• Corpus ID: 18346434

A Survey of the Prominent Quantum Key Distribution Protocols

@inproceedings{Haitjema2007ASO,
  title={A Survey of the Prominent Quantum Key Distribution Protocols},
  author={Mart Haitjema},
  year={2007}
}
This paper provides an overview of quantum key distribution targeted towards the computer science community. A brief description of the relevant principles from quantum mechanics is provided before surveying the most prominent quantum key distribution protocols present in the literature. In particular this paper describes the BB84 protocol and its many variants as well as Eckert's approach through quantum entanglement. A brief discussion of some of the issues arising in practical… 

Figures from this paper

Quantum Key Distribution Protocols: A Review

In this paper all the concerned protocols that share a secret key is explained and comparative study of all protocols shown.

Should Quantum Key Distribution be Used for Secure Communications?

  • Computer Science
  • 2020
This work states that new threats on existing cryptography, and in particular the emergence of universal quantum computers, are taken into account by upcoming standardized “post-quantum” algorithms.

Security in Quantum Computing

The purpose of this paper is to describe the quantum encryption methods that can bring more efficiency of security in existing communications and the QKD architecture is presented in this paper.

Quantum Key Distribution using Different Techniques and Algorithms

This research paper concentrates on techniques and algorithms proposed in quantum cryptography with their comparison and contribution in network security.

Quantum Cryptography and Quantum Key Distribution Protocols: A Survey

The emphasis of this paper is to mark the rise of quantum cryptography, its elements, quantum key distribution protocols and quantum networks.

The Impact of Quantum Computing on Present Cryptography

The aim of this paper is to elucidate the implications of quantum computing in present cryptography and to introduce the reader to basic post-quantum algorithms. In particular the reader can delve

DIFFERENT VULNERABILITIES AND CHALLENGES OF QUANTUM KEY DISTRIBUTION PROTOCOL: A REVIEW

Limits and vulnerabilities and attacks to which Quantum Key Distribution can be exposed are examined in this paper.

Cryptography from Quantum mechanical viewpoint

The radical use of quantum mechanics for cryptography is reviewed, which presents a challenge amongst the researchers to develop new cryptographic techniques that can survive the quantum computing era.

Quantum Key Distribution by Exploitation Public Key Cryptography (ECC) In Resource Constrained Devices

This paper presents ECC (Elliptic Curve Cryptography), which provides equivalent security level as RSA (Rivest-Shamir-Adleman) in less key size that is 160 bit key size of ECC which is advantageous for resource constrained devices like cellular phone, personal digital assistants (PDAs), embedded systems, sensors and smart cards.

Implementation of High Dimensional-QKD using BB84 Protocol in the Security of Aerospace Industry

This research discussed the contribution of Airbus Company in aerospace industry and adaptation of Quantum System for solving future challenges, and proposed a HDQKD based Model for Aerial and Non Aerial Communication.

References

SHOWING 1-10 OF 20 REFERENCES

Quantum cryptography: A survey

The quantum-mechanical background needed to present some fundamental protocols from quantum cryptography is provided, and quantum key distribution via the BB84 protocol and its security proof are reviewed.

Security of quantum key distribution with imperfect devices

This paper prove the security of the Bennett-Brassard (BB84) quantum key distribution protocol in the case where the source and detector are under the limited control of an adversary. This proof

Decoy state quantum key distribution.

The method is to use decoy states to detect eavesdropping attacks and has the best of both worlds--enjoying unconditional security guaranteed by the fundamental laws of physics and yet dramatically surpassing some of the best experimental performances reported in the literature.

Security against individual attacks for realistic quantum key distribution

A formula for the secure bit rate per time slot of an experimental setup is obtained which can be used to optimize the performance of existing schemes for the considered scenario.

Quantum cryptography protocols robust against photon number splitting attacks for weak laser pulse implementations.

A new class of quantum key distribution protocols, tailored to be robust against photon number splitting (PNS) attacks are introduced, which differs from the original protocol by Bennett and Brassard (BB84) only in the classical sifting procedure.

A Quick Glance at Quantum Cryptography

  • S. Lomonaco
  • Computer Science, Mathematics
    Cryptologia
  • 1999
It is now possible to construct cryptographic communication systems which detect unauthorized eavesdroppingShould it occur, and which give a guarantee of no eavesdropping should it not occur.

Quantum cryptography based on Bell's theorem.

  • Ekert
  • Mathematics, Physics
    Physical review letters
  • 1991
Practical application of the generalized Bells theorem in the so-called key distribution process in cryptography is reported. The proposed scheme is based on the Bohms version of the

Quantum cryptography using any two nonorthogonal states.

  • Bennett
  • Physics
    Physical review letters
  • 1992
It is shown that in principle any two nonorthogonal quantum states suffice, and a practical interferometric realization using low-intensity coherent light pulses is described.

Quantum cryptography without Bell's theorem.

A related but simpler EPR scheme is described and it is proved it secure against more general attacks, including substitution of a fake EPR source and the original 1984 key distribution scheme of Bennett and Brassard, which uses single particles instead of EPR pairs.

Entangled-photon six-state quantum cryptography

It is demonstrated that for low error rates, the efficiency for secret key generation is higher when using the four-state protocol, than in four- or two-state protocols.