# A Survey of the Prominent Quantum Key Distribution Protocols

@inproceedings{Haitjema2007ASO, title={A Survey of the Prominent Quantum Key Distribution Protocols}, author={Mart Haitjema}, year={2007} }

This paper provides an overview of quantum key distribution targeted towards the computer science community. A brief description of the relevant principles from quantum mechanics is provided before surveying the most prominent quantum key distribution protocols present in the literature. In particular this paper describes the BB84 protocol and its many variants as well as Eckert's approach through quantum entanglement. A brief discussion of some of the issues arising in practical…

## 19 Citations

### Quantum Key Distribution Protocols: A Review

- Computer Science, Mathematics
- 2014

In this paper all the concerned protocols that share a secret key is explained and comparative study of all protocols shown.

### Should Quantum Key Distribution be Used for Secure Communications?

- Computer Science
- 2020

This work states that new threats on existing cryptography, and in particular the emergence of universal quantum computers, are taken into account by upcoming standardized “post-quantum” algorithms.

### Security in Quantum Computing

- Computer ScienceAnnals of Disaster Risk Sciences
- 2020

The purpose of this paper is to describe the quantum encryption methods that can bring more efficiency of security in existing communications and the QKD architecture is presented in this paper.

### Quantum Key Distribution using Different Techniques and Algorithms

- Computer Science, Mathematics
- 2014

This research paper concentrates on techniques and algorithms proposed in quantum cryptography with their comparison and contribution in network security.

### Quantum Cryptography and Quantum Key Distribution Protocols: A Survey

- Computer Science, Physics2016 IEEE 6th International Conference on Advanced Computing (IACC)
- 2016

The emphasis of this paper is to mark the rise of quantum cryptography, its elements, quantum key distribution protocols and quantum networks.

### The Impact of Quantum Computing on Present Cryptography

- Computer Science, MathematicsArXiv
- 2018

The aim of this paper is to elucidate the implications
of quantum computing in present cryptography and
to introduce the reader to basic post-quantum algorithms. In
particular the reader can delve…

### DIFFERENT VULNERABILITIES AND CHALLENGES OF QUANTUM KEY DISTRIBUTION PROTOCOL: A REVIEW

- Computer Science
- 2017

Limits and vulnerabilities and attacks to which Quantum Key Distribution can be exposed are examined in this paper.

### Cryptography from Quantum mechanical viewpoint

- Computer Science, MathematicsArXiv
- 2014

The radical use of quantum mechanics for cryptography is reviewed, which presents a challenge amongst the researchers to develop new cryptographic techniques that can survive the quantum computing era.

### Quantum Key Distribution by Exploitation Public Key Cryptography (ECC) In Resource Constrained Devices

- Computer Science, Mathematics
- 2015

This paper presents ECC (Elliptic Curve Cryptography), which provides equivalent security level as RSA (Rivest-Shamir-Adleman) in less key size that is 160 bit key size of ECC which is advantageous for resource constrained devices like cellular phone, personal digital assistants (PDAs), embedded systems, sensors and smart cards.

### Implementation of High Dimensional-QKD using BB84 Protocol in the Security of Aerospace Industry

- Computer Science2019 International Conference on Innovative Computing (ICIC)
- 2019

This research discussed the contribution of Airbus Company in aerospace industry and adaptation of Quantum System for solving future challenges, and proposed a HDQKD based Model for Aerial and Non Aerial Communication.

## References

SHOWING 1-10 OF 20 REFERENCES

### Quantum cryptography: A survey

- Computer Science, MathematicsCSUR
- 2007

The quantum-mechanical background needed to present some fundamental protocols from quantum cryptography is provided, and quantum key distribution via the BB84 protocol and its security proof are reviewed.

### Security of quantum key distribution with imperfect devices

- Computer ScienceInternational Symposium onInformation Theory, 2004. ISIT 2004. Proceedings.
- 2004

This paper prove the security of the Bennett-Brassard (BB84) quantum key distribution protocol in the case where the source and detector are under the limited control of an adversary. This proof…

### Decoy state quantum key distribution.

- Physics, Computer SciencePhysical review letters
- 2005

The method is to use decoy states to detect eavesdropping attacks and has the best of both worlds--enjoying unconditional security guaranteed by the fundamental laws of physics and yet dramatically surpassing some of the best experimental performances reported in the literature.

### Security against individual attacks for realistic quantum key distribution

- Computer Science
- 2000

A formula for the secure bit rate per time slot of an experimental setup is obtained which can be used to optimize the performance of existing schemes for the considered scenario.

### Quantum cryptography protocols robust against photon number splitting attacks for weak laser pulse implementations.

- Computer Science, MathematicsPhysical review letters
- 2004

A new class of quantum key distribution protocols, tailored to be robust against photon number splitting (PNS) attacks are introduced, which differs from the original protocol by Bennett and Brassard (BB84) only in the classical sifting procedure.

### A Quick Glance at Quantum Cryptography

- Computer Science, MathematicsCryptologia
- 1999

It is now possible to construct cryptographic communication systems which detect unauthorized eavesdroppingShould it occur, and which give a guarantee of no eavesdropping should it not occur.

### Quantum cryptography based on Bell's theorem.

- Mathematics, PhysicsPhysical review letters
- 1991

Practical application of the generalized Bells theorem in the so-called key distribution process in cryptography is reported. The proposed scheme is based on the Bohms version of the…

### Quantum cryptography using any two nonorthogonal states.

- PhysicsPhysical review letters
- 1992

It is shown that in principle any two nonorthogonal quantum states suffice, and a practical interferometric realization using low-intensity coherent light pulses is described.

### Quantum cryptography without Bell's theorem.

- Mathematics, Computer SciencePhysical review letters
- 1992

A related but simpler EPR scheme is described and it is proved it secure against more general attacks, including substitution of a fake EPR source and the original 1984 key distribution scheme of Bennett and Brassard, which uses single particles instead of EPR pairs.

### Entangled-photon six-state quantum cryptography

- Physics, Computer Science
- 2002

It is demonstrated that for low error rates, the efficiency for secret key generation is higher when using the four-state protocol, than in four- or two-state protocols.