A Review on Quantum Cryptography Technology

被引:0
|
作者
Techateerawat, Piya [1 ]
机构
[1] Thammasat Univ, Dept Elect & Comp Engn, Fac Engn, Bangkok, Thailand
来源
INTERNATIONAL TRANSACTION JOURNAL OF ENGINEERING MANAGEMENT & APPLIED SCIENCES & TECHNOLOGIES | 2010年 / 1卷 / 01期
关键词
Quantum Cryptography; QKD; Quantum Key Distribution; BB84; BB92;
D O I
暂无
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Nowadays, the information is exchanged among the computer network. These data and information are involved in business, military, academic education, research and etc. which are shared around the world in both private and public network. Since, many categories of data are required restriction on authorization of access, modify, delete and insert, security in communication is increasingly important to the network communication. Currently, computer security applies mathematic theory to computer security for encrypting and decrypting on both sender and receiver. To use security attack with high performance computer (e.g. quantum computer), attacker can find a key and then obtains the data in feasible period. Quantum cryptography is one of the solutions that use property of polarization to ensure that transmitted data is not trapped by eavesdropper. Quantum cryptography is improved significantly in the last decades including the most two dominant protocol BB84 and BB92. (C) 2010 International Transaction Journal of Engineering, Management, & Applied Sciences & Technologies. Some Rights Reserved.
引用
收藏
页码:35 / 41
页数:7
相关论文
共 50 条
  • [1] Quantum Cryptography: A New Generation of Information Technology Security System
    Sharbaf, Mehrdad S.
    PROCEEDINGS OF THE 2009 SIXTH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS, VOLS 1-3, 2009, : 1644 - 1648
  • [2] Quantum Cryptography for Future Networks Security: A Systematic Review
    Durr-E-Shahwar
    Imran, Muhammad
    Altamimi, Ahmed B.
    Khan, Wilayat
    Hussain, Shariq
    Alsaffar, Mohammad
    IEEE ACCESS, 2024, 12 : 180048 - 180078
  • [3] Review of Security Methods Based on Classical Cryptography and Quantum Cryptography
    Subramani, Shalini
    Selvi, M.
    Kannan, A.
    Svn, Santhosh Kumar
    CYBERNETICS AND SYSTEMS, 2025, 56 (03) : 302 - 320
  • [4] Quantum Cryptography for Information-Theoretic Security Quantum Cryptography
    Sanders, Barry
    TECHNOLOGICAL INNOVATIONS IN SENSING AND DETECTION OF CHEMICAL, BIOLOGICAL, RADIOLOGICAL, NUCLEAR THREATS AND ECOLOGICAL TERRORISM, 2012, : 335 - 343
  • [5] Research in the application of Quantum cryptography communication technology for Launch Vehicle Range
    Ji, Fengzhu
    Zhou, Yunting
    Qiang, Fan
    Yang, Xiaobo
    Tang, Qijie
    Liu, Hongyang
    PROCEEDINGS OF THE 2017 INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND INTELLIGENT MANUFACTURING (ITIM 2017), 2017, 142 : 53 - 55
  • [6] Quantum cryptography and quantum memory
    Wu, TT
    QUANTUM INFORMATION AND COMPUTATION II, 2004, 5436 : 81 - 92
  • [7] Cryptography in Quantum Computing
    Choy, Pam
    Cates, Dustin
    Chehwan, Florent
    Rodriguez, Cindy
    Leider, Avery
    Tappert, Charles C.
    PROCEEDINGS OF THE FUTURE TECHNOLOGIES CONFERENCE (FTC) 2019, VOL 1, 2020, 1069 : 377 - 393
  • [8] Relativistic quantum cryptography
    Radchenko, I. V.
    Kravtsov, K. S.
    Kulik, S. P.
    Molotkov, S. N.
    LASER PHYSICS LETTERS, 2014, 11 (06)
  • [9] A Survey on Quantum Cryptography
    Li Jian
    Li Na
    Zhang Yu
    Wen Shuang
    Du Wei
    Chen Wei
    Ma Wenping
    CHINESE JOURNAL OF ELECTRONICS, 2018, 27 (02) : 223 - 228
  • [10] Quantum cryptography in practice
    Elliott, C
    Pearson, D
    Troxel, G
    ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2003, 33 (04) : 227 - 238