Management of Security in Quantum Cryptography

被引:20
|
作者
Niemiec, Marcin [1 ]
Pach, Andrzej R. [1 ]
机构
[1] AGH Univ Sci & Technol, Dept Telecommun, Krakow, Poland
关键词
D O I
10.1109/MCOM.2013.6576336
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The interest in quantum-based security methods has been growing rapidly in recent years. New implementations of quantum key distribution and new network services supported by this solution are being introduced. The reason behind the growing popularity of quantum cryptography is its unrivaled security level: all eavesdroppers can be revealed through the application of the laws of physics. First of all, the rules of quantum mechanics ensure that any measurement modifies the state of the transmitted quantum bit. This modification can be discovered by the sender and the receiver. This makes passive eavesdropping impossible. Using protocols such as BB84, network users are able to send a string of bits coded by the polarized photons. After that, they can establish secure cryptographic keys through an unsecure channel using different key distillation methods. Major ongoing challenges include the control and management of security in systems using quantum cryptography, as well as tailoring security to specific end users' requirements and services.
引用
收藏
页码:36 / 41
页数:6
相关论文
共 50 条
  • [21] Quantum cryptography for internet of things security
    Bhatt A.P.
    Sharma A.
    Journal of Electronic Science and Technology, 2019, 17 (03) : 213 - 220
  • [22] Quantum Cryptography for Internet of Things Security
    Alekha Parimal Bhatt
    Anand Sharma
    Journal of Electronic Science and Technology, 2019, 17 (03) : 213 - 220
  • [23] Bounds on information and the security of quantum cryptography
    Biham, E
    Mor, T
    PHYSICAL REVIEW LETTERS, 1997, 79 (20) : 4034 - 4037
  • [24] Quantum Cryptography - The Analysis of Security Requirements
    Niemiec, Marcin
    ICTON: 2009 11TH INTERNATIONAL CONFERENCE ON TRANSPARENT OPTICAL NETWORKS, VOLS 1 AND 2, 2009, : 814 - 817
  • [25] Quantum Cryptography for Internet of Things Security
    Alekha Parimal Bhatt
    Anand Sharma
    Journal of Electronic Science and Technology, 2019, (03) : 213 - 220
  • [26] Security against eavesdropping in quantum cryptography
    Lutkenhaus, N
    Barnett, SM
    QUANTUM COMMUNICATION, COMPUTING, AND MEASUREMENT, 1997, : 89 - 98
  • [27] Review of Security Methods Based on Classical Cryptography and Quantum Cryptography
    Subramani, Shalini
    Selvi, M.
    Kannan, A.
    Svn, Santhosh Kumar
    CYBERNETICS AND SYSTEMS, 2025, 56 (03) : 302 - 320
  • [28] A note on quantum security for post-quantum cryptography
    Song, Fang
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2014, 8772 : 246 - 265
  • [29] A Note on Quantum Security for Post-Quantum Cryptography
    Song, Fang
    POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2014, 2014, 8772 : 246 - 265
  • [30] Effect of source tampering in the security of quantum cryptography
    Sun, Shi-Hai
    Xu, Feihu
    Jiang, Mu-Sheng
    Ma, Xiang-Chun
    Lo, Hoi-Kwong
    Liang, Lin-Mei
    PHYSICAL REVIEW A, 2015, 92 (02):