Management of Security in Quantum Cryptography

被引:20
|
作者
Niemiec, Marcin [1 ]
Pach, Andrzej R. [1 ]
机构
[1] AGH Univ Sci & Technol, Dept Telecommun, Krakow, Poland
关键词
D O I
10.1109/MCOM.2013.6576336
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The interest in quantum-based security methods has been growing rapidly in recent years. New implementations of quantum key distribution and new network services supported by this solution are being introduced. The reason behind the growing popularity of quantum cryptography is its unrivaled security level: all eavesdroppers can be revealed through the application of the laws of physics. First of all, the rules of quantum mechanics ensure that any measurement modifies the state of the transmitted quantum bit. This modification can be discovered by the sender and the receiver. This makes passive eavesdropping impossible. Using protocols such as BB84, network users are able to send a string of bits coded by the polarized photons. After that, they can establish secure cryptographic keys through an unsecure channel using different key distillation methods. Major ongoing challenges include the control and management of security in systems using quantum cryptography, as well as tailoring security to specific end users' requirements and services.
引用
收藏
页码:36 / 41
页数:6
相关论文
共 50 条
  • [41] Multimedia security based on quantum cryptography and blockchain
    Pal, Om
    Das, Prem Laxman
    Alam, Bashir
    Murthy, B. K.
    MULTIMEDIA TOOLS AND APPLICATIONS, 2022, 81 (25) : 36585 - 36585
  • [42] Quantum Cryptography: A way of Improving Security of Information
    Panhwar, Muhammad Aamir
    Khuhro, Sijjad Ali
    Mazhar, Tehseen
    Deng ZhongLiang
    Qadir, Nabeel
    INTERNATIONAL JOURNAL OF MATHEMATICS AND COMPUTER SCIENCE, 2021, 16 (01): : 9 - 21
  • [43] Security of quantum cryptography against collective attacks
    Biham, E
    Mor, T
    PHYSICAL REVIEW LETTERS, 1997, 78 (11) : 2256 - 2259
  • [44] Quantum computing and the security of public key cryptography
    Li, Kai
    Yan, Pei-Gen
    Cai, Qing-Yu
    FUNDAMENTAL RESEARCH, 2021, 1 (01): : 85 - 87
  • [45] Quantum Cryptography Trends: A Milestone in Information Security
    Noor-ul-Ain, W.
    Atta-ur-Rahman, M.
    Nadeem, Muhammad
    Abbasi, Abdul Ghafoor
    HYBRID INTELLIGENT SYSTEMS, HIS 2015, 2016, 420 : 25 - 39
  • [46] Security of quantum cryptography against individual attacks
    Slutsky, BA
    Rao, R
    Sun, PC
    Fainman, Y
    PHYSICAL REVIEW A, 1998, 57 (04): : 2383 - 2398
  • [47] Implementing Quantum Cryptography Algorithms for Data Security
    Cangea, Otilia
    Oprina, Carmen Silvia
    Dima, Mihai-Octavian
    2016 8TH INTERNATIONAL CONFERENCE ON ELECTRONICS, COMPUTERS AND ARTIFICIAL INTELLIGENCE (ECAI), 2016,
  • [48] Security Bounds for Quantum Cryptography with Finite Resources
    Scarani, Valerio
    Renner, Renato
    THEORY OF QUANTUM COMPUTATION, COMMUNICATION, AND CRYPTOGRAPHY, 2008, 5106 : 83 - +
  • [49] Quantum cryptography in the security of cognitive radio networks
    Ezhilarasi, I. Evelyn
    Clement, J. Christopher
    Agnes, Nalini Vincent
    PHYSICA SCRIPTA, 2024, 99 (11)
  • [50] Quantum information processing - Quantum cryptography toward ultimate security
    Shimizu, K
    Imoto, N
    NTT REVIEW, 2000, 12 (01): : 26 - 31