Variations of QKD Protocols Based on Conventional System Measurements: A Literature Review

被引:18
作者
Abushgra, Abdulbast A. [1 ]
机构
[1] Utica Univ, Cybersecur Dept, 1600 Burrstone Rd, Utica, NY 13502 USA
关键词
quantum key distribution protocol; district variable; continues variable; superposition state; quantum bit (qubit); entanglement state; KEY DISTRIBUTION; QUANTUM; SECURITY;
D O I
10.3390/cryptography6010012
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cryptography is an unexpected revolution in information security in the recent decades, where remarkable improvements have been created to provide confidentiality and integrity. Quantum cryptography is one such improvement that has grown rapidly since the first announced protocol. Quantum cryptography contains substantial elements that must be addressed to ensure secure communication between legitimate parties. Quantum key distribution (QKD), a technique for creating a secret key, is one of the most interesting areas in quantum cryptography. This paper reviews some well-known quantum key distribution techniques that have been demonstrated in the past three decades. Furthermore, this paper discusses the process of creating a secret key using quantum mechanics and cryptography methods. Moreover, it explains the relationships between many basic aspects of QKD protocols and suggests some improvements in the cryptosystem. An accurate quantitative comparison between the QKD protocols is presented, especially the runtime execution for each QKD protocol. In addition, the paper will demonstrate a general model of each considered QKD protocol based on security principles.
引用
收藏
页数:25
相关论文
共 63 条
  • [1] Abushgra A., 2015, 2015 Long Island Systems, Applications and Technology, P1
  • [2] Abushgra A., DIFFERENTIATIONS QKD
  • [3] SARG04 and AK15 Protocols Based on the Run-Time Execution and QBER
    Abushgra, Abdulbast A.
    [J]. 2021 IEEE 5TH INTERNATIONAL CONFERENCE ON CRYPTOGRAPHY, SECURITY AND PRIVACY (ICCSP), 2021, : 176 - 180
  • [4] [Anonymous], P INT C INF COMM SEC
  • [5] [Anonymous], 2011, CRYPTOGRAPHY INFORM
  • [6] Barker W.C., 2012, 80067REV1 SP CIT
  • [7] QUANTUM CRYPTOGRAPHY USING ANY 2 NONORTHOGONAL STATES
    BENNETT, CH
    [J]. PHYSICAL REVIEW LETTERS, 1992, 68 (21) : 3121 - 3124
  • [8] Quantum cryptography: Public key distribution and coin tossing
    Bennett, Charles H.
    Brassard, Gilles
    [J]. THEORETICAL COMPUTER SCIENCE, 2014, 560 : 7 - 11
  • [9] Brassard G, 2005, 2005 IEEE INFORMATION THEORY WORKSHOP ON THEORY AND PRACTICE IN INFORMATION-THEORETIC SECURITY, P19
  • [10] Quantum copying: Beyond the no-cloning theorem
    Buzek, V
    Hillery, M
    [J]. PHYSICAL REVIEW A, 1996, 54 (03): : 1844 - 1852