On the security and confidentiality of quantum key distribution

被引:11
作者
Al-Ghamdi, Al-Batool [1 ]
Al-Sulami, Ameenah [1 ]
Aljahdali, Asia Othman [1 ]
机构
[1] Univ Jeddah, Coll Comp Sci & Engn, Jeddah, Saudi Arabia
关键词
photon; quantum key distribution; quantum method; quantum random numbers; secret key;
D O I
10.1002/spy2.111
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cryptography is a scientific method that is used to transmit secret information. In contrast, quantum cryptography depends on physical laws to encrypt information; when the quantum computer appeared, the classic encryption method becomes inefficient. The quantummethod is commonly used to distribute keys, a process called as quantum key distribution (QKD). In this paper, we consider the efficiency of the quantum method compared to classical methods. Also, we discuss the security of QKD against several attacks and provide security analysis based on probabilistic models. Additionally, the paper explains how to encrypt random numbers into a sequence of photons using a QKD system for the distribution of a key. This research demonstrates the efficiency and security ofQKDin sending and distributing keys between communication parties. Thus, both the sender and the receiverwould be able to obtain a security key using the quantum method rather than classical methods.
引用
收藏
页数:14
相关论文
共 60 条
[1]  
Abushgra A, 2015, 2015 IEEE LONG ISLAND SYSTEMS, APPLICATIONS AND TECHNOLOGY CONFERENCE (LISAT)
[2]   Two-dimensional distributed-phase-reference protocol for quantum key distribution [J].
Bacco, Davide ;
Christensen, Jesper Bjerge ;
Castaneda, Mario A. Usuga ;
Ding, Yunhong ;
Forchhammer, Soren ;
Rottwitt, Karsten ;
Oxenlowe, Leif Katsuo .
SCIENTIFIC REPORTS, 2016, 6
[3]  
Baier C, 2008, PRINCIPLES OF MODEL CHECKING, P1
[4]   Synthesis of attack actions using model checking for the verification of security protocols [J].
Basagiannis, Stylianos ;
Katsaros, Panagiotis ;
Pombortsis, Andrew .
SECURITY AND COMMUNICATION NETWORKS, 2011, 4 (02) :147-161
[5]  
Bennett C. H., 1992, Journal of Cryptology, V5, P3, DOI 10.1007/BF00191318
[6]   QUANTUM CRYPTOGRAPHY USING ANY 2 NONORTHOGONAL STATES [J].
BENNETT, CH .
PHYSICAL REVIEW LETTERS, 1992, 68 (21) :3121-3124
[7]   Quantum cryptography: Public key distribution and coin tossing [J].
Bennett, Charles H. ;
Brassard, Gilles .
THEORETICAL COMPUTER SCIENCE, 2014, 560 :7-11
[8]   A proof of the security of quantum key distribution [J].
Biham, Eli ;
Boyer, Michel ;
Boykin, P. Oscar ;
Mor, Tal ;
Roychowdhury, Vwani .
JOURNAL OF CRYPTOLOGY, 2006, 19 (04) :381-439
[9]   Secure Quantum Key Distribution over 421 km of Optical Fiber [J].
Boaron, Alberto ;
Boso, Gianluca ;
Rusca, Davide ;
Vulliez, Cedric ;
Autebert, Claire ;
Caloz, Misael ;
Perrenoud, Matthieu ;
Gras, Gaetan ;
Bussieres, Felix ;
Li, Ming-Jun ;
Nolan, Daniel ;
Martin, Anthony ;
Zbinden, Hugo .
PHYSICAL REVIEW LETTERS, 2018, 121 (19)
[10]  
Born M., 1971, The Born -Einstein Letters (1916-1955)