On the security and confidentiality of quantum key distribution

被引:11
作者
Al-Ghamdi, Al-Batool [1 ]
Al-Sulami, Ameenah [1 ]
Aljahdali, Asia Othman [1 ]
机构
[1] Univ Jeddah, Coll Comp Sci & Engn, Jeddah, Saudi Arabia
关键词
photon; quantum key distribution; quantum method; quantum random numbers; secret key;
D O I
10.1002/spy2.111
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cryptography is a scientific method that is used to transmit secret information. In contrast, quantum cryptography depends on physical laws to encrypt information; when the quantum computer appeared, the classic encryption method becomes inefficient. The quantummethod is commonly used to distribute keys, a process called as quantum key distribution (QKD). In this paper, we consider the efficiency of the quantum method compared to classical methods. Also, we discuss the security of QKD against several attacks and provide security analysis based on probabilistic models. Additionally, the paper explains how to encrypt random numbers into a sequence of photons using a QKD system for the distribution of a key. This research demonstrates the efficiency and security ofQKDin sending and distributing keys between communication parties. Thus, both the sender and the receiverwould be able to obtain a security key using the quantum method rather than classical methods.
引用
收藏
页数:14
相关论文
共 60 条
[41]  
Omer B, 2000, THESIS TU VIENNA
[42]   Attacks on quantum key distribution protocols that employ non-ITS authentication [J].
Pacher, C. ;
Abidin, A. ;
Loruenser, T. ;
Peev, M. ;
Ursin, R. ;
Zeilinger, A. ;
Larsson, J. -A. .
QUANTUM INFORMATION PROCESSING, 2016, 15 (01) :327-362
[43]  
Papanikolaou N.K., 2005, THESIS U WARWICK COV
[44]  
Paterson K.G., 2007, Proc. of NATO Advanced Research Workshop on Quantum Communication and Security, P175
[45]   Practical quantum key distribution with polarization entangled photons [J].
Poppe, A ;
Fedrizzi, A ;
Ursin, R ;
Böhm, HR ;
Lorünser, T ;
Maurhardt, O ;
Peev, M ;
Suda, M ;
Kurtsiefer, C ;
Weinfurter, H ;
Jennewein, T ;
Zeilinger, A .
OPTICS EXPRESS, 2004, 12 (16) :3865-3871
[46]   Quantum cryptography protocols robust against photon number splitting attacks for weak laser pulse implementations -: art. no. 057901 [J].
Scarani, V ;
Acín, A ;
Ribordy, G ;
Gisin, N .
PHYSICAL REVIEW LETTERS, 2004, 92 (05) :4
[47]  
Serna E. H., 2013, ARXIV PREPRINT ARXIV
[48]  
Serna EH, 2009, ARXIV PREPRINT ARXIV
[49]   Simple proof of security of the BB84 quantum key distribution protocol [J].
Shor, PW ;
Preskill, J .
PHYSICAL REVIEW LETTERS, 2000, 85 (02) :441-444
[50]   Continuous variable quantum cryptography:: Beating the 3 dB loss limit -: art. no. 167901 [J].
Silberhorn, C ;
Ralph, TC ;
Lütkenhaus, N ;
Leuchs, G .
PHYSICAL REVIEW LETTERS, 2002, 89 (16)