Brief Study of Quantum Cryptography Applications

Authors

  • Bhavesh B. Prajapati  Assistant Professor, IT Department, L. D. College of Engineering, Ahmedabad, India

Keywords:

Cryptography Applications, Quantum Cryptography Quantum Key Distribution Protocol, Quantum Internet, E-Governance, E-Commerce, Space Communication.

Abstract

Quantum cryptography is gaining importance among IT security practitioners day by day. Theory of quantum cryptography is quite sound and its practical implementations are also becoming mature day by day. With mature technology many applications can use quantum cryptography as back bone like secure key distribution, secure direct communications, large prime factorization, e-commerce, e-governance, quantum internet and many more. In this paper we are discussing possibilities of quantum cryptography applications.

References

  1. Vittorio, S., 2002, "Quantum Cryptography: Privacy Through Uncertainty" http://www.csa.com/discoveryguides/crypt/overview.php
  2. Id Quantique White Paper, 2005, "Understanding Quantum Cryptography" http://www.idquantique.com/products/files/vectis-understanding.pdf
  3. Ford, J., 1996, "Quantum Cryptography Tutorial" http://www.cs.dartmouth.edu/~jford/crypto.html#1
  4. Bennett, C.H., Brassard, G., 1984, "Quantum Cryptography: Public Key Distribution and Coin Tossing"
  5. Bennett, C.H., 1992,"Quantum Cryptography: Uncertainty in the Service of Privacy"
  6. Papanikolaou, N., 2004, "Techniques For Design And Validation Of Quantum Protocols"
  7. Goldwater, S., 1996, "Quantum Cryptography and Privacy Amplification" http://www.ai.sri.com/~goldwate/quantum.html
  8. Gisin, N., Ribordy, G., Tittel, W., Zbinden, H., 2004 , "Quantum cryptography"
  9. Fuchs, C. A., Gisin, N., Griffiths, R. B., Niu, C. S., Peres, A. , 1997, "Optimal Eavesdropping In Quantum Cryptography. I. Information bound and optimal strategy"
  10. Petra Pajic, 2013, "Quantum Cryptography"
  11. D.J. Bernstein, 2009 Post-Quantum Cryptography, Springer
  12. Bhavesh Prajapati, 2014, Quantum Cryptography: A comprehensive study, IJSRSET
  13. Anand Sharma, S.K.Lenka, 2014, Authentication in Online Banking Systems: Quantum Cryptography Perspective, International Journal of Scientific & Engineering Research

Downloads

Published

2015-12-30

Issue

Section

Research Articles

How to Cite

[1]
Bhavesh B. Prajapati, " Brief Study of Quantum Cryptography Applications, International Journal of Scientific Research in Science and Technology(IJSRST), Online ISSN : 2395-602X, Print ISSN : 2395-6011, Volume 1, Issue 5, pp.360-362, November-December-2015.