Quantum Key Distribution : A Comprehensive Study

Authors

  • Bhavesh B. Prajapati  Assistant Professor, IT Department, L.D.College of Engineering, Ahmedabad, Gujarat, India

Keywords:

Quantum Cryptography, Quantum Key Distribution, Entanglement, BB84 Protocol, No-Cloning Theorem

Abstract

Cryptography is age old technique used for secret communication of messages. Quantum cryptography is providing cryptographic solutions based on laws of quantum physics. Quantum public key distribution is prominent solution using which two parties can communicate securely using quantum physics. Heisenberg uncertainty principle, no cloning theorem and photon polarization are used as basic properties for quantum key distribution. Photons are basic quantum particles and they are quantized for encryption. They are also known as qubits. This paper discusses concepts behind quantum key distribution and how it is secure against eavesdropper and future advances in technology.

References

  1. Vittorio, S., 2002, "Quantum Cryptography: Privacy Through Uncertainty" http://www.csa.com/discoveryguides/crypt/overview.php
  2. Id Quantique White Paper, 2005, "Understanding Quantum Cryptography" http://www.idquantique.com/products/files/vectis-understanding.pdf
  3. Ford, J., 1996, "Quantum Cryptography Tutorial" http://www.cs.dartmouth.edu/~jford/crypto.html#1
  4. Bennett, C.H., Brassard, G., 1984, "Quantum Cryptography: Public Key Distribution and Coin Tossing"
  5. Bennett, C.H., 1992,"Quantum Cryptography: Uncertainty in the Service of Privacy"
  6. Papanikolaou, N., 2004, "Techniques For Design And Validation Of Quantum Protocols"
  7. Goldwater, S., 1996, "Quantum Cryptography and Privacy Amplification" http://www.ai.sri.com/~goldwate/quantum.html
  8. Gisin, N., Ribordy, G., Tittel, W., Zbinden, H., 2004 , "Quantum cryptography"
  9. Fuchs, C. A., Gisin, N., Gr?ffiths, R. B., Niu, C. S., Peres, A. , 1997, "Optimal Eavesdropping In Quantum Cryptography. I. Information bound and optimal strategy"
  10. Petra Pajic, 2013, "Quantum Cryptography"
  11. D.J. Bernstein, 2009 Post-Quantum Cryptography, Springer
  12. Bhavesh Prajapati, 2014, Quantum Cryptography: A comprehensive study, IJSRSET
  13. Anand Sharma, S.K.Lenka, 2014, Authentication in Online Banking Systems: Quantum Cryptography Perspective, International Journal of Scientific & Engineering Research
  14. Bhavesh Prajapati, 2015, 'A Brief Study of Quantum Cryptography Applications', International journal of scientific research in science and technology.
  15. Xiaoqing Tan, Introduction to Quantum Cryptography, IntechOpen

Downloads

Published

2016-06-30

Issue

Section

Research Articles

How to Cite

[1]
Bhavesh B. Prajapati, " Quantum Key Distribution : A Comprehensive Study, International Journal of Scientific Research in Science and Technology(IJSRST), Online ISSN : 2395-602X, Print ISSN : 2395-6011, Volume 2, Issue 3, pp.400-403, May-June-2016.