Quantum Key Distribution (QKD) Protocols: A Survey

A. Nurhadi, N. Syambas
{"title":"Quantum Key Distribution (QKD) Protocols: A Survey","authors":"A. Nurhadi, N. Syambas","doi":"10.1109/ICWT.2018.8527822","DOIUrl":null,"url":null,"abstract":"The security strength of key distribution of most conventional cryptography is relied on mathematical complexity and the irrational time needed to break the algorithm. But it will be ineffective if the secret key distribution procedure is weak. In 1994 Peter Shor proposed an algorithm that can factorize great integer number efficiently by using principle of quantum computer, this algorithm poses a threat to some of the conventional cryptography. Recently, Quantum Key Distribution (QKD) is drawing much attention of researcher as a solution of that problem of key distribution. Theoretically, QKD have been proven can be provide unconditionally secure communication based on quantum mechanics laws. In this article we survey the QKD protocols. Also, we present a little experiment of some QKD protocols that we discussed on this paper.","PeriodicalId":356888,"journal":{"name":"2018 4th International Conference on Wireless and Telematics (ICWT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"32","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 4th International Conference on Wireless and Telematics (ICWT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICWT.2018.8527822","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 32

Abstract

The security strength of key distribution of most conventional cryptography is relied on mathematical complexity and the irrational time needed to break the algorithm. But it will be ineffective if the secret key distribution procedure is weak. In 1994 Peter Shor proposed an algorithm that can factorize great integer number efficiently by using principle of quantum computer, this algorithm poses a threat to some of the conventional cryptography. Recently, Quantum Key Distribution (QKD) is drawing much attention of researcher as a solution of that problem of key distribution. Theoretically, QKD have been proven can be provide unconditionally secure communication based on quantum mechanics laws. In this article we survey the QKD protocols. Also, we present a little experiment of some QKD protocols that we discussed on this paper.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
量子密钥分发(QKD)协议综述
大多数传统密码学密钥分发的安全强度依赖于数学复杂性和破解算法所需的不合理时间。但如果密钥分配过程较弱,则会导致密钥分配失效。1994年,Peter Shor利用量子计算机原理提出了一种能有效分解大整数的算法,该算法对一些传统的密码学方法构成了威胁。近年来,量子密钥分发(QKD)作为一种解决密钥分发问题的方法受到了研究人员的广泛关注。理论上,量子密钥分配已经被证明可以提供基于量子力学定律的无条件安全通信。在本文中,我们概述了QKD协议。此外,我们还对本文讨论的一些QKD协议进行了一个小实验。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Quantum Key Distribution (QKD) Protocols: A Survey Designing Electronic Module on Synthetic Polymer Material Based on Green Chemistry Proximity-Coupled Multiband Substrate Integrated Waveguide Antenna with Defected Ground Structure System Design of Controlling and Monitoring on Aquaponic Based on Internet of Things Design and Implementation of SDR-Based GSM Mobile BTS for Remote and Disaster Affected Areas
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1