Quantum Cryptographic Key Distribution Protocols
نویسندگان
چکیده
The application of the principles of quantum mechanics to cryptography has led to a respectable new dimension in confidential communication. As a result of these developments, it is now possible to construct cryptographic communication systems which detect unauthorized eavesdropping should it occur, and which give a incontestable guarantee of no eavesdropping should it not occur. Here several protocols for such communication systems are explored. We first examine quantum bit commitment protocols which are proven as not being unconditionally secure, then, we take a look at proposed protocols which are constructed to disprove the proofs claiming that unconditionally secure quantum bit commitment protocols are impossible.
منابع مشابه
Quantum Key Distribution Protocols: A Survey
Most cryptographic mechanisms, such as symmetric and asymmetric cryptography, often involve the use of cryptographic keys. However, all cryptographic techniques will be ineffective if the key distribution mechanism is weak. The security of most modern cryptographic systems of key distribution mechanism is based on computational complexity and the extraordinary time needed to break the code. Qua...
متن کاملAbstract: Promising advances in the field of quantum computing indicate a growing threat to cryptographic protocols based on integer factorization
Promising advances in the field of quantum computing indicate a growing threat to cryptographic protocols based on integer factorization. To counter this threat, researchers have already designed and tested alternative protocols that do not rely on factorization. Quantum key distribution, a cryptographic mechanism that relies on the inherent randomness of quantum mechanics, serves not only as a...
متن کاملSECURITY USING QUANTUM KEY DISTRIBUTION PROTOCOLS (QKDPs)
Most cryptographic mechanisms such as symmetric and asymmetric cryptography, often involve the use of cryptographic keys. However, all cryptographic techniques will be ineffective if the key distribution mechanism is weak. Quantum Key Distribution or Quantum Cryptography is attracting much attention as a solution of the problem of Key Distribution; QKD offers unconditionally secure communicatio...
متن کاملFinite Key Size Analysis of Two-Way Quantum Cryptography
Quantum cryptographic protocols solve the longstanding problem of distributing a shared secret string to two distant users by typically making use of one-way quantum channel. However, alternative protocols exploiting two-way quantum channel have been proposed for the same goal and with potential advantages. Here, we overview a security proof for two-way quantum key distribution protocols, again...
متن کاملError tolerance of two-basis quantum key-distribution protocols using qudits and two-way classical communication
We investigate the error tolerance of quantum cryptographic protocols using d-level systems. In particular, we focus on prepare-and-measure schemes that use two mutually unbiased bases and a key-distillation procedure with two-way classical communication. For arbitrary quantum channels, we obtain a sufficient condition for secret-key distillation which, in the case of isotropic quantum channels...
متن کاملCryptographic security of quantum key distribution
This work is intended as an introduction to cryptographic security and a motivation for the widely used Quantum Key Distribution (QKD) security definition. We review the notion of security necessary for a protocol to be usable in a larger cryptographic context, i.e., for it to remain secure when composed with other secure protocols. We then derive the corresponding security criterion for QKD. W...
متن کامل