Quantum Key Distribution
نویسندگان
چکیده
منابع مشابه
Quantum key distribution with trusted quantum relay
A trusted quantum relay is introduced to enable quantum key distribution links to form the basic legs in a quantum key distribution network. The idea is based on the well-known intercept/resend eavesdropping. The same scheme can be used to make quantum key distribution between several parties. No entanglement is required.
متن کاملSECURITY USING QUANTUM KEY DISTRIBUTION PROTOCOLS (QKDPs)
Most cryptographic mechanisms such as symmetric and asymmetric cryptography, often involve the use of cryptographic keys. However, all cryptographic techniques will be ineffective if the key distribution mechanism is weak. Quantum Key Distribution or Quantum Cryptography is attracting much attention as a solution of the problem of Key Distribution; QKD offers unconditionally secure communicatio...
متن کاملQuantum Key Distribution Protocols: A Survey
Most cryptographic mechanisms, such as symmetric and asymmetric cryptography, often involve the use of cryptographic keys. However, all cryptographic techniques will be ineffective if the key distribution mechanism is weak. The security of most modern cryptographic systems of key distribution mechanism is based on computational complexity and the extraordinary time needed to break the code. Qua...
متن کاملFree-Space Optical Quantum Key Distribution Using Intersatellite Links
Communication schemes employing quantum entanglement open a wide field of possible applications with properties outperforming their classical counterparts. Promising examples are quantum key distribution, quantum dense coding, and quantum state teleportation. We investigate the potential of quantum cryptography, i.e. quantum key distribution (QKD), with special emphasis on the demands and oppor...
متن کاملMutual Authentication Mechanism using Pre-Shared Key and BB84 Quantum Key Distribution for Quantum Cryptography Communication
It is believed that the quantum cryptography based on quantum key distribution achieves unconditional security. However, the additional authentication mechanism applied to the quantum cryptography needs to be studied since it is difficult for the quantum cryptography alone to prevent manin-the-middle attacks. Thus, we propose two authentication mechanisms combined with modern cryptography that ...
متن کاملSecured Communication Protocol via Encrypted Key Ensuring Message Integrity
The Secured communication protocol via encrypted key ensuring message integrity combination of Authentication of Third Party Authentication Quantum Key Distribute Protocol (implicit) and Third Party Authentication Quantum Key Distribute Protocol Mutual Authentication (explicit) quantum cryptography is used to provide authenticated secure communication between sender and Receiver. In quantum cry...
متن کامل