Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Quantum Key Distribution (QKD):A Review on Technology, Recent Developments and Future Prospects


Affiliations
1 Department of ECE, Kumaraguru College of Technology, Coimbatore, India
     

   Subscribe/Renew Journal


Quantum Key Distribution (QKD) provides promising secure communication, the crucial need for online security in Public Key Infrastructure (PKI). QKD is mainly used for distribution of keys securely between two parties and is a commercially available application of Quantum Cryptography (QC). QKD has the ability to enable the authenticated users to detect unwanted attempts by the intruder in trying to gain knowledge of the secret key. Through the fundamental nature of quantum mechanics, in Principle QKD has the distinction of being, unshakable. Quantum cryptography harnesses the counterintuitive behavior of elementary particles such as photons and ensures the confidentiality of information transmitted between two parties. There are many QKD protocols that provide a secure key which include BB84 protocol, BB92 protocol, SARG04 protocol, E91 protocol, COW protocol, DPS protocol ect. In this review the trends and challenges in Quantum Key Distribution is discussed .Also the contribution of QKD towards network security is presented by analyzing its strengths and weakness.

Keywords

Quantum Mechanics, Quantum Key Distribution, Quantum Cryptography, QKD Protocols, PKI, Network Security.
Subscription Login to verify subscription
User
Notifications
Font Size


  • C. H. Bennett, “Quantum cryptography: Uncertainty in the service of Privacy”, Science, vol.257, 752-753 (1992).
  • N. Lutkenhaus, “Security against eaves dropping in quantum cryptography,” Phys. Rev. A, Vol 54. (1996).
  • Bennett, C. H. and Brassard, G. Quantum cryptography: public key distribution and coin tossing. In Proc. IEEE Int. Conf. Comp. Systems Signal Processing 175–179 (IEEE, 1984).
  • X. B. Wang, “Beating the photon-number-splitting attack in practical quantum cryptography,” Phys. Rev. lett, Vol 94. (2005).
  • Tang, Y.-L. etal. Source attack of decoy-state quantum key distribution using phase information. Phys. Rev. A 88, 022308 (2013).
  • H. K. Lo, X. Ma and K. Chen, “Decoy State Quantum Key Distribution,” Phys. Rev. lett, Vol 94. (2005).
  • Ma, X., Fung, C.-H. F. and Lo, H.-K. Quantum key distribution with entangled photon sources. Phys. Rev. A 76, 012307 (2007).
  • Inoue, K., Waks, E. and Yamamoto, Y. Differential phase shift quantum key distribution. Phys. Rev. Lett. 89, 037902 (2002).
  • Yuan, Z. L., Sharpe, A. W. and Shields, A. J. Unconditionally secure one-way quantum key distribution using decoy pulses. Appl. Phys. Lett. 90, 011118 (2007).
  • Young, A., “The future of cryptography: Practice and Theory”, IEEE IT Professional Journal, 62-64 (2003).
  • Buttler, W.T. et al.: “Free Space QuantumKey Distribution”, Physics Review – A, Vol.57, 2379 – 2382 (1998).
  • N. Lutkenhaus, “Security against individual attacks for realistic Quantum Key Distribution”, Phys. Rev. A, Vol 61. (2000).
  • K. Patel et al., “Co exsistance of high bit rate quantum key distribution and data on optical fiber.” Phys Rev, X, Vol 2 No 4 (2012).
  • Tanaka, A. et al. High-speed quantum key distribution system for 1-Mbps real-time key generation. IEEE J. Quant. Electron. 48, 542–550 (2012).

Abstract Views: 133

PDF Views: 0




  • Quantum Key Distribution (QKD):A Review on Technology, Recent Developments and Future Prospects

Abstract Views: 133  |  PDF Views: 0

Authors

S. Krithika
Department of ECE, Kumaraguru College of Technology, Coimbatore, India

Abstract


Quantum Key Distribution (QKD) provides promising secure communication, the crucial need for online security in Public Key Infrastructure (PKI). QKD is mainly used for distribution of keys securely between two parties and is a commercially available application of Quantum Cryptography (QC). QKD has the ability to enable the authenticated users to detect unwanted attempts by the intruder in trying to gain knowledge of the secret key. Through the fundamental nature of quantum mechanics, in Principle QKD has the distinction of being, unshakable. Quantum cryptography harnesses the counterintuitive behavior of elementary particles such as photons and ensures the confidentiality of information transmitted between two parties. There are many QKD protocols that provide a secure key which include BB84 protocol, BB92 protocol, SARG04 protocol, E91 protocol, COW protocol, DPS protocol ect. In this review the trends and challenges in Quantum Key Distribution is discussed .Also the contribution of QKD towards network security is presented by analyzing its strengths and weakness.

Keywords


Quantum Mechanics, Quantum Key Distribution, Quantum Cryptography, QKD Protocols, PKI, Network Security.

References