[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/1838002.1838046acmotherconferencesArticle/Chapter ViewAbstractPublication PagesfitConference Proceedingsconference-collections
research-article

A survey of quantum key distribution protocols

Published: 16 December 2009 Publication History

Abstract

Quantum cryptography offers a promising unbreakable cryptographic solution as it ensures perfect secrecy in applications such as quantum key distribution and bit commitment. The focus of this paper is to trace the development of quantum key distribution protocols and discuss the state of the art and open issues in this field. Although the protocols have mathematically proven to be totally secure, it must be emphasized that any real world implementation suffers the limitations of physical devices which can serve as vulnerability for an eavesdropper to exploit. In this paper, we survey the quantum key distribution protocols which exist in literature and explore the attacks to which they are vulnerable. We highlight the main implementation bottlenecks related with each implementation and the solutions proposed thereof.

References

[1]
Bennett, C. H. and Brassard, G. 1984. Quantum cryptography: Public-key distribution and coin tossing. In Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, India, December 1984, pp. 175--179.
[2]
Wiesner, S., "Conjugate coding", Sigact News, vol. 15, no. 1, 1983, pp. 78--88
[3]
Ekert, A. K., "Quantum cryptography based on Bell's theorem", Physical Review Letters, vol. 67, no. 6, 5 August 1991, pp. 661--663.
[4]
A Quick Glance at Quantum Cryptography (Cryptologia, Vol. 23, No. 1, January, 1999, pp. 1--41.)
[5]
Brassard, G., Lutkenhaus, N., Mor, T. and Sanders, B. C., "Limitations on Practical Quantum Cryptography", Physical Review Letters, vol. 85, no. 6, 7 August 2000, pp. 1330--1333.
[6]
Bennett, C. H., "Quantum cryptography using any two nonorthogonal states", Physical Review Letters, vol. 68, no. 21, 25 May 1992, pp. 3121--2124.
[7]
Gumus, E., Aydin, G. Z., Aydin, M. A., "Quantum cryptography and comparison of quantum key distribution protocols", Journal of Electrical and Electronics Engineering, vol. 8, no. 1, 2008, pp. 503--510.
[8]
Huttner, B., Imoto, N., Gisin, N., and Mor, T., Quantum cryptography with coherent states", Physical Review Letters, vol. 51, 1995, pp. 1863--1869
[9]
Lutkenhaus, N., "Security against individual attacks for realistic quantum key distribution", Physical Review Letters, vol. A 61, no. 5, 2000, pp. 052304.
[10]
Ekert, A. K., Rarity, J. G., Tapster, P. R., and Palma, G. M., "Practical quantum cryptography based on two-photon interferometry", Physical Review Letters, vol. 69, no. 9, 1992, pp. 1293--1295.
[11]
Marcikic, I., Reidmatten, H., Tittel, W., Scarani, V., Zbinden, H., and Gisin, N., Time-bin entangled qubits for quantum communication created by femtosecond pulses Physical Review Letters, vol. A 66, no. 6, 2002, pp. 062308--0623124.
[12]
Bennett, C. H., Brassard, G. and Mermin, N. D., "Quantum cryptography with-out Bell's theorem", Physical Review Letters, vol. 68, no. 5, 3 February 1992, pp. 557--559.
[13]
Bruß, D., "Optimal Eavesdropping in Quantum Cryptography with Six States," Physical Review Letters, vol. 81, 1998, pp. 3018
[14]
Scarani, V., Acin, A., Ribordy, G., and Gisin, N., "Quantum Cryptography Protocols Robust against Photon Number Splitting Attacks for Weak Laser Pulse Implementations", Physical Review Letters, vol. 92, 2004, pp. 057901
[15]
Hwang, W. Y., "Quantum key distribution with high loss: Toward global secure communication", Physical Review Letters, vol. 91, 2003, pp. 057901
[16]
Lo, H-K., "Error correction and security in quantum cryptography", in Proc. of IEEE International Symposium on Information Theory (ISIT) 2004, p. 137 (IEEE Press. 2004)
[17]
Wootters, W. K., and Zurek, W. H., "A single Quantum cannot be cloned", Nature 299 (1982), pp. 802--803.
[18]
Mauerer, W., Helwig, W., Silberhorn, Ch., "Recent developments in quantum key distribution: Theory and practice", Annalen der Physik, vol. 17, no. 2--3, 2008, pp. 158--175.

Cited By

View all
  • (2023)Quantum Communication Systems: Vision, Protocols, Applications, and ChallengesIEEE Access10.1109/ACCESS.2023.324439511(15855-15877)Online publication date: 2023
  • (2023)Comparative Analysis of Quantum Key Distribution Protocols: Security, Efficiency, and PracticalityArtificial Intelligence of Things10.1007/978-3-031-48774-3_10(151-163)Online publication date: 3-Dec-2023
  • (2022)Quantum Key Distribution for Secure CommunicationsInternational Journal of Innovations in Science and Technology10.33411/IJIST/20220404064:4(173-183)Online publication date: 30-Oct-2022
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
FIT '09: Proceedings of the 7th International Conference on Frontiers of Information Technology
December 2009
446 pages
ISBN:9781605586427
DOI:10.1145/1838002
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

  • COMSATS Institute of Information Technology

In-Cooperation

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 16 December 2009

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. key distribution protocols
  2. quantum cryptography
  3. quantum key distribution

Qualifiers

  • Research-article

Conference

FIT '09
Sponsor:

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)18
  • Downloads (Last 6 weeks)2
Reflects downloads up to 12 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2023)Quantum Communication Systems: Vision, Protocols, Applications, and ChallengesIEEE Access10.1109/ACCESS.2023.324439511(15855-15877)Online publication date: 2023
  • (2023)Comparative Analysis of Quantum Key Distribution Protocols: Security, Efficiency, and PracticalityArtificial Intelligence of Things10.1007/978-3-031-48774-3_10(151-163)Online publication date: 3-Dec-2023
  • (2022)Quantum Key Distribution for Secure CommunicationsInternational Journal of Innovations in Science and Technology10.33411/IJIST/20220404064:4(173-183)Online publication date: 30-Oct-2022
  • (2021)Quantum Computation-Based Secured Key Distribution ProtocolsEmerging Technologies in Data Mining and Information Security10.1007/978-981-15-9774-9_50(539-553)Online publication date: 5-May-2021
  • (2020)Quantum Cryptography and SimulationProceedings of the 2020 4th International Conference on Cryptography, Security and Privacy10.1145/3377644.3377671(36-41)Online publication date: 10-Jan-2020

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media