Publication | Closed Access
Quantum Key Distribution (QKD) Protocols: A Survey
127
Citations
20
References
2018
Year
Unknown Venue
Hardware SecurityQuantum ScienceQuantum CryptographyQuantum SecurityEngineeringQuantum ComputingPost-quantum CryptographySecurity StrengthQuantum InformationSecure CommunicationCryptosystemComputer ScienceQuantum EntanglementConventional CryptographyCryptographyQuantum Key Distribution
The security strength of key distribution of most conventional cryptography is relied on mathematical complexity and the irrational time needed to break the algorithm. But it will be ineffective if the secret key distribution procedure is weak. In 1994 Peter Shor proposed an algorithm that can factorize great integer number efficiently by using principle of quantum computer, this algorithm poses a threat to some of the conventional cryptography. Recently, Quantum Key Distribution (QKD) is drawing much attention of researcher as a solution of that problem of key distribution. Theoretically, QKD have been proven can be provide unconditionally secure communication based on quantum mechanics laws. In this article we survey the QKD protocols. Also, we present a little experiment of some QKD protocols that we discussed on this paper.
| Year | Citations | |
|---|---|---|
Page 1
Page 1