Quantum Key Distribution Protocols : A Review

Authors(1) :-Bhavesh B. Prajapati

Quantum cryptography is constantly growing branch which is offering huge challenge to classical cryptography. Quantum key distribution often abbreviated as QKD is based on basic principles of quantum mechanics. Principles like Heisenberg's uncertainty principle, No-cloning theorem and Entanglement are underlying principles in key assumptions in quantum cryptography. Quantum key distribution is very popular application of quantum cryptography and many companies and government agencies are implementing it. Researchers across globe are suggesting more and more real life applications of quantum key distribution. Compare to classical key distribution, quantum key distribution is future proof and not constrained to advances in computing power. In this paper we are discussing different quantum key distribution protocols and work done by many research scholars.

Authors and Affiliations

Bhavesh B. Prajapati
Assistant Professor, IT Department, L.D.College of Engineering, Ahmedabad, Gujarat, India

Quantum Key Distribution, BB84 Protocol, B92 Protocol, SARG04 Protocol

  1. "Practical Challenges in quantum key distribution" by EleniDiamanti, Hoi-Kwong Lo, Nature Publications,2016
  2. "Quantum cryptography and quantum key distribution Protocol: A Survey" by V. Padmavati, B. Visnuvardan, A.V.N. Krishna, IEEE 6th International Conference, 2016
  3. "Post quantum cryptography what advancements in quantum computing mean for IT professionals" by Logan O. Mailoux, IEEE 2016
  4. "QKDP’s Comparison Based upon Quantum Cryptography Rules" by AbdulbastAbushgra, KhaledElleithy, IEEE, 2015
  5. "Quantum cryptography and its applications over the internet" by Chi-Yuan Chen, Guo-jyunZeng, IEEE 2015
  6. "A Tutorial on Quantum Key Distribution" by Baokang Zhao, Bo Liu, Ilsun You, IEEE 10th International Conference, 2015
  7. "Quantum Cryptography: Pitfalls and Assets" by Deepshikha Sharma, IJERSTE, 2014
  8. "How secure is quantum cryptography" by Renato Renner, Optical Society of America, 2013
  9. "Key Distribution Protocol on Quantum Cryptography" by KondwaniMakanda, Jun-cheolJeon, IEEE, 2013
  10. "Quantum cryptography and comparision of quantum key distribution protocols" by ErgumGumus, G.Zeynep, Journal of Electrical and Electronics engineering,2008.
  11. "The formal study of quantum cryptography protocols" by Fan Yang, Yu-Jie, IEEE 2013
  12. Bennett, C. H. & Brassard, G. Proceedings of the IEEE International Conference on Computers, Systems, and Signal Processing (ed. Goldwasser, S.) 175–179 (IEEE Press, 1984).
  13. Scarani, A.Acin, Ribordy, G.Gisin.N."Quantum Cryptography protocols robust against Photon number Splitting attack." Physical Review Letters, vol.92.2004 http://www.qci.jst.go.jp/eqsi03/program/papers/O26-Scarani.pdf
  14. Secure communication with a publicly known key.C. K. A. Beige, B.-G. Englert and H. Weinfurter. ActaPhysicaPolonica A, 101(3):357–368,2002.
  15. Quantum cryptography: Public key distribution and coin tossing. C. H. Bennett and G. Brassard. Theoretical Computer Science, 560, Part1(0):7 – 11, 2014. Theoretical Aspects of Quantum Cryptography,celebrating 30 years of fBB84g.
  16. Quantum digital signatures without quantum memory. V. Dunjko, P. Wallden, and E. Andersson. Phys. Rev. Lett., 112:040502, Jan 2014.
  17. Quantum cryptography based on bell’s theorem.A. Ekert. Phys. Rev.Lett., 67:661–663, Aug 1991.
  18. Differential phase-shift quantum key distribution systems. K. Inoue. Selected Topics in Quantum Electronics, IEEE Journal of, 21(3):1–7,May 2015.
  19. Efficient quantum key distribution scheme and a proof of its unconditional security.H.-K. Lo, H. F. Chau, and M. Ardehali. J. Cryptol.,18(2):133–165, Apr. 2005.
  20. Quantum cryptography protocols robust against photon number splitting attacks for weak laser pulse implementations V. Scarani, A. Acin, G. Ribordy, and N. Gisin..Phys. Rev. Lett., 92:057901, Feb 2004.
  21. "Quantum Key Distribution Protocols: A Review," S. Reddy, Journal of Computational Information Systems, vol. 8, pp. 2839-2849, 2012.
  22. M. M. Khan, M. Murphy, and A. Beige, New Journal of Physics,vol. 11, p. 063043, 2009.
  23. "High error-rate quantum key distribution for long-distance communication," M. Elboukhari, M. Azizi, and A. Azizi, "Quantum key distribution protocols: A survey," International Journal of Universal ComputerSciences, vol. 1, pp. 59-67, 2010.
  24. "Towards practical and fast quantum cryptography," N. Gisin, G. Ribordy, H. Zbinden, D. Stucki, N. Brunner, and V. Scarani, arXiv preprint quant-ph/0411022, 2004.
  25. "Quantum Cryptography: A comprehensive study", Bhavesh Prajapati, 2014, IJSRSET
  26. "A Brief Study of Quantum Cryptography Applications", Bhavesh Prajapati, 2015, International journal of scientific research in science and technology.
  27. "Quantum Key Distribution : A Comprehensive Study", Bhavesh Prajapati, 2016, International Journal of Scientific Research in Science and Technology (IJSRST)

Publication Details

Published in : Volume 2 | Issue 4 | July-August 2017
Date of Publication : 2017-08-30
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 958-964
Manuscript Number : CSEIT1836161
Publisher : Technoscience Academy

ISSN : 2456-3307

Cite This Article :

Bhavesh B. Prajapati, "Quantum Key Distribution Protocols : A Review", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 4, pp.958-964, July-August-2017.
Journal URL : http://ijsrcseit.com/CSEIT1836161

Article Preview