Security of Quantum Key Distribution

Loading...
Thumbnail Image

Authors

Abushgra, Abdulbast
Elleithy, Khaled M.

Issue Date

2015-04-30

Type

Article

Language

en_US

Keywords

Quantum key distribution (QKD) , Superposition , Entangled states , Pauli matrices , Uncertainty

Research Projects

Organizational Units

Journal Issue

Alternative Title

Abstract

Every day, the world looks on more of security analysis needs that are based on the enormous and sensitive information. This datum is shared by different systems around the world, which are considered at risk of attack at any time. Many scientists and researchers have brought up another cryptographic subject in Quantum Computing that is so-called Quantum Key Distribution (QKD) protocol. The first QKD is BB84 that was presented by Charles Bennett and Gilles Brassard in 1984. After that, several protocols were created sequentially with the same or different mechanism and with some abilities of these protocols to stand against well-known quantum attacks. This paper studies these protocols deeply and compares them to find the strong and weak points in each considered protocols.

Description

© ASEE 2015

Citation

Publisher

ASEE

License

Journal

Volume

Issue

PubMed ID

DOI

ISSN

EISSN