Abstract
Information Security is a major problem nowadays because the information contains personal info, company’s transactions etc., and with that information anyone can harm anyone’s life. Every System in the world tries to peer into the network and want to manipulate or want to access the data. In addition to this nowadays IoT, IoE came into picture where people’s personal data can be gathered. Mainly in IoE, people’s data is given high importance. So, there is great need of providing security for the data. In this kind of situations, Cryptography plays a key role to protect the data. Classic Cryptography algorithms like RSA, ECC are not more efficient in protecting the data as they are based on mathematical calculations. These mathematically based algorithms may be decrypted in one or other way. So, to enhance the security for data, Quantum came into the picture. This Quantum Cryptography is more efficient when compared to other algorithms as it is based on the concept Quantum Entanglement and Heisenberg uncertainty principle. This paper deals with all aspects of quantum key distribution which are major primitive for Quantum Cryptography along with Quantum Key Distribution Protocols used for developing IoE security.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Cangea, O., Oprina, C.S.: Implementing quantum cryptography algorithms for data security. In: ECAI 2016 - International Conference – 8th edn., Electronics, Computers and Artificial Intelligence, 30 June–02 July 2016, Ploiesti, ROMÂNIA (2016)
Richard, J., et al.: Quantum Cryptography, LA-UR-95-806
Chen, C.-Y., Zeng, G.-J., Lin, F.-J., Chou, Y.-H., Chao, H.-C.: Quantum cryptography and its applications over the internet. IEEE Network (2015)
Sharbaf, M.S.: Quantum cryptography: an emerging technology in network security, 978-1-4577-1376-7/11/
Cobourne, S.: Quantum key distribution protocols and applications, Technical report RHUL–MA–2011–05
Quantum No-Cloning. https://en.wikipedia.org/wiki/No-cloning_theorem. Accessed 12 Jan 2019
SARG04. https://en.wikipedia.org/wiki/SARG04. Accessed 15 Jan 2019
Haitjema, M.: A survey of prominent quantum key distribution protocols. https://www.cse.wustl.edu/~jain/cse571-07/ftp/quantum/
Routray, S.K., Jha, M.K., Sharma, L., Nyamangoudar, R., Javali, A.: Quantum cryptography for IOT: a perspective. In: 2017 International Conference on IoT and Application (ICIOT) (2017)
Miraz, M.H., Ali, M., Excell, P.S., Picking, R.: A Review on Internet of Things (loT), Internet of Everything (IoE) and Internet of Nano Things (IoNT), 2015 Internet Technologies and Applications (ITA)
Ryoo, J., Kim, S., Cho, J., Kim, H., Tjoa, S., DeRobertis, C.V.: IoE security threats and you. In: 2017 International Conference on Software Security and Assurance (ICSSA)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Nikhil Pradeep, C., Kameswara Rao, M., Sai Vikas, B. (2019). Quantum Cryptography Protocols for IOE Security: A Perspective. In: Luhach, A., Jat, D., Hawari, K., Gao, XZ., Lingras, P. (eds) Advanced Informatics for Computing Research. ICAICR 2019. Communications in Computer and Information Science, vol 1076. Springer, Singapore. https://doi.org/10.1007/978-981-15-0111-1_11
Download citation
DOI: https://doi.org/10.1007/978-981-15-0111-1_11
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-0110-4
Online ISBN: 978-981-15-0111-1
eBook Packages: Computer ScienceComputer Science (R0)