Abstract
The cryptographic system ensures authentication between the communicating parties through keys, and it cannot be sent over insecure communication channel due to eavesdropping adversary. Distribution approaches are required to support either private or public key cryptosystem that allows key sharing secretly. We represent the existing classical key distribution protocols and relevant quantum methods that overcome the challenges in classical protocols. The keys must be shared at the end of distribution process, and continuum to this, we have quantum key distribution that uses quantum principles which guarantee that key cannot be intercepted. The objective of this paper is to explore quantum key distribution protocols like BB84 and Eckert’s protocol in detail and then to analyze them with classical approaches in comparative parameters and lastly concludes the quantum protocol to be highly secure, advantageous and superior to classical existing protocols.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
W. Diffie, M.E. Hellman, New directions in cryptography. IEEE Trans. Inf. Theory, IT-22(6), 644–654 (1976). (IEEE)
R.P. Feynman, Simulating physics with computers. Int. J. Theor. Phys. 467–488
L. Lace, O. Scegulnaja-Dubrovska, R. Usovs, A. Zalcmane, Quantum cryptographic key distribution protocols, in The European Social Fund (ESF) (2008)
C. Elliot, Quantum cryptography. IEEE Secur. Priv. J. 57–61 (2004)
M. Peev, C. Pacher, T. Lorünser, M. Nölle, A. Poppe, O. Maurhart, M. Suda, A. Fedrizzi, R. Ursin, A. Zeilinger, Response to vulnerability of a novel protocol authentication algorithm ruling out a man-in-the-middle attack in quantum cryptography. Int. J. Quantum Inf. 07(07), 1401–1407 (2009)
S. Wiesner, Conjugate coding. Sigact News 15(1), 78–88 (1983)
P.K. Amiri, Quantum computers. IEEE Potentials 21(5), 6–9 (2003)
A.K. Ekert, Quantum cryptography based on Bell’s theorem. Phys. Rev. Lett. 67, 661–663 (1999)
W.K. Wootters, W.H. Zurek, A single quantum cannot be cloned. Nature 299, 802–803 (1982)
S. William, Cryptography and network security principles and practice. 2nd Edn, Prentice Hall (1998)
C. Pfleeger, Security in computing. Prentice Hall PTR (2001)
C.H., Bennett, Quantum cryptography: public key distribution and coin tossing, in International Conference on Computer System and Signal Processing (IEEE, 1984), pp. 175–179
V. Padamvathi, B.V. Vardhan, A.V.N. Krishna, Quantum cryptography and quantum key distribution protocols: a survey, in International Conference on Advanced Computing (IACC), Bhimavaram (2016), pp. 556–562
G. Brassard, N. Lütkenhaus, T. Mor, B. Sanders, Limitations on practical quantum cryptography. Phys. Rev. Lett. 85, 1330–1333 (2000)
N. Lütkenhaus, M. Jahma, Quantum key distribution with realistic states: photon-number statistics in the photon-number splitting attack. New J. Phys. 4(1), 44 (2002)
D. Jin, P.K. Verma, S.K. Kartalopoulos, Fast convergent key distribution algorithms using a dual quantum channel. Secur. Commun. Netw. (2008)
K.H. Hong, O.M. Foong, T.J. Low, Challenges in quantum key distribution: a review, in ICINS ‘16, Dec 28–31, Kuala Lumpur, Malaysia (2016)
D. Bruss, G. Erdelyi, T. Meyer, T. Riege, J. Rothe, Quantum cryptography: a survey. ACM Comput. Surv. 39(2), Article 6 (2007)
F. Yang, Y. Hao, The formal study of quantum cryptography protocols, in 10th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP), Chengdu (2013), pp. 29–33
R.C. Merkle, Protocols for public key cryptosystems, in IEEE Symposium on Security and Privacy, Oakland, CA, USA, pp. 122–122 (IEEE, 1980)
D.N. Kartheek, G. Amarnath, P. Venkateswarlu, Security in quantum computing using quantum key distribution protocols, in International Multi-Conference on Automation, Computing, Communication, Control and Compressed Sensing(iMas4s), Kottayam (2013), pp. 19–25
P.W. Shor, J. Preskill, Simple proof of security of the BB84 quantum key distribution protocol. Phys. Rev. Lett. 85(2), 441–444 (2000)
C.H. Bennett, Quantum cryptography using any two nonorthogonal states. Phys. Rev. Lett. 68(21), 3121–3124 (1992)
M. Javed, K. Aziz, A survey of quantum key distribution protocols, in FIT’09, CIIT, Abbottabad, Pakistan (2009)
M. Elboukhari, M. Azizi, A. Azizi, Quantum key distribution protocols: a survey. Int. J. Univ. Comput. Sci. 1, 59–67 (2010)
B. Huttner, N. Imoto, N. Gisin, T. Mor, Quantum cryptography with coherent states. Phys. Rev. Lett. 51, 1863–1869 (1995)
D. Bruß, Optimal eavesdropping in quantum cryptography with six states. Phys. Rev. Lett. 81, 3018 (1998)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Jojan, P., Soni, K.K., Rasool, A. (2021). Quantum Computation-Based Secured Key Distribution Protocols. In: Tavares, J.M.R.S., Chakrabarti, S., Bhattacharya, A., Ghatak, S. (eds) Emerging Technologies in Data Mining and Information Security. Lecture Notes in Networks and Systems, vol 164. Springer, Singapore. https://doi.org/10.1007/978-981-15-9774-9_50
Download citation
DOI: https://doi.org/10.1007/978-981-15-9774-9_50
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-9773-2
Online ISBN: 978-981-15-9774-9
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)