Skip to main content

Quantum Computation-Based Secured Key Distribution Protocols

  • Conference paper
  • First Online:
Emerging Technologies in Data Mining and Information Security

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 164))

  • 666 Accesses

Abstract

The cryptographic system ensures authentication between the communicating parties through keys, and it cannot be sent over insecure communication channel due to eavesdropping adversary. Distribution approaches are required to support either private or public key cryptosystem that allows key sharing secretly. We represent the existing classical key distribution protocols and relevant quantum methods that overcome the challenges in classical protocols. The keys must be shared at the end of distribution process, and continuum to this, we have quantum key distribution that uses quantum principles which guarantee that key cannot be intercepted. The objective of this paper is to explore quantum key distribution protocols like BB84 and Eckert’s protocol in detail and then to analyze them with classical approaches in comparative parameters and lastly concludes the quantum protocol to be highly secure, advantageous and superior to classical existing protocols.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. W. Diffie, M.E. Hellman, New directions in cryptography. IEEE Trans. Inf. Theory, IT-22(6), 644–654 (1976). (IEEE)

    Google Scholar 

  2. R.P. Feynman, Simulating physics with computers. Int. J. Theor. Phys. 467–488

    Google Scholar 

  3. L. Lace, O. Scegulnaja-Dubrovska, R. Usovs, A. Zalcmane, Quantum cryptographic key distribution protocols, in The European Social Fund (ESF) (2008)

    Google Scholar 

  4. C. Elliot, Quantum cryptography. IEEE Secur. Priv. J. 57–61 (2004)

    Google Scholar 

  5. M. Peev, C. Pacher, T. Lorünser, M. Nölle, A. Poppe, O. Maurhart, M. Suda, A. Fedrizzi, R. Ursin, A. Zeilinger, Response to vulnerability of a novel protocol authentication algorithm ruling out a man-in-the-middle attack in quantum cryptography. Int. J. Quantum Inf. 07(07), 1401–1407 (2009)

    Article  Google Scholar 

  6. S. Wiesner, Conjugate coding. Sigact News 15(1), 78–88 (1983)

    Article  Google Scholar 

  7. P.K. Amiri, Quantum computers. IEEE Potentials 21(5), 6–9 (2003)

    Article  Google Scholar 

  8. A.K. Ekert, Quantum cryptography based on Bell’s theorem. Phys. Rev. Lett. 67, 661–663 (1999)

    Article  MathSciNet  Google Scholar 

  9. W.K. Wootters, W.H. Zurek, A single quantum cannot be cloned. Nature 299, 802–803 (1982)

    Article  Google Scholar 

  10. S. William, Cryptography and network security principles and practice. 2nd Edn, Prentice Hall (1998)

    Google Scholar 

  11. C. Pfleeger, Security in computing. Prentice Hall PTR (2001)

    Google Scholar 

  12. C.H., Bennett, Quantum cryptography: public key distribution and coin tossing, in International Conference on Computer System and Signal Processing (IEEE, 1984), pp. 175–179

    Google Scholar 

  13. V. Padamvathi, B.V. Vardhan, A.V.N. Krishna, Quantum cryptography and quantum key distribution protocols: a survey, in International Conference on Advanced Computing (IACC), Bhimavaram (2016), pp. 556–562

    Google Scholar 

  14. G. Brassard, N. Lütkenhaus, T. Mor, B. Sanders, Limitations on practical quantum cryptography. Phys. Rev. Lett. 85, 1330–1333 (2000)

    Article  Google Scholar 

  15. N. Lütkenhaus, M. Jahma, Quantum key distribution with realistic states: photon-number statistics in the photon-number splitting attack. New J. Phys. 4(1), 44 (2002)

    Google Scholar 

  16. D. Jin, P.K. Verma, S.K. Kartalopoulos, Fast convergent key distribution algorithms using a dual quantum channel. Secur. Commun. Netw. (2008)

    Google Scholar 

  17. K.H. Hong, O.M. Foong, T.J. Low, Challenges in quantum key distribution: a review, in ICINS ‘16, Dec 28–31, Kuala Lumpur, Malaysia (2016)

    Google Scholar 

  18. D. Bruss, G. Erdelyi, T. Meyer, T. Riege, J. Rothe, Quantum cryptography: a survey. ACM Comput. Surv. 39(2), Article 6 (2007)

    Google Scholar 

  19. F. Yang, Y. Hao, The formal study of quantum cryptography protocols, in 10th International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP), Chengdu (2013), pp. 29–33

    Google Scholar 

  20. R.C. Merkle, Protocols for public key cryptosystems, in IEEE Symposium on Security and Privacy, Oakland, CA, USA, pp. 122–122 (IEEE, 1980)

    Google Scholar 

  21. D.N. Kartheek, G. Amarnath, P. Venkateswarlu, Security in quantum computing using quantum key distribution protocols, in International Multi-Conference on Automation, Computing, Communication, Control and Compressed Sensing(iMas4s), Kottayam (2013), pp. 19–25

    Google Scholar 

  22. P.W. Shor, J. Preskill, Simple proof of security of the BB84 quantum key distribution protocol. Phys. Rev. Lett. 85(2), 441–444 (2000)

    Article  Google Scholar 

  23. C.H. Bennett, Quantum cryptography using any two nonorthogonal states. Phys. Rev. Lett. 68(21), 3121–3124 (1992)

    Article  MathSciNet  Google Scholar 

  24. M. Javed, K. Aziz, A survey of quantum key distribution protocols, in FIT’09, CIIT, Abbottabad, Pakistan (2009)

    Google Scholar 

  25. M. Elboukhari, M. Azizi, A. Azizi, Quantum key distribution protocols: a survey. Int. J. Univ. Comput. Sci. 1, 59–67 (2010)

    MATH  Google Scholar 

  26. B. Huttner, N. Imoto, N. Gisin, T. Mor, Quantum cryptography with coherent states. Phys. Rev. Lett. 51, 1863–1869 (1995)

    Google Scholar 

  27. D. Bruß, Optimal eavesdropping in quantum cryptography with six states. Phys. Rev. Lett. 81, 3018 (1998)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Priyanka Jojan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Jojan, P., Soni, K.K., Rasool, A. (2021). Quantum Computation-Based Secured Key Distribution Protocols. In: Tavares, J.M.R.S., Chakrabarti, S., Bhattacharya, A., Ghatak, S. (eds) Emerging Technologies in Data Mining and Information Security. Lecture Notes in Networks and Systems, vol 164. Springer, Singapore. https://doi.org/10.1007/978-981-15-9774-9_50

Download citation

Publish with us

Policies and ethics