The key management which is associated with the key generation, key distribution, key storage, and key updating has become an important issue in the private communication. This chapter introduces a novel approach of generating and distributing key-pair via quantum ways. The aim is to illustrate how to obtain secure keys via quantum key distribution (QKD) techniques. Four modules, i.e., the quantum coding, quantum transmission, eavesdropping detection and key distillation, of a QKD procedure are described. In addition, a security model for the QKD is established.
Unable to display preview. Download preview PDF.
- Bennett C H, Brassard G (1984) An update on quantum cryptography. Advances in Cryptology-Proceedings of Crypto 84, Barbara, Springer, pp 475–480Google Scholar
- Zeng G H, Wang Z Y, Zhu H W (2000) Quantum key distribution scheme with 100% efficiency. The 5th interaction conference on quantum communication, measurement and computing, Capri, 3-8 July 2000, pp 2–8Google Scholar
- Brassard G, Salvail L (1994) Secret-key reconciliation by public discussion. Advances in Cryptology: Eurocrypt 93, Lofthus, Norway, May 23-27, 1993. Helleseth T (ed) Lecture Notes in Computer Science (LNCS). Springer, Heidelberg, pp 441-423Google Scholar
- Yamazaki K, Sugimoto T (2000) On secret key reconciliation protocol. Proceedings IEEE International Symposium on Information Theory and its Applications, Honolulu. 2000Google Scholar
- Sugimoto T, Yamazaki K (2000) A study on secret key reconciliation protocol cascade. IEICE Transactions on Fundamentals, E83-A(10): 1987–1991Google Scholar
- Boström K, Felbinger T (2004) Deterministic secure direct communication using entanglement. Physical Review Letters, 89: 1–4Google Scholar
- Wójcik A (2004) Eavesdropping on the “Ping-pong” quantum communication protocol. Physical Review Letters, 90: 1–4Google Scholar
- Cardinal J, Assche G V (2003) Construction of a shared secret key using continuous variables. Proceedings of IEEE Information Theory Workshop (ITW), Paris, 2003Google Scholar
- Zeng G H (2006) Quantum cryptology. Science Press, BeijingGoogle Scholar
- Scarani V, Acín A, Ribordy G, et al (2004) Quantum cryptography protocols robust against photon number splitting attacks for weak laser pulse implementations. Physical Review Letters, 92: 1–4Google Scholar
- Wang X B (2005) Beating the Photon-Number-Splitting Attack in Practical Quantum Cryptography. Physical Review Letters, 94: 1–4Google Scholar