Proceedings of the 7th International Conference on Frontiers of Information Technology 2009
DOI: 10.1145/1838002.1838046
|View full text |Cite
|
Sign up to set email alerts
|

A survey of quantum key distribution protocols

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(10 citation statements)
references
References 11 publications
0
10
0
Order By: Relevance
“…BB84 Protocol: In 1984, QKD protocol was proposed for the first time by G. Brassard et al [42]. This protocol is mainly designed based on Heisenberg's uncertainty principle and which is also familiarized as BB84 protocol [43]. The steps of BB84 protocol are given below [33] :…”
Section: A Some Major Quantum Key Distribution Protocolsmentioning
confidence: 99%
See 1 more Smart Citation
“…BB84 Protocol: In 1984, QKD protocol was proposed for the first time by G. Brassard et al [42]. This protocol is mainly designed based on Heisenberg's uncertainty principle and which is also familiarized as BB84 protocol [43]. The steps of BB84 protocol are given below [33] :…”
Section: A Some Major Quantum Key Distribution Protocolsmentioning
confidence: 99%
“…After that, if Bob chooses the correct base, he is able to measure the precise state; otherwise, he is not able to acquire the bit [53]. By using SARG04 protocol, H. K. Lo et al successfully proved the security of photon pluses [43]. When Poissonian source produces a weak signal, an imprecise detector receives that signal SARG04 protocol is used in that situation [56].…”
Section: Sarg04 Protocolmentioning
confidence: 99%
“…Stephen Wiesner [4]proposed the concept of quantum cryptographic procedures by using "conjugate coding" which opened the research gates for achieving secure communications by exploiting the laws of quantum physics. Quantum cryptography relies on the subtle properties of quantum no-cloning, Heisenberg's uncertainty principle, superposition, and entanglement (also known as spooky action at a distance) to accomplish tasks that are otherwise considered intractable using classical cryptography (such as unconditionally secure key distribution, resilience to quantum attacks against classical cryptography and detection of the presence of eavesdropping as a measure of disturbance to the quantum channel).…”
Section: Figure1: Pictorial Illustration Of the Research Flow Adapted...mentioning
confidence: 99%
“…Proposed by Bennet in 1992, this protocol uses one of the two polarization bases used in BB84 (either rectilinear or diagonal); therefore, the receiver measures no output in case of unmatched polarization basis. Resultantly, it offers intrusion detection at lower key rates with efficiency reduced to one-half as compared to BB84 [4].…”
Section: B92 Protocolmentioning
confidence: 99%
See 1 more Smart Citation