2021
DOI: 10.1109/jphot.2021.3069510
|View full text |Cite
|
Sign up to set email alerts
|

QKD-Enhanced Cybersecurity Protocols

Abstract: Security of QKD is guaranteed by the quantum mechanics laws rather than unproven assumptions employed in computational cryptography. Unfortunately, the secret-key rates are way too low and transmission distances are limited. The post-quantum cryptography (PQC) is proposed as an alternative to QKD. However, the PQC protocols are based on conjecture that there are no polynomial time algorithms to break the PQC protocols. To overcome key challenges of both post-quantum cryptography and QKD, we propose to use the … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
5
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 24 publications
0
5
0
Order By: Relevance
“…Computational Security Protocol explains how RSA, SRK, and public key distribution protocols can be altered to fend off assaults based on quantum computing. [3]. They aim to use quantum cryptography to exchange secrets, secure computing, and secure direct communication.…”
Section: Related Workmentioning
confidence: 99%
“…Computational Security Protocol explains how RSA, SRK, and public key distribution protocols can be altered to fend off assaults based on quantum computing. [3]. They aim to use quantum cryptography to exchange secrets, secure computing, and secure direct communication.…”
Section: Related Workmentioning
confidence: 99%
“…Such encrypted information has no significance in the case of quantum computers. In the future, quantum computers will be able to intercept and preserve encrypted data for decryption [6]. Quantum cryptography has the advantages of "unconditional security" and Eavesdropper detection.…”
Section: Quantum Cryptography Vs Traditional Cryptographymentioning
confidence: 99%
“…They are also orthogonal and provide a second basis for key generation. The |+ state represents an equal superposition of |0⟩ and |1⟩, while the |−⟩ state represents their difference [6].…”
Section: The Bb84 Protocol For Quantum Key Distribution (Qkd)mentioning
confidence: 99%
“…To enhance current cryptographic protocols like Rivest-Shamir-Adleman (RSA) and make them more resilient to attacks from quantum computers, this study uses QKD. The article also describes how initializing using a QKD protocol may help fight against brute force attacks by preventing Eve from discovering N and cracking the protocol via a brute force approach [8].…”
Section: Related Workmentioning
confidence: 99%