Using quantum key distribution for cryptographic purposes: A survey
نویسندگان
چکیده
Document history: During the first year of the SECOQC project [1], Philippe Grangier initiated an internal debate regarding the " comparative advantages " of quantum key distribution (QKD). A first written contribution to this debate, by Philippe Grangier, Louis Salvail, Nicolas Gisin and Thierry Debuisschert [2], was then made available to all SECOQC partners. In their 3rd review report, issued on June 26 2006, SECOQC project reviewers and scientific officer pointed out at the need of a paper about the " added value of QKD to classical cryptography ". Following this recommandation and extending on the arguments developped in [2], Romain Alléaume wrote a draft document, entitled QKD and Cryptography: strong points, weaknesses and comparative advantages. On October 12, at the London 10th SECOQC Core Group, project partners agreed to jointly contribute to the improvement of this draft document and make it evolve into the SECOQC cryptography white paper. Numerous comments, suggestions of corrections and new ideas were proposed through the SECOQC Wiki [3]. Based on those reactions, the first draft version of the paper has been modified and updated by Romain Alléaume, leading successively to the versions 2.0, 3.0, and 4.0. On November 21, version 4.0 of the white paper was presented at the Crypto networking session organized by the European Network of Excellence ECRYPT, at the Helsinki IST event. Preprints of the white paper have also been distributed. Final rounds of revisions, taking into account the comments received after the Helsinki event, have then lead to the current version, 5.1, of the white paper.
منابع مشابه
Quantum Key Distribution Protocols: A Survey
Most cryptographic mechanisms, such as symmetric and asymmetric cryptography, often involve the use of cryptographic keys. However, all cryptographic techniques will be ineffective if the key distribution mechanism is weak. The security of most modern cryptographic systems of key distribution mechanism is based on computational complexity and the extraordinary time needed to break the code. Qua...
متن کاملQuantum Cryptographic Protocols for Secure Communication
Quantum Cryptography offers a secure method of sharing sequences of random numbers to be used as cryptographic keys. It can potentially eliminate many of the weaknesses of classical cryptographic methods. In this paper, we survey some results in quantum cryptography. After a brief introduction to classical cryptography, some fundamental quantum key distribution protocols are reviewed. The issue...
متن کاملLPKP: location-based probabilistic key pre-distribution scheme for large-scale wireless sensor networks using graph coloring
Communication security of wireless sensor networks is achieved using cryptographic keys assigned to the nodes. Due to resource constraints in such networks, random key pre-distribution schemes are of high interest. Although in most of these schemes no location information is considered, there are scenarios that location information can be obtained by nodes after their deployment. In this paper,...
متن کاملSECURITY USING QUANTUM KEY DISTRIBUTION PROTOCOLS (QKDPs)
Most cryptographic mechanisms such as symmetric and asymmetric cryptography, often involve the use of cryptographic keys. However, all cryptographic techniques will be ineffective if the key distribution mechanism is weak. Quantum Key Distribution or Quantum Cryptography is attracting much attention as a solution of the problem of Key Distribution; QKD offers unconditionally secure communicatio...
متن کاملMutual Authentication Mechanism using Pre-Shared Key and BB84 Quantum Key Distribution for Quantum Cryptography Communication
It is believed that the quantum cryptography based on quantum key distribution achieves unconditional security. However, the additional authentication mechanism applied to the quantum cryptography needs to be studied since it is difficult for the quantum cryptography alone to prevent manin-the-middle attacks. Thus, we propose two authentication mechanisms combined with modern cryptography that ...
متن کاملDevelopment of a Unique Biometric-based Cryptographic Key Generation with Repeatability using Brain Signals
Network security is very important when sending confidential data through the network. Cryptography is the science of hiding information, and a combination of cryptography solutions with cognitive science starts a new branch called cognitive cryptography that guarantee the confidentiality and integrity of the data. Brain signals as a biometric indicator can convert to a binary code which can be...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Theor. Comput. Sci.
دوره 560 شماره
صفحات -
تاریخ انتشار 2014