International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Most Trusted Research Journal Since Year 2012

ISSN: 2319-7064

Research Paper | Computer Science & Engineering | India | Volume 8 Issue 7, July 2019

Prominent Security of the Quantum Key Distribution Protocol

Mohit Shukla, Sarvesh Patel

This paper provides an overview of quantum key distribution targeted towards the computer science community. A brief description of the relevant principles from quantum mechanics is provided before surveying the most prominent quantum key distribution protocols present in the literature. In particular this paper describes the BB84 protocol and its many variants as well as Eckert's approach through quantum entanglement. A brief discussion of some of the issues arising in practical implementations are also presented including privacy amplification and the photon number splitting attack.

Keywords: Quantum Cryptography, Quantum Key Distribution, QKD, survey, BB84, Eckert, Bennet, Brassard, photon number splitting attack, PNS, privacy amplification

Edition: Volume 8 Issue 7, July 2019

Pages: 468 - 476


How to Cite this Article?

Mohit Shukla, Sarvesh Patel, "Prominent Security of the Quantum Key Distribution Protocol", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=ART20199396, Volume 8 Issue 7, July 2019, 468 - 476

73 PDF Views | 50 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Quantum Cryptography'

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 2214 - 2220

A Comprehensive Survey on: Quantum Cryptography

Pranav Verma, Ritika Lohiya

Share this article

Research Paper, Computer Science & Engineering, India, Volume 8 Issue 7, July 2019

Pages: 468 - 476

Prominent Security of the Quantum Key Distribution Protocol

Mohit Shukla, Sarvesh Patel

Share this article

Similar Articles with Keyword 'Quantum Key Distribution'

Research Paper, Computer Science & Engineering, India, Volume 8 Issue 2, February 2019

Pages: 755 - 759

Implementation of QKD-VTCPABE Security Model for Treasury Information System-E-Governance

Dr. Ramineni Sivarama Prasad, Gurram Veera Raghavaiah

Share this article

Research Paper, Computer Science & Engineering, India, Volume 8 Issue 7, July 2019

Pages: 468 - 476

Prominent Security of the Quantum Key Distribution Protocol

Mohit Shukla, Sarvesh Patel

Share this article

Similar Articles with Keyword 'QKD'

Research Paper, Computer Science & Engineering, India, Volume 8 Issue 2, February 2019

Pages: 755 - 759

Implementation of QKD-VTCPABE Security Model for Treasury Information System-E-Governance

Dr. Ramineni Sivarama Prasad, Gurram Veera Raghavaiah

Share this article

Research Paper, Computer Science & Engineering, India, Volume 8 Issue 7, July 2019

Pages: 468 - 476

Prominent Security of the Quantum Key Distribution Protocol

Mohit Shukla, Sarvesh Patel

Share this article

Similar Articles with Keyword 'survey'

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2786 - 2790

Survey: Detection Schemes Against Selective Forwarding Attack

Harpal Singh, Vaibhav Pandey

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2205 - 2207

A Survey of Generating Multi-Document Summarizations

Patil Ajita S., P. M. Mane

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 735 - 737

Survey Paper on Alleviation of Cloud Internal Denial of Service Attacks

Nikhita Nerkar, Vina M Lomte

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 886 - 889

Survey on Algorithms Predicting Performance of Keyword Queries

Snehal Borole

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1789 - 1791

The Survey Paper on Importance of Integration of Knowledge Management and Business Intelligence

Vina Lomte, Saloni Shah

Share this article

Top