Quantum Cryptography

Cryptography is used for the secure communication in which two parties are involved. The most popular cryptographic issue is the transmission of confidential messages. The privacy is maintained using the cryptographic protocol. The security of quantum cryptography relies more on physics including quantum mechanics and statistics rather than on solving mathematical problems. A well-known application of quantum cryptography is quantum key distribution (QKD) that is used to establish communication by generating cryptographic keys. Moreover, it is based on the Heisenberg uncertainty principle that ensures the security and prevents from eavesdropping. Basically, quantum cryptography with faint laser pulses, polarization coding, phase coding, and frequency coding have been discussed.

[1]  Dominic Mayers,et al.  Quantum Key Distribution and String Oblivious Transfer in Noisy Channels , 1996, CRYPTO.

[2]  H. Bechmann-Pasquinucci,et al.  Quantum Cryptography using larger alphabets , 1999, quant-ph/9910095.

[3]  Dim Coherent States as Signal States in the Bb84 Protocol: Is it Secure? , 2002 .

[4]  Gilles Brassard,et al.  Quantum cryptography: Public key distribution and coin tossing , 2014, Theor. Comput. Sci..

[5]  H Bechmann-Pasquinucci,et al.  Quantum cryptography with 3-state systems. , 2000, Physical review letters.

[6]  N. Lütkenhaus submitted toacta physica slovaca SECURITY OF QUANTUM CRYPTOGRAPHY WITH REALISTIC SOURCES , 1999 .

[7]  Barry C. Sanders,et al.  II Quantum Phenomena in Optical Interferometry , 1996 .

[8]  N. Lütkenhaus Security against individual attacks for realistic quantum key distribution , 2000 .

[9]  E. Jaynes,et al.  Comparison of quantum and semiclassical radiation theories with application to the beam maser , 1962 .

[10]  Y. Yamamoto,et al.  A single-photon turnstile device , 1999, Nature.

[11]  J. Bell On the Problem of Hidden Variables in Quantum Mechanics , 1966 .

[12]  Charles H. Bennett,et al.  Quantum cryptography using any two nonorthogonal states. , 1992, Physical review letters.

[13]  V. L. Kurochkin,et al.  Educational Potential of Quantum Cryptography and Its Experimental Modular Realization , 2017, 1710.08090.

[14]  P. Townsend,et al.  Quantum key distribution over distances as long as 30 km. , 1995, Optics letters.

[15]  Gisin,et al.  Quantum cryptography with coherent states. , 1995, Physical review. A, Atomic, molecular, and optical physics.

[16]  G. Roger,et al.  Experimental Test of Bell's Inequalities Using Time- Varying Analyzers , 1982 .

[17]  R. Hughes,et al.  Quantum Cryptography , 1995, quant-ph/9504002.

[18]  H. Chau,et al.  Efficient Quantum Key Distribution , 1998, quant-ph/9803007.

[19]  H. Bechmann-Pasquinucci,et al.  Incoherent and coherent eavesdropping in the six-state protocol of quantum cryptography , 1998, quant-ph/9807041.