Quantum Key Distribution Protocols: A Review

Quantum key distribution (QKD) provides a way for distribution of secure key in at least two parties which they initially share. And there are many protocols for providing a secure key i.e. BB84 protocol, SARG04 protocol, E91 protocol and many more. In this paper all the concerned protocols that share a secret key is explained and comparative study of all protocols shown.

[1]  Muhammad Mubashir Khan,et al.  High error-rate quantum key distribution for long-distance communication , 2009, 0901.3909.

[2]  Yoshihisa Yamamoto,et al.  Security of differential-phase-shift quantum key distribution against individual attacks , 2005, quant-ph/0508112.

[3]  John Preskill,et al.  Security of quantum key distribution with imperfect devices , 2002, International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings..

[4]  Gilles Brassard,et al.  Secret-Key Reconciliation by Public Discussion , 1994, EUROCRYPT.

[5]  Ekert,et al.  Quantum cryptography based on Bell's theorem. , 1991, Physical review letters.

[6]  V. Scarani,et al.  Towards practical and fast Quantum Cryptography , 2004, quant-ph/0411022.

[7]  Gilles Brassard,et al.  Quantum cryptography: Public key distribution and coin tossing , 2014, Theor. Comput. Sci..

[8]  Gilles Brassard,et al.  Quantum Cryptography , 2005, Encyclopedia of Cryptography and Security.

[9]  Eduin H. Serna Quantum Key Distribution Protocol with Private-Public Key , 2009, 0908.2146.

[10]  H. Bechmann-Pasquinucci,et al.  Incoherent and coherent eavesdropping in the six-state protocol of quantum cryptography , 1998, quant-ph/9807041.

[11]  Yoshihisa Yamamoto,et al.  Differential-phase-shift quantum key distribution using coherent light , 2003 .

[12]  N. Gisin,et al.  Quantum cryptography , 1998 .

[13]  Charles H. Bennett,et al.  Quantum cryptography using any two nonorthogonal states. , 1992, Physical review letters.

[14]  Nicolas Gisin,et al.  Quantum cryptography protocols robust against photon number splitting attacks for weak laser pulse implementations. , 2004, Physical review letters.

[15]  David P. DiVincenzo,et al.  Quantum information and computation , 2000, Nature.

[16]  Eduin H. Serna Quantum Key Distribution From A Random Seed , 2013, 1311.1582.

[17]  mart. haitjema,et al.  A Survey of the Prominent Quantum Key Distribution Protocols , 2007 .

[18]  W. Wootters,et al.  A single quantum cannot be cloned , 1982, Nature.

[19]  G. Buller,et al.  Quantum key distribution system clocked at 2 GHz. , 2005, Optics express.