Quantum Cryptography and Quantum Key Distribution Protocols: A Survey

Quantum cryptography renders a cryptographic solution which is imperishable as it fortifies prime secrecy that is applied to quantum public key distribution. It is a prominent technology wherein two entities can communicate securely with the sights of quantum physics. In classical cryptography, bits are used to encode information where as quantum cryptography i.e. quantum computer uses photons or quantum particles and photon's polarization which is their quantized properties to encode the information. This is represented in qubits which is the unit for quantum cryptography. The transmissions are secure as it is depended on the inalienable quantum mechanics laws. The emphasis of this paper is to mark the rise of quantum cryptography, its elements, quantum key distribution protocols and quantum networks.

[1]  H. Bechmann-Pasquinucci,et al.  Incoherent and coherent eavesdropping in the six-state protocol of quantum cryptography , 1998, quant-ph/9807041.

[2]  Chip Elliott,et al.  Quantum Cryptography , 2004, IEEE Secur. Priv..

[3]  mart. haitjema,et al.  A Survey of the Prominent Quantum Key Distribution Protocols , 2007 .

[4]  Xuemin Shen,et al.  Architecture and protocols of the future European quantum key distribution network , 2008, Secur. Commun. Networks.

[5]  W. Wootters,et al.  A single quantum cannot be cloned , 1982, Nature.

[6]  C. Elliott The DARPA Quantum Network , 2004, quant-ph/0412029.

[7]  Stephen Wiesner,et al.  Conjugate coding , 1983, SIGA.

[8]  Chip Elliott,et al.  Quantum cryptography in practice , 2003, SIGCOMM '03.

[9]  Christoph Pacher,et al.  The SECOQC quantum key distribution network in Vienna , 2009, 2009 35th European Conference on Optical Communication.

[10]  Gilles Brassard,et al.  Quantum Cryptography , 2005, Encyclopedia of Cryptography and Security.

[11]  Daniel A. Lidar,et al.  Defining and detecting quantum speedup , 2014, Science.

[12]  Gilles Brassard,et al.  Quantum cryptography: Public key distribution and coin tossing , 2014, Theor. Comput. Sci..

[13]  Jan Bouda,et al.  SECOQC White Paper on Quantum Key Distribution and Cryptography , 2007, ArXiv.

[14]  Nicolas Gisin,et al.  Quantum cryptography protocols robust against photon number splitting attacks for weak laser pulse implementations. , 2004, Physical review letters.

[15]  Gilles Brassard,et al.  Experimental Quantum Cryptography , 1990, EUROCRYPT.

[16]  David McMahon Quantum Computing Explained , 2007 .

[17]  Charles H. Bennett,et al.  Quantum cryptography using any two nonorthogonal states. , 1992, Physical review letters.

[18]  C. Elliott Building the quantum network* , 2002 .

[19]  Andrew W. Cross,et al.  Demonstration of a quantum error detection code using a square lattice of four superconducting qubits , 2015, Nature Communications.

[20]  Jane E. Nordholt,et al.  Network-Centric Quantum Communications with Application to Critical Infrastructure Protection , 2013, ArXiv.