File Download

There are no files associated with this item.

  Links for fulltext
     (May Require Subscription)
Supplementary

Conference Paper: A survey on quantum cryptographic protocols and their security

TitleA survey on quantum cryptographic protocols and their security
Authors
Issue Date2007
Citation
Canadian Conference on Electrical and Computer Engineering, 2007, p. 1121-1124 How to Cite?
AbstractCommunications in secrecy are often required in many commercial and military applications. Unfortunately, many cryptographic schemes in use today such as public-key cryptography based on the RSA algorithm would be broken with either unanticipated advances in hardware and algorithm or the advent of quantum computers. Quantum cryptography, on the other hand, has been proven secure even against the most general attack allowed by the laws of physics and is a promising technology poised for widespread adoption in realistic cryptographic applications. Quantum cryptography allows two parties to expand on a secret key that they have previously shared. Various quantum cryptographic protocols have been proposed to perform this task. In this paper, we survey some popular quantum cryptographic protocols (including the famous Bennett-Brassard 1984 protocol) and discuss their security. Specifically, we consider their security in two cases: the ideal case where a perfect single-photon source is used and the practical case where a realistic laser source is used. We compare the protocols and find that the efficient six-state protocol outperforms the others both in the tolerable quantum bit error rate and in the key generation rate when a realistic laser source is used. ©2007 IEEE.
Persistent Identifierhttp://hdl.handle.net/10722/285627
ISSN
2023 SCImago Journal Rankings: 0.197

 

DC FieldValueLanguage
dc.contributor.authorFung, Chi Hang Fred-
dc.contributor.authorLo, Hoi Kwong-
dc.date.accessioned2020-08-18T04:56:14Z-
dc.date.available2020-08-18T04:56:14Z-
dc.date.issued2007-
dc.identifier.citationCanadian Conference on Electrical and Computer Engineering, 2007, p. 1121-1124-
dc.identifier.issn0840-7789-
dc.identifier.urihttp://hdl.handle.net/10722/285627-
dc.description.abstractCommunications in secrecy are often required in many commercial and military applications. Unfortunately, many cryptographic schemes in use today such as public-key cryptography based on the RSA algorithm would be broken with either unanticipated advances in hardware and algorithm or the advent of quantum computers. Quantum cryptography, on the other hand, has been proven secure even against the most general attack allowed by the laws of physics and is a promising technology poised for widespread adoption in realistic cryptographic applications. Quantum cryptography allows two parties to expand on a secret key that they have previously shared. Various quantum cryptographic protocols have been proposed to perform this task. In this paper, we survey some popular quantum cryptographic protocols (including the famous Bennett-Brassard 1984 protocol) and discuss their security. Specifically, we consider their security in two cases: the ideal case where a perfect single-photon source is used and the practical case where a realistic laser source is used. We compare the protocols and find that the efficient six-state protocol outperforms the others both in the tolerable quantum bit error rate and in the key generation rate when a realistic laser source is used. ©2007 IEEE.-
dc.languageeng-
dc.relation.ispartofCanadian Conference on Electrical and Computer Engineering-
dc.titleA survey on quantum cryptographic protocols and their security-
dc.typeConference_Paper-
dc.description.naturelink_to_subscribed_fulltext-
dc.identifier.doi10.1109/CCECE.2007.285-
dc.identifier.scopuseid_2-s2.0-48849106416-
dc.identifier.spage1121-
dc.identifier.epage1124-
dc.identifier.issnl0840-7789-

Export via OAI-PMH Interface in XML Formats


OR


Export to Other Non-XML Formats