A REVIEW ON DIFFERENT THREATS ON QUANTUM KEY DISTRIBUTION PROTOCOL
Main Article Content
Abstract
Downloads
Article Details
COPYRIGHT
Submission of a manuscript implies: that the work described has not been published before, that it is not under consideration for publication elsewhere; that if and when the manuscript is accepted for publication, the authors agree to automatic transfer of the copyright to the publisher.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work
- The journal allows the author(s) to retain publishing rights without restrictions.
- The journal allows the author(s) to hold the copyright without restrictions.
References
Barton Zwiebach, Quantum Mechanics 2, MIT OCW
Wolfgang Ketterlee, Isaac Chung, Atomic and Optical Physics, MIT OCW.
Kollmitzer, Pivk et al, “Applied Quantum Cryptographyâ€.
D. Mayers, “ Advances in Cryptologyâ€
H. Inamori, N. L¨utkenhaus and D. Mayers, “Unconditional security of practical QKDâ€, The European Physical Journal, Volume 41, Issue 3, pp 599-62, March 2007.
Ling , Gerhardt, Linares, “Full Field Implementation of a perfect Eavesdropper on a quantum cryptography systemâ€, Nature Communications 2, Article number 349, 2012.
C. H. Bennett and G. Brassard, “Quantum cryptography: Public key distribution and coin tossing,†IEEE Systems and Signals Processing, Volume 175, 8, 1984.
L. Lydersen Wikkers, Wittman et al, “Hacking Commercial quantum cryptography systems by tailored Bright illumination†Nature Photonics4, 686–689,2010.
QKD, Wikipedia, https://en.wikipedia.org/wiki/Q_k_d
Post-Quantum Cryptography: 5th International Workshop, PQCrypto 2013,edited by Philipe Gaborit.
Nitin Jain, Birgit Stiller, Imran Khan, Vadim Makarov, Christoph Marquardt, Gerd Leuchs, “Trojan-horse attacks Threaten the Security of Practical Quantumâ€, Cryptography,New J. Phys. 16, 123030 (2014).
Zhang, J. Liu, D. Wang and S. Shi "Quantum direct communication with authentication" Phys. Rev. A 75, 026301, 2007
David Miller, “Quantum Mechanics for Scientists and Engineersâ€
Leonard Susskind, “Quantum Entanglement Lecturesâ€
Mart Haitjema, “A Survey of the Prominent Quantum Key Distribution Protocolsâ€.
MIT Ocw, Quantum Mechanics 1
Coursera, Quantum Computation
Lo, Cutry , Tamaki“Secure quantum key distributionâ€, Nature Photonics 8, 595-604, 2014.
Elliott, Colvin. et al., “Current status of the DARPA Quantum Networkâ€, In Proc SPIE, Quantum Information. Computation III, 138 June 02, 2005
Fröhlich, B. et al. “A quantum access networkâ€, Nature 501, 69–72, 05 September 2013
Cao, Zheng et al, “Highly Efficient Quantum Key Distribution Immune to All Detector Attacksâ€, arxiv.org/pdf/1410.2928.
Biham, Boyer ,et al,†Security of Quantum Key Distribution Against All Collective Attacksâ€, Quantum Physics, 12th Jan, 1998, pp 1-5
N. Gisin, S. Fasel, B. Kraus, H. Zbinden, and G Ribordy, “Trojan-Horse Attacks on Quantum-Key- Distribution Systemsâ€, Phys. Rev. A 73, 022320 -2006.
Normand J. Beaudry, Marco Lucamarini, Stefano Mancini, Renato Renner, “Security of two-way Quantum key distributionâ€, PHYSICAL REVIEW A 88, 062302 -2013.
Christianson, Bruce , Lecture Notes in Computer Science, 8263
A. Vakhitov, V. Makarov, and D. R. Hjelme, Large Pulse Attack as a Method of Conventional Optical Eavesdropping in Quantum Cryptography, J. Mod. Opt. 48, 2023 (2001).
Stallings, “Cryptography and Network Security.
ETSI - Quantum Key Distribution, http://www.etsi.org/technologies--clusters/technologies/quantum-key-distribution
Feihu Xu, Bing Qi, Hoi-Kwong Lo, “Experimental demonstration of phase-remapping attack in a practical Quantum key distribution systemâ€. New J. Phys. 12, 2010
“Quantum crack in cryptographic armourâ€, Nature News, http://ww w.nature.com/news/2 010/100520/full/ new.256.html
Measurement In Quantum Mechanics , http://en.wikipedia.org/wiki/Measurement_in_ quantum_mechanics.
Thomas Baign`eres, “Quantum Cryptography: On the Security of the BB84 Key-Exchange Protocolâ€.
M.D.Dang and M. Riguldel, “Usage of secure networks built using quantum technologyâ€, 2004
Scarani, Valerio, et al. "The security of practical quantum key distribution." Reviews of modern physics 81.3 (2009): 1301.