Management of Security in Quantum Cryptography

被引:20
|
作者
Niemiec, Marcin [1 ]
Pach, Andrzej R. [1 ]
机构
[1] AGH Univ Sci & Technol, Dept Telecommun, Krakow, Poland
关键词
D O I
10.1109/MCOM.2013.6576336
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The interest in quantum-based security methods has been growing rapidly in recent years. New implementations of quantum key distribution and new network services supported by this solution are being introduced. The reason behind the growing popularity of quantum cryptography is its unrivaled security level: all eavesdroppers can be revealed through the application of the laws of physics. First of all, the rules of quantum mechanics ensure that any measurement modifies the state of the transmitted quantum bit. This modification can be discovered by the sender and the receiver. This makes passive eavesdropping impossible. Using protocols such as BB84, network users are able to send a string of bits coded by the polarized photons. After that, they can establish secure cryptographic keys through an unsecure channel using different key distillation methods. Major ongoing challenges include the control and management of security in systems using quantum cryptography, as well as tailoring security to specific end users' requirements and services.
引用
收藏
页码:36 / 41
页数:6
相关论文
共 50 条
  • [1] A Study on Quantum Cryptography Based Security Management in Cloud
    Raina, Priya
    Kaushal, Sakshi
    [J]. 6TH INTERNATIONAL CONFERENCE ON COMPUTER & COMMUNICATION TECHNOLOGY (ICCCT-2015), 2015, : 350 - 354
  • [2] Security in quantum cryptography
    Portmann, Christopher
    Renner, Renato
    [J]. REVIEWS OF MODERN PHYSICS, 2022, 94 (02)
  • [3] Quantum Cryptography for Information-Theoretic Security Quantum Cryptography
    Sanders, Barry
    [J]. TECHNOLOGICAL INNOVATIONS IN SENSING AND DETECTION OF CHEMICAL, BIOLOGICAL, RADIOLOGICAL, NUCLEAR THREATS AND ECOLOGICAL TERRORISM, 2012, : 335 - 343
  • [4] Security of counterfactual quantum cryptography
    Yin, Zhen-Qiang
    Li, Hong-Wei
    Chen, Wei
    Han, Zheng-Fu
    Guo, Guang-Can
    [J]. PHYSICAL REVIEW A, 2010, 82 (04):
  • [5] Entropic security in quantum cryptography
    Simon Pierre Desrosiers
    [J]. Quantum Information Processing, 2009, 8 : 331 - 345
  • [6] Entropic security in quantum cryptography
    Desrosiers, Simon Pierre
    [J]. QUANTUM INFORMATION PROCESSING, 2009, 8 (04) : 331 - 345
  • [7] The measure of security in quantum cryptography
    Niemiec, Marcin
    Pach, Andrzej R.
    [J]. 2012 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2012, : 967 - 972
  • [8] Unconditional security in quantum cryptography
    Mayers, D
    [J]. JOURNAL OF THE ACM, 2001, 48 (03) : 351 - 406
  • [9] Provable Security in Quantum Cryptography
    Renner, Renato
    [J]. IT-INFORMATION TECHNOLOGY, 2007, 49 (02): : 127 - 130
  • [10] Quantum cryptography and security analysis
    Babber, Karuna
    Singh, J. P.
    [J]. JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2022, 25 (08): : 2205 - 2216