Quantum Key Distribution: Basic Protocols and Threats

12Citations
Citations of this article
23Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The last decade, the evolution in quantum computing has been enormous and real and reliable quantum computers are being developed quickly. One of the consequences of the upcoming quantum era is to make key distribution protocols insecure, as most of them are based on discrete algorithm problems. On the other hand, quantum computing provides a powerful and prominent tool for the safe transmission of information and cryptographic schemes and many of them have already been proposed. In this work, we discuss about quantum cryptography and we present certain quantum key distribution protocols. We also discuss about 'potential attacks that can be performed against the quantum cryptographic schemes which are based on quantum system's imperfections and loopholes.

Cite

CITATION STYLE

APA

Sabani, M., Savvas, I., Poulakis, D., & Makris, G. (2022). Quantum Key Distribution: Basic Protocols and Threats. In ACM International Conference Proceeding Series (pp. 383–388). Association for Computing Machinery. https://doi.org/10.1145/3575879.3576022

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free