RESEARCH OF QUANTUM KEY DISTRIBUTION PROTOCOLS: BB84, B92, E91
DOI:
https://doi.org/10.37943/QRKJ7456Keywords:
quantum cryptography, quantum key distribution, Heisenberg’s uncertainty principle, superposition, quantum gate, quantum entanglement.Abstract
The proposed article is devoted to the investigation of quantum key distribution protocols. The idiosyncrasy of this theme lies within the truth that present day strategies of key distribution, which utilize classical computing at their center, have critical downsides, in contrast to quantum key distribution. This issue concerns all sorts of calculations and frameworks for scrambling mystery data, both symmetric encryption with a private key and deviated encryption with an open key. A case is that in a communication channel ensured by quantum key distribution, it is conceivable to distinguish an interceptor between two legitimate organize substances utilizing the standards laid down in quantum material science at the starting of the final century. Standards and hypotheses such as the Heisenberg guideline, quantum trap, superposition, quantum teleportation, and the no-cloning hypothesis. The field of ponder of this theme may be a promising and quickly creating zone within the field of data security and data security. There are as of now made commercial items with the usage of a few of the quantum key dispersion conventions. Numerous of the made items are utilized in different circles of human movement. The significance of applying quantum key distribution conventions beneath perfect conditions without taking into consideration blunders within the frame of quantum clamor is analyzed. The usage of three quantum key distribution conventions is illustrated, as well as the comes about of the appearance of keys and the likelihood of event of each of them. The purpose of the article is pointed at analyzing and investigating quantum key distribution conventions. The article examines the points of interest and impediments of the BB84, B92, and E91 quantum key distribution conventions.
References
Kronberg D., Ozhigov Y., Chernyavskyi A. (2006) Kvantovaya kriptographiya [Quantum Cryptography]. MSU named after M.V.Lomonosov - Moscow, p. 23-40.
Vyalyy M. (2011). Kvantovyye algoritmy: vozmozhnosti i ogranicheniya [Quantum Algorithms: Possibilities and Limitations]. St. Petersburg. https://storage.yandexcloud.net/lms-vault/private/2/courses/2011-spring/spb-quantumalgorithms/materials/20110403_quantum_algorithms_vyali_lecture_notes.pdf
Postulates of quantum theory. VSU, (2012). http://www.rec.vsu.ru/rus/ecourse/quantcomp/sem2.pdf
Bennett, C.H., Bessette, F., Brassard, G. et al. (1992). Experimental quantum cryptography. J. Cryptology, 5, 3–28. https://doi.org/10.1007/BF00191318
Gisin, N., Ribordy, G., Tittel, W., Zbinden, H. (2002). Quantum cryptography. Reviews of Modern Physics, 74(1), 145-195. https://doi.org/10.1103/RevModPhys.74.145
Baumeyster D. (2002) Fizika kvantovoy informatsii [Physics of quantum information]. Postmarket Moscow. -376 p.
Bechmann-Pasquinucci, H. (2006). Eavesdropping without quantum memory. Physical Review A, 73, 44-305. Retrieved from The Heat Is Online website: https://doi.org/10.1103/PhysRevA.73.044305
Warke A., Behera B. K., Panigrahi P. K. Experimental realization of three quantum key distribution protocols //Quantum Information Processing. – 2020. – Т. 19. – №. 11. – С. 1-15. https://doi.org/10.1007/s11128-020-02914-z
Shicheng Zhao, Wendong Li, Yuan Shen, YongHe Yu, XinHong Han, Hao Zeng, Maoqi Cai, Tian Qian, Shuo Wang, Zhaoming Wang, Ya Xiao, and Yongjian Gu. (2019). "Experimental investigation of quantum key distribution over a water channel," Appl. Opt., 58, 3902-3907. https://doi.org/10.1364/AO.58.003902
Chi Zhang, Xiao-Long Hu, Cong Jiang, Jiu-Peng Chen, Yang Liu, Weijun Zhang, Zong-Wen Yu, Hao Li, Lixing You, Zhen Wang, Xiang-Bin Wang, Qiang Zhang, and Jian-Wei Pan. (13 May 2022). Experimental Side-Channel-Secure Quantum Key Distribution. Phys. Rev. Lett., 128, 190503
Bennet C. (1992) Quantum Cryptography using any Two Nonorthogonal States. Phys.Rev.Lett., 68, 3121. https://doi.org/10.1103/PhysRevLett.68.3121
IBM Quantum Composer and the IBM Quantum Lab. https://quantum-computing.ibm.com/
Dhoha A. L. M. et al. Quantum cryptography on IBM QX. 2019 2nd International Conference on Computer Applications & Information Security (ICCAIS). – IEEE, 2019. – С. 1-6. https://doi.org/10.1109/cais.2019.8769567
Helstrom, C.W. (1969). Quantum detection and estimation theory. J Stat Phys 1, 231–252. https://doi.org/10.1007/BF01007479
Nurhadi A. I., Syambas N. R. Quantum key distribution (QKD) protocols: A survey. 2018 4th International Conference on Wireless and Telematics (ICWT). – IEEE, 2018. – С. 1-5. https://doi.org/10.1109/icwt.2018.8527822
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2022 © Y. Begimbayeva, T. Zhaxalykov This is an open access article under the Creative Commons CC BY license
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Authors who publish a manuscript in this journal agree to the following terms:
- The authors reserve the right to authorship of their work and transfer to the journal the right of first publication under the terms of the Creative Commons Attribution License, which allows others to freely distribute the published work with a mandatory link to the the original work and the first publication of the work in this journal.
- Authors have the right to conclude independent additional agreements that relate to the non-exclusive distribution of the work in the form in which it was published by this journal (for example, to post the work in the electronic repository of the institution or publish as part of a monograph), providing the link to the first publication of the work in this journal.
- Other terms stated in the Copyright Agreement.