{"title":"量子密钥分发(QKD)协议综述","authors":"A. Nurhadi, N. Syambas","doi":"10.1109/ICWT.2018.8527822","DOIUrl":null,"url":null,"abstract":"The security strength of key distribution of most conventional cryptography is relied on mathematical complexity and the irrational time needed to break the algorithm. But it will be ineffective if the secret key distribution procedure is weak. In 1994 Peter Shor proposed an algorithm that can factorize great integer number efficiently by using principle of quantum computer, this algorithm poses a threat to some of the conventional cryptography. Recently, Quantum Key Distribution (QKD) is drawing much attention of researcher as a solution of that problem of key distribution. Theoretically, QKD have been proven can be provide unconditionally secure communication based on quantum mechanics laws. In this article we survey the QKD protocols. Also, we present a little experiment of some QKD protocols that we discussed on this paper.","PeriodicalId":356888,"journal":{"name":"2018 4th International Conference on Wireless and Telematics (ICWT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"32","resultStr":"{\"title\":\"Quantum Key Distribution (QKD) Protocols: A Survey\",\"authors\":\"A. Nurhadi, N. Syambas\",\"doi\":\"10.1109/ICWT.2018.8527822\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The security strength of key distribution of most conventional cryptography is relied on mathematical complexity and the irrational time needed to break the algorithm. But it will be ineffective if the secret key distribution procedure is weak. In 1994 Peter Shor proposed an algorithm that can factorize great integer number efficiently by using principle of quantum computer, this algorithm poses a threat to some of the conventional cryptography. Recently, Quantum Key Distribution (QKD) is drawing much attention of researcher as a solution of that problem of key distribution. Theoretically, QKD have been proven can be provide unconditionally secure communication based on quantum mechanics laws. In this article we survey the QKD protocols. Also, we present a little experiment of some QKD protocols that we discussed on this paper.\",\"PeriodicalId\":356888,\"journal\":{\"name\":\"2018 4th International Conference on Wireless and Telematics (ICWT)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-07-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"32\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 4th International Conference on Wireless and Telematics (ICWT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICWT.2018.8527822\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 4th International Conference on Wireless and Telematics (ICWT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICWT.2018.8527822","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Quantum Key Distribution (QKD) Protocols: A Survey
The security strength of key distribution of most conventional cryptography is relied on mathematical complexity and the irrational time needed to break the algorithm. But it will be ineffective if the secret key distribution procedure is weak. In 1994 Peter Shor proposed an algorithm that can factorize great integer number efficiently by using principle of quantum computer, this algorithm poses a threat to some of the conventional cryptography. Recently, Quantum Key Distribution (QKD) is drawing much attention of researcher as a solution of that problem of key distribution. Theoretically, QKD have been proven can be provide unconditionally secure communication based on quantum mechanics laws. In this article we survey the QKD protocols. Also, we present a little experiment of some QKD protocols that we discussed on this paper.