Muhammad Musharraf Ishtiaq Khan
Department of Computer Science, International Islamic University, Islamabad, Pakistan
Muhammad Sher
Department of Computer Science, International Islamic University, Islamabad, Pakistan
ABSTRACT
Data transmission has always been vulnerable to eavesdropping. Conventional cryptography has provided security in data communication, however it has some limitations when dealing with passive eavesdropping. Recently, the quantum mechanics has made a remarkable entry in the field of data communication. Now, it is possible to construct cryptographic communication systems which detect unauthorized eavesdropping and guarantee its prevention. Several protocols have been devised to implement such systems e.g., BB84, B92 and EPR. The famous BB84 protocol describes quantum encryption in terms of polarization states of a photon. The secret information is transmitted via secure quantum channel followed by a public conversation for verification and reconciliation. The B92 protocol is an extension of BB84 which shows how photons with non-orthogonal states can be used to distribute a secret key. The EPR protocol utilizes an entangled photon pair for encryptionone photon from this pair is transmitted towards the destination while keeping the other at the source; the destination photon describes the state of the source photon, failing to which confirms the intrusion. This paper presents a study of these protocols and a review on the recent developments in the field of secure quantum transmission.
PDF References Citation
How to cite this article
Muhammad Musharraf Ishtiaq Khan and Muhammad Sher, 2003. Protocols for Secure Quantum Transmission: A Review of Recent Developments. Information Technology Journal, 2: 265-276.
DOI: 10.3923/itj.2003.265.276
URL: https://scialert.net/abstract/?doi=itj.2003.265.276
DOI: 10.3923/itj.2003.265.276
URL: https://scialert.net/abstract/?doi=itj.2003.265.276
REFERENCES
- Bennett, C.H. and G. Brassard, 1984. Quantum cryptography: Public key distribution and coin tossing. Proceedings of the International Conference on Computers, Systems and Signal Processing, Dec. 10-12, Bangalore, India, pp: 1-5.
Direct Link - Bennett, C.H., 1992. Quantum cryptography using any two non-orthogonal states. Phys. Rev. Lett., 68: 3121-3124.
Direct Link - Ekert, A.K., B. Huttner, G.M. Palma and A. Peres, 1994. Eavesdropping on quantum-cryptographical systems. Phys. Rev. A, 50: 1047-1056.
PubMedDirect Link - Ekert, A.K., 1991. Quantum cryptography based on Bell's theorem. Phys. Rev. Lett., 67: 661-663.
CrossRefDirect Link - Franson, J.D. and H. Ilves, 1994. Quantum cryptography using polarization feedback. J. Modern Optics, 41: 2391-2396.
Direct Link - Jacobs, B.C. and J.D. Franson, 1996. Quantum cryptography in free space. Optics Lett., 21: 1854-1856.
CrossRef - Phoenix, S.J. and P.D. Townsend, 1995. Quantum cryptography: How to beat the code breakers using quantum mechanics. Comtemporay Phys., 36: 165-195.
CrossRefDirect Link - Townsend, P.D., 1994. Secure key distribution system based on quantum cryptography. Electron. Lett., 30: 809-811.
CrossRefDirect Link - Townsend, P.D. and I. Thompson, 1994. A quantum key distribution channel based on optical fibre. J. Modern Optics, 41: 2425-2433.
CrossRefDirect Link - Townsend, P.D., J.G. Rarity and P.R. Tapster, 1993. Single photon interference in 10km long optical fibre interferometer. Electron. Lett., 29: 634-635.
CrossRefDirect Link - Einstein, A., B. Podolsky and N. Rosen, 1935. Can quantum-mechanical description of physical reality be considered complete. Phys. Rev., 47: 777-780.
CrossRef