Security and Efficiency of Quantum Key Distribution Protocols: A Comprehensive Review

Main Article Content

Dr. Saanvi Grover

Abstract

Quantum Key Distribution (QKD) protocols offer a revolutionary approach to secure communication, leveraging the principles of quantum mechanics to enable theoretically unbreakable encryption. This comprehensive review examines the security and efficiency of various QKD protocols, including BB84, E91, and Continuous Variable QKD. We analyze the fundamental principles underpinning these protocols, their implementation challenges, and the practical considerations for real-world deployment. Special emphasis is placed on the security proofs of QKD, addressing potential vulnerabilities such as photon number splitting attacks and detector blinding attacks. Additionally, we explore the efficiency of QKD systems in terms of key generation rates, distance limitations, and integration with existing communication infrastructures. Recent advancements in QKD technology, including satellite-based QKD and quantum repeaters, are also discussed. Our findings highlight the critical role of QKD in future-proofing communication security and the ongoing efforts to enhance its practicality and scalability. This review aims to provide a detailed understanding of the current state of QKD protocols, offering insights into their potential to transform secure communications in the quantum era.

Article Details

How to Cite
Grover, S. (2024). Security and Efficiency of Quantum Key Distribution Protocols: A Comprehensive Review. Journal of Quantum Science and Technology, 1(2), 23–30. https://doi.org/10.36676/jqst.v1.i2.12
Section
Original Research Articles

References

Anil Kumar. (2017). Exploring Single-Electron Transistors (SETs) in Molecular Electronics: Advanced Simulations Using TCAD and Virtuoso Framework. Innovative Research Thoughts, 3(8), 155–165. Retrieved from https://irt.shodhsagar.com/index.php/j/article/view/1399

Atomode, D (2024). ENERGY EFFICIENCY IN MECHANICAL SYSTEMS: A MACHINE LEARNING APPROACH, Journal of Emerging Technologies and Innovative Research (JETIR), 11 (5), 441-448.

Bennett, C. H., & Brassard, G. (1984). Quantum cryptography: Public key distribution and coin tossing. In Proceedings of IEEE International Conference on Computers, Systems and Signal Processing (pp. 175-179). IEEE.

Diamanti, E., Lo, H. K., Qi, B., & Yuan, Z. (2016). Practical challenges in quantum key distribution. npj Quantum Information, 2, 16025.

Dr. Nadia Ahmed. (2024). Quantum Computing Algorithms for Integer Factorization: A Comparative Analysis. Modern Dynamics: Mathematical Progressions, 1(1), 6–9. https://doi.org/10.36676/mdmp.v1.i1.02

Ekert, A. K. (1991). Quantum cryptography based on Bell's theorem. Physical Review Letters, 67(6), 661-663.

Gisin, N., Ribordy, G., Tittel, W., & Zbinden, H. (2002). Quantum cryptography. Reviews of Modern Physics, 74(1), 145-195.

Liao, S. K., Cai, W. Q., Liu, W. Y., Zhang, L., Li, Y., Ren, J. G., ... & Pan, J. W. (2017). Satellite-to-ground quantum key distribution. Nature, 549(7670), 43-47.

Lohith Paripati, Venudhar Rao Hajari, Narendra Narukulla, Nitin Prasad, Jigar Shah, & Akshay Agarwal. (2024). AI Algorithms for Personalization: Recommender Systems, Predictive Analytics, and Beyond. Darpan International Research Analysis, 12(2), 51–63. Retrieved from https://dira.shodhsagar.com/index.php/j/article/view/41

Lo, H. K., Curty, M., & Tamaki, K. (2014). Secure quantum key distribution. Nature Photonics, 8(8), 595-604.

Mrs. Monika. (2023). Black Holes and Information Paradox: Resolving the Hawking Paradox. Innovative Research Thoughts, 9(1), 336–342. Retrieved from https://irt.shodhsagar.com/index.php/j/article/view/617

Navita. (2018). The Study of Properties of Linear Algebra and Matrices. Universal Research Reports, 5(6), 107–113. Retrieved from https://urr.shodhsagar.com/index.php/j/article/view/846

Pirandola, S., Laurenza, R., Ottaviani, C., & Banchi, L. (2017). Fundamental limits of repeaterless quantum communications. Nature Communications, 8, 15043.

Reena Jangra, & Abhishek Bhatnagar. (2015). Investigation Into Image Intensification Technology. International Journal for Research Publication and Seminar, 6(4). Retrieved from https://jrps.shodhsagar.com/index.php/j/article/view/650

Satyanarayan Kanungo (2023). BRIDGING THE GAP IN AI SECURITY: A COMPREHENSIVE REVIEW AND FUTURE DIRECTIONS FOR CHATBOT TECHNOLOGIES. International Research Journal of Modernization in Engineering Technology and Science, 5(12), 4068-4079. DOI: https://www.doi.org/10.56726/IRJMETS47925

Sasaki, M., Fujiwara, M., Ishizuka, H., Klaus, W., Wakui, K., Takeoka, M., ... & Takeuchi, S. (2017). Field test of quantum key distribution in the Tokyo QKD Network. Optics Express, 19(11), 10387-10409.

Scarani, V., Bechmann-Pasquinucci, H., Cerf, N. J., Dušek, M., Lütkenhaus, N., & Peev, M. (2009). The security of practical quantum key distribution. Reviews of Modern Physics, 81(3), 1301-1350.

Singh Lather, A. (2017). INTRODUCTION TO CONDENSED MATTER PHYSICS. Innovative Research Thoughts, 3(9), 71–74. Retrieved from https://irt.shodhsagar.com/index.php/j/article/view/226

Singh Lather, A. (2017). MANY-BODY PHYSICS. Innovative Research Thoughts, 3(9), 75–78. Retrieved from https://irt.shodhsagar.com/index.php/j/article/view/227

Seema. (2018). Phenomena of interference and Young’s double slit experiment : A Review. Innovative Research Thoughts, 4(2), 140–143. Retrieved from https://irt.shodhsagar.com/index.php/j/article/view/490

Yadav, S. (2023). An Extensive Study on Lattice-Based Cryptography and its Applications for RLWE-Based Problems. Universal Research Reports, 10(3), 104–110. Retrieved from https://urr.shodhsagar.com/index.php/j/article/view/1128

Yin, J., Cao, Y., Li, Y. H., Liao, S. K., Zhang, L., Ren, J. G., ... & Pan, J. W. (2017). Satellite-based entanglement distribution over 1200 kilometers. Science, 356(6343), 1140-1144.

Similar Articles

1 2 3 > >> 

You may also start an advanced similarity search for this article.