Enhancing Communication Security through Quantum Cryptography
DOI:
https://doi.org/10.63282/3050-922X.ICAILLMBA-110Keywords:
Post-Quantum Cryptography, Quantum Entanglement, No-Cloning Theorem, BB84 Protocol, E91 Protocol, Quantum Cryptography, QKDAbstract
Quantum cryptography extends the capabilities of traditional cryptographic systems to provide secure communication based on core quantum physics notions. This paper provides a brief review of quantum cryptography approaches, focusing on quantum key distribution (QKD) protocols such as BB84 and E91. Superposition, entanglement, and the no-cloning theorem all explain quantum systems' natural ability to detect eavesdropping. The paper also examines quantum cryptography's practical applications, including scalability, limited transmission distance, channel noise, and device challenges. To emphasize their distinct advantages and disadvantages in the face of quantum computing threats, conventional, post-quantum, and quantum cryptography are contrasted. Finally, future perspectives for securely scalable quantum communication systems are discussed, including existing applications and unresolved research obstacles.
References
[1] C. H. Bennett and G. Brassard, “Quantum cryptography: Public key distribution and coin tossing,” Proc. IEEE Int. Conf. Computers, Systems and Signal Processing, Bangalore, India, pp. 175–179, 1984
[2] W. K. Wootters and W. H. Zurek, “A single quantum cannot be cloned,” Nature, vol. 299, no. 5886, pp. 802–803, 1982.
[3] D. Mayers, “Unconditional security in quantum cryptography,” J. ACM, vol. 48, no. 3, pp. 351–406, 2001.
[4] A. K. Ekert, “Quantum cryptography based on Bell’s theorem,” Phys. Rev. Lett., vol. 67, no. 6, pp. 661–663, 1991.
[5] N. Gisin, G. Ribordy, W. Tittel, and H. Zbinden, “Quantum cryptography,” Rev. Mod. Phys., vol. 74, no. 1, pp. 145–195, 2002 .
[6] H.-K. Lo, M. Curty, and B. Qi, “Measurement-device-independent quantum key distribution,” Phys. Rev. Lett., vol. 108, no. 13, Art. no. 130503, 2012.
[7] P. Walenta et al., “Long-distance QKD over 250 km,” Opt. Express, vol. 22, no. 24, pp. 30280–30289, 2014.
[8] S.-K. Liao et al., “Satellite-to-ground quantum key distribution,” Nature, vol. 549, no. 7670, pp. 43–47, 2017.
[9] M. Peev et al., “The SECOQC quantum key distribution network in Vienna,” New J. Phys., vol. 11, Art. no. 075001, 2009).
[10] D. J. Bernstein, J. Buchmann, and E. Dahmen, Post-Quantum Cryptography. Berlin, Germany: Springer, 2009.
[11] H.-J. Briegel, W. Dür, J. I. Cirac, and P. Zoller, “Quantum repeaters: The role of imperfect local operations,” Phys. Rev. Lett., vol. 81, no. 26, pp. 5932–5935, 1998.
[12] S. Muralidharan et al., “Optimal architectures for long distance quantum communication,” Sci. Rep., vol. 6, Art. no. 20463, 2016.
[13] F. Grosshans et al., “Quantum key distribution using Gaussian-modulated coherent states,” Nature, vol. 421, pp. 238–241, 2003.
[14] M. Mirhosseini et al., “High-dimensional quantum cryptography with twisted light,” New J. Phys., vol. 17, Art. no. 033033, 2015
[15] V. Scarani et al., “The security of practical quantum key distribution,” Rev. Mod. Phys., vol. 81, no. 3, pp. 1301–1350, 2009.
[16] C. Elliott, “Building the quantum network,” New J. Phys., vol. 4, Art. no. 46, 2002.
[17] M. Mosca, “Cybersecurity in an era with quantum computers,” IEEE Secur. Privacy, vol. 16, no. 5, pp. 38–41, 2018.
[18] S. Wehner, D. Elkouss, and R. Hanson, “Quantum internet: A vision for the road ahead,” Science, vol. 362, no. 6412, Art. no. eaam9288, 2018.
[19] K. Azuma, K. Tamaki, and H.-K. Lo, “All-photonic quantum repeaters,” Nat. Commun., vol. 6, Art. no. 6787, 2015.
[20] M. A. Eisaman et al., “Invited review article: Single-photon sources and detectors,” Rev. Sci. Instrum., vol. 82, no. 7, Art. no. 071101, 2011.
[21] X. Ma, C.-H. F. Fung, and H.-K. Lo, “Quantum key distribution with entangled photon sources,” Phys. Rev. A, vol. 76, no. 1, Art. no. 012307, 2007.
[22] Y. Cao et al., “Integrated optical quantum key distribution network,” Phys. Rev. Lett., vol. 125, no. 26, Art. no. 260503, 2020.
[23] Z. Zhang et al., “Metropolitan all-pass and inter-city quantum communication network,” Opt. Express, vol. 26, no. 24, pp. 31501–31511, 2018.
[24] ETSI GS QKD 014, “Quantum Key Distribution (QKD); Protocol and data format,” ETSI, 2020
[25] R. Alléaume et al., “Using quantum key distribution for cryptographic purposes: A survey,” Theor. Comput. Sci., vol. 560, pp. 62–81, 2014.