QUANTUM KEY DISTRIBUTION SCHEME: AN IMPROVEMENT BASED ON BB84 PROTOCOL
Abstract
Keywords
Full Text:
PDFReferences
W. Stallings, “Cryptography and Network Security: Principles and Practice”, 6th ed., Pearson Education Inc., 2014, pp. 9-12.
Behrouz A Forouzan, Debdeep Mukhopadhyay, “Cryptography and Network Security”, 3rd ed., Tata McGraw Hill Education(India) Pvt. Ltd., New Delhi, 2016.
N. Kaur, “Enhancement of Network Security Techniques using Quantum Cryptography”, International Journal on Computer Science and Engineering (IJCSE), 2011.
Zhao Sheng-Mei, Li Fei, and Zheng Bao-yu, “A Proof of Security of Quantum Key Distribution in Probabilistic Clone Scheme”, Communication Technology Proceedings (ICCT), vol. 2, 2003, pp. 1507-09.
Miss. Payal P. Kilor, Mr. Pravin. D. Soni, “Quantum Cryptography: Realizing next generation information security”, International Journal of Application or Innovation in Engineering & Management (IJAIEM), vol. 3, no. 2, February 2014.
C. H. Bennett and G. Brassard, “Quantum cryptography: public key distribution and coin tossing”, Proceeding of the IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, India, 1984, pp. 175-179.
Hitesh Singh, D.L. Gupta, A.K Singh, “Quantum Key Distribution Protocols: A Review”, IOSR Journal of Computer Engineering (IOSR-JCE), vol. 16, no. 2, ver. XI (Mar-Apr. 2014), pp. 01-09.
C. H. Bennett, F. Bassett, G. Brassard, L. Salvia, and J. Smiling, “Experimental quantum cryptography,” J. Cryptal. vol. 5, no. 1, 1992, pp. 3–28.
Akash Shrivastava, Manvendra Singh, “A Security Enhancement Approach in Quantum Cryptography”, IEEE 5thInternation Conference on Computers and devices for Communications(CODEC), 2012.
DOI: https://doi.org/10.26483/ijarcs.v9i2.5673
Refbacks
Copyright (c) 2018 International Journal of Advanced Research in Computer Science

