Date of Publication :24th August 2017
Abstract: Quantum Cryptography is a way to deal with verifying correspondences by applying the wonders of quantum material science. Dissimilar to protocols traditional cryptography, which employs numerical strategies to confine eavesdroppers, quantum cryptography is engaged on the material science of data. Quantum cryptography gives secure correspondence, whose security relies just upon the legitimacy of quantum hypothesis, i.e., it is guaranteed legitimately by the laws of material science. This is a significant contrast from any traditional cryptographic methods. This article abridges the current condition of quantum cryptography and gives potential expansions of its practicality as a system for verifying existing correspondence systems.
Reference :
-
- Bennett, C. H., and Brassard, G. Quantum public key distribution reinvented. Sigact News 18(4) (1987), 51–53.
- Bennett, C. H., Brassard, G., and Ekert, A. K. Quantum cryptography. Sci. Am. 267, 4 (Oct. 1992), 50.
- Bennett, C. H., and DiVincenzo, D. P. Quantum information and computation. Nature 404 (2000), 247–55.
- Bennett, C. H., and Shor, P. W. Quantum information theory. IEEE Transactions on Information Theory 44, 6 (1998), 2724–42.
- Brassard, G. Cryptology column — 25 years of quantum cryptography. Sigact News 27(3) (1996), 13–24.
- Gottesman, D., and Lo, H.-K. From quantum cheating to quantum security. Physics Today 53, 11 (Nov. 2000), 22.
- Lo, H.-K. Quantum Cryptology. World Scientific, 1998.
- Singh, S., 1999, The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography (Fourth Estate, London).
- Brassard, G., 1988, Modern Cryptology: A Tutorial, Lecture Notes in Computer Science, Vol. 325 (Springer, New York).
- Shannon, C. E., 1949, ‘‘Communication theory of secrecy systems, ’’ Bell Syst. Tech. J. 28, 656–715.
- Stallings, W., 1999, Cryptography and Network.
- Wiesner, S., 1983, ‘‘Conjugate coding,’’ SIGACT News, 15, 78–88
- Bennett, C. H., and G. Brassard, 1984, in Proceedings of the IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, India, (IEEE, New York), pp.175–179.
- Bennett, C. H., and G. Brassard, 1985, ‘‘Quantum public key distribution system,’’ IBM Tech. Discl. Bull. 28, 3153–3163.
- W. K. Wootters and W. H. Zurek, “A single quantum cannot be cloned,” Nature 299, 802 (1982).
- J Ganeshkumar, N Rajesh, J Elavarasan, M Sarmila, S Balamurugan, “Investigations on Decentralized Access Control Strategies for Anonymous Authentication of Data Stored In Clouds”, International Journal of Innovative Research in Computer and Communication Engineering, 2015
- VM Prabhakaran, S Balamurugan, S Charanyaa, “Sequence Flow Modelling for Efficient Protection of Personal Health Records (PHRs) in Cloud”, International Journal of Innovative Research in Computer and Communication Engineering, 2015
- J Ganeshkumar, N Rajesh, J Elavarasan, M Sarmila, S Balamurugan, “Certain Investigations on Anonymous Authentication Mechanisms for Data Stored in Clouds”, International Journal of Innovative Research in Computer and Communication Engineering, 2015
- J Ganeshkumar, N Rajesh, J Elavarasan, M Sarmila, S Balamurugan, “A Survey on Decentralized Access Control Strategies for Data Stored in Clouds”, International Journal of Innovative Research in Computer and Communication Engineering, 2015