Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3377644.3377671acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiccspConference Proceedingsconference-collections
research-article

Quantum Cryptography and Simulation: Tools and Techniques

Published: 26 February 2020 Publication History

Abstract

The advancement of quantum mechanics has accelerated the quantum computer architecture and hardware. However, algorithms and implementations to take the full advantage of entanglements provided by quantum devices are still far behind. Quantum cryptography offers the possibility of theoretically perfect security based on the principles of quantum mechanics, ensuring that the presence of an eavesdropper will be detected before any sensitive information is transmitted. However, the relevant technology is still under development - hardware, though commercially available, is still in an immature state, and the protocols used to implement secure communications using that hardware may still be improved. The use of simulations is an important tool for studying quantum cryptography, as they can enable researchers to make valuable insights at a relatively low cost. The data garnered from working with simulations can provide direction for further research both in the development of new communications protocols and in the improvement of actual hardware systems.

References

[1]
Mobin Javed and Khurram Aziz. 2009. A Survey of Quantum Key Distribution Protocols. In Proceedings of the 7th International Conference on Frontiers of Information Technology (FIT '09), Article 39, 5 pages. DOI=https://dx.doi.org/10.1145/1838002.1838046
[2]
Abudhahir Buhari, Zuriati Ahmad Zukarnain, Shamla K.Subramaniam, et al. 2012. An Efficient Modeling and Simulation of Quantum Key Distribution Protocols using OptiSystem™. In 2012 IEEE Symposium on Industrial Electronics and Applications. Pages 84--89.
[3]
Jan Hilgevoord. 2016. The Uncertainty Principle. Retrieved September 10, 2017 from https://plato.stanford.edu/entries/qt-uncertainty/
[4]
Jeffrey Bub. 2015. Quantum Entanglement and Information. Retrieved September 10, 2017 from https://plato.stanford.edu/entries/qt-entangle/
[5]
C. H. Bennett and G. Brassard. 1984. Quantum Cryptography: Public Key Distribution and Coin Tossing. In Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, Volume 175. Pages 175--179. Retrieved August 21, 2017 from http://researcher.watson.ibm.com/researcher/files/us-bennetc/BB84highest.pdf
[6]
Dagmar Bruss, Gábor Erdélyi, Tim Meyer, et al. 2007. Quantum Cryptography: A Survey. In ACM Comput. Surv. 39, 2, Article 6 (July 2007). 27 pages. DOI=https://dx.doi.org/10.1145/1242471.1242474
[7]
Artur K. Ekert. 1991. Quantum Cryptography Based on Bell's Theorem. In Physical Review Letters, Vol. 67, No. 6. Pages 661--663.
[8]
Yoshito Kanamori, Seong-Moo Yoo, and Mohammad Al-Shurman. 2005. A Quantum No-Key Protocol for Secure Data Communication. In Proceedings of the 43rd annual Southeast regional conference - Volume 2 (ACM-SE 43), Vol. 2. Pages 92--93.
[9]
Alla Altalib, Yomna Al-Ibrahim, Zahra Almahfoudh, et al. 2015. Security Measures in a Keyless Quantum Communication Protocol. In 2015 Fifth International Conference on e-Learning (econf). Pages 53--57.
[10]
MagiQ Technologies. 2017. MagiQ Research Labs. Retrieved September 9, 2017 from http://www.magiqtech.com/research-labs/
[11]
IDQ. 2017. Quantum-Safe Crypto. Retrieved September 9, 2017 from http://www.idquantique.com/quantum-safe-crypto/
[12]
IDQ. 2017. Single-Photon Systems. Retrieved September 9, 2017 from http://www.idquantique.com/photon-counting/
[13]
IDQ. 2017. Random Number Generation. Retrieved September 9, 2017 from http://www.idquantique.com/random-number-generation/
[14]
Paul Marks. 2007. Quantum Cryptography to Protect Swiss Election. Retrieved September 12, 2017 from https://www.newscientist.com/article/dn12786-quantum-cryptography-to-protect-swiss-election/
[15]
Swiss Quantum. 2010. Quantum Encryption to Secure World Cup Link. Retrieved September 12, 2017 from http://swissquantum.idquantique.com/?Quantum-encryption-to-secure-World
[16]
QuintessenceLabs. 2017. Quantum Cybersecurity. Retrieved September 12, 2017 from https://www.quintessencelabs.com/quantum-cybersecurity/
[17]
QuintessenceLabs. 2017. Quantum Cybersecurity - Ultimate Data Protection. Retrieved September 12, 2017 from https://www.quintessencelabs.com/products/#clientSDK
[18]
Chip Elliott, Alexander Colvin, David Pearson, et al. 2005. Current Status of the DARPA Quantum Network. In Proceedings Volume 5815, Quantum Information and Computation 30, 12 pages.
[19]
Sheng-Kai Liao, Wen-Qi Cai, Wei-Yue Liu, et al. 2017. Satellite-to-Ground Quantum Key Distribution. In Nature 549, 43--47 (07 September 2017), 18 pages.
[20]
Ji-Gang Ren, Ping Xu, Hai-Lin Yong, et al. 2017. Ground-to-Satellite Quantum Teleportation. In Nature 549, 70--73 (07 September 2017), 16 pages.
[21]
M. Canale, D. Bacco, et al. 2011. A Prototype of a Free-Space QKD Scheme Based on the B92 Protocol. In Proceedings of the 4th International Symposium on Applied Sciences in Biomedical and Communication Technologies (ISABEL '11). 5 pages.
[22]
OptSim Product Overview. 2017. Synopsys, Inc. Retrieved September 20, 2017 from https://www.synopsys.com/optical-solutions/rsoft/system-network-optsim.html
[23]
B. Archana and S. Krithika. 2015. Implementation of BB84 Quantum Key Distribution using OptSim. In 2015-2nd International Conference on Electronics and Communication Systems. Pages 457--460.
[24]
OptiSystem. 2017. Optiwave Systems Inc. Retrieved September 20, 2017 from https://optiwave.com/category/products/system-and-amplifier-design/optisystem/
[25]
Abudhahir Buhari, Zuriati Ahmad Zukarnain, et al. 2012. An Efficient Modeling and Simulation of Quantum Key Distribution Protocols using OptiSystem™. In 2012 IEEE Symposium on Industrial Electronics and Applications. Pages 84--89.
[26]
Timothy Calver, Michael Grimaila, et al. 2011. An Empirical Analysis of the Cascade Error Reconciliation Protocol for Quantum Key Distribution. In Proceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research (CSIIRW '11). 4 pages.
[27]
Wajdi Al-Khateeb, Khalid Al-Khateeb, Nur Elyana Ahmad, Siti Norussaadah Mohd Salleh. 2013. Practical Considerations on Quantum Key Distribution (QKD). In 2013 International Conference on Advanced Computer Science Applications and Technologies. Pages 278--283.

Index Terms

  1. Quantum Cryptography and Simulation: Tools and Techniques

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    ICCSP 2020: Proceedings of the 2020 4th International Conference on Cryptography, Security and Privacy
    January 2020
    160 pages
    ISBN:9781450377447
    DOI:10.1145/3377644
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    In-Cooperation

    • NJU: Nanjing University

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 26 February 2020

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Quantum cryptography
    2. Quantum key distribution
    3. Security
    4. Simulation

    Qualifiers

    • Research-article
    • Research
    • Refereed limited

    Conference

    ICCSP 2020

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • 0
      Total Citations
    • 529
      Total Downloads
    • Downloads (Last 12 months)82
    • Downloads (Last 6 weeks)7
    Reflects downloads up to 18 Aug 2024

    Other Metrics

    Citations

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media