Effective Quantum Key Distribution and Authentication Protocol for Secure Communication in Peer to Peer Networks
Loading...
Date
item.page.authors
Journal Title
Journal ISSN
Volume Title
Publisher
Abstract
The Evolution of quantum computing has endangered the conventional
newlinecryptography methods that put millions of devices under security threats. Hackers
newlineusing quantum computers could theoretically rip through these encrypted keys under
newlinepolynomial time; therefore, Quantum-based encryption techniques can provide rigid
newlineand robust security protocols against such threats. The real problem arises during
newlinepractical deployment of quantum protocol. The existing quantum encryption
newlineprotocol faces problems like key generating rate (key size), key authentication
newlineschemes and key preserving techniques for multiple transactions. The existing
newlinequantum protocol techniques deploy delayed/post measurement by through storage
newlineof the qubit in memory. The current storage time for qubit is 3ns and it s difficult to
newlinegenerate a larger size key for secure communication. The primary focus of research
newlineworks is to develop an effective protocol for secure communication between
newlinelegitimate users
newline