Effective Quantum Key Distribution and Authentication Protocol for Secure Communication in Peer to Peer Networks

Abstract

The Evolution of quantum computing has endangered the conventional newlinecryptography methods that put millions of devices under security threats. Hackers newlineusing quantum computers could theoretically rip through these encrypted keys under newlinepolynomial time; therefore, Quantum-based encryption techniques can provide rigid newlineand robust security protocols against such threats. The real problem arises during newlinepractical deployment of quantum protocol. The existing quantum encryption newlineprotocol faces problems like key generating rate (key size), key authentication newlineschemes and key preserving techniques for multiple transactions. The existing newlinequantum protocol techniques deploy delayed/post measurement by through storage newlineof the qubit in memory. The current storage time for qubit is 3ns and it s difficult to newlinegenerate a larger size key for secure communication. The primary focus of research newlineworks is to develop an effective protocol for secure communication between newlinelegitimate users newline

Description

Keywords

Citation

item.page.endorsement

item.page.review

item.page.supplemented

item.page.referenced