Blog
About

30
views
0
recommends
+1 Recommend
1 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Poster: found
      Is Open Access

      Quantum Cryptography

        , 1

      ScienceOpen Posters

      ScienceOpen

      Quantum cryptography , Cryptography

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          Nowadays, information is exchanged among the computer network. These data and information are involved in the business, military, academic education, research and etc. which are shared around the world in both private and public networks. Since, many categories of data are required restriction on the authorization of access, modify, delete, and insert, security in communication is increasingly important to network communication. Currently, computer security applies mathematic theory to computer security for encrypting and decrypting on both sender and receiver. To use a security attack with a high-performance computer (e.g. quantum computer), an attacker can find a key and then obtains the data infeasible period. Quantum cryptography is one of the solutions that use the property of polarization to ensure that transmitted data is not trapped by an eavesdropper. Quantum cryptography is improved significantly in the last decades including the most two dominant protocols BB84 and BB92.

          Related collections

          Author and article information

          Journal
          ScienceOpen Posters
          ScienceOpen
          24 November 2020
          Affiliations
          [1 ] Computer Science /Karunya Institute of Technology and Sciences/ Coimbatore, India
          Article
          10.14293/S2199-1006.1.SOR-.PPSDX4A.v1

          This work has been published open access under Creative Commons Attribution License CC BY 4.0 , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Conditions, terms of use and publishing policy can be found at www.scienceopen.com .

          All data generated or analysed during this study are included in this published article (and its supplementary information files).

          Computer science

          Cryptography, Quantum cryptography

          Comments

          Comment on this article