Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

A Quantum Key Distribution Technique Using Quantum Cryptography

A Quantum Key Distribution Technique Using Quantum Cryptography
View Sample PDF
Author(s): Meenakshi Sharma (Galgotias University, India) and Sonia Thind (Chandigarh University, India)
Copyright: 2019
Volume: 11
Issue: 2
Pages: 10
Source title: International Journal of Distributed Artificial Intelligence (IJDAI)
Editor(s)-in-Chief: Firas A. Raheem (University of Technology - Iraq, Iraq) and Israa AbdulAmeer AbdulJabbar (University of Technology - Iraq, Iraq)
DOI: 10.4018/IJDAI.2019070101


View A Quantum Key Distribution Technique Using Quantum Cryptography on the publisher's website for pricing and purchasing information.


In order to protect and secure the sensitive data over the internet, the current data security methods typically depend on the cryptographic systems. Recent achievements in quantum computing is a major challenge to such cryptography systems. In this way, the quantum key distribution (QKD) technique evolves as a very important technique which gives un-conditional data security. This technique is based on the laws of quantum physics for its security. This article gives a detailed description of the QKD technique. This technique secures the encryption key delivery between the two authenticated parties from the unauthorized access. In the next phase, quantum cryptography model is discussed. Finally, some important application areas and limitations of this technology are be discussed.

Related Content

Pinki Sharma, Jyotsna Sengupta, P. K. Suri. © 2019. 17 pages.
Sahil Chhabra, Neeraj Kumar Jain, Vipin Tomar. © 2019. 9 pages.
Sukhdev Singh, Chander Kant. © 2019. 7 pages.
Ashish Lathwal. © 2019. 6 pages.
Alankrita Aggarwal, Deepak Chatha. © 2019. 10 pages.
Smiley Gupta, Jagtar Singh. © 2019. 10 pages.
Meenakshi Sharma, Sonia Thind. © 2019. 10 pages.
Body Bottom