Improving BB84 in Quantum Encryption
Abstract
Keywords
Full Text:
PDFReferences
A. M. Shaikha, and P. D. Shah, BB84 and Identity Based Encryption (IBE) Based a Novel Symmetric Key
Distribution Algorithm, Elsevier journal, 2012.
A. Mahmoud Abbas, A, Goneid, and Sh, El-Kassas, Privacy Amplification in Quantum Cryptography BB84 using
Combined Univarsal2-Truly Random Hashing, International Journal of Information and Network Security (IJINS),
(2)98-115, 2014.
B. Santhi, K.S. Ravichandran, A. P. Arun, and L. Chakkarapani, A Novel Cryptographic Key Generation Method
Using Image Features, Research Journal of Information Technology, 4(2), pp. 88-92, 2012.
B. Tanmay, H. Sirshendu, M. Ayan, and S. R. Bhadra Chaudhuri, A novel data encryption technique by genetic
crossover of robust biometric key and session based password, International. J. Network Secur. Appl. (IJNSA), 3(2),
pp. 111-120, 2011.
C. Bennet, and G. Brassard, Quantum cryptography, IEEE. International Conference on computer. System and
processing. Bangalore. India. N.Y, p175, 1992.
C. Bennet, F. Bessette, G. Brassard, L. Salvail, and J. Smolin, Experimental quantum Cryptography, Journal of
cryptography, 1992.
C. Elliot, and D. Pearson, Quantum Cryptography in Practice, IEEE, optics letter, vol. 91, NO.6, PP 35-40, 2003.
C. Kollmitzer, and M. Pivk, Applied Quantum Cryptography, Springer, 2010.
D. N. Kartheek, O. P. Kumar, and S. Srujan, Security Using BB84 Quantum Key Distribution Protocols. IJARCSSE
All Rights Reserved, 2012.
H. Schildt, The Complete Reference Java, Seventh Edition, McGraw-Hill, 2007.
J. Katz, Digital Signatures, 1st ed, 2nd Printing, pp. 3-33 & 87-119, 2010.
M. R. Ogiela, and L. Ogiela, Image based cryptobiometric key generation, Third International Conference
on Intelligent Networking and Collaborative Systems (INCoS), AGH Univ. Sci. Technol, Krakow, Poland, pp. 673-
, 2011.
N.V. Chetty, B. Abhijith, G. Nihar, and P. M. D. Raj Vincent, Modified Novel Quantum Key Exchange using
BB84 Algorithm, International Journal of Engineering and Technology, 5(3)2451-2454, 2013.
P. Marrand, and D. Townsend, Quantum key distribution over distance as long as 30km, vol. 20, no.15, pp.
-1697, 1995.
R. Ursin, Entanglement-based quantum communication over 144km, Nature Physics, pp. 481-486, 2007.
S. Fengxi, G. Zhongwei, M. Dayong, Feature Selection Using Principal Component Analysis, ICSEM, 1:
-30, 2010.
W. Lifang, L. Xingsheng, Y. Songlong, and X. Peng, A novel key generation cryptosystem based on face
features, IEEE 10th International Conference on Signal Processing, pp. 1675-1678, 2010.
Y. Jeong, Effects of depolarizing quantum channels on BB84 and SARG04 quantum cryptography protocols,
Department of Physics, Pohang University of Science and Technology (POSTECH), Pohang, 790-784, Korea. February
, 2010.
Y. Kai-zhi, C. Ying-lei, and J. Liu, A method for extracting the text feature of SAR image based on cooccurrence matrix, 4th International Congress on Image and Signal Processing (CISP), Telecommun. Eng. Inst., Air Force Eng. Univ., Xi'an, China, 4: 2038-2043, 2011.
Refbacks
- There are currently no refbacks.
Copyright (c) 2015 Journal of Information Sciences and Computing Technologies
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
Copyright © 2014 Journal of Information Sciences and Computing Technologies. All rights reserved.
ISSN: 2394-9066
For any help/support contact us at jiscteditor@scitecresearch.com.