[go: up one dir, main page]

Kasliwal et al., 2023 - Google Patents

Enhancing satellite‐to‐ground communication using quantum key distribution

Kasliwal et al., 2023

View PDF @Full View
Document ID
17085501350797037222
Author
Kasliwal K
PN J
Jain A
Bahl R
Publication year
Publication venue
IET Quantum Communication

External Links

Snippet

Classical Cryptography has been in use for a long time. It has been the only way of securing people's communication. However, there are some flaws observed during the execution of classical cryptography. One of them being the staunch belief that the number composed of …
Continue reading at ietresearch.onlinelibrary.wiley.com (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0852Quantum cryptography
    • H04L9/0858Details about key distillation or coding, e.g. reconciliation, error correction, privacy amplification, polarisation coding or phase coding
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/08Randomization, e.g. dummy operations or using noise
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3271Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B10/00Transmission systems employing electromagnetic waves other than radio-waves, e.g. infrared, visible or ultraviolet light, or employing corpuscular radiation, e.g. quantum communication
    • H04B10/70Photonic quantum communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B10/00Transmission systems employing electromagnetic waves other than radio-waves, e.g. infrared, visible or ultraviolet light, or employing corpuscular radiation, e.g. quantum communication
    • H04B10/11Arrangements specific to free-space transmission, i.e. transmission through air or vacuum
    • H04B10/112Line-of-sight transmission over an extended range
    • H04B10/1121One-way transmission

Similar Documents

Publication Publication Date Title
Liu et al. Towards the industrialisation of quantum key distribution in communication networks: A short survey
Hasan et al. Quantum communication systems: vision, protocols, applications, and challenges
Diamanti et al. Practical challenges in quantum key distribution
Lo et al. Secure quantum key distribution
Di Candia et al. Two-way covert quantum communication in the microwave regime
US7805079B1 (en) Free-space quantum communications process operative absent line-of-sight
Kasliwal et al. Enhancing satellite‐to‐ground communication using quantum key distribution
Lo et al. Quantum cryptography
Trinh et al. Quantum key distribution over FSO: Current development and future perspectives
Sahu et al. State-of-the-art analysis of quantum cryptography: applications and future prospects
US12010225B2 (en) Discrete variable quantum key distribution using conjugate homodyne detection
Kundu et al. Wireless quantum key distribution at terahertz frequencies: Opportunities and challenges
Endo et al. Line-of-sight quantum key distribution with differential phase shift keying
Lo et al. Quantum cryptography
Karabo et al. A novel quantum key distribution resistant against large‐pulse attacks
Zhou et al. Towards Quantum-Native Communication Systems: State-of-the-Art, Trends, and Challenges
Zawadzki Advances in quantum secure direct communication
Avanesov et al. On eavesdropping strategy for symmetric coherent states quantum cryptography using heterodyne measurement
Alshaer et al. Performance evaluation and security analysis of ground‐to‐satellite FSO system with CV‐QKD protocol
Park et al. Mutual entity authentication of quantum key distribution network system using authentication qubits
Mráz et al. Quantum circuit‐based modeling of continuous‐variable quantum key distribution system
Mukhopadhyay et al. Study of different performance measures and their relations in satellite‐based and terrestrial quantum communication
Sheikh et al. An overview of quantum cryptography for wireless networking infrastructure
Meyers Free-space and atmospheric quantum communications
Bennett et al. A quantum information science and technology roadmap