Open Access   Article Go Back

Quantum Key Distribution Protocol for Knapsack Cryptosystem

Partha Sarathi Goswami1 , Tamal Chakraborty2 , Abir Chattopadhyay3

Section:Research Paper, Product Type: Journal Paper
Volume-07 , Issue-18 , Page no. 17-21, May-2019

Online published on May 25, 2019

Copyright © Partha Sarathi Goswami, Tamal Chakraborty, Abir Chattopadhyay . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Partha Sarathi Goswami, Tamal Chakraborty, Abir Chattopadhyay, “Quantum Key Distribution Protocol for Knapsack Cryptosystem,” International Journal of Computer Sciences and Engineering, Vol.07, Issue.18, pp.17-21, 2019.

MLA Style Citation: Partha Sarathi Goswami, Tamal Chakraborty, Abir Chattopadhyay "Quantum Key Distribution Protocol for Knapsack Cryptosystem." International Journal of Computer Sciences and Engineering 07.18 (2019): 17-21.

APA Style Citation: Partha Sarathi Goswami, Tamal Chakraborty, Abir Chattopadhyay, (2019). Quantum Key Distribution Protocol for Knapsack Cryptosystem. International Journal of Computer Sciences and Engineering, 07(18), 17-21.

BibTex Style Citation:
@article{Goswami_2019,
author = { Partha Sarathi Goswami, Tamal Chakraborty, Abir Chattopadhyay},
title = {Quantum Key Distribution Protocol for Knapsack Cryptosystem},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2019},
volume = {07},
Issue = {18},
month = {5},
year = {2019},
issn = {2347-2693},
pages = {17-21},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=1327},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=1327
TI - Quantum Key Distribution Protocol for Knapsack Cryptosystem
T2 - International Journal of Computer Sciences and Engineering
AU - Partha Sarathi Goswami, Tamal Chakraborty, Abir Chattopadhyay
PY - 2019
DA - 2019/05/25
PB - IJCSE, Indore, INDIA
SP - 17-21
IS - 18
VL - 07
SN - 2347-2693
ER -

           

Abstract

The major threat in data communication in present day is security. To reduce the threat caused in the communication channel quantum cryptography is emerging as a replacement to its classical counterpart. This paper focuses on a quantum key distribution protocol for the knapsack cryptosystem using a one-way trapdoor function by qubit rotation. The protocol exploits a qubit in superposition state for a single bit message communication. The security of the protocol is owing to the fact that any random quantum state cannot be replicated.

Key-Words / Index Term

Quantum Cryptography, Knapsack Sequence, Quantum Key Distribution Protocol

References

[1] C. H. Bennett and G. Brassard, “Quantum Cryptography: Public Key Distribution and Coin Tossing”, Proceedings of IEEE International Conference on Computers Systems and Signal Processing, Bangalore, India, December 1984, pp. 175-179.
[2] C.H. Bennett, “Quantum cryptography using any two non-orthogonal states” Physical Review Letters, 68, 1992, pp 3121–3124.
[3] Ching-Nung Yang and Chen-Chin Kuo, “Enhanced Quantum Key Distribution Protocols Using BB84 and B92”, 2002.
[4] M. Houshmand and Khayat. S. Hosseini., “An Entanglement- base Quantum Key Distribution Protocol”, Information Security and cryptology (ISCISC), 8th International ISC Conference, IEEE, 2011, pp. 45-48.
[5] A. Odeh, K. Elleithy, et. al., “Quantum Key Distribution by Using Public Key Algorithm (RSA)”, London, United Kingdom: third International Conference on Innovative Computing Technology (INTECH), IEEE, August 2013.
[6] A. Aldhaheri, K. Elleithy, et. al., “A Novel Secure Quantum Key Distribution Algorithm”, University of Bridgeport, 2014.
[7] A. Gueddana and V. Lakshminarayanan, “Physical Feasibility of QKD based on Probabilistic Quantum Circuits”, IET Information Security, Volume 12, Issue 6, November 2018, pp. 521 – 526.
[8] Bruce Schneir (1996), “Applied Cryptography”, John Willey and Sons Inc., New York, USA
[9] W. K. Wootters and W. H. Zurek, “A single quantum cannot be cloned,” Nature 299, 1982, pp. 802-803.
[10] M. A. Nielsen and I. L. Chuang, “Quantum Computation and Quantum Information”, Cambridge University Press, Cambridge, London, 2000.