Quantum Cryptography for Enhanced Network Security: A Comprehensive Survey of Research, Developments, and Future Directions

by   Mst Shapna Akter, et al.

With the ever-growing concern for internet security, the field of quantum cryptography emerges as a promising solution for enhancing the security of networking systems. In this paper, 20 notable papers from leading conferences and journals are reviewed and categorized based on their focus on various aspects of quantum cryptography, including key distribution, quantum bit commitment, post quantum cryptography, and counterfactual quantum key distribution. The paper explores the motivations and challenges of employing quantum cryptography, addressing security and privacy concerns along with existing solutions. Secure key distribution, a critical component in ensuring the confidentiality and integrity of transmitted information over a network, is emphasized in the discussion. The survey examines the potential of quantum cryptography to enable secure key exchange between parties, even when faced with eavesdropping, and other applications of quantum cryptography. Additionally, the paper analyzes the methodologies, findings, and limitations of each reviewed study, pinpointing trends such as the increasing focus on practical implementation of quantum cryptography protocols and the growing interest in postquantum cryptography research. Furthermore, the survey identifies challenges and open research questions, including the need for more efficient quantum repeater networks, improved security proofs for continuous variable quantum key distribution, and the development of quantum resistant cryptographic algorithms.


Security in Quantum Cryptography

Quantum cryptography exploits principles of quantum physics for the secu...

Reinforcing Security and Usability of Crypto-Wallet with Post-Quantum Cryptography and Zero-Knowledge Proof

Crypto-wallets or digital asset wallets are a crucial aspect of managing...

Privacy and Data Balkanization: Circumventing the Barriers

The rapid growth in digital data forms the basis for a wide range of new...

Secure Quantum Computing for Healthcare Sector: A Short Analysis

Quantum computing research might lead to "quantum leaps," and it could h...

Quantum security and theory of decoherence

We sketch a relation between two crucial, yet independent, fields in qua...

Applied Awareness: Test-Driven GUI Development using Computer Vision and Cryptography

Graphical user interface testing is significantly challenging, and autom...

Please sign up or login with your details

Forgot password? Click here to reset