Quantum Cryptography Protocols for Information Security

Quantum Cryptography Protocols for Information Security

Göran Pulkkis, Kaj J. Grahn
ISBN13: 9781605660264|ISBN10: 1605660264|EISBN13: 9781605660271
DOI: 10.4018/978-1-60566-026-4.ch510
Cite Chapter Cite Chapter

MLA

Pulkkis, Göran, and Kaj J. Grahn. "Quantum Cryptography Protocols for Information Security." Encyclopedia of Information Science and Technology, Second Edition, edited by Mehdi Khosrow-Pour, D.B.A., IGI Global, 2009, pp. 3191-3198. https://doi.org/10.4018/978-1-60566-026-4.ch510

APA

Pulkkis, G. & Grahn, K. J. (2009). Quantum Cryptography Protocols for Information Security. In M. Khosrow-Pour, D.B.A. (Ed.), Encyclopedia of Information Science and Technology, Second Edition (pp. 3191-3198). IGI Global. https://doi.org/10.4018/978-1-60566-026-4.ch510

Chicago

Pulkkis, Göran, and Kaj J. Grahn. "Quantum Cryptography Protocols for Information Security." In Encyclopedia of Information Science and Technology, Second Edition, edited by Mehdi Khosrow-Pour, D.B.A., 3191-3198. Hershey, PA: IGI Global, 2009. https://doi.org/10.4018/978-1-60566-026-4.ch510

Export Reference

Mendeley
Favorite

Abstract

Quantum cryptography will have a severe impact on information security technology. The objective of this article is to present state-of-the-art and future possibilities of two quantum cryptography protocol types. These protocols are for absolutely secure distribution of symmetric encryption/ decryption keys and for creating secure digital signatures.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.