{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,7]],"date-time":"2025-11-07T13:26:56Z","timestamp":1762522016881,"version":"3.41.2"},"reference-count":17,"publisher":"Emerald","issue":"3","license":[{"start":{"date-parts":[[2017,4,10]],"date-time":"2017-04-10T00:00:00Z","timestamp":1491782400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JEIM"],"published-print":{"date-parts":[[2017,4,10]]},"abstract":"<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Purpose<\/jats:title>\n<jats:p>Quantum key distribution (QKD) is a technology, based on the quantum laws of physics, rather than the assumed computational complexity of mathematical problems, to generate and distribute provably secure cipher keys over unsecured channels. The authors are using this concept of QKD for the online banking systems. The paper aims to discuss these issues.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Design\/methodology\/approach<\/jats:title>\n<jats:p>In order to function properly, any system using QKD needs to transport both quantum and classical data from a specified source to a specified destination, resolve competing requests for shared hardware, and manage shared keys between neighboring trusted nodes via a multi-hop mechanism. In this paper the authors are going to explain the transmission and control system for QKD implementation in online banking systems.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Findings<\/jats:title>\n<jats:p>This paper presents the transmission and system control of QKD for online banking system is feasible under specific conditions outside a laboratory. Above, the authors have shown the research on the QKD based online banking systems. Though the current researches are focused on QKD systems for online banking systems, the techniques discussed can be applied to other quantum information processing involving photons. Combination with other efforts that are not mentioned here, such as entangled-photon-sources, single photon sources, two-qubit gates, and so on, will provide a rigid foundation for future quantum information technologies.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Originality\/value<\/jats:title>\n<jats:p>Recognizing the importance of online access as one of the vehicles for the development of cheaper, faster and more reliable services there are areas of improvement where all involved parties should endeavor to improve toward the deployment of services without unnecessary or excessive risks. This improvement applies to both retail and commercial customers and does not endorse any particular technology.<\/jats:p>\n<\/jats:sec>","DOI":"10.1108\/jeim-08-2014-0084","type":"journal-article","created":{"date-parts":[[2017,4,18]],"date-time":"2017-04-18T05:22:49Z","timestamp":1492492969000},"page":"526-532","source":"Crossref","is-referenced-by-count":4,"title":["Transmission and control for QKD in online banking systems"],"prefix":"10.1108","volume":"30","author":[{"given":"Anand","family":"Sharma","sequence":"first","affiliation":[]},{"given":"Saroj","family":"Lenka","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"first-page":"175","article-title":"Quantum cryptography: public key distribution and coin tossing","year":"1984","key":"key2020120802441807700_ref001"},{"issue":"43","key":"key2020120802441807700_ref002","first-page":"1","article-title":"Practical free-space quantum key distribution over 10 km in daylight and at night","volume":"4","year":"2002","journal-title":"New Journal of Physics"},{"issue":"7497","key":"key2020120802441807700_ref003","doi-asserted-by":"crossref","first-page":"441","DOI":"10.1038\/508441a","article-title":"Quantum communications leap out of the lab","volume":"508","year":"2014","journal-title":"Nature"},{"issue":"1","key":"key2020120802441807700_ref004","first-page":"010503\/1","article-title":"Long-distance decoy-state quantum key distribution in optical fiber","volume":"98","year":"2007","journal-title":"Physical Review Letters"},{"issue":"3","key":"key2020120802441807700_ref005","first-page":"2696","article-title":"Authentication in online banking systems through quantum cryptography","volume":"5","year":"2013","journal-title":"International Journal of Engineering and Technology"},{"first-page":"351","article-title":"Experimental quantum cryptography, advantages in cryptology","year":"1990","key":"key2020120802441807700_ref006"},{"issue":"7465","key":"key2020120802441807700_ref007","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1038\/nature12493","article-title":"A quantum access network","volume":"501","year":"2013","journal-title":"Nature"},{"issue":"5-6","key":"key2020120802441807700_ref008","first-page":"431","article-title":"Security of quantum key distribution using weak coherent states with nonrandom phases","volume":"7","year":"2007","journal-title":"Quantum Information and Computation"},{"first-page":"1701","article-title":"Building security and trust in online banking","year":"2005","key":"key2020120802441807700_ref009"},{"key":"key2020120802441807700_ref010","unstructured":"NIST (2011), \u201cSpecial Publication 800-63, Rev. 1\u201d, Electronic Authentication Guideline, available at: http:\/\/nvlpubs.nist.gov\/nistpubs\/Legacy\/SP\/nistspecialpublication800-63-1.pdf (accessed December 2011)."},{"issue":"4","key":"key2020120802441807700_ref011","first-page":"041010\/1","article-title":"Coexistence of high-bit-rate quantum key distribution and data on optical fiber,","volume":"2","year":"2012","journal-title":"Physical Review X"},{"issue":"1","key":"key2020120802441807700_ref012","first-page":"010505\/1","article-title":"Experimental long-distance decoy-state quantum key distribution based on polarization encoding","volume":"98","year":"2007","journal-title":"Physical Review Letters"},{"first-page":"277","volume-title":"Multi-Factor Authenticated Key Exchange","year":"2008","key":"key2020120802441807700_ref013"},{"issue":"9","key":"key2020120802441807700_ref014","first-page":"200","article-title":"BB84 protocol for authentication in online banking systems","volume":"29","year":"2014","journal-title":"Ciencia-e-Tecnica: A Science and Technology Journal"},{"issue":"2","key":"key2020120802441807700_ref015","first-page":"561","article-title":"Authentication in online banking systems: quantum cryptography perspective","volume":"5","year":"2014","journal-title":"International Journal of Scientific & Engineering Research"},{"first-page":"710","article-title":"Quantum cryptography \u2013 the concept and challenges","year":"2010","key":"key2020120802441807700_ref016"},{"issue":"3","key":"key2020120802441807700_ref017","doi-asserted-by":"crossref","first-page":"153","DOI":"10.1016\/j.intcom.2009.10.001","article-title":"Usable security: user preferences for authentication methods in e-banking and the effects of experience","volume":"22","year":"2010","journal-title":"Interacting with Computers"}],"container-title":["Journal of Enterprise Information Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/JEIM-08-2014-0084\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/JEIM-08-2014-0084\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T22:31:50Z","timestamp":1753396310000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/jeim\/article\/30\/3\/526-532\/202356"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,4,10]]},"references-count":17,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2017,4,10]]}},"alternative-id":["10.1108\/JEIM-08-2014-0084"],"URL":"https:\/\/doi.org\/10.1108\/jeim-08-2014-0084","relation":{},"ISSN":["1741-0398"],"issn-type":[{"type":"print","value":"1741-0398"}],"subject":[],"published":{"date-parts":[[2017,4,10]]}}}