A Three-Stage Quantum Cryptography Protocol
- Subhash Kak
- … show all 1 hide
Rent the article at a discountRent now
* Final gross prices may vary according to local VAT.Get Access
We present a three-stage quantum cryptographic protocol based on public key cryptography in which each party uses its own secret key. Unlike the BB84 protocol, where the qubits are transmitted in only one direction and classical information exchanged thereafter, the communication in the proposed protocol remains quantum in each stage. A related system of key distribution is also described.
- 1. M. A. Nielsen and I. L. Chuang, Quantum Computation and Quantum Information (Cambridge University Press, 2000).
- 2. A. K. Ekert, “Quantum cryptography based on Bell's theorem,” Phys. Rev. Lett. 67, 661–663 (1991). CrossRef
- 3. S. Kak, “Quantum key distribution using three basis states,” Pramana 54, 709–713 (2000); quant-ph/9902038.
- 4. A. Poppe et al., “Practical quantum key distribution with polarization entangled photons,” quant-ph/0404115.
- 5. K. Svozil, “The interlock protocol cannot save quantum cryptography from man-in-the-middle attacks,” quant-ph/0501062.
- A Three-Stage Quantum Cryptography Protocol
Foundations of Physics Letters
Volume 19, Issue 3 , pp 293-296
- Cover Date
- Print ISSN
- Online ISSN
- Kluwer Academic Publishers-Plenum Publishers
- Additional Links
- quantum information science
- quantum cryptography
- secure communication protocol
- Subhash Kak (1)
- Author Affiliations
- 1. Department of Electrical & Computer Engineering, Louisiana State University, Baton Rouge, Louisiana, 70803