Foundations of Physics Letters

, Volume 19, Issue 3, pp 293–296 | Cite as

A Three-Stage Quantum Cryptography Protocol

  • Subhash KakEmail author
Original Article


We present a three-stage quantum cryptographic protocol based on public key cryptography in which each party uses its own secret key. Unlike the BB84 protocol, where the qubits are transmitted in only one direction and classical information exchanged thereafter, the communication in the proposed protocol remains quantum in each stage. A related system of key distribution is also described.

Key words:

quantum information science quantum cryptography secure communication protocol 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    1. M. A. Nielsen and I. L. Chuang, Quantum Computation and Quantum Information (Cambridge University Press, 2000).Google Scholar
  2. 2.
    2. A. K. Ekert, “Quantum cryptography based on Bell's theorem,” Phys. Rev. Lett. 67, 661–663 (1991).CrossRefADSzbMATHMathSciNetGoogle Scholar
  3. 3.
    3. S. Kak, “Quantum key distribution using three basis states,” Pramana 54, 709–713 (2000); quant-ph/9902038.Google Scholar
  4. 4.
    4. A. Poppe et al., “Practical quantum key distribution with polarization entangled photons,” quant-ph/0404115.Google Scholar
  5. 5.
    5. K. Svozil, “The interlock protocol cannot save quantum cryptography from man-in-the-middle attacks,” quant-ph/0501062.Google Scholar

Copyright information

© Springer Science+Business Media, Inc. 2006

Authors and Affiliations

  1. 1.Department of Electrical & Computer EngineeringLouisiana State UniversityBaton Rouge

Personalised recommendations