Comparing BB84 and Authentication-Aided Kak's Three-Stage Quantum Protocol

نویسنده

  • Partha Basuchowdhuri
چکیده

This paper compares the popular quantum key distribution (QKD) protocol BB84 with the more recent Kak’s three-stage protocol and the latter is shown to be more secure. A theoretical representation of an authentication-aided version of Kak’s threestage protocol is provided that makes it possible to deal with man-in-the-middle attack.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Variations on Kak's Three Stage Quantum Cryptography Protocol

This paper introduces a variation on Kak’s three-stage quanutm key distribution protocol which allows for defence against the man in the middle attack. In addition, we introduce a new protocol, which also offers similar resiliance against such an attack.

متن کامل

Classical Authentication Aided Three-Stage Quantum Protocol

This paper modifies Kak’s three-stage protocol so that it can guarantee secure transmission of information. Although avoiding man-in-the-middle attack is our primary objective in the introduction of classical authentication inside the three-stage protocol, we also benefit from the inherent advantages of the chosen classical authentication protocol. We have tried to implement ideas like key dist...

متن کامل

A Three-Stage Quantum Cryptography Protocol

We present a three-stage quantum cryptographic protocol based on public key cryptography in which each party uses its own secret key. Unlike the BB84 protocol, where the qubits are transmitted in only one direction and classical information exchanged thereafter, the communication in the proposed protocol remains quantum in each stage. A related system of key distribution is also described. Intr...

متن کامل

A Hybrid Authentication Protocol Using Quantum Entanglement and Symmetric Cryptography

This paper presents a hybrid cryptographic protocol, using quantum and classical resources, for authentication and authorization in a network. One or more trusted servers distribute streams of entangled photons to individual resources that seek to communicate. It is assumed that each resource shares a previously distributed secret key with the trusted server, and that resources can communicate ...

متن کامل

Analysis of Kak's Quantum Cryptography Protocol from the Perspective of Source Strength

This paper analyzes the performance of Kak’s quantum cryptography protocol when intensity monitoring is used to detect the presence of Eve during transmission. Some difficulties related to interception to obtain useful data from the transmission are discussed. The analysis shows the resilience of the protocol towards the man-in-the-middle attack. Introduction The field of quantum physics has op...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • CoRR

دوره abs/cs/0703092  شماره 

صفحات  -

تاریخ انتشار 2007