Comparing BB84 and Authentication-Aided Kak's Three-Stage Quantum Protocol
نویسنده
چکیده
This paper compares the popular quantum key distribution (QKD) protocol BB84 with the more recent Kak’s three-stage protocol and the latter is shown to be more secure. A theoretical representation of an authentication-aided version of Kak’s threestage protocol is provided that makes it possible to deal with man-in-the-middle attack.
منابع مشابه
Variations on Kak's Three Stage Quantum Cryptography Protocol
This paper introduces a variation on Kak’s three-stage quanutm key distribution protocol which allows for defence against the man in the middle attack. In addition, we introduce a new protocol, which also offers similar resiliance against such an attack.
متن کاملClassical Authentication Aided Three-Stage Quantum Protocol
This paper modifies Kak’s three-stage protocol so that it can guarantee secure transmission of information. Although avoiding man-in-the-middle attack is our primary objective in the introduction of classical authentication inside the three-stage protocol, we also benefit from the inherent advantages of the chosen classical authentication protocol. We have tried to implement ideas like key dist...
متن کاملA Three-Stage Quantum Cryptography Protocol
We present a three-stage quantum cryptographic protocol based on public key cryptography in which each party uses its own secret key. Unlike the BB84 protocol, where the qubits are transmitted in only one direction and classical information exchanged thereafter, the communication in the proposed protocol remains quantum in each stage. A related system of key distribution is also described. Intr...
متن کاملA Hybrid Authentication Protocol Using Quantum Entanglement and Symmetric Cryptography
This paper presents a hybrid cryptographic protocol, using quantum and classical resources, for authentication and authorization in a network. One or more trusted servers distribute streams of entangled photons to individual resources that seek to communicate. It is assumed that each resource shares a previously distributed secret key with the trusted server, and that resources can communicate ...
متن کاملAnalysis of Kak's Quantum Cryptography Protocol from the Perspective of Source Strength
This paper analyzes the performance of Kak’s quantum cryptography protocol when intensity monitoring is used to detect the presence of Eve during transmission. Some difficulties related to interception to obtain useful data from the transmission are discussed. The analysis shows the resilience of the protocol towards the man-in-the-middle attack. Introduction The field of quantum physics has op...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- CoRR
دوره abs/cs/0703092 شماره
صفحات -
تاریخ انتشار 2007