Skip to main content
Log in

A Three-Stage Quantum Cryptography Protocol

  • Original Article
  • Published:
Foundations of Physics Letters

Abstract

We present a three-stage quantum cryptographic protocol based on public key cryptography in which each party uses its own secret key. Unlike the BB84 protocol, where the qubits are transmitted in only one direction and classical information exchanged thereafter, the communication in the proposed protocol remains quantum in each stage. A related system of key distribution is also described.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. 1. M. A. Nielsen and I. L. Chuang, Quantum Computation and Quantum Information (Cambridge University Press, 2000).

    Google Scholar 

  2. 2. A. K. Ekert, “Quantum cryptography based on Bell's theorem,” Phys. Rev. Lett. 67, 661–663 (1991).

    Article  ADS  MATH  MathSciNet  Google Scholar 

  3. 3. S. Kak, “Quantum key distribution using three basis states,” Pramana 54, 709–713 (2000); quant-ph/9902038.

    Google Scholar 

  4. 4. A. Poppe et al., “Practical quantum key distribution with polarization entangled photons,” quant-ph/0404115.

  5. 5. K. Svozil, “The interlock protocol cannot save quantum cryptography from man-in-the-middle attacks,” quant-ph/0501062.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Subhash Kak.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Kak, S. A Three-Stage Quantum Cryptography Protocol. Found Phys Lett 19, 293–296 (2006). https://doi.org/10.1007/s10702-006-0520-9

Download citation

  • Received:

  • Revised:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10702-006-0520-9

Key words:

Navigation