Abstract
We present a three-stage quantum cryptographic protocol based on public key cryptography in which each party uses its own secret key. Unlike the BB84 protocol, where the qubits are transmitted in only one direction and classical information exchanged thereafter, the communication in the proposed protocol remains quantum in each stage. A related system of key distribution is also described.
Similar content being viewed by others
References
1. M. A. Nielsen and I. L. Chuang, Quantum Computation and Quantum Information (Cambridge University Press, 2000).
2. A. K. Ekert, “Quantum cryptography based on Bell's theorem,” Phys. Rev. Lett. 67, 661–663 (1991).
3. S. Kak, “Quantum key distribution using three basis states,” Pramana 54, 709–713 (2000); quant-ph/9902038.
4. A. Poppe et al., “Practical quantum key distribution with polarization entangled photons,” quant-ph/0404115.
5. K. Svozil, “The interlock protocol cannot save quantum cryptography from man-in-the-middle attacks,” quant-ph/0501062.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Kak, S. A Three-Stage Quantum Cryptography Protocol. Found Phys Lett 19, 293–296 (2006). https://doi.org/10.1007/s10702-006-0520-9
Received:
Revised:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10702-006-0520-9