To install click the Add extension button. That's it.

The source code for the WIKI 2 extension is being checked by specialists of the Mozilla Foundation, Google, and Apple. You could also do it yourself at any point in time.

4,5
Kelly Slayton
Congratulations on this excellent venture… what a great idea!
Alexander Grigorievskiy
I use WIKI 2 every day and almost forgot how the original Wikipedia looks like.
Live Statistics
English Articles
Improved in 24 Hours
Added in 24 Hours
Languages
Recent
Show all languages
What we do. Every page goes through several hundred of perfecting techniques; in live mode. Quite the same Wikipedia. Just better.
.
Leo
Newton
Brights
Milds

Three-stage quantum cryptography protocol

From Wikipedia, the free encyclopedia

The three-stage quantum cryptography protocol, also known as Kak's three-stage protocol[1] is a method of data encryption that uses random polarization rotations by both Alice and Bob, the two authenticated parties, that was proposed by Subhash Kak.[2] In principle, this method can be used for continuous, unbreakable encryption of data if single photons are used.[3] It is different from methods of QKD (quantum key distribution) for it can be used for direct encryption of data, although it could also be used for exchanging keys.

Alice and Bob communicate safely using random polarization rotations.

The basic idea behind this method is that of sending secrets (or valuables) through an unreliable courier by having both Alice and Bob place their locks on the box containing the secret, which is also called double-lock cryptography. Alice locks the box with the secret in it and it is transported to Bob, who sends it back after affixing his own lock. Alice now removes her lock (after checking that it has not been tampered with) and sends it back to Bob who, similarly unlocks his lock and obtains the secret. In the braided form, only one-pass suffices but here Alice and Bob share an initial key.[4][5]

This protocol has been proposed as a method for secure communication that is entirely quantum unlike quantum key distribution in which the cryptographic transformation uses classical algorithms[6]

The basic polarization rotation scheme has been implemented in hardware by Pramode Verma in the quantum optics laboratory of the University of Oklahoma.[7] [8][9] In this method more than one photon can be used in the exchange between Alice and Bob and, therefore, it opens up the possibility of multi-photon quantum cryptography.[10] This works so long as the number of photons siphoned off by the eavesdropper is not sufficient to determine the polarization angles. A version that can deal with the man-in-the-middle attack has also been advanced.[11]

Parakh analyzed the three-stage protocol under rotational quantum errors and proposed a modification that would correct these errors.[12] One interesting feature of the modified protocol is that it is invariant to the value of rotational error and can therefore correct for arbitrary rotations.

YouTube Encyclopedic

  • 1/3
    Views:
    375 849
    1 431
    1 363
  • Quantum Cryptography Explained
  • Quantum Cryptography (Beyond QKD)
  • Security of Quantum Key Distribution 6: Prepare-and-Measure Protocols

Transcription

See also

References

  1. ^ Cardinal, David (March 11, 2019). "Quantum Cryptography Demystified: How It Works in Plain Language". Extreme Tech.
  2. ^ Kak, Subhash (2006). "A Three-Stage Quantum Cryptography Protocol". Foundations of Physics Letters. 19 (3): 293–296. arXiv:quant-ph/0503027. Bibcode:2006FoPhL..19..293K. doi:10.1007/s10702-006-0520-9. S2CID 7245233.
  3. ^ Chen, Yuhua; Verma, Pramode K.; Kak, Subhash (2009). "Embedded security framework for integrated classical and quantum cryptography services in optical burst switching networks". Security and Communication Networks: n/a. doi:10.1002/sec.98.
  4. ^ James Harold Thomas (2007). "Variations on Kak's Three Stage Quantum Cryptography Protocol". arXiv:0706.2888. {{cite journal}}: Cite journal requires |journal= (help)
  5. ^ Darunkar, Bhagyashri; Verma, Pramode (2014). "The braided single-stage protocol for quantum secure communication". In Donkor, Eric; Pirich, Andrew R; Brandt, Howard E; Frey, Michael R; Lomonaco, Samuel J; Myers, John M (eds.). Quantum Information and Computation XII. Vol. 9123. p. 912308. doi:10.1117/12.2050164. S2CID 62145124.
  6. ^ Thapliyal, Kishore; Pathak, Anirban (2018). "Kak's three-stage protocol of secure quantum communication revisited: Hitherto unknown strengths and weaknesses of the protocol". Quantum Information Processing. 17 (9): 229. arXiv:1803.02157. Bibcode:2018QuIP...17..229T. doi:10.1007/s11128-018-2001-z. S2CID 52009384.
  7. ^ A multi-photon approach to quantum cryptography http://www.kurzweilai.net/a-multi-photon-approach-to-quantum-cryptography [accessed Feb 10, 2015]
  8. ^ Quantum optics lab. http://www.ou.edu/coe/tcom/research/quantum-optics1.html [accessed Feb 10, 2015]
  9. ^ Verma, P.K.; et al. (2019). Multi-photon Quantum Secure Communication. Signals and Communication Technology. Springer. doi:10.1007/978-981-10-8618-2. ISBN 978-981-10-8617-5. S2CID 126012309.
  10. ^ Mandal, S.; MacDonald, G.; El Rifai, Mayssaa; Punekar, N.; Zamani, F.; Yuhua Chen; Kak, S.; Verma, P. K.; Huck, R. C.; Sluss, J. (2013). "Multi-photon implementation of three-stage quantum cryptography protocol". The International Conference on Information Networking 2013 (ICOIN). pp. 6–11. doi:10.1109/ICOIN.2013.6496343. ISBN 978-1-4673-5742-5. S2CID 1055005.
  11. ^ Clifford Chan, Kam Wai; El Rifai, Mayssaa; Verma, Pramode; Kak, Subhash; Chen, Yuhua (2015). "Security Analysis of the Multi-Photon Three-Stage Quantum Key Distribution". International Journal on Cryptography and Information Security. 5 (3/4): 01–13. arXiv:1503.05793. doi:10.5121/ijcis.2015.5401. S2CID 3220239.
  12. ^ Parakh, Abhishek; Van Brandwijk, Joel (2016). "Correcting rotational errors in three stage QKD". 2016 23rd International Conference on Telecommunications (ICT). pp. 1–5. doi:10.1109/ICT.2016.7500409. ISBN 978-1-5090-1990-8. S2CID 11693845.
This page was last edited on 16 June 2023, at 03:07
Basis of this page is in Wikipedia. Text is available under the CC BY-SA 3.0 Unported License. Non-text media are available under their specified licenses. Wikipedia® is a registered trademark of the Wikimedia Foundation, Inc. WIKI 2 is an independent company and has no affiliation with Wikimedia Foundation.