Kak’s three-stage protocol of secure quantum communication revisited: hitherto unknown strengths and weaknesses of the protocol

@article{Thapliyal2018KaksTP,
  title={Kak’s three-stage protocol of secure quantum communication revisited: hitherto unknown strengths and weaknesses of the protocol},
  author={Kishore Thapliyal and Anirban Pathak},
  journal={Quantum Information Processing},
  year={2018},
  volume={17},
  pages={1-18}
}
Kak’s three-stage protocol for quantum key distribution is revisited with special focus on its hitherto unknown strengths and weaknesses. It is shown that this protocol can be used for secure direct quantum communication. Further, the implementability of this protocol in the realistic situation is analyzed by considering various Markovian noise models. It is found that the Kak’s protocol and its variants in their original form can be implemented only in a restricted class of noisy channels… Expand
Entanglement-based quantum key distribution over noisy channels
Quantum key distribution (QKD) is one of the most important subjects in quantum information theory. There are two kinds of QKD protocols, prepare-measure protocols and entanglement-based protocols.Expand
Design and Analysis of Communication Protocols using Quantum Resources
TLDR
A specific attention of the present thesis is to study the quantum teleportation schemes with entangled orthogonal and nonorthogonal states and their experimental realization, but not limited to it. Expand
Optical designs for realization of a set of schemes for quantum cryptography
TLDR
This paper has proposed optical designs for the implementation of two single photon and one entangled state based controlled quantum dialogue schemes and subsequently reduced their optical designs to yield simpler designs for realizing other secure quantum communication tasks. Expand
A theoretical study of nonclassical effects in optical and spin systems and their applications
TLDR
This work has examined generation of various lower- and higher-order nonclassical states in both codirectional and contradirectional asymmetric nonlinear optical couplers operating under second harmonic generation with the help of moments-based criteria and obtained the performance of a set of cryptographic schemes over non-Markovian channels. Expand
Multi-Bits Transfer Based on the Quantum Three-Stage Protocol with Quantum Error Correction Codes
TLDR
A cost comparison between the multi-bits transfer quantum protocol and the original three-stage quantum cryptography protocol is analyzed to show that the protocol has better performance. Expand
Network routing protocols for multi-photon quantum cryptography
In this paper, we propose the use of multi-photon quantum cryptography to provide higher data exchange rates and security in quantum networks. We investigate different routing strategies and theirExpand
Quantum Computing - The Impending End for the Blockchain?
TLDR
This paper describes the dangers quantum computing hold for the blockchain and presents the current state of research on countermeasures to quantum computing to conclude that, based on current knowledge, quantum computing does not mean the end to the blockchain. Expand
Quantum Security for IoT to Secure Healthcare Applications and Their Data
TLDR
Health agencies need a security prognosis and treatment plan as soon as possible to combat the security gaps in existing healthcare industry, and the use of quantum security alerts the security pros that someone is trying to breach the link. Expand

References

SHOWING 1-10 OF 69 REFERENCES
A comparative study of protocols for secure quantum communication under noisy environment: single-qubit-based protocols versus entangled-state-based protocols
TLDR
It is observed that squeezing, a completely quantum mechanical resource present in the squeezed generalized amplitude channel, can be used in a beneficial way as it may yield higher fidelity compared to the corresponding zero squeezing case. Expand
Orthogonal-state-based and semi-quantum protocols for quantum private comparison in noisy environment
TLDR
Two new protocols for QPC are proposed, first of which does not use conjugate coding (uses orthogonal states only) and the second one allows the users other than TP to be classical whose activities are restricted to either reflecting a quantum state or measuring it in computational basis. Expand
Which verification qubits perform best for secure communication in noisy channel?
TLDR
If the kind of noise present in a communication channel is known or measured, then the present study can provide the best choice of decoy qubits required for implementation of schemes of secure quantum communication through that channel. Expand
Quantum secure direct communication and deterministic secure quantum communication
In this review article, we review the recent development of quantum secure direct communication (QSDC) and deterministic secure quantum communication (DSQC) which both are used to transmit secretExpand
Quantum secure direct communication and deterministic secure quantum communication
In this review article, we review the recent development of quantum secure direct communication (QSDC) and deterministic secure quantum communication (DSQC) which both are used to transmit secretExpand
Experimental Quantum Cryptography
TLDR
Initial results from an apparatus and protocol designed to implement quantum public key distribution are described, by which two users exchange a random quantum transmission, consisting of very faint flashes of polarized light, which remains secure against an adversary with unlimited computing power. Expand
Experimental quantum cryptography
We describe results from an apparatus and protocol designed to implement quantum key distribution, by which two users, who share no secret information initially: (1) exchange a random quantumExpand
Experimental quantum key distribution with decoy states.
TLDR
By making simple modifications to a commercial quantum key distribution system, it is shown that a secure key generation rate of 165 bit/s, which is 1/4 of the theoretical limit, can be obtained over 15 km of a telecommunication fiber. Expand
Asymmetric quantum dialogue in noisy environment
TLDR
The proposed scheme offers an architecture, where the entangled state to be used and the encoding scheme to be shared between Alice and Bob depend on the amount of classical information they want to exchange with each other. Expand
Quantum cryptography over non-Markovian channels
TLDR
A three-party scheme for secure quantum communication, namely controlled quantum dialogue (CQD), is analyzed under the influence of non-Markovian channels and it is seen that the average fidelity can be maintained for relatively longer periods of time. Expand
...
1
2
3
4
5
...