Kak’s three-stage protocol of secure quantum communication revisited: hitherto unknown strengths and weaknesses of the protocol

  title={Kak’s three-stage protocol of secure quantum communication revisited: hitherto unknown strengths and weaknesses of the protocol},
  author={Kishore Thapliyal and Anirban Pathak},
  journal={Quantum Information Processing},
Kak’s three-stage protocol for quantum key distribution is revisited with special focus on its hitherto unknown strengths and weaknesses. It is shown that this protocol can be used for secure direct quantum communication. Further, the implementability of this protocol in the realistic situation is analyzed by considering various Markovian noise models. It is found that the Kak’s protocol and its variants in their original form can be implemented only in a restricted class of noisy channels… 

Quantum key distribution over noisy channels

A method, called testing state method, is provided to implement QKD protocols without errors over arbitrarily strength noisy channels, including Pauli noises, amplitude damping noise, phase damping noises, collective noises as well as mixtures of them, in any strength without distillations.

Entanglement-based quantum key distribution over noisy channels

This paper focuses on how to implement QKD protocols over noisy channels as in noiseless ones without errors and analyzes the efficiency of the schemes, demonstrating that they could be more efficient than the standard entanglement-basedQKD scheme.

Design and Analysis of Communication Protocols using Quantum Resources

A specific attention of the present thesis is to study the quantum teleportation schemes with entangled orthogonal and nonorthogonal states and their experimental realization, but not limited to it.

Optical designs for realization of a set of schemes for quantum cryptography

This paper has proposed optical designs for the implementation of two single photon and one entangled state based controlled quantum dialogue schemes and subsequently reduced their optical designs to yield simpler designs for realizing other secure quantum communication tasks.

A theoretical study of nonclassical effects in optical and spin systems and their applications

This work has examined generation of various lower- and higher-order nonclassical states in both codirectional and contradirectional asymmetric nonlinear optical couplers operating under second harmonic generation with the help of moments-based criteria and obtained the performance of a set of cryptographic schemes over non-Markovian channels.

Multi-Bits Transfer Based on the Quantum Three-Stage Protocol with Quantum Error Correction Codes

A cost comparison between the multi-bits transfer quantum protocol and the original three-stage quantum cryptography protocol is analyzed to show that the protocol has better performance.

Network routing protocols for multi-photon quantum cryptography

The use of multi-photon quantum cryptography to provide higher data exchange rates and security in quantum networks is proposed and simulation varies parameters such as the network size, topology, length of fiber channels, and probability of channel decoherence.

Quantum Computing - The Impending End for the Blockchain?

This paper describes the dangers quantum computing hold for the blockchain and presents the current state of research on countermeasures to quantum computing to conclude that, based on current knowledge, quantum computing does not mean the end to the blockchain.

Quantum Security for IoT to Secure Healthcare Applications and Their Data

Health agencies need a security prognosis and treatment plan as soon as possible to combat the security gaps in existing healthcare industry, and the use of quantum security alerts the security pros that someone is trying to breach the link.



A comparative study of protocols for secure quantum communication under noisy environment: single-qubit-based protocols versus entangled-state-based protocols

It is observed that squeezing, a completely quantum mechanical resource present in the squeezed generalized amplitude channel, can be used in a beneficial way as it may yield higher fidelity compared to the corresponding zero squeezing case.

Orthogonal-state-based and semi-quantum protocols for quantum private comparison in noisy environment

Two new protocols for QPC are proposed, first of which does not use conjugate coding (uses orthogonal states only) and the second one allows the users other than TP to be classical whose activities are restricted to either reflecting a quantum state or measuring it in computational basis.

Which verification qubits perform best for secure communication in noisy channel?

If the kind of noise present in a communication channel is known or measured, then the present study can provide the best choice of decoy qubits required for implementation of schemes of secure quantum communication through that channel.

Quantum secure direct communication and deterministic secure quantum communication

In this review article, we review the recent development of quantum secure direct communication (QSDC) and deterministic secure quantum communication (DSQC) which both are used to transmit secret

Asymmetric quantum dialogue in noisy environment

The proposed scheme offers an architecture, where the entangled state to be used and the encoding scheme to be shared between Alice and Bob depend on the amount of classical information they want to exchange with each other.

Quantum cryptography over non-Markovian channels

A three-party scheme for secure quantum communication, namely controlled quantum dialogue (CQD), is analyzed under the influence of non-Markovian channels and it is seen that the average fidelity can be maintained for relatively longer periods of time.

Quantum conference

It is shown that the proposed protocols can be realized using a large number of entangled states and group of operators and can be easily reduced to a protocol for multiparty quantum key distribution.

Applications of quantum cryptographic switch: various tasks related to controlled quantum communication can be performed using Bell states and permutation of particles

It is shown that all the schemes proposed here may be viewed as applications of the concept of quantum cryptographic switch which was recently introduced by some of us and the performances of the proposed protocols as subjected to the amplitude damping and phase damping noise on the channels are discussed.

Semi-quantum communication: protocols for key agreement, controlled secure direct communication and dialogue

Set of schemes proposed here and subsequent discussions have established that almost every secure communication and computation tasks that can be performed using fully quantum protocols can also be performed in semi-quantum manner.

Quantum cryptography: Public key distribution and coin tossing