Computer Science – Cryptography and Security
Scientific paper
2007-03-19
Computer Science
Cryptography and Security
9 pages, 4 figures
Scientific paper
This paper compares the popular quantum key distribution (QKD) protocol BB84
with the more recent Kak's three-stage protocol and the latter is shown to be
more secure. A theoretical representation of an authentication-aided version of
Kak's three-stage protocol is provided that makes it possible to deal with the
man-in-the-middle attack.
No associations
LandOfFree
Comparing BB84 and Authentication-Aided Kak's Three-Stage Quantum Protocol does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.
If you have personal experience with Comparing BB84 and Authentication-Aided Kak's Three-Stage Quantum Protocol, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Comparing BB84 and Authentication-Aided Kak's Three-Stage Quantum Protocol will most certainly appreciate the feedback.
Profile ID: LFWR-SCP-O-31473