2018
DOI: 10.1007/s11128-018-2001-z
|View full text |Cite
|
Sign up to set email alerts
|

Kak’s three-stage protocol of secure quantum communication revisited: hitherto unknown strengths and weaknesses of the protocol

Abstract: Kak's three-stage protocol for quantum key distribution is revisited with special focus on its hitherto unknown strengths and weaknesses. It is shown that this protocol can be used for secure direct quantum communication. Further, the implementability of this protocol in the realistic situation is analyzed by considering various Markovian noise models. It is found that the Kak's protocol and its variants in their original form can be implemented only in a restricted class of noisy channels, where the protocols… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
11
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
3
3

Relationship

2
4

Authors

Journals

citations
Cited by 9 publications
(11 citation statements)
references
References 60 publications
0
11
0
Order By: Relevance
“…There are several schemes for quantum secure direct communication, such as BB84 can be modified to be a quantum secure direct communication if we allow Bob to have a quantum memory. 22 However, the three-stage protocol does not require any storage capabilities and, therefore, is practical using current technology. In the next section, we'll review the effect of some of the common-noise models over the three-stage protocol.…”
Section: The Three-stage Qkd Protocolmentioning
confidence: 99%
See 2 more Smart Citations
“…There are several schemes for quantum secure direct communication, such as BB84 can be modified to be a quantum secure direct communication if we allow Bob to have a quantum memory. 22 However, the three-stage protocol does not require any storage capabilities and, therefore, is practical using current technology. In the next section, we'll review the effect of some of the common-noise models over the three-stage protocol.…”
Section: The Three-stage Qkd Protocolmentioning
confidence: 99%
“…17-21 Kak's three-stage protocol is the major focus of this study, and it is established to be one of the QKD protocols that is favorable to QSDC. 22 The two main issues restraining the development of ideal QKD setups are (1) the presence of noise in the system and (2) non-ideal photon emitters, i.e., ideal single-photon emitters are not plausible under today's technologies. The main noises affecting a practical quantum channel are amplitude damping, dephasing error, collective rotation, and bit-flip error.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…2.1.2 Scheme T2: Kak's three-stage scheme inspired five-stage scheme of CQD with single photons A three-stage QKD scheme proposed in the past [59] was recently shown to be able to perform secure direct quantum communication [60]. Here, we propose a three-stage scheme inspired CQD protocol, which can be viewed as a five-stage protocol of CQD.…”
Section: Cs-omentioning
confidence: 99%
“…The above status of the experimental works have motivated us to investigate possibilities of experimental realization of quantum cryptographic schemes, such as QD [6,57], CQD [58], Kak's three-stage scheme inspired direct communication scheme [59,60], CDSQC with entanglement swapping [61], which have not been experimentally realized so far. In the process, to design optical schemes for the realization of these schemes, we have perceived that the implementation requires some modifications of the original schemes.…”
Section: Introductionmentioning
confidence: 99%