Kak's three-stage protocol of secure quantum communication revisited: hitherto unknown strengths and weaknesses of the protocol.
Kishore ThapliyalAnirban PathakPublished in: Quantum Inf. Process. (2018)
Keyphrases
- strengths and weaknesses
- group communication
- cryptographic protocols
- communication protocol
- communication protocols
- tcp ip
- covert channel
- advantages and disadvantages
- multi party
- security protocols
- lightweight
- scalar product
- authentication protocol
- key exchange protocol
- key distribution
- security analysis
- rfid systems
- key establishment
- mutual authentication
- electronic voting
- key agreement protocol
- vertically partitioned data
- diffie hellman
- secure communication
- security model
- information sharing
- homomorphic encryption
- interprocess communication
- protocol stack
- cryptographic algorithms
- trusted third party
- mobile payment
- usability testing
- security requirements
- computer networks