This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
2013 International Conference on Information Networking (ICOIN)
Multi-photon implementation of three-stage quantum cryptography protocol
Bangkok Thailand
January 28-January 30
ISBN: 978-1-4673-5740-1
Yuhua Chen, Dept. of Electrical and Computer Engineering, University of Houston, Houston, TX 77204, USA
Subhash Kak, Department of Computer Science, Oklahoma State University, Stillwater, OK 74078, USA
The paper presents the implementation of a quantum cryptography protocol for secure communication. As computing power increases, classical cryptography and key management schemes based on computational complexity become increasingly susceptible to brute force and cryptanalytic attacks. Current implementations of quantum cryptography are based on the BB84 protocol, which is susceptible to siphoning attacks on the multiple photons emitted by practical laser sources. The three-stage protocol, whose implementation is described in this paper, is a departure from conventional practice and it obviates some of the known vulnerabilities of the current implementations of quantum cryptography. This paper presents an implementation of the three-stage quantum communication protocol in free-space. To the best of the authors' knowledge, this is the first implementation of a quantum protocol where multiple photons can be used for secure communication.
Index Terms:
LabView,Quantum cryptography,three-stage protocol,polarization,rotation transformation,Muller Matrices,free-space,half-wave plate
Citation:
Yuhua Chen, Subhash Kak, "Multi-photon implementation of three-stage quantum cryptography protocol," icoin, pp.6-11, 2013 International Conference on Information Networking (ICOIN), 2013
Usage of this product signifies your acceptance of the Terms of Use.