{"title":"An Algorithmic Approach to Securing the Three-Stage Quantum Cryptography Protocol","authors":"Mayssaa El Rifai, P. Verma","doi":"10.1109/TrustCom.2013.224","DOIUrl":null,"url":null,"abstract":"A recent paper has discussed the implementation of the three-stage protocol as a multi-photon tolerant protocol. In this paper, we present a powerful algorithm to further enhance the security of the three-stage protocol. Using this algorithm, the three-stage protocol will be provided with yet another layer of security by provisioning an initialization vector between the two communicating parties. The addition of this contrivance makes it theoretically impossible for any intruder to recover the plaintext except under the condition when the intruder has simultaneous real-time access to four elements in the implementation of the protocol. In this paper, it is postulated that the concept can be extended to an electronic implementation with minor enhancement.","PeriodicalId":206739,"journal":{"name":"2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications","volume":"35 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"9","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/TrustCom.2013.224","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 9
Abstract
A recent paper has discussed the implementation of the three-stage protocol as a multi-photon tolerant protocol. In this paper, we present a powerful algorithm to further enhance the security of the three-stage protocol. Using this algorithm, the three-stage protocol will be provided with yet another layer of security by provisioning an initialization vector between the two communicating parties. The addition of this contrivance makes it theoretically impossible for any intruder to recover the plaintext except under the condition when the intruder has simultaneous real-time access to four elements in the implementation of the protocol. In this paper, it is postulated that the concept can be extended to an electronic implementation with minor enhancement.