8
9

Variations on Kak's Three Stage Quantum Cryptography Protocol

Abstract

This paper introduces a variation on Kak's three-stage quanutm key distribution protocol which allows for defence against the man in the middle attack. In addition, we introduce a new protocol, which also offers similar resiliance against such an attack.

View on arXiv
Comments on this paper