Abstract

In this paper, we exhibit a practical quantum key agreement (QKA) protocol and give an analysis of its security. More precisely, we employ the hash function to prevent participants from cheating, so as to achieve the purpose of determining the key fairly by both participants. Our protocol is therefore computationally secure against internal attacks while still providing unconditional security against eavesdropping attacks. The quantum part of our protocol is similar to BB84, so it is simple to implement and has a wide range of applications.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call