全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...

Analysis of Security of Quantum Key Distribution Based on Entangled Photon Pairs by Model Checking

DOI: 10.4236/jqis.2015.53012, PP. 103-108

Keywords: Cryptography, Quantum Cryptography, Quantum Key Distribution, Model Checking

Full-Text   Cite this paper   Add to My Lib

Abstract:

Quantum key distribution is a technique to securely distribute a bit string between two parties by using the laws of quantum mechanics. The security of this technique depends on the basis of quantum mechanics rather than the difficulty of the mathematical calculation as in the classical encoding. Researches in this field have shown that the quantum key distribution will be fully functioning outside the laboratory in a few years. Due to the complexity and the high efficiency of the device, the verification is needed. In this article, we use PRISM to verify the security of the quantum key distribution protocol, which uses the entangled photon based on BB84 protocol.

References

[1]  Bennett, C.H. and Brassard, G. (1984) Quantum Cryptography: Public Key Distribution and Coin Tossing. Proceedings of the IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, 10-12 dEcember 1984, 175-179.
[2]  Gerard, J.H. (1997) The Model Checker SPIN. IEEE Transactions on Software Engineering, 23, 279-295.
[3]  prismmodelchecker.
http://www.prismmodelchecker.org/
[4]  Elboukhari, M., Azizi, M. and Azizi, A. (2009) Implementation of Secure Key Distribution Based on Quantum Cryptography. Proceedings of IEEE International Conference on Multimedia Computing and Systems (ICMCS’09), Ouarzazate, 2-4 April 2009, 361-365.
[5]  Elboukhari, M., Azizi, M. and Azizi, A. (2010) Analysis of Quantum Cryptography Protocols by Model Checking. IJUCS, 1, 34-40.
[6]  Elboukhari, M., Azizi, M. and Azizi, A. (2010) Analysis of the Security of BB84 by Model Checking. International Journal of Network Security & Its Applications (IJNSA), 2, 87-97.
[7]  Papanikolaou, N.K. (2004) Techniques for Design and Validation of Quantum Protocols. University of Warwick, Coventry.
[8]  Siddiqui, M.A. and Qureshi, T. (2014) Quantum Key Distribution with Qubit Pairs. Journal of Quantum Information Science, 4, 129-132.
http://dx.doi.org/10.4236/jqis.2014.43014
[9]  Sahoo, J.R. and Satapathy, S. (2011) Simulation and Analysis of BB84 Protocol by Model Checking. International Journal of Engineering Science and Technology, 3, 5695.

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133