全部 标题 作者
关键词 摘要

OALib Journal期刊
ISSN: 2333-9721
费用:99美元

查看量下载量

相关文章

更多...
-  2017 

基于模型检测的半量子密码协议的安全性分析
Security Analysis of Semi-Quantum Cryptography Protocols by Model Checking

DOI: 10.3969/j.issn.1001-0548.2017.05.013

Keywords: 窃听,模型检测,PRISM,半量子密码

Full-Text   Cite this paper   Add to My Lib

Abstract:

对于密码协议而言,安全性是其最核心的关键问题,对于量子密码协议来说也一样。研究人员可以通过各种手段证明这些协议是安全的,但存在极大的困难,因为这对数学功底有着很高的要求。该文利用全自动化的技术——模型检测,采用了形式化验证方法,即基于概率的模型检测工具PRISM,来对半量子密码协议进行建模并验证其安全性。该方法避免了传统基于数学方法验证的繁杂,提高了验证的速度和效率。验证的结果也表明,当传输足够多的光子时,检测出窃听的概率无限趋近于1,和全量子密码协议一样,半量子密码协议也是安全的。

References

[1]  BENNETT C H, BRASSARD G. Quantum cryptography:Public key distribution and coin tossing[C]//In Proc of IEEE International Conference on Computers, Systems, and Signal Processing. Bangalore, India:IEEE, 1984:175-179.
[2]  BASAGIANNIS S, KATSAROS P, POMBORTSIS A. Synthesis of attack actions using model checking for the verification of security protocols[J]. Secur Comm Networks, 2011, 4(2):147-161.
[3]  ELBOUKHARI M, AZIZI M. Analysis of the security of bb84 by model checking[J]. International Journal of Network Security & Its Applications, 2010, 2(2):87-98.
[4]  CHANG Y J, TSAI C W, HWANG T. Multi-user private comparison protocol using GHz class states[J]. Quantum Information Processing, 2013, 12(2):1077-1088.
[5]  YANG F, YANG G W, HAO Y J, et al. Security analysis of multi-party quantum private comparison protocol by model checking[J]. Modern Physics Letters B, 2015, 29(18):717-755.
[6]  YANG F, YANG G W, HAO Y J. The modeling library of eavesdropping methods in quantum cryptography protocols by model checking[J]. International Journal of Theoretical Physics, 2016, DOI:10.1007/s10773-016-2969-z.
[7]  HILLERY M, BUZEK V, BERTHIAUME A. Quantum secret sharing[J]. Physical Review A, 1999, 59(3):1829-1834.
[8]  CHUANG I, GOTTESMAN D. Quantum digital signatures:US, US 7246240 B2[P]. 2007.
[9]  ZENG G H, CHRISTOPH K. An arbitrated quantum signature scheme[J]. Physev A, 2002, 65:042312.
[10]  BOYER M, KENIGSBERG D, MOR T. Quantum key distribution with classical bob[C]//First International Conference on Quantum, Nano, and Micro Technologies, 2007, ICQNM'07.[S.l.]:IEEE, 2007, 99(14):10-10.
[11]  KRAWEC W. Mediated semiquantum key distribution[J]. Physical Review A, 2015, 91(3):032323.
[12]  BOYER M, GELLES R, KENIGSBERG D, et al. Semiquantum key distribution[J]. Phys Rev A, 2009, 79:032341.
[13]  YU K F, YANG C W, LIAO C H, et al. Authenticated semi-quantum key distribution protocol using Bell states[J]. Quantum Information Processing, 2014, 13(6):1-9.
[14]  KRAWEC W. Mediated semiquantum key distribution[J]. Physical Review A, 2015, 91(3):032323.
[15]  KRAWEC W. Security proof of a semi-quantum key distribution protocol to appear[C]//IEEE ISIT 2015.[S.l.]:IEEE, 2015.
[16]  KRAWEC W. Semi-quantum key distribution[D].[S.l.]:Stevens Institute of Technology, 2015.
[17]  QUEILLE J P, SIFAKIS J. Specification and verification of concurrent systems in CESAR[C]//In Proc 5th Colloquium on Int Symp Programming. London:Springer, 1982:337-351.
[18]  BEN-ARI M, PNUELI A, MANNA Z. The temporal logic of branching time[J]. Acta Informatica, 1983, 20(3):207-226.
[19]  GASTIN P, ODDOUX D. Fast LTL to büchi automata translation[J]. Lecture Notes in Computerence, 2001, 2102:53-65.
[20]  YANG J, SEGER C H J. Generalized symbolic trajectory evaluation-abstraction in action[M]//Formal Methods in Computer-Aided Design, LNCS. Berlin, Heidelberg:Springer-Verlag, 2002:70-87.
[21]  BENNETT C H, BESSETTE F, BRASSARD G, et al. Experimental quantum cryptography[J]. Journal of Cryptology, 1992, 5(1):3-28.
[22]  SHI R H, HUANG L S, YANG W, et al. Multiparty quantum secret sharing with Bell states and Bell measurements[J]. Optics Communications, 2010, 283(11):2476-2480.
[23]  RAHAMAN R, PARKER M G. Quantum scheme for secret sharing based on local distinguishability[J]. Physical Review A, 2015, 91(2):91. 022330.
[24]  KRAWEC W. Security of a semi-quantum protocol where reflections contribute to the secret key[J]. Quantum Information Processing, 2015, 15(5):1-24.
[25]  KRAWEC W. Restricted attacks on semi-quantum key distribution protocols[J]. Quantum Information Processing, 2014, 13(11):2417-2436.
[26]  BAIER C, KATOEN J P. Principles of model checking[M]. Cambridge, USA:The MIT Press, 2008.
[27]  EMERSON E A, CLARKE E M. Characterizing correctness properties of parallel programs using fixpoints[M]//Automata, Languages and Programming. Berlin, Heidelberg:Springer-Verlag, 1980:169-181.
[28]  CLARKE E M, EMERSON E A. Design and synthesis of synchronization skeletons using branching time temporal logic[J]. Proc Workshop on Logic of Programs, 1982, 131:52-71.
[29]  CLARKE E M, EMERSON E A, SISTLA A P. Automatic verification of finite-state concurrent systems using temporal logic specifications[C]//ACM Transactions on Programming Languages and Systems. New York:ACM, 1986:244-263.

Full-Text

Contact Us

service@oalib.com

QQ:3279437679

WhatsApp +8615387084133