首页 | 本学科首页   官方微博 | 高级检索  
     

Analysis of Information Leakage in Quantum Key Agreement
引用本文:刘胜利 郑东 陈克非. Analysis of Information Leakage in Quantum Key Agreement[J]. 上海交通大学学报(英文版), 2006, 11(2): 219-223
作者姓名:刘胜利 郑东 陈克非
作者单位:Computer Science and Eng. Shanghai Jiaotong Univ. Shanghai 200030 China,Lab. of Computer Network and Information Security Xidian Univ. Xi'an 710071,Computer Science and Eng. Shanghai Jiaotong Univ. Shanghai 200030 China,Computer Science and Eng. Shanghai Jiaotong Univ. Shanghai 200030 China
基金项目:NationalNaturalScienceFoundationofChina(Nos.60303026,60473020,60573030)
摘    要:Introduction Quantumkeyagreement(QKA)enablestwo userstosharesecretrandombitsthroughaquan-tumchannel.Thesesecretbitscanbeusedasa conventionalsecretkeyforsecurecommunications overaclassicalchannel.TheadvantageofQKA overtraditionalkeyagreementmethodsisthatthe exchangeofquantumbitscanbeshowntobeun-conditionallysecure(orinformation-theoretically secure).ThefirstQKAprotocolwasproposedbyBen-nettetalinRef.[1].Bennettetalconsidered quantumkeyagreementbetweentwolegalusers AliceandBob.Thephysicalca…

关 键 词:分析方法 信息泄露 量子 管理方法
文章编号:1007-1172(2006)02-0219-05
收稿时间:2005-10-10

Analysis of Information Leakage in Quantum Key Agreement
LIU Sheng-li,ZHENG Dong,CHENG Ke-fei. Analysis of Information Leakage in Quantum Key Agreement[J]. Journal of Shanghai Jiaotong university, 2006, 11(2): 219-223
Authors:LIU Sheng-li  ZHENG Dong  CHENG Ke-fei
Abstract:Quantum key agreement is one of the approaches to unconditional security. Since 1980's, different protocols for quantum key agreement have been proposed and analyzed. A new quantum key agreement protocol was presented in 2004, and a detailed analysis to the protocol was given. The possible game played between legitimate users and the enemy was described:sitting in the middle, an adversary can play a "man-in-the-middle" attack to cheat the sender and receiver. The information leaked to the adversary is essential to the length of the final quantum secret key. It was shown how to determine the amount of information leaked to the enemy and the amount of uncertainty between the legitimate sender and receiver.
Keywords:quantum key agreement  analysis
本文献已被 CNKI 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号