首页 | 本学科首页   官方微博 | 高级检索  
     

BB84 Protocol and Its Security Analysis
引用本文:Jie Yang Tian Yang. BB84 Protocol and Its Security Analysis[J]. 通讯和计算机, 2005, 2(11): 38-42
作者姓名:Jie Yang Tian Yang
作者单位:Department of Information Engineering, Wuhan University of Technology, Wuhan 430063, China
基金项目:This work is supported by the Research of Digital Product Copyrights Protection Technology Foundation of China (No. 527).
摘    要:The information of encryption depends on the security of the secret key, but not the security of the algorithm. This paper introduces the quantum cryptography and BB84 protocol, analyzes its security, and gives an example to explain the process of quantum transmission. Theory analysis shows that this kind of key distribution's protocolis absolutely safe.


BB84 Protocol and Its Security Analysis
Abstract:
Keywords:Quantum Cryptography   Quantum Key Distribution   BB84 protocol
本文献已被 维普 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号