首页 | 本学科首页   官方微博 | 高级检索  
     

量子密钥分配协议的Petri网建模及安全性分析
引用本文:张盛,王剑,张权,唐朝京. 量子密钥分配协议的Petri网建模及安全性分析[J]. 量子电子学报, 2009, 26(1): 50-55. DOI: 10.3969/j.issn.1007-5461.2009.01.009
作者姓名:张盛  王剑  张权  唐朝京
作者单位:国防科学技术大学,电子科学与工程学院,湖南,长沙,410073
摘    要:量子密钥分配协议已经被证明具有无条件安全特性,但是证明过程比较复杂,不利于推广到其他量子密码协议的安全性分析和证明中.为了简化量子密码协议的安全性证明以及建立一种通用的证明方法,基于Petri网提出一种量子密钥分配协议的形式化分析方法,根据Biham的等效对称化攻击模型,将协议分为主体模型和攻击模型两部分,建立了BB84协议的Petn网模型,然后对模型进行安全性分析,分析结果表明, BB84协议是无条件安全的.该方法提高了安全性分析效率,形式上简洁统一,容易推广到其他量子密码协议的安全性分析中.

关 键 词:量子信息  形式化分析  Petri网建模  无条件安全
收稿时间:2008-04-07

Security analysis on the Petri-net model of quantum key distribution protocol
ZHANG Sheng,WANG Jian,ZHANG Quan,TANG Chao-jing. Security analysis on the Petri-net model of quantum key distribution protocol[J]. Chinese Journal of Quantum Electronics, 2009, 26(1): 50-55. DOI: 10.3969/j.issn.1007-5461.2009.01.009
Authors:ZHANG Sheng  WANG Jian  ZHANG Quan  TANG Chao-jing
Abstract:Quantum key distribution protocols are already proved to be unconditionally secure, however, the complexity of the existed proving versions makes it a difficult way to further spread into the security proving of other quantum cryptography protocols. To address this problem, a new method of security analysis of QKD protocols is introduced. Based on the equivalence attack model of QKD protocols which is refered to Biham's proving, the protocol is divided into two parts: the body and the attack, then a Petri-net model of BB84 is obtained, and a security analysis is followed. The formal annlysis of QKD protocols bωed on Petri-net can improve the efficiency of security analysis. Because of its simpleness and unification, it becomes more easy to apply this method to other quantum cryptography protocols
Keywords:quantum information  formal analysis  Petri-net modeling  unconditional security
本文献已被 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号