Chinese Journal of Quantum Electronics, Volume. 26, Issue 1, 50(2009)

Security analysis on the Petri-net model of quantum key distribution protocol

Sheng ZHANG*... Jian WANG, Quan ZHANG and Chao-jing TANG |Show fewer author(s)
Author Affiliations
  • [in Chinese]
  • show less

    Quantum key distribution protocols are already proved to be unconditionally secure, however, the complexity of the existed proving versions makes it a difficult way to further spread into the security proving of other quantum cryptography protocols. To address this problem, a new method of security analysis of QKD protocols is introduced. Based on the equivalence attack model of QKD protocols which is refered to Biham's proving, the protocol is divided into two parts: the body and the attack, then a Petri-net model of BB84 is obtained, and a security analysis is followed. The formal annlysis of QKD protocols bωed on Petri-net can improve the efficiency of security analysis. Because of its simpleness and unification, it becomes more easy to apply this method to other quantum cryptography protocols

    Tools

    Get Citation

    Copy Citation Text

    ZHANG Sheng, WANG Jian, ZHANG Quan, TANG Chao-jing. Security analysis on the Petri-net model of quantum key distribution protocol[J]. Chinese Journal of Quantum Electronics, 2009, 26(1): 50

    Download Citation

    EndNote(RIS)BibTexPlain Text
    Save article for my favorites
    Paper Information

    Category:

    Received: Apr. 7, 2008

    Accepted: --

    Published Online: May. 24, 2010

    The Author Email: Sheng ZHANG (huoxingren112@163.com)

    DOI:

    CSTR:32186.14.

    Topics