Chinese Journal of Quantum Electronics, Volume. 26, Issue 1, 50(2009)

Security analysis on the Petri-net model of quantum key distribution protocol

Sheng ZHANG*... Jian WANG, Quan ZHANG and Chao-jing TANG |Show fewer author(s)
Author Affiliations
  • [in Chinese]
  • show less
    References(7)

    [1] [1] Lo H K, Chau H F. Unconditional security of quantum key distribution over arbitrarily long distances [J]. Science, 1999, 283: 2050-2056, arXive e-print quant-ph/9803006.

    [2] [2] Lo H K. Proof of unconditional security of six-state quantum key distribution scheme [J]. Quantum Information and Computation, 2001, 1(2): 81-94.

    [3] [3] Lo H K, Chau H F. Unconditional security of quantum key distribution over arbitrarily long distances [J]. Science, 1999, 283: 2050-2056.

    [4] [4] Gottesman D, Lo H K. Proof of security of quantum key distribution with two-way classical communications [J]. IEEE Transactions on Information Theory, 2003, 49(2): 457-475.

    [5] [5] Dominic Mayers. Unconditional security in quantum cryptography [J]. Journal of the ACM, 2001, 48(3): 351-406.

    [6] [6] Biham E, Boyer M, Boykin P O, et al. A Proof of the Security of Quantum Key Distribution [OL]. arXiv:quant-ph/9912053 v1 11 Dec 1999.

    [7] [7] Bennett C H, Brassard G. Quantum crypotography:public key distribution and coin tossing [C]. Proc. IEEE Int. Conference on Computers, Systems and Signal Processing [M]. New York: 1984.

    Tools

    Get Citation

    Copy Citation Text

    ZHANG Sheng, WANG Jian, ZHANG Quan, TANG Chao-jing. Security analysis on the Petri-net model of quantum key distribution protocol[J]. Chinese Journal of Quantum Electronics, 2009, 26(1): 50

    Download Citation

    EndNote(RIS)BibTexPlain Text
    Save article for my favorites
    Paper Information

    Category:

    Received: Apr. 7, 2008

    Accepted: --

    Published Online: May. 24, 2010

    The Author Email: Sheng ZHANG (huoxingren112@163.com)

    DOI:

    CSTR:32186.14.

    Topics