Chinese Journal of Quantum Electronics, Volume. 26, Issue 1, 50(2009)
Security analysis on the Petri-net model of quantum key distribution protocol
[1] [1] Lo H K, Chau H F. Unconditional security of quantum key distribution over arbitrarily long distances [J]. Science, 1999, 283: 2050-2056, arXive e-print quant-ph/9803006.
[2] [2] Lo H K. Proof of unconditional security of six-state quantum key distribution scheme [J]. Quantum Information and Computation, 2001, 1(2): 81-94.
[3] [3] Lo H K, Chau H F. Unconditional security of quantum key distribution over arbitrarily long distances [J]. Science, 1999, 283: 2050-2056.
[4] [4] Gottesman D, Lo H K. Proof of security of quantum key distribution with two-way classical communications [J]. IEEE Transactions on Information Theory, 2003, 49(2): 457-475.
[5] [5] Dominic Mayers. Unconditional security in quantum cryptography [J]. Journal of the ACM, 2001, 48(3): 351-406.
[6] [6] Biham E, Boyer M, Boykin P O, et al. A Proof of the Security of Quantum Key Distribution [OL]. arXiv:quant-ph/9912053 v1 11 Dec 1999.
[7] [7] Bennett C H, Brassard G. Quantum crypotography:public key distribution and coin tossing [C]. Proc. IEEE Int. Conference on Computers, Systems and Signal Processing [M]. New York: 1984.
Get Citation
Copy Citation Text
ZHANG Sheng, WANG Jian, ZHANG Quan, TANG Chao-jing. Security analysis on the Petri-net model of quantum key distribution protocol[J]. Chinese Journal of Quantum Electronics, 2009, 26(1): 50
Category:
Received: Apr. 7, 2008
Accepted: --
Published Online: May. 24, 2010
The Author Email: Sheng ZHANG (huoxingren112@163.com)
CSTR:32186.14.