Analysis of Information Leakage in Quantum Key Agreement  

Analysis of Information Leakage in Quantum Key Agreement

在线阅读下载全文

作  者:刘胜利 郑东 陈克非 

机构地区:[1]Computer Science and Eng., Shanghai Jiaotong Univ., Shanghai 200030, China,Lab. of Computer Network and Information Security, Xidian Univ., Xi'an 710071 [2]Computer Science and Eng., Shanghai Jiaotong Univ., Shanghai 200030, China

出  处:《Journal of Shanghai Jiaotong university(Science)》2006年第2期219-223,共5页上海交通大学学报(英文版)

基  金:NationalNaturalScienceFoundationofChina(Nos.60303026,60473020,60573030)

摘  要:Quantum key agreement is one of the approaches to unconditional security. Since 1980’s, different protocols for quantum key agreement have been proposed and analyzed. A new quantum key agreement protocol was presented in 2004, and a detailed analysis to the protocol was given. The possible game played between legitimate users and the enemy was described: sitting in the middle, an adversary can play a “man-in-the-middle” attack to cheat the sender and receiver. The information leaked to the adversary is essential to the length of the final quantum secret key. It was shown how to determine the amount of information leaked to the enemy and the amount of uncertainty between the legitimate sender and receiver.Quantum key agreement is one of the approaches to unconditional security. Since 1980's, different protocols for quantum key agreement have been proposed and analyzed. A new quantum key agreement protocol was presented in 2004, and a detailed analysis to the protocol was given. The possible game played between legitimate users and the enemy was described: sitting in the middle, an adversary can play a "man-in-the-middle" attack to cheat the sender and receiver. The information leaked to the adversary is essential to the length of the final quantum secret key. It was shown how to determine the amount of information leaked to the enemy and the amount of uncertainty between the legitimate sender and receiver.

关 键 词:quantum key agreement ANALYSIS 

分 类 号:TP309[自动化与计算机技术—计算机系统结构]

 

参考文献:

正在载入数据...

 

二级参考文献:

正在载入数据...

 

耦合文献:

正在载入数据...

 

引证文献:

正在载入数据...

 

二级引证文献:

正在载入数据...

 

同被引文献:

正在载入数据...

 

相关期刊文献:

正在载入数据...

相关的主题
相关的作者对象
相关的机构对象