首页> 外文期刊>Journal of computer sciences >Stop Conditions Of BB84 Protocol Via A Depolarizing Channel (Quantum Cryptography) | Science Publications
【24h】

Stop Conditions Of BB84 Protocol Via A Depolarizing Channel (Quantum Cryptography) | Science Publications

机译:通过去极化通道(量子密码学)终止BB84协议的条件科学出版物

获取原文
获取外文期刊封面目录资料

摘要

> BB84 (Bennett and Brassard 1984) is one of the well known protocols of quantum keys distribution. It is built to allow two interlocutors commonly called Alice and Bob to share two similar binary keys and to detect the eavesdropper presence (the eavesdropper is commonly called Eve). However, Eve presence in a disturbed environment causes errors to the sifted keys and decreases the amount of secure information between Alice and Bob. One of the most important stages in BB84 protocol is to decide by using error probability estimation if we can continue the protocol phases or no. Indeed, this decision is function of some factors like: what is the amount of information that we will lose in the error correction phase? What is the degree of errors detected in our sifted keys? What is the origin of these errors: Eve strategy or the channel disturbance? For these reasons, we will study in this study some conditions to stop BB84 protocol in the context of depolarizing channel. We implement two types of eavesdropping strategy: Intercept and Resend and Cloning Attack.
机译: > BB84(Bennett和Brassard 1984)是量子密钥分配的众所周知的协议之一。它被构造为允许两个通常称为Alice和Bob的对话者共享两个相似的二进制密钥并检测窃听者的存在(窃听者通常称为Eve)。但是,夏娃在受干扰的环境中的存在会导致筛选的键出现错误,并减少了爱丽丝和鲍勃之间的安全信息量。 BB84协议中最重要的阶段之一是通过使用错误概率估计来决定是否可以继续协议阶段。确实,此决定取决于某些因素,例如:在纠错阶段我们将丢失的信息量是多少?在我们筛选过的钥匙中检测到的错误程度是多少?这些错误的根源是:夏娃策略还是渠道干扰?由于这些原因,我们将在本研究中研究在去极化通道的情况下停止BB84方案的一些条件。我们实施两种窃听策略:拦截和重新发送以及克隆攻击。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号