Security analysis of quantum key distribution protocol

被引:0
|
作者
Omine T. [1 ]
Yamada C. [1 ]
Miyagi K. [1 ]
Ichikawa S. [2 ]
机构
[1] Okinawa National College of Technology, 095, Henoko, Nago, Okinawa
[2] Toyohashi University of Technology, 1-1, Hibarigaoka, Tempaku-cho, Toyohashi, Aichi
基金
日本学术振兴会;
关键词
Intensity modulation; Quantum cryptography; Simulator; Y-00;
D O I
10.1541/ieejias.136.698
中图分类号
学科分类号
摘要
Recently, the Y-00 protocol has been developed as a defense against cryptanalysis. The Y-00 protocol has a high affinity with existing public communication networks and has also been shown to achive a large-capacity transmission. In this article, we aim to improve Key DSR, which is part of the functionality of Y-00. We propose a new model of Key DSR, and a discussion of the efficiency of the new model is presented. Finally, we show that the proposed method can contribute to the composition of a safety design approach for Y-00 encryption. © 2016 The Institute of Electrical Engineers of Japan.
引用
收藏
页码:698 / 702
页数:4
相关论文
共 50 条
  • [1] Security of "asymmetrical quantum key distribution protocol"
    Li, Chuan-Ming
    Hwang, Tzonelih
    Lee, Kuo-Chang
    INTERNATIONAL JOURNAL OF MODERN PHYSICS C, 2007, 18 (02): : 157 - 161
  • [2] An enhanced quantum key distribution protocol for security authentication
    Kumar, Ankit
    Dadheech, Pankaj
    Singh, Vijander
    Raja, Linesh
    Poonia, Ramesh C.
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2019, 22 (04): : 499 - 507
  • [3] Unconditional security of relativistic quantum key distribution protocol
    Zhuang, Sushuai
    Yang, Li
    QUANTUM AND NONLINEAR OPTICS, 2010, 7846
  • [4] Quantum Key Distribution with Error Rejecting Protocol: Optical Setup and Security Analysis
    Nascimento, Jose C.
    Mendonca, Fabio A.
    Giraudo, Elvio C.
    Ramos, Rubens V.
    PROCEEDINGS OF THE IEEE INTERNATIONAL TELECOMMUNICATIONS SYMPOSIUM, VOLS 1 AND 2, 2006, : 668 - 671
  • [5] Simple analysis of security of the BB84 quantum key distribution protocol
    Hong-Yi Su
    Quantum Information Processing, 2020, 19
  • [6] Simple analysis of security of the BB84 quantum key distribution protocol
    Su, Hong-Yi
    QUANTUM INFORMATION PROCESSING, 2020, 19 (06)
  • [7] Security Proof of a Semi-Quantum Key Distribution Protocol
    Krawec, Walter O.
    2015 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2015, : 686 - 690
  • [8] Unconditional security of a three state quantum key distribution protocol
    Boileau, JC
    Tamaki, K
    Batuwantudawe, J
    Laflamme, R
    Renes, JM
    PHYSICAL REVIEW LETTERS, 2005, 94 (04)
  • [9] Integration and formal security analysis of a quantum key distribution scheme within CHAP protocol
    Ghilen, Aymen
    Azizi, Mostafa
    Bouallegue, Ridha
    2015 IEEE/ACS 12TH INTERNATIONAL CONFERENCE OF COMPUTER SYSTEMS AND APPLICATIONS (AICCSA), 2015,
  • [10] Analysis of Reconciliation Protocol in Quantum Key Distribution
    Huo, Xin-Xing
    Yu, Li
    Lu, Zhi-Xin
    Liu, Bing-Can
    PROCEEDINGS OF THE 14TH YOUTH CONFERENCE ON COMMUNICATION, 2009, : 776 - +