Alla Altalib, Yomna Al-Ibrahim, Zahra Almahfoudh, Marius Nagy, Naya Nagy
{"title":"无密钥量子通信协议中的安全措施","authors":"Alla Altalib, Yomna Al-Ibrahim, Zahra Almahfoudh, Marius Nagy, Naya Nagy","doi":"10.1109/ECONF.2015.33","DOIUrl":null,"url":null,"abstract":"It has been shown that secure communication between two partners can be achieved with devices containing components with quantum properties. While such devices are in timid stages of practical availability, the quantum properties exhibited are well defined theoretically: quantum bits (qubits) in persistent quantum states, quantum transformations or gates applicable on qubits, and quantum communication channels between devices. The present paper measures and verifies by simulation a security level of a quantum communication protocol that does not use an encryption/decryption key. The algorithm is simpler than the two-step protocols that involve the distribution of a secret key first. Our simulations measure the security level of the protocol depending on several parameters: the number of encoding bases (two or three), the length of the signature string attached to the message, the percentage of qubits the eavesdropper inspects, etc.","PeriodicalId":268471,"journal":{"name":"2015 Fifth International Conference on e-Learning (econf)","volume":"127 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Security Measures in a Keyless Quantum Communication Protocol\",\"authors\":\"Alla Altalib, Yomna Al-Ibrahim, Zahra Almahfoudh, Marius Nagy, Naya Nagy\",\"doi\":\"10.1109/ECONF.2015.33\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"It has been shown that secure communication between two partners can be achieved with devices containing components with quantum properties. While such devices are in timid stages of practical availability, the quantum properties exhibited are well defined theoretically: quantum bits (qubits) in persistent quantum states, quantum transformations or gates applicable on qubits, and quantum communication channels between devices. The present paper measures and verifies by simulation a security level of a quantum communication protocol that does not use an encryption/decryption key. The algorithm is simpler than the two-step protocols that involve the distribution of a secret key first. Our simulations measure the security level of the protocol depending on several parameters: the number of encoding bases (two or three), the length of the signature string attached to the message, the percentage of qubits the eavesdropper inspects, etc.\",\"PeriodicalId\":268471,\"journal\":{\"name\":\"2015 Fifth International Conference on e-Learning (econf)\",\"volume\":\"127 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2015-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2015 Fifth International Conference on e-Learning (econf)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ECONF.2015.33\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 Fifth International Conference on e-Learning (econf)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ECONF.2015.33","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Security Measures in a Keyless Quantum Communication Protocol
It has been shown that secure communication between two partners can be achieved with devices containing components with quantum properties. While such devices are in timid stages of practical availability, the quantum properties exhibited are well defined theoretically: quantum bits (qubits) in persistent quantum states, quantum transformations or gates applicable on qubits, and quantum communication channels between devices. The present paper measures and verifies by simulation a security level of a quantum communication protocol that does not use an encryption/decryption key. The algorithm is simpler than the two-step protocols that involve the distribution of a secret key first. Our simulations measure the security level of the protocol depending on several parameters: the number of encoding bases (two or three), the length of the signature string attached to the message, the percentage of qubits the eavesdropper inspects, etc.