{"title":"基于有色Petri网的量子密钥分发协议建模及安全性分析方法","authors":"Xiaoming Yang, Jian Jiao, Yunmei Shi, Yong Liu","doi":"10.1109/ICCT46805.2019.8947177","DOIUrl":null,"url":null,"abstract":"As the core of quantum communication, the security analysis of Quantum Key Distribution (QKD) has always been a hot and difficult issue in the field of quantum communication. Aiming at the complicated and cumbersome problems existing in the current QKD protocol security analysis method, this paper proposes a formal analysis method based on colored Petri nets, and the Petri net model of BB84 protocol and B92 protocol is established by using this method. Man-in-the-middle attack is a common attack mode in quantum communication at present. We also use this method to model and analyze the man-in-the-middle attack. The experimental results show that BB84 and B92 protocols are as vulnerable to man-in-the-middle attack as any classical protocol without authentication.","PeriodicalId":306112,"journal":{"name":"2019 IEEE 19th International Conference on Communication Technology (ICCT)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Modeling and Security Analysis Method of Quantum Key Distribution Protocol Based on Colored Petri Nets\",\"authors\":\"Xiaoming Yang, Jian Jiao, Yunmei Shi, Yong Liu\",\"doi\":\"10.1109/ICCT46805.2019.8947177\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"As the core of quantum communication, the security analysis of Quantum Key Distribution (QKD) has always been a hot and difficult issue in the field of quantum communication. Aiming at the complicated and cumbersome problems existing in the current QKD protocol security analysis method, this paper proposes a formal analysis method based on colored Petri nets, and the Petri net model of BB84 protocol and B92 protocol is established by using this method. Man-in-the-middle attack is a common attack mode in quantum communication at present. We also use this method to model and analyze the man-in-the-middle attack. The experimental results show that BB84 and B92 protocols are as vulnerable to man-in-the-middle attack as any classical protocol without authentication.\",\"PeriodicalId\":306112,\"journal\":{\"name\":\"2019 IEEE 19th International Conference on Communication Technology (ICCT)\",\"volume\":\"58 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 IEEE 19th International Conference on Communication Technology (ICCT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCT46805.2019.8947177\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 IEEE 19th International Conference on Communication Technology (ICCT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCT46805.2019.8947177","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Modeling and Security Analysis Method of Quantum Key Distribution Protocol Based on Colored Petri Nets
As the core of quantum communication, the security analysis of Quantum Key Distribution (QKD) has always been a hot and difficult issue in the field of quantum communication. Aiming at the complicated and cumbersome problems existing in the current QKD protocol security analysis method, this paper proposes a formal analysis method based on colored Petri nets, and the Petri net model of BB84 protocol and B92 protocol is established by using this method. Man-in-the-middle attack is a common attack mode in quantum communication at present. We also use this method to model and analyze the man-in-the-middle attack. The experimental results show that BB84 and B92 protocols are as vulnerable to man-in-the-middle attack as any classical protocol without authentication.