{"title":"BB84协议的中间人攻击及其防御","authors":"Yong Wang, Huadeng Wang, Zhaohong Li, Jinxiang Huang","doi":"10.1109/ICCSIT.2009.5234678","DOIUrl":null,"url":null,"abstract":"Man-in-the-middle attack on the BB84 protocol is presented. The man in the middle can intercept the message from the sender and send his message to the receiver in every step of the BB84 protocol. The attack can be analogously used on other quantum key distribution schemes. Some methods are suggested to defense against the attack by discovering the attack or handicapping the attack, and the security of BB84 Protocol is analyzed.","PeriodicalId":342396,"journal":{"name":"2009 2nd IEEE International Conference on Computer Science and Information Technology","volume":"54 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"20","resultStr":"{\"title\":\"Man-in-the-middle attack on BB84 protocol and its defence\",\"authors\":\"Yong Wang, Huadeng Wang, Zhaohong Li, Jinxiang Huang\",\"doi\":\"10.1109/ICCSIT.2009.5234678\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Man-in-the-middle attack on the BB84 protocol is presented. The man in the middle can intercept the message from the sender and send his message to the receiver in every step of the BB84 protocol. The attack can be analogously used on other quantum key distribution schemes. Some methods are suggested to defense against the attack by discovering the attack or handicapping the attack, and the security of BB84 Protocol is analyzed.\",\"PeriodicalId\":342396,\"journal\":{\"name\":\"2009 2nd IEEE International Conference on Computer Science and Information Technology\",\"volume\":\"54 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2009-09-11\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"20\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2009 2nd IEEE International Conference on Computer Science and Information Technology\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCSIT.2009.5234678\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 2nd IEEE International Conference on Computer Science and Information Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCSIT.2009.5234678","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Man-in-the-middle attack on BB84 protocol and its defence
Man-in-the-middle attack on the BB84 protocol is presented. The man in the middle can intercept the message from the sender and send his message to the receiver in every step of the BB84 protocol. The attack can be analogously used on other quantum key distribution schemes. Some methods are suggested to defense against the attack by discovering the attack or handicapping the attack, and the security of BB84 Protocol is analyzed.