建模单向和双向量子密钥分发协议

A. M. Sofy, M. Shalaby, H. Dahshan, A. Rohiem
{"title":"建模单向和双向量子密钥分发协议","authors":"A. M. Sofy, M. Shalaby, H. Dahshan, A. Rohiem","doi":"10.1109/ICICIS46948.2019.9014729","DOIUrl":null,"url":null,"abstract":"The present cryptography systems security depends on the hardness of factorizing an integer number with a large number of digits to its prime integer factors. In 1994, Peter Shor proposed a quantum procedure (Shor's algorithm) that easily factorizes large integer numbers to its prime factors compared with other algorithms. Consequently, present cryptography systems became endangered and once quantum computers exist, conventional cryptography systems could breakdown. On the other hand, quantum cryptography security is based on the well-known quantum mechanics uncertainty principle, and so the quantum cryptography enhances the cryptography field with a mechanism for eavesdropper detecting. Here, a hardware implementation was proposed for two types of key distribution protocols based on quantum computing, the one-way quantum key distribution protocol (BB84 protocol), and the two-way quantum key distribution protocol.","PeriodicalId":200604,"journal":{"name":"2019 Ninth International Conference on Intelligent Computing and Information Systems (ICICIS)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Modeling One-way and Two-way quantum key distribution protocols\",\"authors\":\"A. M. Sofy, M. Shalaby, H. Dahshan, A. Rohiem\",\"doi\":\"10.1109/ICICIS46948.2019.9014729\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The present cryptography systems security depends on the hardness of factorizing an integer number with a large number of digits to its prime integer factors. In 1994, Peter Shor proposed a quantum procedure (Shor's algorithm) that easily factorizes large integer numbers to its prime factors compared with other algorithms. Consequently, present cryptography systems became endangered and once quantum computers exist, conventional cryptography systems could breakdown. On the other hand, quantum cryptography security is based on the well-known quantum mechanics uncertainty principle, and so the quantum cryptography enhances the cryptography field with a mechanism for eavesdropper detecting. Here, a hardware implementation was proposed for two types of key distribution protocols based on quantum computing, the one-way quantum key distribution protocol (BB84 protocol), and the two-way quantum key distribution protocol.\",\"PeriodicalId\":200604,\"journal\":{\"name\":\"2019 Ninth International Conference on Intelligent Computing and Information Systems (ICICIS)\",\"volume\":\"30 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 Ninth International Conference on Intelligent Computing and Information Systems (ICICIS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICICIS46948.2019.9014729\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 Ninth International Conference on Intelligent Computing and Information Systems (ICICIS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICICIS46948.2019.9014729","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

摘要

当前密码系统的安全性依赖于将具有大量位数的整数分解为其素数整数因子的难易程度。1994年,彼得·肖尔(Peter Shor)提出了一种量子过程(肖尔算法),与其他算法相比,它可以很容易地将大整数分解为质因数。因此,现有的密码系统受到威胁,一旦量子计算机出现,传统的密码系统可能会崩溃。另一方面,量子密码的安全性基于量子力学中众所周知的不确定性原理,因此量子密码通过窃听检测机制增强了密码学领域。本文提出了两种基于量子计算的密钥分发协议的硬件实现,即单向量子密钥分发协议(BB84协议)和双向量子密钥分发协议。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Modeling One-way and Two-way quantum key distribution protocols
The present cryptography systems security depends on the hardness of factorizing an integer number with a large number of digits to its prime integer factors. In 1994, Peter Shor proposed a quantum procedure (Shor's algorithm) that easily factorizes large integer numbers to its prime factors compared with other algorithms. Consequently, present cryptography systems became endangered and once quantum computers exist, conventional cryptography systems could breakdown. On the other hand, quantum cryptography security is based on the well-known quantum mechanics uncertainty principle, and so the quantum cryptography enhances the cryptography field with a mechanism for eavesdropper detecting. Here, a hardware implementation was proposed for two types of key distribution protocols based on quantum computing, the one-way quantum key distribution protocol (BB84 protocol), and the two-way quantum key distribution protocol.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信