Analysis of Security of Quantum Key Distribution Based on Entangled Photon Pairs by Model Checking

DOI: 10.4236/jqis.2015.53012   PDF   HTML     3,330 Downloads   3,800 Views  

Abstract

Quantum key distribution is a technique to securely distribute a bit string between two parties by using the laws of quantum mechanics. The security of this technique depends on the basis of quantum mechanics rather than the difficulty of the mathematical calculation as in the classical encoding. Researches in this field have shown that the quantum key distribution will be fully functioning outside the laboratory in a few years. Due to the complexity and the high efficiency of the device, the verification is needed. In this article, we use PRISM to verify the security of the quantum key distribution protocol, which uses the entangled photon based on BB84 protocol.

Share and Cite:

Rochanapratishtha, S. and Pijitrojana, W. (2015) Analysis of Security of Quantum Key Distribution Based on Entangled Photon Pairs by Model Checking. Journal of Quantum Information Science, 5, 103-108. doi: 10.4236/jqis.2015.53012.

Conflicts of Interest

The authors declare no conflicts of interest.

References

[1] Bennett, C.H. and Brassard, G. (1984) Quantum Cryptography: Public Key Distribution and Coin Tossing. Proceedings of the IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, 10-12 dEcember 1984, 175-179.
[2] Gerard, J.H. (1997) The Model Checker SPIN. IEEE Transactions on Software Engineering, 23, 279-295.
[3] prismmodelchecker.
http://www.prismmodelchecker.org/
[4] Elboukhari, M., Azizi, M. and Azizi, A. (2009) Implementation of Secure Key Distribution Based on Quantum Cryptography. Proceedings of IEEE International Conference on Multimedia Computing and Systems (ICMCS’09), Ouarzazate, 2-4 April 2009, 361-365.
[5] Elboukhari, M., Azizi, M. and Azizi, A. (2010) Analysis of Quantum Cryptography Protocols by Model Checking. IJUCS, 1, 34-40.
[6] Elboukhari, M., Azizi, M. and Azizi, A. (2010) Analysis of the Security of BB84 by Model Checking. International Journal of Network Security & Its Applications (IJNSA), 2, 87-97.
[7] Papanikolaou, N.K. (2004) Techniques for Design and Validation of Quantum Protocols. University of Warwick, Coventry.
[8] Siddiqui, M.A. and Qureshi, T. (2014) Quantum Key Distribution with Qubit Pairs. Journal of Quantum Information Science, 4, 129-132.
http://dx.doi.org/10.4236/jqis.2014.43014
[9] Sahoo, J.R. and Satapathy, S. (2011) Simulation and Analysis of BB84 Protocol by Model Checking. International Journal of Engineering Science and Technology, 3, 5695.

  
comments powered by Disqus

Copyright © 2020 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.