期刊文献+

量子密钥分配协议仿真平台的研究与设计 被引量:3

Research and Design of Quantum Key Distribution Protocol Simulation Platform
下载PDF
导出
摘要 量子密钥分配协议是目前信息安全方向的一大研究热点,物理实验已难以应付层出不穷的协议来证明它的安全性。通过仿真平台来验证协议的安全性,是最经济有效的做法。利用.NET开发平台、C#语言开发了一个量子密钥分配协议仿真平台,并对已有的BB84协议进行了仿真,得到了与理论结果一致的仿真结果。 Quantum key distribution protocol is a hot spot of research in the information security,and physics experiment couldn′t cope with lots of protocols in order to demonstrate its safety.It is the most economic and effective way through the simulation platform to verify security of protocols.A quantum key distribution protocol simulation platform was designed under.NET and C#,and the existing BB84 protocol was simulated by the platform,and it was shown that the simulation results are completely tallied with theoretic results.
作者 朱丽娟
出处 《计算机与数字工程》 2012年第11期112-114,共3页 Computer & Digital Engineering
基金 上海高校青年教师科研专项基金资助项目(AAYQ0629) 上海市教委科研创新项目(12YZ190) 上海建桥学院科研创新项目(BB201109)资助
关键词 量子密钥分配协议 仿真 NET C# BB84协议 quantum key distribution protocol simulation .NET C# BB84
  • 相关文献

参考文献10

  • 1Shor P W. Algorithms for quantum computation: discrete log- arithms and factoring[C]. 35 Annual Symposium on the Foun- dation of Computer Science: IEEE Computer Society Press, 1994:365-368.
  • 2SchneierB. Applied Cryptography: protocols, algorithms, and source code in C [M]. New York: Wiley,1994:29-32.
  • 3Bennett C H. Quantum cryptography using any two non-or- thogonal states [J]. Phys. Rev. Lett. , 1992, 68:3121-3124.
  • 4Ekert A K. Quantum cryptography bases on Bell 's theorem [J]. Phys. Rev. Lett. , 1991, 67:661-664.
  • 5Calderbank A R and Shor P W. Good quantum error correcting codes exist [J]. Phys. Rev. A, 1996, 54: 1098-1105.
  • 6Steane A M. Multiple particle interference and error correc- tion. Proc [J]. Royal Society of London Series A, 1996, 452: 2551-2577.
  • 7赵生妹,李飞,郑宝玉.基于经典计算机的量子加密算法仿真[J].量子电子学报,2004,21(3):331-336. 被引量:11
  • 8Bruss D. Optimal eavesdropping in quantum cryptography with six states[J]. Phys. Rev. Left. ,1998,32(14) :3018-3021.
  • 9Ekert A K, Rarity J G. , Tapster P R, Palma G Mo Practical quantum cryptography based on two-photan interferometer [J]. Phys. Rev. Lett. , 1992, 69.. 1293-1296.
  • 10庄克良,高云岭,纪向尚.嵌入式系统程序调用关系分析设计方法[J].舰船电子工程,2010,30(10):129-131. 被引量:7

二级参考文献4

  • 1Microsoft corporation.Visual C++MSDN. http://msdn.microsoft.com/zh-cn/library/c63a9b7h(VS.80).aspx . 2008
  • 2Framework Open Source Community.EFI_Shell_get-ting_Started_Guide.Version 0.31[].https://efi-shelltianocoreorg/servlets/ProjectDocumentList.2005
  • 3M.Tim Jones.Visualize function calls with Graphviz. http://www.ibm.com/developerworks/linux/library/l-graphvis . 2005
  • 4陈克非.信息安全──密码的作用与局限[J].通信学报,2001,22(8):93-99. 被引量:10

共引文献16

同被引文献17

引证文献3

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部