期刊文献+
共找到1篇文章
< 1 >
每页显示 20 50 100
PROBABILISTIC CLONE-RESEND ATTACK STRATEGY IN QUANTUM KEY DISTRIBUTION
1
作者 ZhaoShengmei LiFei ZhengBaoyu 《Journal of Electronics(China)》 2005年第1期85-89,共5页
A kind of attack strategy based on a probabilistic cloning machine is proposed in this letter. The security of BB84 and the six-state quantum key distribution protocols under this attack is studied by theoretic analys... A kind of attack strategy based on a probabilistic cloning machine is proposed in this letter. The security of BB84 and the six-state quantum key distribution protocols under this attack is studied by theoretic analyses and corroborated by simulations. It is concluded that the quantum key distribution protocols still have an asymptotic perfect security even if the eavesdropper adopts the proposed attack strategy. 展开更多
关键词 Attack strategy Quantum Key Distribution(QKD) Probabilistic cloning machine No-cloning theorem
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部