Man-in-the-middle Attack on BB84 Protocol and its Defence
Man-in-the-middle attack on the BB84 protocol is presented. The man in the middle can intercept the message from the sender and send his message to the receiver in every step of the BB84 protocol. The attack can be analogously used on other quantum key distribution schemes. Some methods are suggested to defense against the attack by discovering the attack or handicapping the attack, and the security of BB84 Protocol is analyzed.
quantum cryptography man-in-the-middle attack BB84 protocol quantum key distribution
WANG Yong WANG Huadeng LI Zhaohong HUANG Jinxiang
College of Computer and Control Guilin University of Electronic Technology Guilin 541004, China
国际会议
北京
英文
1759-1760
2009-08-08(万方平台首次上网日期,不代表论文的发表时间)