会议专题

Man-in-the-middle Attack on BB84 Protocol and its Defence

Man-in-the-middle attack on the BB84 protocol is presented. The man in the middle can intercept the message from the sender and send his message to the receiver in every step of the BB84 protocol. The attack can be analogously used on other quantum key distribution schemes. Some methods are suggested to defense against the attack by discovering the attack or handicapping the attack, and the security of BB84 Protocol is analyzed.

quantum cryptography man-in-the-middle attack BB84 protocol quantum key distribution

WANG Yong WANG Huadeng LI Zhaohong HUANG Jinxiang

College of Computer and Control Guilin University of Electronic Technology Guilin 541004, China

国际会议

2009 2nd IEEE International Conference on Computer Science and Information Technology(第二届计算机科学与信息技术国际会议 ICCSIT2009)

北京

英文

1759-1760

2009-08-08(万方平台首次上网日期,不代表论文的发表时间)