Model checking quantum key distribution protocols

Baichuan Huang, Yan Huang, Jiaming Kong, Xin Huang

Research output: Chapter in Book or Report/Conference proceedingConference Proceedingpeer-review

3 Citations (Scopus)

Abstract

Quantum key distribution protocols use quantum information theories to guarantee the security of key exchange procedure, and model checking is a verification technique which could be used to test the security of it. In this paper, a new group quantum key distribution protocol is designed based on BB84 protocol, which is a possible solution to handle the security issue in communication between multi-users. Discrete time Markov chain and probabilistic computation tree logic are used to model the protocol procedure and verify its security properties in PRISM. Also, we provide the theoretical proof for this group protocol, which supports the model checking results from PRISM. Our study gives an insight into some of the major difficulties of quantum security protocol design and analysis.

Original languageEnglish
Title of host publicationProceedings - 2016 8th International Conference on Information Technology in Medicine and Education, ITME 2016
EditorsYing Dai, Shaozi Li, Yun Cheng
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages611-615
Number of pages5
ISBN (Electronic)9781509039050
DOIs
Publication statusPublished - 12 Jul 2017
Event8th International Conference on Information Technology in Medicine and Education, ITME 2016 - Fuzhou, China
Duration: 23 Dec 201625 Dec 2016

Publication series

NameProceedings - 2016 8th International Conference on Information Technology in Medicine and Education, ITME 2016

Conference

Conference8th International Conference on Information Technology in Medicine and Education, ITME 2016
Country/TerritoryChina
CityFuzhou
Period23/12/1625/12/16

Keywords

  • BB84
  • Group QKD
  • Model checking

Fingerprint

Dive into the research topics of 'Model checking quantum key distribution protocols'. Together they form a unique fingerprint.

Cite this