{"title":"Security Oriented Analysis of B92 by Model Checking","authors":"M. Elboukhari, A. Azizi, M. Azizi","doi":"10.1109/NTMS.2008.ECP.89","DOIUrl":null,"url":null,"abstract":"This paper presents a methodology for analyzing quantum information systems, based on model checking; particularly we are interested in the protocol of quantum key distribution B92. It has been proved that this protocol is unconditionally secure against all kinds of attacks according to the information theory, but this security proof is not easily adaptable to practical scenarios. Our approach is based on probabilistic model checking; using the PRISM tool, we show that the protocol B92 fulfilled specific security properties.","PeriodicalId":432307,"journal":{"name":"2008 New Technologies, Mobility and Security","volume":"9 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 New Technologies, Mobility and Security","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/NTMS.2008.ECP.89","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5
Abstract
This paper presents a methodology for analyzing quantum information systems, based on model checking; particularly we are interested in the protocol of quantum key distribution B92. It has been proved that this protocol is unconditionally secure against all kinds of attacks according to the information theory, but this security proof is not easily adaptable to practical scenarios. Our approach is based on probabilistic model checking; using the PRISM tool, we show that the protocol B92 fulfilled specific security properties.