2016 8th International Conference on Information Technology in Medicine and Education (ITME) 2016
DOI: 10.1109/itme.2016.0144
|View full text |Cite
|
Sign up to set email alerts
|

Model Checking Quantum Key Distribution Protocols

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 8 publications
0
2
0
Order By: Relevance
“…The process was performed by using PRISM tool in [21]. In [22] a variant of BB84 was modeled by using discrete time Markov chain and probabilistic computation tree logic and its security properties were verified by using PRISM tool. BB84 and B94 were modeled by using Communicating Quantum Processes in [23] which were translated into PRISM model for its verification.…”
Section: Literature Surveymentioning
confidence: 99%
“…The process was performed by using PRISM tool in [21]. In [22] a variant of BB84 was modeled by using discrete time Markov chain and probabilistic computation tree logic and its security properties were verified by using PRISM tool. BB84 and B94 were modeled by using Communicating Quantum Processes in [23] which were translated into PRISM model for its verification.…”
Section: Literature Surveymentioning
confidence: 99%
“…The sending party then randomly chooses a basis for each qubit with either rectilinear (⊕) or diagonal polarization (⊗). A qubit can be represented in either of the following quantum states: alignleftalign-1|ψ(0,)align-2=|0align-1|ψ(1,)align-2=|1align-1|ψ(0,)align-2=|+align-1|ψ(1,)align-2=|.align-1align-2 Figure also shows how a qubit can be encoded in the polarization of a photon in the BB84 protocol. The receiving party then randomly selects a basis for the measurement of the received polarized photons.…”
Section: Overview Of Qkdmentioning
confidence: 99%