2019 IEEE 19th International Conference on Communication Technology (ICCT) 2019
DOI: 10.1109/icct46805.2019.8947177
|View full text |Cite
|
Sign up to set email alerts
|

Modeling and Security Analysis Method of Quantum Key Distribution Protocol Based on Colored Petri Nets

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
1
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 15 publications
0
1
0
Order By: Relevance
“…After all photons have been sent, there is no base check between Alice and Bob. Bob tells Alice which qubit will remain as the key shared between them (Yang, Jiao, Shi, and Liu, 2019).…”
Section: Bennett 1992 (B92)mentioning
confidence: 99%
“…After all photons have been sent, there is no base check between Alice and Bob. Bob tells Alice which qubit will remain as the key shared between them (Yang, Jiao, Shi, and Liu, 2019).…”
Section: Bennett 1992 (B92)mentioning
confidence: 99%
“…Luo et al, have used CPN Tools to analyze the security of the Wireless Hart protocol [ 28 ], verified the known protocol vulnerabilities through state space analysis, updated the protocol for security flaws, and used CPN Tools to verify the updates again. In addition, other similar works [ 37 , 38 , 39 ] have used CPN Tools to conduct formal security analyses for the SIP protocol, 5G AKA and QKD protocol. From the above, it can be seen that CPN Tools play an essential role in the formal analysis of security protocols.…”
Section: Related Workmentioning
confidence: 99%