http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
CHSH 부등식을 이용하여 양자 키 분배와 양자 인증의 안전성을 개선한 프로토콜
허진오(Jin o Heo),홍창호(Chang ho Hong),임종인(Jongin Lim),양형진(Hyoung jin Yang) 한국정보보호학회 2008 정보보호학회논문지 Vol.18 No.4
본 논문에서는 Bao-sen Shi(2001년)에 의해 제안된 얽힘 상태(벨 상태)를 이용한 양자 키 분배와 양자 인증 프로토콜의 취약성을 분석하고 그것을 보완한 프로토콜을 제안한다. 기존의 프로토콜은 사용자들이 제 3자(중재자)를 인증하는 과정만 존재했기 때문에 도청자의 Impersonation 공격에 대해 취약성을 가지고 있었다. 본 논문이 제안하는 프로토콜은 CHSH 부등식을 이용한 체크 모드를 사용하여 중재자가 사용자들을 인증함으로써 안전성을 보완한 프로토콜이다. We propose to analyze a weakness of quantum key distribution and quantum authentication which use entangled state were proposed by Bao-sen Shi(2001) and to improve the security of the protocol. The existing protocol had a weakness against an impersonation attack of an eavesdropper, because of a only process which authenticated a third party(Center) by users. In this paper, we propose improving the security of the protocol that authenticates users by a third party using check mode which applies CHSH inequality.
Multi-user Quantum Network System and Quantum Communication Using χ-type Entangled States
홍창호,허진오,임종인,양형진 한국물리학회 2012 THE JOURNAL OF THE KOREAN PHYSICAL SOCIETY Vol.61 No.1
A multi-user quantum direct communication network system for <i>N</i> users utilizing χ-type entangled states is proposed. The network system is composed of a communication center, <i>N</i> users, and <i>N</i> quantum lines linking the center and the <i>N</i> users. There is no quantum line among users; therefore, only N quantum lines are necessary for the communication between users. Using one χ-type entangled state, in this protocol, we are able to send two bits of information through direct communication and, at the same time, share two bits of quantum keys. The security of the protocol will be analyzed.
Quantum Signature Scheme for Participant Attack
원기탁,허진오,윤천석,최지웅,양형진 한국물리학회 2019 THE JOURNAL OF THE KOREAN PHYSICAL SOCIETY Vol.75 No.4
We present a quantum signature scheme for a participant attack using only Pauli operators. The arbitrator verifies the signature and serves to prevent the denial of participants as well as the existing arbitrated quantum signature. Conversely, Bob's existential forgery and Alice's disavowal, which are reported to be a shortcoming of Pauli operators, are not allowed. This simplifies the structure and increases the efficiency of communication.