Ȩ > Ç¥ÁØÈ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ
Ç¥ÁعøÈ£ | TTAK.KO-12.0329-Part2 | ±¸Ç¥ÁعøÈ£ | |
---|---|---|---|
Á¦°³Á¤ÀÏ | 2018-12-19 | ÃÑÆäÀÌÁö | 17 |
ÇѱÛÇ¥Áظí | ¾çÀÚ Å° ºÐ¹è - Á¦2ºÎ: BB84 ÇÁ·ÎÅäÄÝ | ||
¿µ¹®Ç¥Áظí | Quantum Key Distribution - Part2: BB84 Protocol | ||
Çѱ۳»¿ë¿ä¾à | QKD Ç¥ÁØÀº Á¦1ºÎ ÀϹÝ, Á¦2ºÎ BB84 ÇÁ·ÎÅäÄÝ·Î ±¸¼ºµÈ´Ù. Á¦1ºÎ ÀϹݿ¡¼´Â QKDÀÇ °³³äÀ» ¹ÙÅÁÀ¸·Î ÀϹÝÀû ¸ðµ¨À» Á¤¸³ÇÏ°í, ´Ù¾çÇÑ QKD ÇÁ·ÎÅäÄÝÀ» Æ÷°ýÇÒ ¼ö ÀÖ´Â ´Ü°èº° ÀýÂ÷¿Í ¾ÈÀü¼º ¿ä±¸»çÇ×À» Á¦½ÃÇÑ´Ù. Á¦2ºÎÀÎ ÀÌ Ç¥ÁØÀº QKDÀÇ ±¸Çö ¾ÈÀü¼ºÀ» ³ôÀÌ´Â µðÄÚÀÌ ±â¹ýÀÌ Àû¿ëµÈ BB84 ÇÁ·ÎÅäÄÝÀÇ ´Ü°èº° ¼¼ºÎ ÀýÂ÷¿Í ¾ÈÀü¼º °í·Á»çÇ×À» Á¦½ÃÇÑ´Ù. | ||
¿µ¹®³»¿ë¿ä¾à | The QKD standards consist of Quantum Key Distribution - Part1: General and Part2: BB84 protocol. The part1 provides a general model which is based on the basic concept of QKD, stepwise process, and security requirements that would encompass the various QKD protocol. The part2 provides detailed process and security requirements for BB84 protocol with decoy method that enhance the implementation security of QKD. | ||
±¹Á¦Ç¥ÁØ | |||
°ü·ÃÆÄÀÏ | TTAK.KO-12.0329-Part2.pdf |