Ȩ > Ç¥ÁØÈ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ
| Ç¥ÁعøÈ£ | TTAK.KO-12.0356 | ±¸Ç¥ÁعøÈ£ | |
|---|---|---|---|
| Á¦°³Á¤ÀÏ | 2019-12-11 | ÃÑÆäÀÌÁö | 38 |
| ÇѱÛÇ¥Áظí | ¾çÀÚŰºÐ¹è º¸¾È ¿ä±¸»çÇ× | ||
| ¿µ¹®Ç¥Áظí | Security requirements for quantum key distribution(QKD) | ||
| Çѱ۳»¿ë¿ä¾à | ÀÌ Ç¥ÁØÀº BB84 ÇÁ·ÎÅäÄݰú µðÄÚÀÌ ±â¹ýÀ» »ç¿ëÇÏ¸ç ´Ü¹æÇâ ±â¹ýÀ¸·Î ±¸ÇöÇÑ QKD ¸ÞÄ¿´ÏÁòÀÇ º¸¾È ¿ä±¸»çÇ×µéÀ» ¸í¼¼ÇÑ´Ù. QKD °æ°è°¡ ¾ÏÈ£°æ°è ³»¿¡ Æ÷ÇԵǾî Ű »ý¼º ¹× °øÀ¯ ¼ºñ½º¸¦ Á¦°øÇÏ´Â °æ¿ì QKD °æ°è ³»ÀÇ º¸¾È ¿ä±¸»çÇ×À» Á¤ÀÇÇÑ´Ù. | ||
| ¿µ¹®³»¿ë¿ä¾à | The standard specifies security requirements for QKD mechanism using BB84 protocol, decoy method, and one-way realization method. Define security requirements within QKD boundary if QKD boundary is contained within the cryptographic boundary to provide secret key generation and sharing services. | ||
| ±¹Á¦Ç¥ÁØ | |||
| °ü·ÃÆÄÀÏ |
| ||





