ÀÚ·á°Ë»ö-Ç¥ÁØ

Ȩ > ÀڷḶ´ç > ÀÚ·á°Ë»ö > Ç¥ÁØ

ÀÚ·á °Ë»ö°á°ú

°Ë»öÆäÀÌÁö·Î
Ç¥ÁØÁ¾·ù Á¤º¸Åë½Å´ÜüǥÁØ(TTAS)
Ç¥ÁعøÈ£ TTAK.KO-12.0329-Part2 ±¸ Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2018-12-19 ÃÑ ÆäÀÌÁö 17
ÇÑ±Û Ç¥ÁØ¸í ¾çÀÚ Å° ºÐ¹è - Á¦2ºÎ: BB84 ÇÁ·ÎÅäÄÝ
¿µ¹® Ç¥Áظí Quantum Key Distribution - Part2: BB84 Protocol
ÇÑ±Û ³»¿ë¿ä¾à QKD Ç¥ÁØÀº Á¦1ºÎ ÀϹÝ, Á¦2ºÎ BB84 ÇÁ·ÎÅäÄÝ·Î ±¸¼ºµÈ´Ù. Á¦1ºÎ ÀϹݿ¡¼­´Â QKDÀÇ °³³äÀ» ¹ÙÅÁÀ¸·Î ÀϹÝÀû ¸ðµ¨À» Á¤¸³Çϰí, ´Ù¾çÇÑ QKD ÇÁ·ÎÅäÄÝÀ» Æ÷°ýÇÒ ¼ö ÀÖ´Â ´Ü°èº° ÀýÂ÷¿Í ¾ÈÀü¼º ¿ä±¸»çÇ×À» Á¦½ÃÇÑ´Ù. Á¦2ºÎÀÎ ÀÌ Ç¥ÁØÀº QKDÀÇ ±¸Çö ¾ÈÀü¼ºÀ» ³ôÀÌ´Â µðÄÚÀÌ ±â¹ýÀÌ Àû¿ëµÈ BB84 ÇÁ·ÎÅäÄÝÀÇ ´Ü°èº° ¼¼ºÎ ÀýÂ÷¿Í ¾ÈÀü¼º °í·Á»çÇ×À» Á¦½ÃÇÑ´Ù.
¿µ¹® ³»¿ë¿ä¾à The QKD standards consist of Quantum Key Distribution - Part1: General and Part2: BB84 protocol. The part1 provides a general model which is based on the basic concept of QKD, stepwise process, and security requirements that would encompass the various QKD protocol. The part2 provides detailed process and security requirements for BB84 protocol with decoy method that enhance the implementation security of QKD.
°ü·Ã IPR È®¾à¼­ Á¢¼öµÈ IPR È®¾à¼­ ¾øÀ½
°ü·ÃÆÄÀÏ    TTAK.KO-12.0329-Part2.pdf TTAK.KO-12.0329-Part2.pdf
Ç¥ÁØÀÌ·Â
Ç¥Áظí Ç¥ÁعøÈ£ Á¦°³Á¤ÀÏ ±¸ºÐ À¯È¿
¿©ºÎ
IPR
È®¾à¼­
ÆÄÀÏ
¾çÀÚ Å° ºÐ¹è - Á¦2ºÎ: BB84 ÇÁ·ÎÅäÄÝ TTAK.KO-12.0329-Part2 2018-12-19 Á¦Á¤ À¯È¿ ¾øÀ½ TTAK.KO-12.0329-Part2.pdf