Ȩ > Ç¥ÁØÈ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ
Ç¥ÁعøÈ£ | TTAK.KO-12.0356 | ±¸Ç¥ÁعøÈ£ | |
---|---|---|---|
Á¦°³Á¤ÀÏ | 2019-12-11 | ÃÑÆäÀÌÁö | 38 |
ÇѱÛÇ¥Áظí | ¾çÀÚÅ°ºÐ¹è º¸¾È ¿ä±¸»çÇ× | ||
¿µ¹®Ç¥Áظí | Security requirements for quantum key distribution(QKD) | ||
Çѱ۳»¿ë¿ä¾à | ÀÌ Ç¥ÁØÀº BB84 ÇÁ·ÎÅäÄÝ°ú µðÄÚÀÌ ±â¹ýÀ» »ç¿ëÇÏ¸ç ´Ü¹æÇâ ±â¹ýÀ¸·Î ±¸ÇöÇÑ QKD ¸ÞÄ¿´ÏÁòÀÇ º¸¾È ¿ä±¸»çÇ×µéÀ» ¸í¼¼ÇÑ´Ù. QKD °æ°è°¡ ¾ÏÈ£°æ°è ³»¿¡ Æ÷ÇԵǾî Å° »ý¼º ¹× °øÀ¯ ¼ºñ½º¸¦ Á¦°øÇÏ´Â °æ¿ì QKD °æ°è ³»ÀÇ º¸¾È ¿ä±¸»çÇ×À» Á¤ÀÇÇÑ´Ù. | ||
¿µ¹®³»¿ë¿ä¾à | The standard specifies security requirements for QKD mechanism using BB84 protocol, decoy method, and one-way realization method. Define security requirements within QKD boundary if QKD boundary is contained within the cryptographic boundary to provide secret key generation and sharing services. | ||
±¹Á¦Ç¥ÁØ | |||
°ü·ÃÆÄÀÏ | TTAK.KO-12.0356.pdf |