Formal Verification of Quantum Protocols
release_tbqivfl7qzhbvaowslkiislc3q
by
Rajagopal Nagarajan University of Warwick,
2002
Abstract
We propose to analyse quantum protocols by applying formal verification
techniques developed in classical computing for the analysis of communicating
concurrent systems. One area of successful application of these techniques is
that of classical security protocols, exemplified by Lowe's discovery and fix
of a flaw in the well-known Needham-Schroeder authentication protocol. Secure
quantum cryptographic protocols are also notoriously difficult to design.
Quantum cryptography is therefore an interesting target for formal
verification, and provides our first example; we expect the approach to be
transferable to more general quantum information processing scenarios. The
example we use is the quantum key distribution protocol proposed by Bennett and
Brassard, commonly referred to as BB84. We present a model of the protocol in
the process calculus CCS and the results of some initial analyses using the
Concurrency Workbench of the New Century (CWB-NC).
In text/plain
format
Archived Files and Locations
application/pdf 87.1 kB
file_ouevrdmbhfhfpdi34pugs3wn3u
|
arxiv.org (repository) web.archive.org (webarchive) |
application/pdf 98.4 kB
file_7pf7m5n6lva7je6nee5ljktbou
|
archive.org (archive) |
quant-ph/0203086v1
access all versions, variants, and formats of this works (eg, pre-prints)