We gratefully acknowledge support from
the Simons Foundation and member institutions.
Full-text links:

Download:

Current browse context:

cs.CR

Change to browse by:

References & Citations

DBLP - CS Bibliography

Bookmark

(what is this?)
CiteULike logo BibSonomy logo Mendeley logo del.icio.us logo Digg logo Reddit logo

Computer Science > Cryptography and Security

Title: Symbolic Abstractions for Quantum Protocol Verification

Authors: Lucca Hirschi
Abstract: Quantum protocols such as the BB84 Quantum Key Distribution protocol exchange qubits to achieve information-theoretic security guarantees. Many variants thereof were proposed, some of them being already deployed. Existing security proofs in that field are mostly tedious, error-prone pen-and-paper proofs of the core protocol only that rarely account for other crucial components such as authentication. This calls for formal and automated verification techniques that exhaustively explore all possible intruder behaviors and that scale well.
The symbolic approach offers rigorous, mathematical frameworks and automated tools to analyze security protocols. Based on well-designed abstractions, it has allowed for large-scale formal analyses of real-life protocols such as TLS 1.3 and mobile telephony protocols. Hence a natural question is: Can we use this successful line of work to analyze quantum protocols? This paper proposes a first positive answer and motivates further research on this unexplored path.
Subjects: Cryptography and Security (cs.CR); Quantum Physics (quant-ph)
Cite as: arXiv:1904.04186 [cs.CR]
  (or arXiv:1904.04186v2 [cs.CR] for this version)

Submission history

From: Lucca Hirschi [view email]
[v1] Mon, 8 Apr 2019 16:50:15 GMT (466kb,D)
[v2] Wed, 10 Apr 2019 14:26:11 GMT (266kb,D)

Link back to: arXiv, form interface, contact.