This paper is written in Persian (فارسی) language. In this paper, we introduce S13 Quantum Key Distribution Center (QKDC) protocol and analyze it against known attacks on QKDC protocols, specially BB84.
8. دﻫﻤﯿﻦﻣﺤﺪ ﺗﺨﺼﺼﯽ ﻫﻤﺎﯾﺶرﻣﺰﻧﮕﺎري ود
[7] Mayers, Dominic. "Unconditional security in
quantum cryptography." Journal of the ACM
(JACM) 48.3 (2001): 351-406.
[8] Shor, Peter W., and John Preskill. "Simple proof of
security of the BB84 quantum key distribution
protocol." Physical Review Letters 85.2 (2000): 441.
[9] Brassard, Gilles, et al. "Limitations on practical
quantum cryptography."Physical Review Letters 85.6
(2000): 1330.
[10] Aggarwal, Rahul, Heeren Sharma, and Deepak Gupta.
"Analysis of Various Attacks over BB84 Quantum
Key Distribution Protocol." International Journal of
Computer Applications 20.8 (2011): 28-31.
[11] Tamaki, Kiyoshi, and Norbert Lütkenhaus.
"Unconditional security of the Bennett 1992 quantum
key-distribution over lossy and noisy channel." arXiv
preprint quant-ph/0308048 (2003).
[12] Quan, Zhang, and Tang Chaojing. "Simple proof of
the unconditional security of the Bennett 1992
quantum key distribution protocol." Physical Review
A 65.6 (2002): 062301.
[13] Tamaki, Kiyoshi, and Hoi-Kwong Lo.
"Unconditionally secure key distillation from multi-
photons in a single-photon polarization based
quantum key distribution." Information Theory, 2005.
ISIT 2005. Proceedings. International Symposium on.
IEEE, 2005.
[14] Yong, Wang, et al. "Man-in-the-Middle Attack on
BB84 Protocol and its Defence." Computer Science
and Information Technology, 2009. ICCSIT 2009.
2nd IEEE International Conference on. IEEE, 2009.
[15] Wootters, William K., and Wojciech H. Zurek. "A
single quantum cannot be cloned." Nature 299.5886
(1982): 802-803.
[16] Scarani, Valerio, et al. "The security of practical
quantum key distribution."Reviews of modern
physics 81.3 (2009): 1301.
[17] Makarov*, Vadim, and Dag R. Hjelme. "Faked states
attack on quantum cryptosystems." Journal of
Modern Optics 52.5 (2005): 691-705.
[18] Gisin, Nicolas, et al. "Quantum
cryptography." Reviews of modern physics 74.1
(2002): 145-195.
[19] Vakhitov, Artem, Vadim Makarov, and Dag R.
Hjelme. "Large pulse attack as a method of
conventional optical eavesdropping in quantum
cryptography." journal of modern optics 48.13
(2001): 2023-2038.