The search functionality is under construction.

Keyword Search Result

[Keyword] quantum key distribution(9hit)

1-9hit
  • A Secure Communication Network Infrastructure Based on Quantum Key Distribution Technology

    Yoshimichi TANIZAWA  Ririka TAKAHASHI  Hideaki SATO  Alexander R. DIXON  Shinichi KAWAMURA  

     
    PAPER

      Vol:
    E99-B No:5
      Page(s):
    1054-1069

    Quantum key distribution (QKD), a cryptography technology providing information theoretic security based on physical laws, has moved from the research stage to the engineering stage. Although the communication distance is subject to a limitation attributable to the QKD fundamentals, recent research and development of “key relaying” over a “QKD network” is overcoming this limitation. However, there are still barriers to widespread use of QKD integrated with conventional information systems: applicability and development cost. In order to break down these barriers, this paper proposes a new solution for developing secure network infrastructure based on QKD technology to accommodate multiple applications. The proposed solution introduces 3 functions: (1) a directory mechanism to manage multiple applications hosted on the QKD network, (2) a key management method to share and to allocate the keys for multiple applications, and (3) a cryptography communication library enabling existing cryptographic communication software to be ported to the QKD network easily. The proposed solution allows the QKD network to accommodate multiple applications of various types, and moreover, realizes applicability to conventional information systems easily. It also contributes to a reduction in the development cost per information system, since the development cost of the QKD network can be shared between the multiple applications. The proposed solution was implemented with a network emulating QKD technology and evaluated. The evaluation results show that the proposed solution enables the infrastructure of a single QKD network to host multiple applications concurrently, fairly, and effectively through a conventional application programming interface, OpenSSL API. In addition, the overhead of secure session establishment by the proposed solution was quantitatively evaluated and compared.

  • Quantum Communication Experiments Using Telecom-Band Entangled Photons

    Hiroki TAKESUE  Toshimori HONJO  Kenichi HARADA  Benjamin MIQUEL  

     
    INVITED PAPER

      Vol:
    E93-A No:5
      Page(s):
    903-909

    Entanglement is expected to play a crucial role in the next-generation quantum communication systems. This paper reviews recent quantum communication experiments over optical fiber using 1.5-µm telecom-band entangled photon pairs. After describing the telecom-band entanglement sources based on spontaneous parametric processes, we review three quantum communication experiments using entangled photons: a long-distance entanglement distribution, an entanglement-based quantum key distribution, and an entanglement swapping.

  • DPS Quantum Key Distribution System

    Kyo INOUE  

     
    INVITED PAPER

      Vol:
    E93-A No:5
      Page(s):
    897-902

    Differential-phase-shift (DPS) quantum key distribution (QKD) is one scheme of quantum key distribution whose security is based on the quantum nature of lightwave. This protocol features simplicity, a high key creation rate, and robustness against photon-number-splitting attacks. We describe DPS-QKD in this paper, including its setup and operation, eavesdropping against DPS-QKD, system performance, and modified systems to improve the system performance.

  • High Speed Quantum Key Distribution System

    Akio TAJIMA  Akihiro TANAKA  Seigo TAKAHASHI  Ken-ichiro YOSHINO  Yoshihiro NAMBU  

     
    INVITED PAPER

      Vol:
    E93-A No:5
      Page(s):
    889-896

    Quantum key distribution (QKD) systems can generate unconditionally secure common keys between remote users. Improvements of QKD performance, particularly in key generation rate, have been required to meet current network traffic. A high-speed QKD system should be equipped with low-loss receivers with high visibility, highly efficient photon detectors with small dark count probability. A solution to these issues is to employ planar lightwave circuit (PLC) interferometers, single photon detection circuits and modules, together with multi-wavelength channels transmission using wavelength division multiplexing (WDM) technique.

  • Security Proof of Quantum Key Distribution

    Kiyoshi TAMAKI  Toyohiro TSURUMARU  

     
    INVITED PAPER

      Vol:
    E93-A No:5
      Page(s):
    880-888

    Quantum key distribution (QKD) is a way to securely expand the secret key to be used in One-time pad, and it is attracting great interest from not only theorists but also experimentalists or engineers who are aiming for the actual implementations. In this paper, we review the theoretical aspect of QKD, especially we focus on its security proof, and we briefly mention the possible problems and future directions.

  • Changes to Quantum Cryptography

    Yasuyuki SAKAI  Hidema TANAKA  

     
    INVITED PAPER

      Vol:
    E93-A No:5
      Page(s):
    872-879

    Quantum cryptography has become a subject of widespread interest. In particular, quantum key distribution, which provides a secure key agreement by using quantum systems, is believed to be the most important application of quantum cryptography. Quantum key distribution has the potential to achieve the "unconditionally" secure infrastructure. We also have many cryptographic tools that are based on "modern cryptography" at the present time. They are being used in an effort to guarantee secure communication over open networks such as the Internet. Unfortunately, their ultimate efficacy is in doubt. Quantum key distribution systems are believed to be close to practical and commercial use. In this paper, we discuss what we should do to apply quantum cryptography to our communications. We also discuss how quantum key distribution can be combined with or used to replace cryptographic tools based on modern cryptography.

  • Key Rate Available from Mismatched Measurements in the BB84 Protocol and the Uncertainty Principle

    Ryutaroh MATSUMOTO  Shun WATANABE  

     
    LETTER-Information Theory

      Vol:
    E91-A No:10
      Page(s):
    2870-2873

    We consider the mismatched measurements in the BB84 quantum key distribution protocol, in which measuring bases are different from transmitting bases. We give a lower bound on the amount of a secret key that can be extracted from the mismatched measurements. Our lower bound shows that we can extract a secret key from the mismatched measurements with certain quantum channels, such as the channel over which the Hadamard matrix is applied to each qubit with high probability. Moreover, the entropic uncertainty principle implies that one cannot extract the secret key from both matched measurements and mismatched ones simultaneously, when we use the standard information reconciliation and privacy amplification procedure.

  • 1550 nm Single-Photon Detection for the Demonstration of Unconditionally Secure Fiber-Optic Quantum Key Distribution over 50 km

    Akio YOSHIZAWA  Ryosaku KAJI  Hidemi TSUCHIDA  

     
    PAPER

      Vol:
    E86-C No:9
      Page(s):
    1800-1804

    The performance of an indium-gallium-arsenide avalanche photodiode serving as a 1550 nm single-photon detector is investigated. Quantum efficiency is evaluated for laser pulses with an average of < 0.015 photons per pulse, which are important for the demonstration of unconditionally secure quantum key distribution [G. Brassard et al.: Phys. Rev. Lett. 85, 6, p.1330 (2000)]. An operating temperature of 243 K is achieved by thermo-electrical cooling, yielding a quantum efficiency of 18% with a dark-count probability per gate of 2.8 10-5. The results obtained here guarantee unconditionally secure fiber-optic quantum key distribution over 50 km.

  • A Study on Secret Key Reconciliation Protocol "Cascade"

    Tomohiro SUGIMOTO  Kouichi YAMAZAKI  

     
    LETTER-Cryptography and Information Security

      Vol:
    E83-A No:10
      Page(s):
    1987-1991

    We show some numerical results of computer simulations of secret key reconciliation (SKR) protocol "Cascade" and clarify its properties. By using these properties, we propose to improve the protocol performance on the number of publicly exchanged bits which should be as few as possible.