메뉴 건너뛰기




Volumn 16, Issue 21, 2008, Pages 16680-16690

Secure key generation using an ultra-long fiber laser: Transient analysis and experiment

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHY; FIBER LASERS; FIBERS; LASER MIRRORS; MIRRORS; NETWORK SECURITY; TRANSIENT ANALYSIS;

EID: 54249146882     PISSN: None     EISSN: 10944087     Source Type: Journal    
DOI: 10.1364/OE.16.016680     Document Type: Article
Times cited : (51)

References (37)
  • 2
    • 0000478763 scopus 로고
    • Cipher printing telegraph systems for secret wire and radio telegraphic communications
    • G. Vernam, "Cipher printing telegraph systems for secret wire and radio telegraphic communications," J. Am. Inst. Electr. Eng. 45, 109-116 (1926).
    • (1926) J. Am. Inst. Electr. Eng , vol.45 , pp. 109-116
    • Vernam, G.1
  • 3
    • 0022216938 scopus 로고
    • Quantum public key distribution system
    • C. H. Bennett, and G. Brassard, "Quantum public key distribution system," IBM Tech. Disci. Bull. 28, 3153-3163 (1985).
    • (1985) IBM Tech. Disci. Bull , vol.28 , pp. 3153-3163
    • Bennett, C.H.1    Brassard, G.2
  • 4
    • 0343152990 scopus 로고
    • Quantum cryptography based on Bell's theorem
    • A. K. Ekert, "Quantum cryptography based on Bell's theorem," Phys. Rev. Lett. 67, 661-663 (1991).
    • (1991) Phys. Rev. Lett , vol.67 , pp. 661-663
    • Ekert, A.K.1
  • 6
    • 0347090658 scopus 로고    scopus 로고
    • Simple proof of security of the BB84 quantum key distribution protocol
    • P. W. Shor, and J. Preskill, "Simple proof of security of the BB84 quantum key distribution protocol," Phys. Rev. Lett. 85, 441-444 (2000).
    • (2000) Phys. Rev. Lett , vol.85 , pp. 441-444
    • Shor, P.W.1    Preskill, J.2
  • 7
    • 0035936121 scopus 로고    scopus 로고
    • Long-distance quantum communication with atomic ensembles and linear optics
    • L.-M. Duan, M. D. Lukin, J. I. Cirac, and P. Zoller, "Long-distance quantum communication with atomic ensembles and linear optics," Nature 414, 413-424 (2001).
    • (2001) Nature , vol.414 , pp. 413-424
    • Duan, L.-M.1    Lukin, M.D.2    Cirac, J.I.3    Zoller, P.4
  • 10
    • 0034652057 scopus 로고    scopus 로고
    • Quantum key distribution over a 48-km optical fiber network
    • R. J. Hughes, G. L. Morgan, and C. G. Peterson, "Quantum key distribution over a 48-km optical fiber network," J. Mod. Opt. 47, 533-547 (2000).
    • (2000) J. Mod. Opt , vol.47 , pp. 533-547
    • Hughes, R.J.1    Morgan, G.L.2    Peterson, C.G.3
  • 11
    • 2942611260 scopus 로고    scopus 로고
    • Quantum key distribution over 122 km of standard telecom fiber
    • C. Gobby, Z. L. Yuan, and A. J. Shields, "Quantum key distribution over 122 km of standard telecom fiber," Appl. Phys. Lett 84, 3762-3764 (2004).
    • (2004) Appl. Phys. Lett , vol.84 , pp. 3762-3764
    • Gobby, C.1    Yuan, Z.L.2    Shields, A.J.3
  • 12
    • 0041415963 scopus 로고    scopus 로고
    • Quantum key distribution with high loss: Towards global secure communication
    • W.-Y. Hwang, "Quantum key distribution with high loss: towards global secure communication," Phys. Rev. Lett. 91, 057901 (2003).
    • (2003) Phys. Rev. Lett , vol.91 , pp. 057901
    • Hwang, W.-Y.1
  • 13
    • 27744479495 scopus 로고    scopus 로고
    • Decoy state quantum key distribution
    • H.-K. Lo, X. Ma, and K. Chen, "Decoy state quantum key distribution," Phys. Rev. Lett. 94, 230504 (2005).
    • (2005) Phys. Rev. Lett , vol.94 , pp. 230504
    • Lo, H.-K.1    Ma, X.2    Chen, K.3
  • 14
    • 27744568650 scopus 로고    scopus 로고
    • Beating the photon-number-splitting attack in practical quantum cryptography
    • X.-B. Wang, "Beating the photon-number-splitting attack in practical quantum cryptography," Phys. Rev. Lett. 94, 230503 (2005).
    • (2005) Phys. Rev. Lett , vol.94 , pp. 230503
    • Wang, X.-B.1
  • 15
    • 44349176870 scopus 로고    scopus 로고
    • Gigahertz quantum key distribution with InGaAs avalanche photodiodes
    • Z. L. Yuan, A. R. Dixon, J. F. Dynes, A. W. Sharpe, and A. J. Shields, "Gigahertz quantum key distribution with InGaAs avalanche photodiodes," Appl. Phys. Lett. 92, 201104 (2008).
    • (2008) Appl. Phys. Lett , vol.92 , pp. 201104
    • Yuan, Z.L.1    Dixon, A.R.2    Dynes, J.F.3    Sharpe, A.W.4    Shields, A.J.5
  • 16
    • 0347111146 scopus 로고    scopus 로고
    • Security against individual attacks for realistic quantum key distribution
    • N. Lutkenhaus, "Security against individual attacks for realistic quantum key distribution," Phys. Rev. A 61, 052304 (2000).
    • (2000) Phys. Rev. A , vol.61 , pp. 052304
    • Lutkenhaus, N.1
  • 17
    • 0001085312 scopus 로고    scopus 로고
    • Long-distance Bell-type tests using energy-time entangled photons
    • W. Tittel, J. Brendel, H. Zbinden, and N. Gisin, "Long-distance Bell-type tests using energy-time entangled photons," Phys. Rev. A 59, 4150-4163, (1999).
    • (1999) Phys. Rev. A , vol.59 , pp. 4150-4163
    • Tittel, W.1    Brendel, J.2    Zbinden, H.3    Gisin, N.4
  • 20
    • 34249869818 scopus 로고    scopus 로고
    • Quantum key distribution over a 40-dB channel loss using superconducting single photon detectors
    • H. Takesue, S. W. Nam, Q. Zhang, R. H. Hadfield, T. Honjo, K. Tamaki, and Y. Yamamoto, "Quantum key distribution over a 40-dB channel loss using superconducting single photon detectors," Nat. Photon. 1, 343-348 (2007).
    • (2007) Nat. Photon , vol.1 , pp. 343-348
    • Takesue, H.1    Nam, S.W.2    Zhang, Q.3    Hadfield, R.H.4    Honjo, T.5    Tamaki, K.6    Yamamoto, Y.7
  • 21
    • 0029305715 scopus 로고
    • Secure optical network architecture utilizing wavelength hopping / time spreading codes
    • L. Tancevski, I. Andonovich, and J. Budin, "Secure optical network architecture utilizing wavelength hopping / time spreading codes," IEEE Photon. Technol. Lett. 7, 573-575 (1995).
    • (1995) IEEE Photon. Technol. Lett , vol.7 , pp. 573-575
    • Tancevski, L.1    Andonovich, I.2    Budin, J.3
  • 22
    • 0030672516 scopus 로고    scopus 로고
    • Photonic code-division multiple-access communications
    • D. D. Sampson, G. Pendock, and R. A. Griffin, "Photonic code-division multiple-access communications," Fiber Integr. Opt. 16, 129-157 (1997).
    • (1997) Fiber Integr. Opt , vol.16 , pp. 129-157
    • Sampson, D.D.1    Pendock, G.2    Griffin, R.A.3
  • 23
    • 15744387141 scopus 로고    scopus 로고
    • Security performance of optical CDMA against eavesdropping
    • T. H. Shake, "Security performance of optical CDMA against eavesdropping," IEEE J. Lightwave Technol. 23, 655-670 (2005).
    • (2005) IEEE J. Lightwave Technol , vol.23 , pp. 655-670
    • Shake, T.H.1
  • 24
    • 15744366748 scopus 로고    scopus 로고
    • Confidentiality performance of spectral-phase-encoded optical CDMA
    • T. H. Shake, "Confidentiality performance of spectral-phase-encoded optical CDMA," IEEE J. Lightwave Technol. 23, 1652-1663 (2005).
    • (2005) IEEE J. Lightwave Technol , vol.23 , pp. 1652-1663
    • Shake, T.H.1
  • 25
    • 11744303078 scopus 로고    scopus 로고
    • Optical cryptosystem based on synchronization of hyperchaos generated by a delayed feedback tunable laser diode
    • J.-P. Goedgebuer, L. Larger, and H. Porte, "Optical cryptosystem based on synchronization of hyperchaos generated by a delayed feedback tunable laser diode," Phys. Rev. Lett. 80, 2249-2252 (1998).
    • (1998) Phys. Rev. Lett , vol.80 , pp. 2249-2252
    • Goedgebuer, J.-P.1    Larger, L.2    Porte, H.3
  • 28
    • 33749460795 scopus 로고    scopus 로고
    • J. Scheuer, J. and A. Yariv, Giant fiber lasers: a new paradigm for secure key distribution, Phys. Rev. Lett. 97, 140502 (2006).
    • J. Scheuer, J. and A. Yariv, "Giant fiber lasers: a new paradigm for secure key distribution," Phys. Rev. Lett. 97, 140502 (2006).
  • 29
    • 0017930809 scopus 로고
    • A method for of obtaining digital signatures and public key cryptosystems
    • R. L. Rivest, A. Shamir, and L. M. Adleman, "A method for of obtaining digital signatures and public key cryptosystems," Commun. ACM 21, 120-126 (1978).
    • (1978) Commun. ACM , vol.21 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.M.3
  • 30
    • 0018443657 scopus 로고
    • A note on the complexity of cryptography
    • G. Brassard, "A note on the complexity of cryptography," IEEE Trans. Inf. Theory IT-25, 232-233 (1979).
    • (1979) IEEE Trans. Inf. Theory , vol.IT-25 , pp. 232-233
    • Brassard, G.1
  • 31
    • 0942278533 scopus 로고    scopus 로고
    • Fast and secure key distribution using mesoscopic coherence states of light
    • G. A. Barbosa, "Fast and secure key distribution using mesoscopic coherence states of light," Phys. Rev. A 68, 052307 (2003).
    • (2003) Phys. Rev. A , vol.68 , pp. 052307
    • Barbosa, G.A.1
  • 32
    • 33645265197 scopus 로고
    • Key exchange using keyless cryptography
    • B. Alpern, ad F. B. Schneider, "Key exchange using keyless cryptography," Info. Proc. Lett. 16, 79-81 (1983).
    • (1983) Info. Proc. Lett , vol.16 , pp. 79-81
    • Alpern, B.1    ad, F.2    Schneider, B.3
  • 34
    • 0030104541 scopus 로고    scopus 로고
    • A general planar waveguide autoregressive optical filter
    • C. K. Madsen, and J. H. Zhao, "A general planar waveguide autoregressive optical filter," IEEE J. Lightwave Technol. 14, 437-447 (1996).
    • (1996) IEEE J. Lightwave Technol , vol.14 , pp. 437-447
    • Madsen, C.K.1    Zhao, J.H.2
  • 35
    • 30444442452 scopus 로고    scopus 로고
    • Unconditional security in cryptography
    • S. Wolf, "Unconditional security in cryptography," Lectures on data security 1561, 217-250 (1999).
    • (1999) Lectures on data security , vol.1561 , pp. 217-250
    • Wolf, S.1
  • 36
    • 0016562514 scopus 로고
    • The wire-tap channel
    • A. D. Wyner, "The wire-tap channel," Bell Syst. Tech. J. 54, 1355-1387 (1975).
    • (1975) Bell Syst. Tech. J , vol.54 , pp. 1355-1387
    • Wyner, A.D.1
  • 37
    • 54249125862 scopus 로고    scopus 로고
    • Security protocols with isotropic channels
    • Technical report MS-CIS-06-18, Department of Computer and Information Science, University of Pennsylvania
    • M. Anand, E. Cronin, M. Sherr, M. A. Blaze, and S. Kannan, "Security protocols with isotropic channels," Technical report MS-CIS-06-18, Department of Computer and Information Science, University of Pennsylvania (2006).
    • (2006)
    • Anand, M.1    Cronin, E.2    Sherr, M.3    Blaze, M.A.4    Kannan, S.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.