메뉴 건너뛰기




Volumn 15, Issue 6, 2009, Pages 1622-1629

Ensuring quality of shared keys through quantum key distribution for practical application

Author keywords

Error rate; Quantum key distribution (QKD); Randomness test

Indexed keywords

DEGRADING FACTORS; ERROR RATE; PRIVACY AMPLIFICATION; QUANTUM CRYPTOSYSTEMS; QUANTUM KEY DISTRIBUTION; RANDOMNESS TEST;

EID: 72149133647     PISSN: 1077260X     EISSN: None     Source Type: Journal    
DOI: 10.1109/JSTQE.2009.2028243     Document Type: Article
Times cited : (7)

References (34)
  • 2
    • 0023985539 scopus 로고
    • Privacy amplification by public discussion
    • Apr.
    • C. H. Bennet, G. Brassard, and J.-M. Robert, "Privacy amplification by public discussion," SIAM J. Comput., vol.17, no.2, pp. 210-229, Apr. 1988.
    • (1988) SIAM J. Comput. , vol.17 , Issue.2 , pp. 210-229
    • Bennet, C.H.1    Brassard, G.2    Robert, J.-M.3
  • 6
    • 0011769922 scopus 로고    scopus 로고
    • Quantum key distribution over 67 km with a plug&play system
    • Jul.
    • D. Stucki, N. Gisin, O. Guinnard, G. Ribordy, and H. Zbinden, "Quantum key distribution over 67 km with a plug&play system," New J. Phys., vol.4, pp. 41.1-41.8, Jul. 2002.
    • (2002) New J. Phys. , vol.4 , pp. 411-418
    • Stucki, D.1    Gisin, N.2    Guinnard, O.3    Ribordy, G.4    Zbinden, H.5
  • 7
    • 2942611260 scopus 로고    scopus 로고
    • Quantum key distribution over 122 km of standard telecom fiber
    • May
    • C. Gobby, Z. L. Yuan, and A. J. Shields, "Quantum key distribution over 122 km of standard telecom fiber," Appl. Phys. Lett., vol.84, pp. 3762- 3764, May 2004.
    • (2004) Appl. Phys. Lett. , vol.84 , pp. 3762-3764
    • Gobby, C.1    Yuan, Z.L.2    Shields, A.J.3
  • 10
    • 56149113102 scopus 로고    scopus 로고
    • Gigahertz decoy quantum key distribution with 1Mbit/s secure key rate
    • Nov.
    • A. R. Dixon, Z. L. Yuan, J. F. Dynes, A. W. Sharpe, and A. J. Shields, "Gigahertz decoy quantum key distribution with 1Mbit/s secure key rate," Opt. Exp., vol.16, pp. 18790-18797, Nov. 2008.
    • (2008) Opt. Exp. , vol.16 , pp. 18790-18797
    • Dixon, A.R.1    Yuan, Z.L.2    Dynes, J.F.3    Sharpe, A.W.4    Shields, A.J.5
  • 11
    • 0000600063 scopus 로고
    • Quantum cryptography with coherent states
    • Mar.
    • B. Huttner, N. Imoto, N. Gisin, and T. Mor, "Quantum cryptography with coherent states," Phys. Rev. A, vol.51, pp. 1863-1870, Mar. 1995.
    • (1995) Phys. Rev. A , vol.51 , pp. 1863-1870
    • Huttner, B.1    Imoto, N.2    Gisin, N.3    Mor, T.4
  • 12
    • 0041415963 scopus 로고    scopus 로고
    • Quantum key distribution with high loss: Toward global secure communication
    • Aug.
    • W.-Y. Hwang, "Quantum key distribution with high loss: Toward global secure communication," Phys. Rev. Lett., vol.91, no.5, pp. 057901-1- 057901-4, Aug. 2003.
    • (2003) Phys. Rev. Lett. , vol.91 , Issue.5 , pp. 0579011-0579014
    • Hwang, W.-Y.1
  • 13
    • 27744568650 scopus 로고    scopus 로고
    • Beating the photon-number-splitting attack in practical quantum cryptography
    • Jun.
    • X.-B. Wang, "Beating the photon-number-splitting attack in practical quantum cryptography," Phys. Rev. Lett., vol.94, pp. 230503-1-230503- 4, Jun. 2005.
    • (2005) Phys. Rev. Lett. , vol.94 , pp. 2305031-2305034
    • Wang, X.-B.1
  • 14
    • 27744479495 scopus 로고    scopus 로고
    • Decoy state quantum key distribution
    • Jun.
    • H.-K. Lo, X. Ma, and K. Chen, "Decoy state quantum key distribution," Phys. Rev. Lett., vol.94, pp. 230504-1-230504-4, Jun. 2005.
    • (2005) Phys. Rev. Lett. , vol.94 , pp. 2305041-2305044
    • Lo, H.-K.1    Ma, X.2    Chen, K.3
  • 15
    • 27844566291 scopus 로고    scopus 로고
    • Faked states attack on quantum cryptosystems
    • Mar.
    • V. Makarov and D. R. Hjelme, "Faked states attack on quantum cryptosystems," J. Mod. Opt., vol.52, no.5, pp. 691-705, Mar. 2005.
    • (2005) J. Mod. Opt. , vol.52 , Issue.5 , pp. 691-705
    • Makarov, V.1    Hjelme, D.R.2
  • 16
    • 33846202211 scopus 로고    scopus 로고
    • Time-shift attack in practical quantum cryptosystems
    • (quant-ph/0512080)
    • B. Qi, C.-H. F. Fung, H.-K. Lo, and X. Ma, "Time-shift attack in practical quantum cryptosystems," Quantum Inf. Comput., vol.7, no.1, pp. 73-82, 2007 (quant-ph/0512080).
    • (2007) Quantum Inf. Comput. , vol.7 , Issue.1 , pp. 73-82
    • Qi, B.1    Fung, C.-H.F.2    Lo, H.-K.3    Ma, X.4
  • 17
    • 0347090658 scopus 로고    scopus 로고
    • Simple proof of security of the BB84 quantum key distribution protocol
    • Jul.
    • P.W. Shor and J. Preskill, "Simple proof of security of the BB84 quantum key distribution protocol," Phys. Rev. Lett., vol.85, no.2, pp. 441-444, Jul. 2000.
    • (2000) Phys. Rev. Lett. , vol.85 , Issue.2 , pp. 441-444
    • Shor, P.W.1    Preskill, J.2
  • 19
    • 7044249607 scopus 로고    scopus 로고
    • Security of quantum key distribution with imperfect devices
    • Sep.
    • D. Gottesman, H.-K. Lo, N. Lütkenhaus, and J. Preskill, "Security of quantum key distribution with imperfect devices," Quantum Inf. Comput., vol.4, no.5, pp. 325-360, Sep. 2004.
    • (2004) Quantum Inf. Comput. , vol.4 , Issue.5 , pp. 325-360
    • Gottesman, D.1    Lo, H.-K.2    Lütkenhaus, N.3    Preskill, J.4
  • 20
    • 49249121205 scopus 로고    scopus 로고
    • Entangled quantum-keydistribution randomness
    • Aug.
    • I. J. Owens, R. J. Hughes, and J. E. Nordholt, "Entangled quantum-keydistribution randomness," Phys. Rev. A, vol.78, pp. 022307-1-022307-5, Aug. 2008.
    • (2008) Phys. Rev. A , vol.78 , pp. 0223071-0223075
    • Owens, I.J.1    Hughes, R.J.2    Nordholt, J.E.3
  • 22
    • 72149112796 scopus 로고    scopus 로고
    • NIST FIPS publication 140-142 [Online]. Available
    • NIST FIPS publication 140-142 [Online]. Available: http://csrc.nist.gov/ publications.
  • 23
    • 72149096548 scopus 로고    scopus 로고
    • NIST special publication 800-822 rev1 [Online]. Available
    • NIST special publication 800-822 rev1 [Online]. Available: http://csrc.nist. gov/publications.
  • 27
    • 72149106515 scopus 로고
    • Synchronous Optical Network (SONET)
    • Synchronous Optical Network (SONET), ANSI Standard T1.105, 1995.
    • (1995) ANSI Standard T1.105
  • 28
    • 72149089340 scopus 로고    scopus 로고
    • Synchronous Digital Hierarchy (SDH)
    • Synchronous Digital Hierarchy (SDH), ITU Standard ITU-T G.707, 1996.
    • (1996) ITU Standard ITU-T G.707
  • 29
    • 72149112511 scopus 로고    scopus 로고
    • Standard for Information Technology
    • Standard for Information Technology, IEEE Standard 802.3, 1999.
    • (1999) IEEE Standard 802.3
  • 30
    • 84991939136 scopus 로고
    • LFSR-based hashing and authentication
    • Aug.
    • H. Krawczyk, "LFSR-based hashing and authentication," in Proc. Adv. Cryptol. (CRYPTO), Aug. 1994, pp. 129-139.
    • (1994) Proc. Adv. Cryptol. (CRYPTO) , pp. 129-139
    • Krawczyk, H.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.