메뉴 건너뛰기




Volumn 19, Issue 11, 2011, Pages 10387-10409

Field test of quantum key distribution in the Tokyo QKD network

(46)  Sasaki, M a   Fujiwara, M a   Ishizuka, H a   Klaus, W a   Wakui, K a   Takeoka, M a   Miki, S a   Yamashita, T a   Wang, Z a   Tanaka, A b   Yoshino, K b   Nambu, Y b   Takahashi, S b   Tajima, A b   Tomita, A c   Domeki, T b   Hasegawa, T d   Sakai, Y d   Kobayashi, H d   Asai, T d   more..


Author keywords

[No Author keywords available]

Indexed keywords

QUANTUM CHEMISTRY; TELECOMMUNICATION EQUIPMENT;

EID: 79957605027     PISSN: None     EISSN: 10944087     Source Type: Journal    
DOI: 10.1364/OE.19.010387     Document Type: Article
Times cited : (1116)

References (54)
  • 4
    • 84894390189 scopus 로고    scopus 로고
    • I. D. Quantique, http://www.idquantique.com/
  • 5
    • 84894401545 scopus 로고    scopus 로고
    • Q. Magi Technologies, Inc., http://www.magiqtech.com/MagiQ/Home.html
  • 6
    • 84894394829 scopus 로고    scopus 로고
    • QuintessenceLabs Pty Ltd, http://www.quintessencelabs.com/
  • 9
    • 67649535645 scopus 로고    scopus 로고
    • Standardization of quantum key distribution and the ETSI standardization initiative ISG-QKD
    • T. Länger and G. Lenhart, " Standardization of quantum key distribution and the ETSI standardization initiative ISG-QKD," N. J. Phys. 11(5), 055051 (2009).
    • (2009) N. J. Phys. , vol.11 , Issue.5 , pp. 055051
    • Länger, T.1    Lenhart, G.2
  • 10
    • 84894389064 scopus 로고    scopus 로고
    • SWISS QUANTUM, http://www.swissquantum.com/
  • 11
    • 77955695575 scopus 로고    scopus 로고
    • Realizing long-term quantum cryptography
    • A. Mirza and F. Petruccione, " Realizing long-term quantum cryptography," J. Opt. Soc. Am. B 27(6), A185-A188 (2010).
    • (2010) J. Opt. Soc. Am. B , vol.27 , Issue.6
    • Mirza, A.1    Petruccione, F.2
  • 12
    • 13544277609 scopus 로고    scopus 로고
    • Continuous operation of a one-way quantum key distribution system over installed telecom fibre
    • DOI 10.1364/OPEX.13.000660
    • Z. L. Yuan and A. J. Shields, " Continuous operation of a one-way quantum key distribution system over installed telecom fibre," Opt. Express 13(2), 660-665 (2005). (Pubitemid 40224943)
    • (2005) Optics Express , vol.13 , Issue.2 , pp. 660-665
    • Yuan, Z.L.1    Shields, A.J.2
  • 17
    • 78049501312 scopus 로고    scopus 로고
    • Photon level crosstalk between parallel fibers installed in urban area
    • M. Fujiwara, S. Miki, T. Yamashita, Z. Wang, and M. Sasaki, " Photon level crosstalk between parallel fibers installed in urban area," Opt. Express 18(21), 22199-22207 (2010).
    • (2010) Opt. Express , vol.18 , Issue.21 , pp. 22199-22207
    • Fujiwara, M.1    Miki, S.2    Yamashita, T.3    Wang, Z.4    Sasaki, M.5
  • 19
    • 0041415963 scopus 로고    scopus 로고
    • Quantum key distribution with high loss: Toward global secure communication
    • W.-Y. Hwang, " Quantum key distribution with high loss: toward global secure communication," Phys. Rev. Lett. 91(5), 057901 (2003).
    • (2003) Phys. Rev. Lett. , vol.91 , Issue.5 , pp. 057901
    • Hwang, W.-Y.1
  • 20
    • 27744479495 scopus 로고    scopus 로고
    • Decoy state quantum key distribution
    • H.-K. Lo, X. Ma, and K. Chen, " Decoy state quantum key distribution," Phys. Rev. Lett. 94(23), 230504 (2005).
    • (2005) Phys. Rev. Lett. , vol.94 , Issue.23 , pp. 230504
    • Lo, H.-K.1    Ma, X.2    Chen, K.3
  • 21
    • 27744568650 scopus 로고    scopus 로고
    • Beating the photon-number-splitting attack in practical quantum cryptography
    • X.-B. Wang, " Beating the photon-number-splitting attack in practical quantum cryptography," Phys. Rev. Lett. 94(23), 230503 (2005).
    • (2005) Phys. Rev. Lett. , vol.94 , Issue.23 , pp. 230503
    • Wang, X.-B.1
  • 22
    • 0142025187 scopus 로고    scopus 로고
    • Differential-phase-shift quantum key distribution using coherent light
    • K. Inoue, E. Waks, and Y. Yamamoto, " Differential-phase-shift quantum key distribution using coherent light," Phys. Rev. A 68(2), 022317 (2003).
    • (2003) Phys. Rev. A , vol.68 , Issue.2 , pp. 022317
    • Inoue, K.1    Waks, E.2    Yamamoto, Y.3
  • 23
    • 11944263767 scopus 로고
    • Quantum cryptography without Bell's theorem
    • C. H. Bennett, G. Brassard, and N. D. Mermin, " Quantum cryptography without Bell's theorem," Phys. Rev. Lett. 68(5), 557-559 (1992).
    • (1992) Phys. Rev. Lett. , vol.68 , Issue.5 , pp. 557-559
    • Bennett, C.H.1    Brassard, G.2    Mermin, N.D.3
  • 24
    • 1642383816 scopus 로고    scopus 로고
    • Quantum cryptography protocols robust against photon number splitting attacks for weak laser pulse implementations
    • V. Scarani, A. Acín, G. Ribordy, and N. Gisin, " Quantum cryptography protocols robust against photon number splitting attacks for weak laser pulse implementations," Phys. Rev. Lett. 92(5), 057901 (2004).
    • (2004) Phys. Rev. Lett. , vol.92 , Issue.5 , pp. 057901
    • Scarani, V.1    Acín, A.2    Ribordy, G.3    Gisin, N.4
  • 26
    • 77954962991 scopus 로고    scopus 로고
    • Multichannel SNSPD system with high detection efficiency at telecommunication wavelength
    • S. Miki, T. Yamashita, M. Fujiwara, M. Sasaki, and Z. Wang, " Multichannel SNSPD system with high detection efficiency at telecommunication wavelength," Opt. Lett. 35(13), 2133-2135 (2010).
    • (2010) Opt. Lett. , vol.35 , Issue.13 , pp. 2133-2135
    • Miki, S.1    Yamashita, T.2    Fujiwara, M.3    Sasaki, M.4    Wang, Z.5
  • 27
    • 72149125879 scopus 로고    scopus 로고
    • General purpose hash function family computer and shared key creating system
    • Patent WO/2007/034685 (March 29)
    • S. Obana and A. Tanaka, " General purpose hash function family computer and shared key creating system," Patent WO/2007/034685 (March 29, 2007).
    • (2007)
    • Obana, S.1    Tanaka, A.2
  • 28
    • 27144453296 scopus 로고    scopus 로고
    • Practical decoy state for quantum key distribution
    • X. Ma, B. Qi, Y. Zhao, and H.-K. Lo, " Practical decoy state for quantum key distribution," Phys. Rev. A 72(1), 012326 (2005).
    • (2005) Phys. Rev. A , vol.72 , Issue.1 , pp. 012326
    • Ma, X.1    Qi, B.2    Zhao, Y.3    Lo, H.-K.4
  • 29
    • 33344454530 scopus 로고    scopus 로고
    • Experimental quantum key distribution with decoy states
    • Y. Zhao, B. Qi, X. Ma, H.-K. Lo, and L. Qian, " Experimental quantum key distribution with decoy states," Phys. Rev. Lett. 96(7), 070502 (2006).
    • (2006) Phys. Rev. Lett. , vol.96 , Issue.7 , pp. 070502
    • Zhao, Y.1    Qi, B.2    Ma, X.3    Lo, H.-K.4    Qian, L.5
  • 30
    • 34547400660 scopus 로고    scopus 로고
    • Upper bounds of eavesdropper's performances in finite-length code with the decoy method
    • M. Hayashi, " Upper bounds of eavesdropper's performances in finite-length code with the decoy method," Phys. Rev. A 76(1), 012329 (2007).
    • (2007) Phys. Rev. A , vol.76 , Issue.1 , pp. 012329
    • Hayashi, M.1
  • 31
    • 34548303396 scopus 로고    scopus 로고
    • General theory for decoy-state quantum key distribution with an arbitrary number of intensities
    • M. Hayashi, " General theory for decoy-state quantum key distribution with an arbitrary number of intensities," N. J. Phys. 9(8), 284 (2007).
    • (2007) N. J. Phys. , vol.9 , Issue.8 , pp. 284
    • Hayashi, M.1
  • 32
    • 77951783248 scopus 로고    scopus 로고
    • Continuous operation of high bit rate quantum key distribution
    • A. R. Dixon, Z. L. Yuan, J. F. Dynes, A. W. Sharpe, and A. J. Shields, " Continuous operation of high bit rate quantum key distribution," Appl. Phys. Lett. 96(16), 161102 (2010).
    • (2010) Appl. Phys. Lett. , vol.96 , Issue.16 , pp. 161102
    • Dixon, A.R.1    Yuan, Z.L.2    Dynes, J.F.3    Sharpe, A.W.4    Shields, A.J.5
  • 33
    • 34547394809 scopus 로고    scopus 로고
    • High speed single photon detection in the near infrared
    • Z. L. Yuan, B. E. Kardynal, A. W. Sharpe, and A. J. Shields, " High speed single photon detection in the near infrared," Appl. Phys. Lett. 91(4), 041114 (2007).
    • (2007) Appl. Phys. Lett. , vol.91 , Issue.4 , pp. 041114
    • Yuan, Z.L.1    Kardynal, B.E.2    Sharpe, A.W.3    Shields, A.J.4
  • 34
    • 56149113102 scopus 로고    scopus 로고
    • Gigahertz decoy quantum key distribution with 1 Mbit/s secure key rate
    • A. R. Dixon, Z. L. Yuan, J. F. Dynes, A. W. Sharpe, and A. J. Shields, " Gigahertz decoy quantum key distribution with 1 Mbit/s secure key rate," Opt. Express 16(23), 18790-18797 (2008).
    • (2008) Opt. Express , vol.16 , Issue.23 , pp. 18790-18797
    • Dixon, A.R.1    Yuan, Z.L.2    Dynes, J.F.3    Sharpe, A.W.4    Shields, A.J.5
  • 35
    • 34547394809 scopus 로고    scopus 로고
    • High speed single photon detection in the near infrared
    • Z. L. Yuan, B. E. Kardynal, A. W. Sharpe, and A. J. Shields, " High speed single photon detection in the near infrared," Appl. Phys. Lett. 91(4), 041114 (2007).
    • (2007) Appl. Phys. Lett. , vol.91 , Issue.4 , pp. 041114
    • Yuan, Z.L.1    Kardynal, B.E.2    Sharpe, A.W.3    Shields, A.J.4
  • 36
    • 85027496257 scopus 로고
    • Secret-key reconciliation by public discussion
    • G. Brassard and L. Salvail, " Secret-key reconciliation by public discussion," Lect. Notes Comput. Sci. 765, 410-423 (1994).
    • (1994) Lect. Notes Comput. Sci. , vol.765 , pp. 410-423
    • Brassard, G.1    Salvail, L.2
  • 37
    • 34249869818 scopus 로고    scopus 로고
    • Quantum key distribution over a 40-dB channel loss using superconducting single-photon detectors
    • H. Takesue, S. W. Nam, Q. Zhang, R. H. Hadfield, T. Honjo, K. Tamaki, and Y. Yamamoto, " Quantum key distribution over a 40-dB channel loss using superconducting single-photon detectors," Nat. Photonics 1(6), 343-348 (2007).
    • (2007) Nat. Photonics , vol.1 , Issue.6 , pp. 343-348
    • Takesue, H.1    Nam, S.W.2    Zhang, Q.3    Hadfield, R.H.4    Honjo, T.5    Tamaki, K.6    Yamamoto, Y.7
  • 38
    • 33144478746 scopus 로고    scopus 로고
    • Security of differential-phase-shift quantum key distribution against individual attacks
    • E. Waks, H. Takesue, and Y. Yamamoto, " Security of differential-phase-shift quantum key distribution against individual attacks," Phys. Rev. A 73(1), 012344 (2006).
    • (2006) Phys. Rev. A , vol.73 , Issue.1 , pp. 012344
    • Waks, E.1    Takesue, H.2    Yamamoto, Y.3
  • 39
    • 66449127660 scopus 로고    scopus 로고
    • Differential-phase-shift quantum key distribution experiment using fast physical random bit generator with chaotic semiconductor lasers
    • T. Honjo, A. Uchida, K. Amano, K. Hirano, H. Someya, H. Okumura, K. Yoshimura, P. Davis, and Y. Tokura, " Differential-phase-shift quantum key distribution experiment using fast physical random bit generator with chaotic semiconductor lasers," Opt. Express 17(11), 9053-9061 (2009).
    • (2009) Opt. Express , vol.17 , Issue.11 , pp. 9053-9061
    • Honjo, T.1    Uchida, A.2    Amano, K.3    Hirano, K.4    Someya, H.5    Okumura, H.6    Yoshimura, K.7    Davis, P.8    Tokura, Y.9
  • 43
    • 0035841908 scopus 로고    scopus 로고
    • Large pulse attack as a method of conventional optical eavesdropping in quantum cryptography
    • DOI 10.1080/09500340110074691, Technologies for Quantum Communications
    • A. Vakhitov, V. Makarov, and D.-R. Hjelme, " Large pulse attack as a method of conventional optical eavesdropping in quantum cryptography," J. Mod. Opt. 48(13), 2023-2038 (2001). (Pubitemid 35381812)
    • (2001) Journal of Modern Optics , vol.48 , Issue.13 SPEC. , pp. 2023-2038
    • Vakhitov, A.1    Makarov, V.2    Hjelme, D.R.3
  • 44
    • 27844566291 scopus 로고    scopus 로고
    • Faked states attack on quantum cryptosystems
    • DOI 10.1080/09500340410001730986
    • V. Makarov and D.-R. Hjelme, " Faked states attack on quantum cryptosystems," J. Mod. Opt. 52(5), 691-705 (2005). (Pubitemid 41648384)
    • (2005) Journal of Modern Optics , vol.52 , Issue.5 , pp. 691-705
    • Makarov, V.1    Hjelme, D.R.2
  • 45
    • 33646373811 scopus 로고    scopus 로고
    • Trojan-horse attacks on quantum-key-distribution systems
    • N. Gisin, S. Fasel, B. Kraus, H. Zbinden, and G. Ribordy, " Trojan-horse attacks on quantum-key-distribution systems," Phys. Rev. A 73(2), 022320 (2006).
    • (2006) Phys. Rev. A , vol.73 , Issue.2 , pp. 022320
    • Gisin, N.1    Fasel, S.2    Kraus, B.3    Zbinden, H.4    Ribordy, G.5
  • 46
    • 33846365694 scopus 로고    scopus 로고
    • Effects of detector efficiency mismatch on security of quantum cryptosystems
    • V. Makarov, A. Anisimov, and J. Skaar, " Effects of detector efficiency mismatch on security of quantum cryptosystems," Phys. Rev. A 74(2), 022313 (2006).
    • (2006) Phys. Rev. A , vol.74 , Issue.2 , pp. 022313
    • Makarov, V.1    Anisimov, A.2    Skaar, J.3
  • 47
    • 34547403333 scopus 로고    scopus 로고
    • Breaking a quantum key distribution system through a timing side channel
    • DOI 10.1364/OE.15.009388
    • A. Lamas-Linares and C. Kurtsiefer, " Breaking a quantum key distribution system through a timing side channel," Opt. Express 15(15), 9388-9393 (2007). (Pubitemid 47171708)
    • (2007) Optics Express , vol.15 , Issue.15 , pp. 9388-9393
    • Lamas-Linares, A.1    Kurtsiefer, C.2
  • 48
    • 33846202211 scopus 로고    scopus 로고
    • Time-shift attack in practical quantum crypto-systems
    • B. Qi, C.-H. F. Fung, H.-K. Lo, and X. Ma, " Time-shift attack in practical quantum crypto-systems," Quantum Inf. Comput. 7, 73-82 (2007).
    • (2007) Quantum Inf. Comput. , vol.7 , pp. 73-82
    • Qi, B.1    Fung, C.-H.F.2    Lo, H.-K.3    Ma, X.4
  • 49
    • 33947205243 scopus 로고    scopus 로고
    • Phase-remapping attack in practical quantum key distribution systems
    • C.-H. F. Fung, B. Qi, K. Tamaki, and H.-K. Lo, " Phase-remapping attack in practical quantum key distribution systems," Phys. Rev. A 75(3), 032314 (2007).
    • (2007) Phys. Rev. A , vol.75 , Issue.3 , pp. 032314
    • Fung, C.-H.F.1    Qi, B.2    Tamaki, K.3    Lo, H.-K.4
  • 50
    • 55049100546 scopus 로고    scopus 로고
    • Quantum hacking experimental demonstration of time-shift attack against practical quantum key distribution systems
    • Y. Zhao, C.-H. F. Fung, B. Qi, C. Chen, and H.-K. Lo, " Quantum hacking experimental demonstration of time-shift attack against practical quantum key distribution systems," Phys. Rev. A 78(4), 042333 (2008).
    • (2008) Phys. Rev. A , vol.78 , Issue.4 , pp. 042333
    • Zhao, Y.1    Fung, C.-H.F.2    Qi, B.3    Chen, C.4    Lo, H.-K.5
  • 51
    • 44149085575 scopus 로고    scopus 로고
    • Faked states attack using detector efficiency mismatch on SARG04, phase-time, DPSK, and Ekert protocols
    • V. Makarov and J. Skaar, " Faked states attack using detector efficiency mismatch on SARG04, phase-time, DPSK, and Ekert protocols," Quantum Inf. Comput. 8, 0622-0635 (2008).
    • (2008) Quantum Inf. Comput. , vol.8 , pp. 0622-0635
    • Makarov, V.1    Skaar, J.2
  • 52
    • 67650091527 scopus 로고    scopus 로고
    • Information leakage via side channels in freespace BB84 quantum cryptography
    • S. Nauerth, M. Fürst, T. Schmitt-Manderbach, H. Weier, and H. Weinfurter, " Information leakage via side channels in freespace BB84 quantum cryptography," N. J. Phys. 11(6), 065001 (2009).
    • (2009) N. J. Phys. , vol.11 , Issue.6 , pp. 065001
    • Nauerth, S.1    Fürst, M.2    Schmitt-Manderbach, T.3    Weier, H.4    Weinfurter, H.5
  • 53
    • 77957566438 scopus 로고    scopus 로고
    • Hacking commercial quantum cryptography systems by tailored bright illumination
    • L. Lydersen, C. Wiechers, C. Wittmann, D. Elser, J. Skaar, and V. Makarov, " Hacking commercial quantum cryptography systems by tailored bright illumination," Nat. Photonics 4(10), 686-689 (2010).
    • (2010) Nat. Photonics , vol.4 , Issue.10 , pp. 686-689
    • Lydersen, L.1    Wiechers, C.2    Wittmann, C.3    Elser, D.4    Skaar, J.5    Makarov, V.6
  • 54
    • 78650161554 scopus 로고    scopus 로고
    • Experimental demonstration of phase-remapping attack in a practical quantum key distribution system
    • F. Xu, B. Qi, and H.-K. Lo, " Experimental demonstration of phase-remapping attack in a practical quantum key distribution system," N. J. Phys. 12(11), 113026 (2010).
    • (2010) N. J. Phys. , vol.12 , Issue.11 , pp. 113026
    • Xu, F.1    Qi, B.2    Lo, H.-K.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.