WO2003007543A1 - Dispositif et procede d'affinage de donnees partagees - Google Patents
Dispositif et procede d'affinage de donnees partagees Download PDFInfo
- Publication number
- WO2003007543A1 WO2003007543A1 PCT/JP2002/006961 JP0206961W WO03007543A1 WO 2003007543 A1 WO2003007543 A1 WO 2003007543A1 JP 0206961 W JP0206961 W JP 0206961W WO 03007543 A1 WO03007543 A1 WO 03007543A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- block
- data
- refining
- purification
- rule
- Prior art date
Links
- 238000007670 refining Methods 0.000 title claims abstract description 138
- 238000000034 method Methods 0.000 title claims description 43
- 238000013019 agitation Methods 0.000 claims abstract description 35
- 238000000746 purification Methods 0.000 claims description 141
- 238000012937 correction Methods 0.000 claims description 99
- 238000003756 stirring Methods 0.000 claims description 73
- 238000004891 communication Methods 0.000 claims description 57
- 238000012545 processing Methods 0.000 claims description 52
- 230000005540 biological transmission Effects 0.000 claims description 37
- 238000013500 data storage Methods 0.000 claims description 36
- 238000002156 mixing Methods 0.000 claims description 20
- 230000008569 process Effects 0.000 claims description 15
- 238000003860 storage Methods 0.000 claims description 5
- 230000000694 effects Effects 0.000 abstract description 26
- OKUGPJPKMAEJOE-UHFFFAOYSA-N S-propyl dipropylcarbamothioate Chemical compound CCCSC(=O)N(CCC)CCC OKUGPJPKMAEJOE-UHFFFAOYSA-N 0.000 abstract description 12
- 230000003321 amplification Effects 0.000 abstract description 11
- 238000003199 nucleic acid amplification method Methods 0.000 abstract description 11
- 230000006870 function Effects 0.000 description 29
- 238000010586 diagram Methods 0.000 description 20
- 238000012795 verification Methods 0.000 description 20
- 238000007796 conventional method Methods 0.000 description 4
- 238000002474 experimental method Methods 0.000 description 4
- 238000010276 construction Methods 0.000 description 2
- 238000004519 manufacturing process Methods 0.000 description 2
- 229910001369 Brass Inorganic materials 0.000 description 1
- 101800004937 Protein C Proteins 0.000 description 1
- 102100036546 Salivary acidic proline-rich phosphoprotein 1/2 Human genes 0.000 description 1
- 101800001700 Saposin-D Proteins 0.000 description 1
- 239000010951 brass Substances 0.000 description 1
- 238000006243 chemical reaction Methods 0.000 description 1
- 238000013524 data verification Methods 0.000 description 1
- 238000012899 de-mixing Methods 0.000 description 1
- 238000009826 distribution Methods 0.000 description 1
- 230000008571 general function Effects 0.000 description 1
- 239000000203 mixture Substances 0.000 description 1
- 229960000856 protein c Drugs 0.000 description 1
- 238000010079 rubber tapping Methods 0.000 description 1
- 238000000926 separation method Methods 0.000 description 1
- 238000012360 testing method Methods 0.000 description 1
- VLCQZHSMCYCDJL-UHFFFAOYSA-N tribenuron methyl Chemical compound COC(=O)C1=CC=CC=C1S(=O)(=O)NC(=O)N(C)C1=NC(C)=NC(OC)=N1 VLCQZHSMCYCDJL-UHFFFAOYSA-N 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0852—Quantum cryptography
- H04L9/0858—Details about key distillation or coding, e.g. reconciliation, error correction, privacy amplification, polarisation coding or phase coding
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/34—Encoding or coding, e.g. Huffman coding or error correction
Definitions
- the present invention relates to a shared data refining apparatus and a shared data refining method for refining an error-free shared data from a shared data containing an error in communication using quantum cryptography or the like. . Background art.
- the principle of the error correction method is simple. First, assume that there is shared data between the sender and the receiver that contains some errors. This is divided into several blocks, and one block of parity is compared for each block. Since a public line is used at this time, it is generally assumed that the parity information is leaked to an eavesdropper. Therefore, the amount of information leaked theoretically, in this case 1 bit, but in order to match the balance, 1 bit of the currently held rough shared data is discarded later. Blocks with matching parity then stop processing for the time being. Blocks with mismatching parity are further divided into two blocks and similar parity check is performed. Two branches are performed until an erroneous bit is detected. The search is repeated, and finally the erroneous video ⁇ Modify the note.
- one bit of the brass is discarded by the number of parity bits used in the two-branch search, and the remaining bits are used as candidates for shared information.
- the candidate is that if there is an even number of errors in the same block, the noise will match and cannot be detected.To eliminate such a case, replace the bits of the shared data appropriately. By repeating the same process several times from the beginning, erroneous bits can be reliably removed. Even if the above-described error correction is performed by the privacy amplification method, even if the number is very small, there is a possibility that there is a bit that is not detected as an error even if an eavesdropper accidentally eavesdrops. For the purpose of removing the possibility of eavesdropping, the sender and receiver take a hash of the shared information and use the hash value as the final shared data to perform processing to further enhance security. This is called the privacy amplification method.
- Z_2 represents Z 2
- 2 n denotes the 2 to the power n.
- the inverse image of f ⁇ ⁇ -l ⁇ (y) is defined to have 2 ⁇ ⁇ - m ⁇ elements.
- x_ ⁇ 1 ⁇ represents xtl
- c-1 represents.
- 2 to ⁇ —m ⁇ means 2-m.
- f is applied to reduce the bit length from n bits to m bits.
- t is considered to be the maximum number of bits that can be eavesdropped by Eve in quantum communication due to errors. For this reason, the value of t should be determined by the error rate.
- n is determined so that m becomes sufficiently large, t is determined from the error rate, a t-resilient function is constructed, and a communication protocol is designed, the initial key exchange can be performed. Even if some bits are leaked to an eavesdropper, using the t-resilient function provides complete security (intuitively, if m is a security parameter, the eavesdropper will be (The probability of estimating the key is exactly ⁇ ⁇ -m ⁇ ).
- the construction method of the t-resilient function may be known to eavesdroppers. That is, the t-resilient function is public information.
- the t-resilient function was applied to increase the security.However, the construction method of the t-resilient function does not exist in all cases. There was a problem that it depended on the output bit length and security parameters.
- the present invention has been made in order to solve the above-described problems, and can cope with all the above cases using a general function such as SHA-1 instead of the t-resilient function.
- the aim is to get the scheme.
- all security during data transmission and reception can be reduced to the security of the Vernam cipher, and a method with higher information-theoretic security is obtained.
- the porpose is to do. Disclosure of the invention
- the transmitter agitates the refining block by the hamming distance amplifying effect, it is subjected to Vernam-encryption in a disposable manner and then transmitted to the receiver.
- the transmitter and the receiver each divide the temporary shared data into a refining block and a disposable block, and the refining data is used to amplify the Hamming distance.
- the hamming distance is further extended.
- FIG. 1 is a diagram showing a shared data refining system according to Embodiment 1 of the present invention.
- FIG. 2 is a block diagram showing the data processing means Y according to Embodiment 1 of the present invention.
- FIG. 3 is a flowchart showing an operation of the shared data refining system according to the first embodiment of the present invention.
- FIG. 4A is a diagram in which temporary shared data X in Embodiment 1 of the present invention is divided into refinement data and disposable data.
- FIG. 4B is a diagram in which temporary shared data Y in Embodiment 1 of the present invention is divided into refinement data and disposable data.
- FIG. 5 is a diagram of experimental results showing the stirring performance of the hash function SHA-1.
- FIG. 6 is a flowchart showing the operation of the shared data refining system according to Embodiment 2 of the present invention.
- FIG. 7 is a flowchart showing an operation of the shared data refining system according to Embodiment 3 of the present invention.
- FIG. 8A is a diagram for explaining a procedure for generating a Banam cipher X from a refining block according to Embodiment 3 of the present invention.
- FIG. 8B is a diagram for explaining a procedure for generating a binary code Y from a refining block according to Embodiment 3 of the present invention.
- FIG. 9 is a diagram illustrating estimation of an error position according to Embodiment 3 of the present invention.
- FIG. 10 is a flowchart showing the operation of the shared data refining system according to Embodiment 4 of the present invention.
- FIG. 11 is a flowchart showing the operation of the shared data overnight refining system according to the fifth embodiment of the present invention.
- FIG. 12A is a diagram in which temporary shared data X in Embodiment 5 of the present invention is divided into refinement data.
- FIG. 12 ⁇ is a diagram in which temporary shared data ⁇ ⁇ ⁇ ⁇ in Embodiment 5 of the present invention is divided into refinement data.
- FIG. 13 is a diagram showing a shared data overnight purification system according to Embodiment 6 of the present invention.
- FIG. 14 is a flowchart showing the operation of the shared data refining system according to the sixth embodiment of the present invention.
- FIG. 1 is a diagram showing a shared data refining system according to this embodiment
- FIG. 2 is a block diagram of data processing means of the shared data refining system
- FIG. 3 is a flowchart showing the operation of the shared data refining system
- FIG. 4 Figures A and B are diagrams that divide the temporary shared data X and Y into data for purification and data for disposable data.
- 1 is a transmitter
- 2 is a receiver
- 3 is a quantum communication line connecting the transmitter 1 and the receiver
- 4 is a public communication line connecting the transmitter 1 and the receiver 2.
- reference numeral 11 denotes a communication means X included in the transmitter 1 and is connected to a communication means Y 21 included in the receiver 2.
- the communication means X 11 and the communication means Y 21 each include both quantum communication means and public communication means.
- an error correction code such as the Reed-Solomon method is added by the communication means X 11 and the communication means Y 21 so that even if an error occurs, it is corrected.
- 1 2, 2 2 are included in the transmitter 1 and the receiver 2, respectively, and are data processing means X and data processing means Y including a CPU, a RAM, etc., and 1 3, 2 3 are transmitters 1, 2, respectively.
- the data storage means X and the data storage means Y are included in the receiver 2 and include a volatile memory such as a RAM or a nonvolatile memory such as a flash memory or a fixed disk.
- 2 2 1 is a block generating means
- 2 2 2 is a means for de-mixing
- 2 2 3 is a decoded block generating means
- 2 2 4 is an identity determining means
- 2 2 5 is an error correcting means.
- Receiver 2 is a shared data refining device.
- step 101 the transmission data stored in the data storage means X 13 of the transmitter 1 is transmitted to the receiver 2 by the communication means X 11 via the quantum communication line 3 via the quantum communication line 3. Sent by communication.
- the receiver 2 receives this data by the communication means Y 21 and stores it in the data storage means Y 23.
- the transmitter 1 and the receiver 2 share the data for transmission, but the shared data may be transmitted due to an error occurring during the transmission from the transmitter 1 to the receiver 2 or an eavesdropping by a third party. They may not be exactly the same. This is expressed as “temporary sharing” in FIG.
- the transmission data stored in the data storage means X 13 is referred to as the temporary shared data X
- the data stored in the data storage means Y 23 is referred to as the temporary shared data Y.
- the temporary shared data X and the temporary shared data Y temporarily shared in step 101 are transmitted by the transmitter 1 and the receiver 2 by steps 102 and 110, respectively, as shown in FIGS. 4A and 4B.
- the data is divided into A x and A y for purification and B x and B y for disposable data for generating the Burnham II.
- Fig. 4A is a diagram showing the division of the temporary shared data X.
- 301 is the temporary shared data X
- 302 is the purification data A x
- 303 is the disposable data B.
- x and 304 represent the remainder.
- Fig. 4B is a diagram showing the division of the temporary shared data Y.
- reference numeral 305 denotes the temporary shared data Y
- reference numeral 30 denotes the data for purification Ay
- reference numeral 30 denotes the disposable data.
- 308 indicates a remainder.
- the temporary shared data X is divided by the data processing means X12
- the temporary shared data Y is divided by the data processing means Y22 (block generation means).
- the temporary shared data ⁇ is divided into ⁇ purification blocks A yr having the same number of bits ⁇ and n disposable blocks B yr having the same number of bits Q.
- the purification block AX r and the disposable block BX r are in the data processing means X12: RAM, the purification block A yr and the disposable block B yr are in the data processing means Y 22 : Stored in AM, but may be stored in data storage means X 13 and data storage means Y 23 respectively.
- Division is performed according to such a predetermined division rule.
- the error rate between Ax r and Ay r, and the disposable blocks Bx r and Byr, for each of the purifying proxies with the same value of r depends on the quality of the quantum communication line 3, but is about 1%. I do.
- step 103 and step 111 the transmitter 1 and the receiver 2 agitate the purification blocks Axr and Ayr, respectively, using a Hamming distance amplification effect such as a hash function (a rule of overnight mixing). After stirring, it is converted into blocks CXr and Cyr. The sizes of the blocks C Xr and C yr after stirring are each Q bits. This conversion is performed by the data processing means X12 and the data processing means Y22 (data stirring means).
- Hamming distance is the number of unmatched bits of two digital data It is.
- the Hamming distance amplifying effect uses the Hamming distance increasing function F defined by (a) and (b) below or the exclusive-OR entropy increasing function.
- the meaning of performing this processing is as follows. In other words, even if the Hamming distance amplifying effect is applied to exactly the same data, the mapped destination has the same value, but even one bit of different data is mapped due to the Hamming distance amplifying effect. The destination is a completely different day. In other words, it is considered that the data with the Hamming distance of 1 bit is expanded to the Hamming distance of about half of the data size. This is one of the points of the present invention.
- the purification block Axr is the second purification block
- the purification block Ayr is the first purification block
- the disposable block BXr is the second disposable block
- the disposable block Byr is the first disposable block.
- the block CXr is the second stirring block
- the stirring block Cyr is the first stirring block.
- the transmitter 1 performs data processing in step 104.
- the exclusive logic of the disposable block CXr and the disposable block BXr after the stirring is used as a random number sequence with the disposable block BXr having the same size as the mapped (mixed) post-mixed block Cxr.
- the sum (XOR) is obtained, and the result is sent to the receiver 2 through the public communication line 4 from the communication means X 11 as a transmission block Dr. That is, it is sent as the Burnham cipher.
- the size of the transmission block Dr is Q bits.
- the Burnham cipher is a cryptography whose security is proved theoretically by information theory when the bit sequence to be sent and the random number sequence taking XOR are the same length.In this case, the random number sequence must be used only once. Can not.
- the transmission block Dr is an encryption block.
- the receiver 2 When the receiver 2 receives the transmission block Dr by the communication means Y 21, the receiver 2 first uses the data processing means Y 22 (decryption block generation means and identity determination means) in step 112 to transmit the transmission block Dr first. Take the XOR of Dr and the disposable block Byr> use the result as the verification block Er, and compare this verification block Er with the block Cyr after stirring.
- the data processing means Y 22 decryption block generation means and identity determination means
- the disposable blocks B Xr and By r are not exactly the same, and may contain an error of about one percent.
- the verification block E r is a decryption block, and the decryption rule is to take the XOR of the transmission block Dr and the disposable block B yr.
- Figure 5 shows the experimental results showing the performance of the hash function "SHA-1" to stir the data overnight.
- the input bit length was fixed at 512 bits.
- the histogram shows how much the output of the two data sets, which differ by one bit out of 512 bits, is separated by a Hamming distance as a histogram of 10000000 samples.
- the vertical axis is normalized by dividing the frequency by the total number of samples. Therefore, the appearance probability of Hamming distance 80 is slightly more than 6%.
- the mean (m) was 79.999550 and the standard deviation (b) was 6.327267.
- the initial Hamming distance was changed to 2 and the number of input bits was changed to 256. Almost the same as the average about 80, standard deviation It showed a normal distribution of about 6.3.
- the variance is small, and it is found that it is concentrated around 80 out of 160 bits in total. In general, how much the security margin is set as the confidence interval is determined by the user.
- 6xcr 38, which would be generally accepted, is used as the width of the confidence interval.
- the hash function SHA-1 is used when the Hamming distance between the refinement blocks Axr and Ayr is 1 or more and is sufficiently smaller than the number of bits 1Z2 of the refinement blocks AXr and Ayr (for example, 1 / 100 or less), the mixture is stirred so that the Hamming distance between the blocks CXr and Cyr after the stirring is longer than the Hamming distance between the purification blocks AXr and Ayr.
- the number of bits for the purification blocks AXr and Ayr is LA
- the Hamming distance is HA
- the number of bits for the blocks CXr and Cyr after stirring is LC
- the Hamming distance is HC.
- the Hamming distance ratio before mixing is HA / LA
- the Hamming distance ratio after stirring is HC / LC
- the Hamming distance ratio before stirring exceeds 0 and is sufficiently smaller than 0.5 (for example, 0.01 or less)
- the Hamming distance ratio is larger than the Hamming distance ratio before stirring, for example, 0.5 ⁇ 0.25 if the confidence interval is six. 38/160 is approximately 0 ⁇ 25.
- the error between disposable blocks Bxr and Byr about 1%
- step 112 if the Hamming distance between the verification block Er and the stirred block Cyr is 40 or less, the stirred blocks CXr and Cyr * are the same, and therefore the purification is performed. Since the blocks A xr and A yr coincide with each other, they are determined to be “same”. In other words, if the physical error rate is less than 25%, it is determined to be the same.
- the “predetermined value” of the Hamming distance in step 112 in FIG. 3 is 40.
- the receiver 2 If it is determined that they are the same in Steps 1 and 2, the receiver 2 notifies the transmitter 1 from the communication means Y 2 1 to the transmitter 1 through the public communication line 4 (Step 1 13), and The receiver 2 stores the refining block A yr at a position corresponding to the value of r in the purified data storage area (not shown) in the data storage means Y 23 (step 114), The operation related to this block is terminated (step 1 15).
- the transmitter 1 receives the judgment result sent from the receiver 2 by the communication means X 11, identifies the judgment result by the data processing means X 12 (step 105), and determines whether the result is “same”. If this is the case, the operation for this block ends (step 106).
- the same purification data blocks A xr and A yr are stored in the data storage means X 13 and the data storage means Y 23, respectively, and are completely shared by the transmitter 1 and the receiver 2. “Perfect sharing” means that transmitter 1 and receiver 2 hold exactly the same data.
- the data processing means X 1 2 and the data processing means Y 22 2 were able to completely share the purification block, that is, what are the values of r of the purification blocks AX r and A yr that could be completely shared. Are stored in the “completed block numbering. Evening” (not shown) owned by each in the order in which complete sharing is completed.
- the purification blocks that have been completely shared are counted, and when the number of completed purification blocks reaches n, the complete sharing of all the purification blocks is completed. As a result, the purification data Ax and A It is determined that y has been completely shared.
- Step 1 1 6 If it is determined to be “No” in Steps 1 and 2, Receiver 2 notifies transmitter 1 of the difference using communication means Y 21, and transmitter 1 has an error in purification process A xr. Wait for the correction code to be sent (step 1 1 6
- the transmitter 1 receives the judgment result sent from the receiver 2 by the communication means X 11, identifies the judgment result by the data processing means 12 (step 105), and if it is “no”, In step 107, an error correction code Arc (correction information) of the purification block AXr is generated.
- the error correction code Arc is information for matching the purification block Ayr with the purification block Ar.
- the number of check symbols in the Reed-Solomon code that is, the length of the redundant code is twice as large as 42 bytes. Therefore, for a code length of 255 bytes, the information length is 213 bytes, and the redundancy is 42 bytes, that is, a ratio of about 1: 0.2.
- a redundant code with a length of about 20% of the code to be corrected is generated. Then, X0R with a random sequence is sent as a binary code.
- the transmitter 1 further transmits the error correction code Arc to the receiver 2 as the Vernam-cipher by performing an exclusive OR operation with the data (encryption data) having the same length and the same length.
- the data processing means X 12 reads the smallest s of the numbers (values of r) of the other blocks that have already been completely shared from the “completed block number register”, and reads the block number. From the data storage means X 13.
- the block number at this time is stored in the “complete block number register”, and the value of the number of purification blocks for which complete sharing has been completed is incremented.
- the encryption error correction code Communication means Y 21 Received by data processing means ⁇ 22 (Error correction means)
- the smallest (r value) of the other refining protocol numbers (r values) that have already been completely shared. s is read from the above-mentioned “completion block pick-up register”, and the production block A ys of that block number is read from the data storage means Y 23.
- the exclusive OR of the data (decryption data) having the same number of bits as the encryption error correction code received from the head of the purification block Ays and the received encryption error correction code is obtained.
- the error correction code Arc is used to correct the error in the refining block Ayr, and the error-corrected refining block Ayr is stored in the data storage means Y23. Store.
- the data for encryption and the data for decryption are the same data.
- Step 101 is a temporary shared data transmission step
- Step 102 is a second block generation step
- Step 103 is a second stirring block generation step
- Step 10 4 is a decryption block generation step
- Step 1 ⁇ 5 is a second identity determination step
- Step 106 is an end step
- Step 107 is a correction information transmission step
- Step 110 is a first block generation step.
- Step 1 1 1 is the first 1 Stirring block generation step
- Steps 1 and 12 are identity determination steps
- Steps 1 13 and 1 14 are first refining block storage steps
- Step 1 16 are determination result transmission steps
- Step 11 7 is the error correction step.
- error correction is performed, so that the same data can be completely shared without discarding many data compared with the conventional method.
- the hash function SHA-1 is used for the Hamming distance amplification effect.
- SHA 1 up 2 64 - generates a bi Uz from Preparative data 160 bi Uz Bok hash value.
- the error rate is extremely small and about 0.01% (this is a value that can be said to be impossible in current quantum cryptography experiments, but we will proceed as an assumption). Then, if there are 10,000 bits, about one error is included.
- the transmitter and the receiver divide the temporary shared data into refining blocks and disposable blocks, respectively.
- Hamming distance Since the separation is expanded, it is easy to identify whether the temporarily shared data is the same or different.
- the transmitter since the transmitter agitates the purification pro- cess by the Hamming distance amplifying effect and then transmits it to the receiver after performing the Vernam-encryption with the disposable data, the danger of data tapping is low. I can do it.
- the temporarily shared data is divided into a plurality of blocks (a pair of a purification block and a disposable block), so that the data of other blocks that have been completely shared can be used.
- the error correction code correction information
- the error correction code can be transmitted, and the security of data concealment is high.
- whether the first purification block and the second purification block are the same or different is determined based on the Hamming distance between the decryption block and the first stirring block, and the reference value for determining the Hamming distance is used. Changing the (predetermined value) has the effect that the judgment reliability can be changed flexibly.
- the Hashing distance Although an example in which the SHA-1 of a number is used has been described, another hash function may be used.
- the “predetermined value” in step 1 1 2 in FIG. 3 was set to 40, but as described in the above experimental results, sufficient reliability can be obtained even with 4 2 (confidence interval 6).
- the predetermined value may be set to 42.
- other values may be used depending on the number of output bits of the hash function and the data mixing characteristics.
- the Hamming distance amplifying effect is not limited to the hash function as long as the data is agitated.
- an encryption function of a common key cryptosystem such as DES or MISTY or a public key cryptosystem such as RSA may be used.
- the present invention is not limited to the quantum cryptography but uses a public line. Communication may be used, and may not be encrypted communication. That is, in step 101, as long as the transmitter 1 transmits data for the purpose of sharing the same data with the receiver 2, the format of the transmission data, the transmission method, and the like are particularly limited. is not.
- the first refining data and the first refining block, the first disposable data — evening and the first disposable block, the second refining data overnight and the second refining block, the second disposable data and the second disposable block Are all the same.
- steps 107 and 117 of the flowchart of FIG. 3 an example is shown in which a part of the purification process is used as the data for encryption and the data for decryption, respectively.
- the blocks whose Hamming distance was 0 in Step 1 1 and 2 are also considered to be completely shared with the disposable blocks B xr and Byr.
- a part of the lock B xr may be used as data for encryption, and a part of the disposable block Byr may be used as data for decryption.
- the receiver 2 compares the verification block Er and the post-agitation block Cyr, and generates and transmits the error correction code of the refining block only when it is determined that the blocks are different from each other. showed that.
- the transmitter 1 generates and transmits an error correction code for all the refining blocks.
- the shared data refining system in this embodiment is the same as in FIG. 1 described in the first embodiment.
- the temporary shared data is divided into data for purification and disposable data as shown in FIG.
- FIG. 6 is a flowchart showing the operation of the shared data refining system in this embodiment.
- the steps denoted by the same reference numerals as those in FIG. 3 perform the same operations as in the first embodiment, and a description thereof will not be repeated.
- ⁇ r.
- step 201 the data processing means X12 of the transmitter 1 generates the error correction code Axrc of the purification block Axr.
- step 202 the smallest t of the numbers (values of r) of the other blocks that have already been completely shared is read from the “completed block number register” described in the first embodiment.
- the block Axt for refining the block number is read from the data storage means X13.
- step 203 of generating the error correction code Axtc of the refining block Axt the data processing means X12 uses the post-agitation process CXr and the disposable CXr as in the first embodiment.
- the exclusive OR (X ⁇ R) of the block BX r is calculated, and the result is set as a transmission block: Dr.
- an exclusive OR of the above error correction codes Axrc and Axtc is calculated, and the result is used as a transmission correction code Gr, which is transmitted by the transmission means X11 to the receiver 2 through the public communication line.
- the data processing means X 1.2 stores the block number at this time in the “complete block number register”, and increments the value of the number of purification blocks that have been completely shared.
- the receiver 2 When the receiver 2 receives the transmission block Dr and the transmission correction code Gr by the communication means Y 21, the receiver 2 executes the data processing means Y 22 (decoding block generation means, identity determination means) in step 112. ), The transmitting block D r XOR of the disposable block Byr and the disposable block Byr is used as the verification block Er, and the verification block Er and the stirred block Cyr are compared. '
- Step 112 if the Hamming distance between the verification block Er and the agitated program Cyr is equal to or less than a predetermined value (40), the agitated programs Cxr and Cyr are Since the purification blocks Ax r and Ay r are the same, they are determined to be “same”.
- the receiver 2 corresponds to the value of r in the purified data storage area (not shown) in the data storage means Y 23 with the purification block A y r ′. Is stored (step 114), and the operation related to the block is terminated (step 115). As a result, the purification processes Axr and Ayr, which are the same data, are stored in the data storage means X13 and the data storage means Y23, respectively, and are completely shared by the transmitter 1 and the receiver 2. Is done.
- the data processing means Y22 stores the block number at this time in the "completed block number register", and increments the value of the number of purification blocks that have been completely shared.
- step 1 12 If it is determined to be “No” in step 1 12, the data processing means Y 22 (error correction means) of the receiver 2 has the number (value of r) of the other blocks that have already been completely shared. The smallest t is read from the “completed block number register”, and the purification block Ay t of that block number is read from the data storage means Y 23. And this purification block Ayt An error correction code Ay tc is generated (step 211).
- the data processing means Y 22 obtains the exclusive OR Hr of the transmission correction code Gr and the error correction code Aytc (step 21).
- Axtc and Aytc are identical because they were generated from the refining blocks Axt and Ayt of block number t that were completely shared in step 222 and step 211, respectively. Therefore,
- H r is an error correction code of the purification block Ax rc.
- the data processing means Y22 uses this Hr to correct the error in the purification data Ayr containing the error, and stores the corrected Ayr in the data storage means Y23 (step 21). 3). Also, the block number at this time is stored in the “complete block number register”, the value of the number of purification blocks for which complete sharing has been completed is incremented, and the processing for this block number is completed (step 2 14). .
- step 201 is the step of generating the second correction information
- step 202 is the step of generating the second shared correction information
- step 203 is the correction information encryption step and the correction information transmission step
- Step 211 is the first shared correction information generation step
- Step 212 is the correction information decoding step
- Step 213 is the error correction step.
- the transmitter 1 since the transmitter 1 also transmits the transmission correction code Gr along with the transmission block D r, there is no need for the receiver 2 to respond to the transmitter 1.
- the effect is that mutual communication is completed once and the amount of communication is reduced.
- the receiver 2 compares the verification block Er with the block C yr after stirring, and when it is determined that the blocks are different, the transmitter 1 generates an error correction code of the purification block.
- the example of sending by sending was shown.
- the transmitter 1 converts and transmits the purification block A xr, and the receiver 2 also converts the purification block A yr. Then, an example of estimating the bit position where an error has occurred is shown.
- FIG. 7 is a flowchart showing the operation of the shared data refining system in this embodiment.
- the steps denoted by the same reference numerals as those in FIG. 3 perform the same operations as in the first embodiment, and thus the description thereof will be omitted.
- the transmitter 1 receives the judgment result sent from the receiver 2 by the communication means X 11, identifies the judgment result by the data processing means X 12 (step 105), If so, in step 607, as shown in Fig. 8A, the purification protocol Axr is divided into two equal parts to generate the first half and the second half of Axr. An exclusive OR of the corresponding bits of each part is used to generate a Vernam cipher X. The Vernam cipher X is transmitted to the receiver 2 by the communication means XI1.
- the receiver 2 receives the Vernam cipher X through the communication means Y 21 and divides the refining block A yr into two equal parts as shown in FIG. 8B to separate the former half and the latter half of A yr. Then, the exclusive OR of the corresponding bits in the first half and the second half is used to generate the Vernam cipher Y.
- This personal signal Y is not transmitted to the outside of the receiver 2, but is referred to as “encryption” for convenience.
- step 105 and step 112 are performed. Since the judgment result is "No", the bannum cipher X and the bannum cipher Y do not match. Then, from the positions of the bits where the Burnham cipher X and the Burnham cipher Y do not match, it is possible to estimate which position of the refining block Ayr is different from the refining block Axr.
- verification data is generated by taking the exclusive OR of the Vernam cipher X and the Vernam cipher Y, and the position where "1" appears in the verification data is From the first bit of the refining block A yr from the front of the first half or b from the front of the second half. It can be inferred that any one of the first bits is incorrect, inverting the bit at the same position in the purification process Axr.
- the receiver 2 generates the Vernam-cipher Y and estimates the error position as described above.
- the receiver 2 inverts one of the bits at the position estimated to be erroneous in the purification block A yr by the data processing means Y 22 (error correction means) to convert the provisional purification procedure A yr 2 This is agitated by the same Hamming distance amplifying effect as in step 111, and tentatively agitated to produce block Cyr2 (step 618).
- the block ⁇ 2 after the tentative stirring is compared with the verification block Er obtained in step 1 12 to confirm whether the Hamming distance is equal to or less than a predetermined value (40 in this embodiment). . If the Hamming distance is equal to or less than a predetermined value, the block A yr 2 for provisional purification can be regarded as being identical to the block A xr for purification, and the block A yr 2 for provisional purification is stored in the data storage means Y 2 3 Is stored at the position corresponding to the value of r in the storage area for refined data.
- the bit at the other position of the purification block A yr that is estimated to be incorrect is inverted.
- Pre-purification process A yr2 or if there are multiple positions that were presumed to be erroneous, then flip those bits at the same time.
- the bits of all combinations at the set positions are inverted, and the tentative stirring is repeated until the Hamming distance between the block C yr and the verification block Er becomes a predetermined value or less.
- the temporary purification block A yr 2 at that time is deleted.
- Overnight storage means Stores the refined data storage area of Y23 at the position corresponding to the value of r (step 619), and ends the processing for this block number (step 118).
- Step 607 is a correction information transmission step
- Steps 617 to 618 are error correction steps.
- the receiver can estimate and correct the position of the error only from the already transmitted refining block, so that the transmitted data can be effectively used. It has the effect that it can be used.
- the transmitter 1 converts the refining block AXr and transmits it when the receiver 2 determines “no”, but in the fourth embodiment, An example is shown in which the machine 1 converts and transmits all the purification blocks.
- the shared data refining system in this embodiment is the same as in FIG. 1 described in the first embodiment. Further, the temporary shared data is divided into refinement data and disposable data as shown in FIG. 4, as in the first embodiment.
- FIG. 10 is a flowchart showing the operation of the shared data refining system according to this embodiment.
- steps denoted by the same reference numerals as those in FIGS. 3 and 7 perform the same operations as those in the first and third embodiments. The explanation is omitted here.
- the processing is performed. In other words, the same process proceeds in parallel n times.
- the transmitter 1 divides the purification block A xr into two equal parts to generate the first half and the second half of A xr in step 901, and generates the first half and the second half of the first half.
- the exclusive OR of the corresponding bits is used to generate the binary code X.
- Step 902 a disposable block having the same size as the block CXr after stirring as in Step 104 of Embodiment 1 and FIG. 3; BXr as a random number sequence and a disposable block CXr after stirring.
- the transmitter 1 since the transmitter 1 also transmits the Vernam cipher X along with the transmission block Dr, it is not necessary for the receiver 2 to respond to the transmitter 1 and the communication between the receivers 1 It is completed in one round, and the effect is that the communication volume is reduced.
- the receiver can estimate and correct the position of the error only from the transmitted refining block, so that the transmitted data can be effectively used. Has the effect of being possible
- Embodiment 5 Since the transmitter and the receiver do not need to calculate the error correction code or transmit and receive the error correction code, the processing for error correction is simplified. This has the effect. Embodiment 5
- Embodiment 1 shows an example in which the transmitter 1 converts the block CXr after the stirring into the block for transmission Dr and transmits the same to the receiver 2 in this embodiment.
- An example of transmitting the block CX r to the receiver 2 is shown.
- the shared data overnight purification system of this embodiment is the same as in FIG.
- the operation of the shared data refining system according to this embodiment is as shown in the flowchart of FIG.
- FIGS. 12A and 12B are diagrams in which the temporary shared data X and Y are respectively divided into refinement data in this embodiment.
- 310 and 311 indicate the remainder, and the size is /? Bit.
- Elements common to FIGS. 4A and 4B are denoted by the same reference numerals, and description thereof will be omitted.
- the temporary shared data X and the temporary shared data Y temporarily shared in step 101, and the transmitter 1 and the receiver 2 respectively perform steps 901 and 911, as shown in Figs. 12A and 12B. It is divided into n purification blocks Axr and Ar (r l ⁇ ; ⁇ ) having the same number of bits P as B.
- the above purification block AXr is stored in RAM in the data processing means X12
- the production block Ayr is stored in the RAM in the data processing means Y22, but may be stored in the data storage means X13 and the data storage means Y23, respectively.
- the error rate between A x r and A y r of each of the purifying blocks having the same value of r depends on the quality of the quantum communication line 3, but is generally about 1%.
- step 902 the transmitter 1 sends the post-agitation block C Xr from the communication means X 11 to the receiver 2 via the public communication line 4.
- the receiver 2 When the receiver 2 receives the post-mixing block CXr by the communication unit Y21, the receiver 2 uses the data processing unit Y22 in step 912 to set the post-mixing block. Compare with C yr.
- the transmitter 1 transmits the post-mixing data CXr without performing a personal encryption
- the receiver 2 transmits the post-mixing data Cxr without any processing to the received post-mixing data Cxr. Since this is compared with C yr, there is an effect that the processing is simplified.
- receiver 2 describes an example of separately acquiring temporary shared data and verifying whether receiver 2 has the same shared data as transmitter 1.
- FIG. 13 is a diagram showing a shared data refining system in this embodiment
- FIG. 14 is a flowchart showing the operation of the shared data refining system.
- the components or steps denoted by the same reference numerals as in FIGS. 1 and 3 described in Embodiment 1 in FIGS. 13 and 14 perform the same operations as those in Embodiment 1 and will be described in detail. Detailed description is omitted.
- FIG. 13 is a diagram in which the quantum communication line 3 is deleted from the diagram of the shared data purification system according to the first embodiment shown in FIG. 1, and the other configuration is the same as FIG.
- step 1001 and step 1002 the transmitter 1 and the receiver 2 respectively acquire the temporary shared data X and the temporary shared data.
- a data supply device (not shown), and the same data is supplied from the data supply device to the transmitter 1 as the temporary shared data X, stored in the data storage means X 13, and is temporarily stored in the receiver 2. It shall be supplied as ⁇ and stored in data storage means ⁇ .
- the temporary shared data X and the temporary shared data ⁇ ⁇ may not be completely the same due to an error occurring during transmission from the data supply device, and are therefore referred to as “temporary shared data”.
- This temporary shared data X is the second temporary shared data in the present invention
- the temporary shared data ⁇ is the first temporary shared data in the present invention.
- the receiver 2 is the shared data refining device of the present invention.
- the transmitter operates in the order of steps 102, 103, 104 in the same manner as in the first embodiment, and transmits the transmission block Dr generated in step 104 to the receiver 2.
- Receiver 2 also operates in the order of steps 110, 111, and 112 in the same manner as in the first embodiment.
- verification procedure Er is generated, and in step 111, it is generated. After stirring, compare with the protein C yr.
- the receiver 2 in step 1 16 determines ⁇ different '' as the determination result through the public communication line. Send to transmitter 1
- the transmitter 1 and the receiver 2 receive the supply of data again from the data supply device, for example, and repeat the above operation until the determination result becomes “same”.
- the receiver 2 If the Hamming distance between the post-agitation block C yr and the verification block E r is less than or equal to the predetermined value in step 1 12, the receiver 2 sends the same result as the judgment result in step 1 13 to the public communication. Transmit to transmitter 1 via the line.
- the determination result is “same”, it means that the transmitter 1 and the receiver 2 share the same data.
- the shared data is used as a key of the common key encryption method to perform encrypted communication.
- the receiver in this embodiment verifies whether or not the temporary shared data temporarily shared with the transmitter is identical, and can be called a shared data verification device or a shared data authentication device. .
- the transmitter and receiver divide the temporary shared data into a refining block and a disposable block, respectively. Since the Hamming distance is expanded by the Hamming distance amplification effect in each case, it is easy to distinguish whether the temporarily shared data is the same or different.
- data other than the temporary shared data is It is transmitted and received via a public network, but is not limited to public communication lines, and may be via a dedicated line or wireless.
- the smallest one of the program numbers that have already been completely shared is selected as the encryption data, but this is not a limitation. Instead, one of the numbers of blocks that have already been completely shared may be selected. In this case, the same numbered block (the number of bits in this block is the same as that of the error correction code) is used on both the transmitting side and the receiving side.
- the shared data refining device and the shared data refining method according to the present invention reduce the risk of eavesdropping when removing errors from data temporarily shared by the transmitter and the receiver, and Suitable for increasing the percentage of valid data.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Electromagnetism (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Detection And Prevention Of Errors In Transmission (AREA)
- Communication Control (AREA)
- Storage Device Security (AREA)
- Error Detection And Correction (AREA)
- Selective Calling Equipment (AREA)
- Numerical Control (AREA)
- Maintenance And Management Of Digital Transmission (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Description
Claims
Priority Applications (8)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR10-2003-7003476A KR100517847B1 (ko) | 2001-07-10 | 2002-07-09 | 공유 데이터 정제 장치 및 공유 데이터 정제 방법 |
CA002421720A CA2421720C (en) | 2001-07-10 | 2002-07-09 | Shared data refining device and shared data refining method |
EP02743887A EP1406412B1 (en) | 2001-07-10 | 2002-07-09 | Shared data refining device and shared data refining method |
DE60218470T DE60218470T2 (de) | 2001-07-10 | 2002-07-09 | Verfeinerungseinrichtung und -verfahren für gemeinsam benutzte daten |
AU2002346319A AU2002346319B2 (en) | 2001-07-10 | 2002-07-09 | Shared data refining device and shared data refining method |
JP2003513183A JP4187105B2 (ja) | 2001-07-10 | 2002-07-09 | 共有データ精製装置及び共有データ精製方法 |
US10/363,266 US7260222B2 (en) | 2001-07-10 | 2002-07-09 | Shared data refining device and shared data refining method |
NO20031056A NO20031056L (no) | 2001-07-10 | 2003-03-07 | Renseapparat for delte data og en rensemetode for delte data |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2001208716 | 2001-07-10 | ||
JP2001-208716 | 2001-07-10 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2003007543A1 true WO2003007543A1 (fr) | 2003-01-23 |
Family
ID=19044484
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2002/006961 WO2003007543A1 (fr) | 2001-07-10 | 2002-07-09 | Dispositif et procede d'affinage de donnees partagees |
Country Status (11)
Country | Link |
---|---|
US (1) | US7260222B2 (ja) |
EP (1) | EP1406412B1 (ja) |
JP (1) | JP4187105B2 (ja) |
KR (1) | KR100517847B1 (ja) |
CN (1) | CN100449992C (ja) |
AT (1) | ATE355674T1 (ja) |
AU (1) | AU2002346319B2 (ja) |
CA (1) | CA2421720C (ja) |
DE (1) | DE60218470T2 (ja) |
NO (1) | NO20031056L (ja) |
WO (1) | WO2003007543A1 (ja) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2005130195A (ja) * | 2003-10-23 | 2005-05-19 | Mitsubishi Electric Corp | 量子暗号通信方法 |
JP2007086170A (ja) * | 2005-09-20 | 2007-04-05 | Nec Corp | 汎用ハッシュ関数族計算装置、方法、プログラム、および共有鍵生成システム |
EP1902931A1 (de) | 2006-09-22 | 2008-03-26 | Audi Ag | Karossiemodul für einen Kraftwagen sowie dessen Befestigungsanordnung |
Families Citing this family (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR100763464B1 (ko) * | 2003-12-16 | 2007-10-04 | 김기호 | 암호화된 통신을 위한 비밀키 교환 방법 |
JP4200909B2 (ja) * | 2004-01-29 | 2008-12-24 | 日本電気株式会社 | 乱数生成共有システム、暗号化通信装置及びそれらに用いる乱数生成共有方法 |
JP3876324B2 (ja) * | 2004-03-31 | 2007-01-31 | 独立行政法人情報通信研究機構 | 乱数列共有システム、乱数列共有装置、暗号復号システム、暗号装置、復号装置、乱数列共有方法、暗号方法、復号方法、ならびに、プログラム |
KR100855958B1 (ko) * | 2004-11-24 | 2008-09-02 | 삼성전자주식회사 | 해밍거리를 이용한 부가 채널 공격에 안전한 암호화시스템 및 방법 |
GB0512229D0 (en) * | 2005-06-16 | 2005-07-27 | Hewlett Packard Development Co | Quantum key distribution apparatus & method |
US8054976B2 (en) * | 2005-06-16 | 2011-11-08 | Keith Alexander Harrison | Quantum key distribution apparatus and method |
US9191198B2 (en) | 2005-06-16 | 2015-11-17 | Hewlett-Packard Development Company, L.P. | Method and device using one-time pad data |
JP5384781B2 (ja) * | 2005-08-18 | 2014-01-08 | 日本電気株式会社 | 秘匿通信システムおよび共有秘密情報の生成方法 |
KR100933166B1 (ko) * | 2007-08-20 | 2009-12-21 | 삼성전자주식회사 | 근거리 네트워크에서 데이터를 공유하기 위한 방법 및 이를 위한 단말기 |
CN102047274B (zh) * | 2008-05-26 | 2014-10-08 | Nxp股份有限公司 | 应答器、读取器和对其所支持的应用进行遮蔽的方法 |
JP6359285B2 (ja) * | 2014-02-17 | 2018-07-18 | 株式会社東芝 | 量子鍵配送装置、量子鍵配送システムおよび量子鍵配送方法 |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH11133854A (ja) * | 1997-10-29 | 1999-05-21 | Oki Electric Ind Co Ltd | データ送信装置、データ受信装置及びデータ伝送システム |
-
2002
- 2002-07-09 EP EP02743887A patent/EP1406412B1/en not_active Expired - Lifetime
- 2002-07-09 CN CNB02802351XA patent/CN100449992C/zh not_active Expired - Fee Related
- 2002-07-09 KR KR10-2003-7003476A patent/KR100517847B1/ko not_active IP Right Cessation
- 2002-07-09 AU AU2002346319A patent/AU2002346319B2/en not_active Ceased
- 2002-07-09 CA CA002421720A patent/CA2421720C/en not_active Expired - Fee Related
- 2002-07-09 WO PCT/JP2002/006961 patent/WO2003007543A1/ja active IP Right Grant
- 2002-07-09 US US10/363,266 patent/US7260222B2/en not_active Expired - Fee Related
- 2002-07-09 JP JP2003513183A patent/JP4187105B2/ja not_active Expired - Fee Related
- 2002-07-09 AT AT02743887T patent/ATE355674T1/de not_active IP Right Cessation
- 2002-07-09 DE DE60218470T patent/DE60218470T2/de not_active Expired - Lifetime
-
2003
- 2003-03-07 NO NO20031056A patent/NO20031056L/no not_active Application Discontinuation
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH11133854A (ja) * | 1997-10-29 | 1999-05-21 | Oki Electric Ind Co Ltd | データ送信装置、データ受信装置及びデータ伝送システム |
Non-Patent Citations (2)
Title |
---|
AKIHIRO YAMAMURA AND HIROKAZU ISHIZUKA: "Error detection and authentication in quantum key distribution", LNCS2119 INFORMATION SECURITY AND PRIVACY, 6 August 2001 (2001-08-06), pages 260 - 273, XP002957601 * |
VALERI KORJIK, GUILLERMO MORALES-LUNA AND VLADIMIR B. BALAKIRSKY: "Privacy amplification theorem for noisy main channel", LNCS2200 INFORMATION SECURITY, 22 October 2001 (2001-10-22), pages 18 - 26, XP002957602 * |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2005130195A (ja) * | 2003-10-23 | 2005-05-19 | Mitsubishi Electric Corp | 量子暗号通信方法 |
JP4509530B2 (ja) * | 2003-10-23 | 2010-07-21 | 三菱電機株式会社 | 量子暗号通信方法 |
JP2007086170A (ja) * | 2005-09-20 | 2007-04-05 | Nec Corp | 汎用ハッシュ関数族計算装置、方法、プログラム、および共有鍵生成システム |
EP1902931A1 (de) | 2006-09-22 | 2008-03-26 | Audi Ag | Karossiemodul für einen Kraftwagen sowie dessen Befestigungsanordnung |
DE102006044799A1 (de) * | 2006-09-22 | 2008-04-03 | Audi Ag | Karosseriemodul für einen Kraftwagen sowie dessen Befestigungsanordnung |
Also Published As
Publication number | Publication date |
---|---|
ATE355674T1 (de) | 2006-03-15 |
JPWO2003007543A1 (ja) | 2004-11-04 |
DE60218470D1 (de) | 2007-04-12 |
CN1465162A (zh) | 2003-12-31 |
EP1406412A4 (en) | 2005-09-21 |
CN100449992C (zh) | 2009-01-07 |
KR20030036769A (ko) | 2003-05-09 |
NO20031056D0 (no) | 2003-03-07 |
US20030188242A1 (en) | 2003-10-02 |
AU2002346319B2 (en) | 2004-04-22 |
DE60218470T2 (de) | 2007-11-29 |
NO20031056L (no) | 2003-05-02 |
JP4187105B2 (ja) | 2008-11-26 |
KR100517847B1 (ko) | 2005-09-30 |
CA2421720A1 (en) | 2003-03-07 |
US7260222B2 (en) | 2007-08-21 |
CA2421720C (en) | 2007-07-03 |
EP1406412A1 (en) | 2004-04-07 |
EP1406412B1 (en) | 2007-02-28 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8332643B2 (en) | Establishing secure mutual trust using an insecure password | |
EP0511420B1 (en) | A cryptographic system based on information difference | |
TWI489847B (zh) | 資料加密方法、資料驗證方法及電子裝置 | |
US20080095360A1 (en) | Signature System and Signature Method | |
KR101092696B1 (ko) | 에러 정정 코드에 기초하는 메시지 인증 코드 | |
US10810495B2 (en) | Methods for data encoding in DNA and genetically modified organism authentication | |
WO2003007543A1 (fr) | Dispositif et procede d'affinage de donnees partagees | |
Micali et al. | Optimal error correction against computationally bounded noise | |
US12034840B2 (en) | Computer implemented system and method for sharing a common secret preliminary class | |
US10333698B2 (en) | Entwined encryption and error correction | |
JP5395051B2 (ja) | レートレス符号によってコード化された内容のための低複雑性暗号化方法 | |
Hemenway et al. | Non-committing encryption from Φ-hiding | |
Mihaljević et al. | An approach for stream ciphers design based on joint computing over random and secret data | |
US11196447B2 (en) | Computer-implemented method for error-correction-encoding and encrypting of a file | |
CN108737075B (zh) | 一种生成共享密钥的方法、装置及系统 | |
JP4231926B2 (ja) | 量子鍵配送方法および通信装置 | |
US20230299949A1 (en) | Key exchange protocol | |
JPWO2004105310A1 (ja) | 暗号化装置、暗号化方法および暗号化プログラム | |
WO2023218575A1 (ja) | 鍵交換システム、拠点装置、qkd装置、方法、及びプログラム | |
WO2023089776A1 (ja) | 通信システム、送信装置、受信装置、並びに、それらの方法およびプログラム | |
RU2686005C1 (ru) | Способ обеспечения передачи зашифрованных данных в цифровой системе передачи данных (варианты) | |
JP2006189607A (ja) | 復号装置とそのプログラム | |
CN118764190A (zh) | 量子不经意传输方法、电子设备和存储介质 | |
Véron | Public key cryptography and coding theory | |
Araki et al. | Efficient Almost Secure 1-Round Message Transmission Schemes for 3t+ 1 Channels |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AU CA CN JP KR MX NO SG US |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR IE IT LU MC NL PT SE SK TR |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2003513183 Country of ref document: JP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2421720 Country of ref document: CA Ref document number: 2002346319 Country of ref document: AU |
|
WWE | Wipo information: entry into national phase |
Ref document number: 1020037003476 Country of ref document: KR |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2002743887 Country of ref document: EP Ref document number: 02802351X Country of ref document: CN |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
WWP | Wipo information: published in national office |
Ref document number: 1020037003476 Country of ref document: KR |
|
WWE | Wipo information: entry into national phase |
Ref document number: 10363266 Country of ref document: US |
|
WWP | Wipo information: published in national office |
Ref document number: 2002743887 Country of ref document: EP |
|
WWG | Wipo information: grant in national office |
Ref document number: 2002346319 Country of ref document: AU |
|
WWG | Wipo information: grant in national office |
Ref document number: 1020037003476 Country of ref document: KR |
|
WWG | Wipo information: grant in national office |
Ref document number: 2002743887 Country of ref document: EP |