WO2004030270A1 - 暗号通信装置 - Google Patents
暗号通信装置 Download PDFInfo
- Publication number
- WO2004030270A1 WO2004030270A1 PCT/JP2002/009950 JP0209950W WO2004030270A1 WO 2004030270 A1 WO2004030270 A1 WO 2004030270A1 JP 0209950 W JP0209950 W JP 0209950W WO 2004030270 A1 WO2004030270 A1 WO 2004030270A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- quantum
- qubit
- unit
- random number
- pseudo
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B10/00—Transmission systems employing electromagnetic waves other than radio-waves, e.g. infrared, visible or ultraviolet light, or employing corpuscular radiation, e.g. quantum communication
- H04B10/70—Photonic quantum communication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/065—Encryption by serially and continuously modifying data stream elements, e.g. stream cipher systems, RC4, SEAL or A5/3
- H04L9/0656—Pseudorandom key sequence combined element-for-element with data sequence, e.g. one-time-pad [OTP] or Vernam's cipher
- H04L9/0662—Pseudorandom key sequence combined element-for-element with data sequence, e.g. one-time-pad [OTP] or Vernam's cipher with particular pseudorandom sequence generator
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0852—Quantum cryptography
- H04L9/0858—Details about key distillation or coding, e.g. reconciliation, error correction, privacy amplification, polarisation coding or phase coding
Definitions
- the present invention relates to a quantum cryptographic communication device and a quantum cryptographic communication method for sharing random number information while maintaining confidentiality by performing eavesdropping detection based on the uncertainty principle of quantum mechanics.
- the overall configuration diagram in Figure 5 is, for example, the quantum cryptography first proposed by Bennett and Brassard in 1984 (Reference 1: CH Bennett and G. Brassard, “Quantum Cryptography: Public Key Distribution and Coin Tossing," in Pro IEEE International Conference on Computers, Systems, and Signal Processing, Bangalore, India, PP175-179, (1984), and Reference 2: CH Bennett, F. Bessette, G. Brassard, and L Salvai 1, “Experimental Quantum Cryptography , "J. Cryptology, pp. 3-28, (1992)).
- a quantum transmitting device 100 is a device that transmits cipher text using quantum cryptography
- a quantum receiving device 200 is a device that receives cipher text using quantum cryptography.
- the quantum cryptographic communication channel 1 is a communication channel for transmitting a cub from the quantum transmitting device 100 to the quantum receiving device 200.
- the classical communication network 2 is a network that connects the quantum transmission device 100 and the quantum reception device 200 and performs communication between the two devices using a communication method that has been conventionally performed.
- the secret shared information 3 and the secret shared information 21 are information that is previously secretly shared between the quantum transmitting apparatus 100 and the quantum receiving apparatus 200.
- the purpose of the quantum signal is to allow the quantum transmitting apparatus 100 and the quantum receiving apparatus 200 to share random information much larger than the secret shared information while maintaining confidentiality.
- the qubit generation means 4 includes a qubit
- the random number generation means 5 outputs a first random number bit.
- the random number generation means 6 outputs a second random number bit.
- the quantum encoding unit X7 performs quantum encoding on the qubit generated by the qubit generation unit 4 according to the first random number bit output from the random number generation unit 5.
- the quantum coding rule is shown below.
- the X transformation in the above rule is a bit flip transformation, which corresponds to the X component of the Pauli matrix.
- the quantum modulator H8 quantum-modulates the qubit that has been quantum-encoded by the quantum encoder X7 according to the second random number bit output from the random number generator 6.
- the modulation rule is shown below.
- the ⁇ transformation on the above rule is a Hadamard transformation, which corresponds to the basis transformation.
- a protocol for transmitting a qubit using two conjugate + bases and an X base is referred to as a 84 protocol.
- the two conjugate + bases and X base will be described later.
- the above three base transforms are selected for a second random number having three values of 0, 1, and 2.
- the basis exchange means 9 performs classical communication with the quantum receiver 200 for the first random number output by the random number generation means 5, and extracts random shared information.
- the error correction means 10 performs classical communication with the quantum receiving apparatus 200 via the classical communication network 2 with respect to the random shared information output by the base exchange means 9, and performs error correction.
- the old communication means with authentication 11 is provided so that the base exchange means 9 and the error correction means 10 perform classical communication with the quantum receiver 200.
- secret sharing information 3 is used for authentication by means of the classical communication means with authentication 11.
- the confidentiality enhancing means 12 enhances the confidentiality of the error-corrected random shared information output from the error correcting means 10.
- the eavesdropping detection means 13 determines the presence or absence of eavesdropping from the additional information output by the error correction means 10.
- the secret key 14 is a key output from the confidentiality enhancing means 12 and shared with the quantum receiving apparatus 200 while maintaining confidentiality with the quantum receiving apparatus 200.
- the random number generation means 22 outputs a third random number bit.
- the quantum demodulator H 23 performs quantum demodulation on the cubic transmitted through the quantum cryptographic communication channel 1 according to the third random number bit output from the random number generator 22.
- the demodulation rule is shown below.
- the quantum measuring means 24 performs a quantum measurement on the qubit that has undergone quantum demodulation.
- the measurement result is
- polarization state of a photon when using the polarization state of a photon as a qubit, it can be easily realized by using a polarization beam splitter and two photon detectors.
- the basis exchange means 25 performs classical communication with the quantum transmitting apparatus 100 on the measurement result output by the quantum measurement means 24 and the third random number output by the random number generation means 22 and performs random sharing. Extract information.
- the error correction means 26 uses the random sharing output from the base exchange means 25. Classical communication is performed with the quantum transmitter 100 for the information, and error correction is performed.
- the classical communication means with authentication 27 is provided for performing classical communication with the quantum transmitter 100 when performing the base exchange means 25 and the error correction means 26.
- the secret sharing information 21 is used for authentication with the quantum transmitter 100.
- the secrecy enhancing means 28 enhances the secrecy of the error-corrected random shared information.
- the eavesdropping detection means 29 determines the presence or absence of eavesdropping from the additional information output by the error correction means 26.
- the secret key 30 is a key that is output from the confidentiality enhancing unit 28 and is shared with the quantum transmitting device 100 while maintaining confidentiality with the quantum transmitting device 100. Next, the operation will be described.
- the overall process diagram in FIG. 6 is a conventional technology of a quantum cryptographic communication method represented by References 1 and 2.
- the overall process can be broadly divided into two processes, the quantum cryptography communication large-scale process (S100) and the classical data processing large-scale process (S200).
- S100 quantum cryptography communication large-scale process
- S200 classical data processing large-scale process
- the process on the left is executed by the quantum transmitting device 100
- the process on the right is executed by the quantum receiving device 200.
- the qubit generating means 4 is a qubit generating means 4 which has been defined in advance.
- the quantum encoding means X7 encodes the generated qubit.
- the quantum modulation means H8 modulates the encoded qubit according to the second random number bit output by the random number generation means 6.
- the qubit has four states representing 0 and 1 in two sets of conjugate bases (+ basis and X basis).
- the modulation bit has
- the modulation bit is transmitted from the quantum transmitting device 100 to the quantum receiving device 200 through the quantum cryptography channel 1.
- the transmitted qubit (modulation bit) is demodulated by the quantum demodulation unit 23 according to the third random number bit output by the random number generation unit 22.
- the quantum measurement means 24 quantum-measures the quantum-demodulated qubit.
- quantum measurements In quantum measurements,
- the quantum cryptography communication large step (S100) ends.
- the base exchange processing step (S21) the base information and the second random number bit information used for quantum modulation and demodulation in the transmission of the qubit performed in the quantum cryptography communication large step (S100) are used.
- the random number bit information of 3 is exchanged between the quantum transmitting and receiving devices via the classical communication network 2.
- the exchanged basis information matches, it means that correct quantum modulation / demodulation has been performed. Therefore, only the first random number bit and the quantum measurement bit of the qubit transmission in which the base information matches and the correct quantum modulation / demodulation is performed are extracted and output as random shared information. Since half of the base information does not match, about half of the qubits transmitted from the quantum transmitter 100 to the quantum receiver 200 become invalid. Ref. 6 The 6-state quantum cryptography makes about 23 of the transmitted qubits invalid.
- eavesdropping may be possible, but tampering and impersonation by a third party must be prevented. If spoofing is permitted, the device owned by the eavesdropper enters the respective relays of the quantum cryptographic communication path 1 connecting the quantum transmitter 100 and the quantum receiver 200 and the classical communication network 2, and the quantum transmitter It can act as a pseudo quantum receiver 200 for 100 and as a pseudo quantum transmitter 100 for the quantum receiver 200. Therefore, an independent secret key is shared between the quantum transmitting device 100 and the eavesdropping device and between the eavesdropping device and the quantum receiving device 200, and the quantum transmission is performed.
- the device 100 regards the eavesdropping device as a legitimate quantum receiving device 200, and transmits the ciphertext using the key shared by the quantum cryptography communication, and the eavesdropping device uses the key shared with the quantum transmitting device 100
- An attack is possible in which the ciphertext is decrypted, encrypted again using the secret key shared with the quantum receiver 200, and then transmitted to the quantum receiver 200. For this reason, in order to prevent tampering and spoofing by a third party, authentication must be performed using secret shared information that is secretly shared between quantum transmitting and receiving devices in advance.
- the confidentiality of the information is enhanced in terms of the amount of information by passing the error-corrected random shared information through the hash function.
- the secret shared information is updated for the next quantum cryptographic communication by using a part of the random shared information with enhanced confidentiality.
- the new and remaining random shared information is output as a secret key.
- the secret shared information that is secretly shared between the transmitting and receiving apparatuses is encrypted and communicated using a common key block cipher, a stream cipher, and the like as random information larger than the secret shared information. , Keep confidentiality and share.
- the conventional quantum cryptography communication device and communication method have the problem that authentication must be performed using secret shared information prepared in advance in classical communication, and the validity of measurement bits obtained by quantum cryptography communication is high.
- a base exchange for exchanging quantum modulation / demodulation information between the transmitting and receiving devices via the classical communication network must be performed, and about half of the qubit strings transmitted quantum (6 In the case of state quantum cryptography, there is a problem that about 23) is lost.
- the present invention does not require authentication in classical communication, does not require base exchange, and maintains the transmitted qubit while maintaining the information security of the qubit transmitted by the eavesdropping detection function. It is an object of the present invention to provide a quantum cryptographic communication device and a quantum cryptographic communication method that can use all of the data for signal transmission. Disclosure of the invention
- the quantum transmitting device synchronizes with the pseudorandom number generation performed by the quantum receiving device, and generates a first pseudorandom number generating unit that generates a first pseudorandom number from secret shared information previously secretly shared with the quantum receiving device.
- a quantum modulator that quantum-modulates the qubit quantum-coded by the quantum coding unit based on the first pseudorandom number.
- FIG. 1 is an overall configuration diagram of the first embodiment.
- FIG. 2 is a diagram showing a quantum cryptography communication process according to the first embodiment.
- FIG. 3 is an overall configuration diagram of the second embodiment.
- FIG. 4 is an overall configuration diagram of the third embodiment.
- FIG. 5 is a conventional diagram showing the overall configuration of quantum cryptography.
- FIG. 6 is a conventional diagram showing a communication process of quantum cryptography. BEST MODE FOR CARRYING OUT THE INVENTION
- FIG. 1 is an overall configuration diagram of the first embodiment.
- the quantum transmitter 100 and the quantum receiver 200 are connected by a quantum signal channel 1 that transmits a qubit from the quantum transmitter 100 to the quantum receiver 200. .
- the classical communication network 2 is a communication network connecting quantum transmitting and receiving devices.
- the secret shared information 3 and the secret shared information 21 are secret information shared in advance between the quantum transmitting and receiving apparatuses.
- the internal configuration of the quantum transmission device 100 will be described.
- the qubit generation unit 40 is a
- such a qubit generation unit 40 can be easily realized by placing a polarizer at an output port from a light source.
- the random number generation unit 50 is a unit that outputs a first random number bit.
- the first pseudo-random number generation unit 60 is a unit that outputs the first pseudo-random number bit using the secret shared information 3 as a seed.
- the quantum encoding unit 70 performs quantum encoding on the qubit generated by the qubit generation unit 40 according to the first random number bit output from the random number generation unit 50 Department.
- the encoding rule is
- the quantum modulator 80 quantizes the qubit coded by the quantum coding unit 70 according to the first pseudo-random number bit output from the first pseudo-random number generation unit 60. This is a unit that performs modulation.
- the modulation rule is that when the pseudo-random bit is 0, the identity transformation is:
- the H transformation is: o> ⁇ o
- the H transformation is a Hadamard transformation and corresponds to a basis transformation.
- the BB84 protocol described above transmits qubits using two conjugate bases.
- the above three basis transforms are selected for the first three pseudorandom numbers of 0, 1, and 2.
- the above-mentioned transformation is applied to the polarization state of photons. Is to install a phase modulator using a phase modulator so that the TE mode plane of the phase modulator and the horizontal polarization plane of the polarization state are at an appropriate angle, and apply appropriate phase modulation to the TE mode. It can be easily realized by seeing.
- the first error correction unit 90 is a unit that performs classical communication with the quantum receiver 200 with respect to the first random number output from the random number generation unit 50, and performs error correction. This output is the error-corrected random shared information.
- the first classical communication unit 130 is a unit provided for the first error correction unit 90 to perform classical communication with the quantum receiver 200.
- pseudo-random numbers generated from secret shared information 3 and secret shared information 21 are transmitted by quantum transmission.
- the authentication function is not necessarily required because the communication device 100 and the quantum reception device 200 share the same function.
- the first confidentiality enhancement unit 110 is a unit that enhances the confidentiality of the error-corrected random shared information.
- the first eavesdropping detection section 120 is an eavesdropping detection section that determines the presence or absence of eavesdropping from the additional information output by the first error correction section 90.
- the secret key 14 is a key that is output from the first confidentiality enhancement unit 110 and is shared while maintaining confidentiality with the quantum receiving device 200.
- the second pseudorandom number generation unit 220 is a unit that outputs the second pseudorandom number using the secret shared information 21 as a seed in synchronization with the first pseudorandom number generation unit 60.
- the quantum demodulator 230 responds to the qubit transmitted through the quantum cryptographic communication channel 1 in accordance with the second pseudorandom number bit output from the second pseudorandom number generator 220. This is a unit that performs demodulation.
- the demodulation rule is that when the pseudorandom bit is 0, the identity transformation is:
- HS " 1 demodulate with three bases including (
- the above three base transforms are selected for the ternary second pseudorandom numbers of 0, 1, and 2.
- the quantum measurement unit 240 performs a process on the quantum-demodulated qubit. This is the unit that performs quantum measurement.
- the second error correction unit 250 performs classical communication with the quantum transmission device 100 on the measurement result output from the quantum measurement unit 240 and performs error correction. This output is the error-corrected random shared information.
- the second classical communication unit 260 is a unit provided for the second error correction unit 250 to perform classical communication with the quantum transmitter 100.
- the authentication function is not necessarily required as in the first classic communication unit 130.
- the second confidentiality enhancement unit 270 is a unit that enhances the confidentiality of the error-corrected random shared information.
- the second eavesdropping detection unit 280 is a unit that determines the presence or absence of eavesdropping from the additional information output by the second error correction unit 250.
- the secret key 30 is a key that is shared with the quantum transmission device 100 output from the second confidentiality enhancing unit 270 while maintaining confidentiality.
- Figure 2 is an overall process diagram.
- the overall process can be broadly divided into two major processes, the quantum cryptography communication large-scale process (S300) and the classical data processing large-scale process (S400).
- the qubit generation unit 40 is configured to execute
- the quantum encoding unit 70 encodes the generated qubit according to the random number bit output from the random number generation unit 50. Go.
- the quantum modulator 80 modulates the encoded qubit according to the first pseudorandom number bit output from the first pseudorandom number generation unit 60. With this modulation, the qubit has four states representing 0 and 1 in two sets of conjugate bases.
- the quantum transmission step (S34) such a modulation bit is transmitted from the quantum transmitting device 100 to the quantum receiving device 200 through the quantum cryptographic communication channel 1.
- the quantum demodulator 230 demodulates the transmitted qubit in accordance with the second pseudo random number bit output from the second pseudo random number generation unit 220.
- the first pseudo-random number bit generated in the quantum modulation step (S33) and the second pseudo-random number bit generated in the quantum demodulation step (S35) are synchronized. For this reason, conventionally, about one half (2Z3 in the case of six-state quantum cryptography) of the transmitted qubit string is invalid, but according to the quantum cryptography communication method according to the present embodiment, the correct quantum is always obtained.
- the quantum demodulated qubit is quantum-measured. In quantum measurements,
- the quantum demodulation process (S35) always performs the correct quantum demodulation, so that the measurement bits are generated in the quantum encoding process (S32) unless disturbances due to noise or eavesdropping occur in the qubit during transmission. Random number bit It always matches the bird.
- the random number bits generated in the quantum encoding step (S32) and the measurement bitmaps measured in the quantum measurement step (S36) are used in the classical theory of a quantum transceiver. It corrects errors while performing classical communication that allows eavesdropping via communication network 2. Although error correction is performed, the amount of information leaked to a third party is small, and data processing is performed to maintain confidentiality. At this time, the bit rate and bit error rate are output as additional information. The presence or absence of eavesdropping is determined from the magnitude, change, etc. of this value.
- quantum modulation / demodulation is performed based on the secret shared information 3 and the secret shared information 21, so that spoofing-falsification is allowed in classical communication. Even if this is done, consistent error correction processing cannot be performed, and an eavesdropper can always be detected. Therefore, since the relay attack as seen in the prior art is not established, the authentication function in classical communication is not necessarily required.
- quantum modulation information cannot be predicted by pseudorandomness, and the randomness of quantum encoded information is added. It is extremely difficult to extract significant information from a single qubit that has proven unreproducible, and it is also possible to detect eavesdropping from the disturbances that eavesdropping involves.
- the confidentiality enhancement processing step (S42) the confidentiality is enhanced in terms of the amount of information through the hash function on the error-corrected random shared information output in the error correction processing step (S41).
- the secret shared information updating step (S43) the secret shared information is updated for the next quantum cryptographic communication using a part of the random shared information with enhanced confidentiality, and the remaining random shared information is updated. Output as secret key.
- the quantum mechanics using the quantum communication path 1 for performing the first signal transmission using the quantum states that cannot be simultaneously observed with each other and the classical communication network 2 for performing the second classical information data communication are described.
- the quantum transmission device 100 and the quantum reception device 200 use the secret shared information 3 and the secret shared information 21 held in advance securely to prevent tampering and spoofing in classical communication,
- a quantum cryptographic communication device where random number data can be secretly shared
- the quantum cryptographic communication device includes a quantum transmitting device 100 and a quantum receiving device 200,
- the quantum transmission device 100 includes a qubit generation unit 4 that can constantly generate a cupite of the same quantum state, a random number generation unit 50 serving as a signal source of a quantum encoding given to the qubit, and secret shared information 3. Is used as a seed, and a first pseudorandom number generation unit 60 that generates a pseudorandom number from the seed, and performs quantum coding on the qubit in accordance with the random number output from the random number generation unit 50
- a quantum encoding unit 70, a quantum modulator 80 that applies quantum modulation to qubits according to the pseudorandom number output from the first pseudorandom number generation unit 60, and a quantum reception Performs classical communication to perform error correction with the first error correction unit 90 that performs error correction while maintaining confidentiality while performing classical communication with the device 200 and the quantum receiver 200.
- the first classical communication department 130 and error-corrected secret information Comprises a first privacy amplification unit 1 1 0 enhances the confidentiality, the first eavesdropping detecting unit 1 2 0 which performs eavesdropping detection knowledge from the additional information output in the error correction process.
- the quantum receiver 200 uses the secret shared information 21 as a seed, and Quantum demodulation is performed on the received qubit according to the second pseudo-random number generator 220 that generates pseudo-random numbers from the seed and the pseudo-random number output from the second pseudo-random number generator 220 Quantum demodulator 230 that demodulates by the above, quantum measuring unit 240 that measures the demodulated qubit and outputs the classical bit, and quantum transmitter 100 and the classical A second error correction unit 250 that performs error correction while maintaining confidentiality while communicating, and a second communication unit that performs classical communication to perform error correction processing with the quantum transmitter 100 Classic communication unit 260, a second confidentiality enhancement unit that increases the confidentiality of error-corrected confidential information, and a second eavesdropping device that performs eavesdropping detection from additional information output in error correction processing A detection unit 280.
- the quantum cryptography communication method described in the present embodiment includes a generation step in which qubit generation section 40 generates a qubit, and a quantum processing in accordance with the random number bit generated by random number generation section 50 for the generated qubit.
- the first pseudo-random number generation unit 60 performs quantum processing on the qubit that has undergone the quantum coding according to the pseudo-random number bit generated using the secret shared information 3 as a seed.
- a quantum modulation step of performing modulation a quantum transmission step of transmitting a qubit subjected to quantum modulation from the quantum transmission apparatus 100 to the quantum reception apparatus 200 via the quantum communication channel 1;
- An error correction processing step of performing error correction on the classical data obtained by communicating the qubit sequence through the classical communication network 2, and a quantum transmitting and receiving It consists of a confidentiality enhancement processing step in which individual enhancements are performed, and a process group up to the confidential shared information update process in which part of classical data with confidentiality enhanced is updated as confidential shared information. It is characterized by having a classical data processing large process.
- quantum modulation / demodulation is performed according to pseudo-random bits output between the quantum transmitting and receiving apparatuses using the secret shared information as a seed and synchronization. Can be omitted.
- the eavesdropping detection function allows the presence or absence of eavesdropping to be assured, which guarantees the security of the amount of information transmitted in the absence of eavesdropping. It is possible to share confidential information of random information, which is much more secure.
- quantum cryptography communication is realized by using the polarization state of an arbitrary qubit.
- quantum cryptography communication can be performed using any qubit phase state.
- phase state of a photon is adopted as a qubit and quantum cryptography communication is performed using a Matsuhatsu-Zenda interferometer.
- FIG. 3 is an overall configuration diagram of the second embodiment. Mach Twender interferometer
- 900 is a qubit generator 40, a first phase modulator 81, and a quantum channel
- the difference from the first embodiment in the configuration is the configuration of the qubit generation unit, the quantum coding unit, the quantum modulator, the quantum communication channel, the quantum demodulator, and the quantum measurement unit.
- the qubit generation unit 40 includes a single photon source 700, a beam splitter 350, and a mirror 400.
- a photon from a single photon source 700 is split into two optical paths at a beam splitter 350 and a mirror 400.
- the state with photons in the upper quantum channel 101 is
- the first phase modulator 81 corresponds to the quantum encoder and the quantum modulator of the first embodiment.
- the first phase modulator 81 generates a generation qubit according to the first random number bit output from the random number generation unit 50 and the first pseudo random number bit output from the first pseudo random number generation unit 60.
- Uru When random number bit 0 and pseudo random number bit 0,
- ⁇ (
- the qubit that has been quantum-encoded and quantum-modulated is quantum-transmitted to the quantum receiver 200 via the quantum channel 101.
- the transmitted qubit is transmitted to the quantum demodulator according to the first embodiment in accordance with the second pseudo-random number bit output from the second pseudo-random number generator 220 synchronized with the first pseudo-random number generator 60.
- Quantum demodulation is performed by the corresponding second phase modulator 231 according to the following rules.
- the quantum-demodulated qubit follows the first random number bit
- the quantum measurement unit 240 composed of the mirror 241, the beam splitter 24, the first photon detector 24, and the second photon detector 24,
- the first photon detector 243 detects photons
- the second photon detector 244 detects and detects photons.
- the phase state of photons is adopted as a qubit, and Mach. Even when quantum cryptography communication is performed using the Zeng interferometer 900, the high-speed quantum cryptography communication can be realized by omitting the conventional base exchange unit and the base exchange processing step and effectively using all cubits. Nature can be realized. Embodiment 3.
- the qubit generation unit is provided in the quantum transmission device 100.
- a configuration such as that placed in the quantum receiver 200 (Reference 5: G. Ribordy, LD, Gautier,, Gisin, 0. Guinnard, H. Zbinden, "Automated” Plug & Play " Quantum Key Distribution, "Electronic Lett. 34, PP.2116-2117, (1998)).
- FIG. 4 is an overall configuration diagram of the third embodiment.
- a forward path and a return path between quantum transmitting and receiving apparatuses are separately provided as quantum communication paths (quantum communication path 105 on the forward path, quantum communication path 106 on the return path).
- quantum communication path 105 on the forward path quantum communication path 106 on the return path.
- an optical path control unit such as a beam splitter and a Faraday mirror.
- the quantum demodulator 230 is installed in the quantum communication path 106 on the return path, but may be installed in the quantum communication path 105 on the outward path. The same effect as in the other embodiments can be obtained.
- the processing load on the quantum transmitter 100 can be reduced.
- the process of exchanging bases between devices can be omitted.
- the cubits can be used effectively.
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Electromagnetism (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Optics & Photonics (AREA)
- Optical Communication System (AREA)
- Digital Transmission Methods That Use Modulated Carrier Waves (AREA)
Description
Claims
Priority Applications (8)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020047007969A KR100631242B1 (ko) | 2002-09-26 | 2002-09-26 | 양자 송신 장치, 양자 수신 장치, 양자 암호 통신 장치 및양자 암호 통신 방법 |
DE60220083T DE60220083T2 (de) | 2002-09-26 | 2002-09-26 | Kryptographische Kommunikationsvorrichtung |
JP2004539435A JP4398374B2 (ja) | 2002-09-26 | 2002-09-26 | 暗号通信装置 |
US10/496,368 US7649996B2 (en) | 2002-09-26 | 2002-09-26 | Cryptographic communication apparatus |
EP02770218A EP1445890B1 (en) | 2002-09-26 | 2002-09-26 | Cryptographic communication apparatus |
AU2002338042A AU2002338042A1 (en) | 2002-09-26 | 2002-09-26 | Cryptographic communication apparatus |
CN02822808.1A CN1589544A (zh) | 2002-09-26 | 2002-09-26 | 量子发送装置、量子接收装置、量子密码通信装置和量子密码通信方法 |
PCT/JP2002/009950 WO2004030270A1 (ja) | 2002-09-26 | 2002-09-26 | 暗号通信装置 |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/JP2002/009950 WO2004030270A1 (ja) | 2002-09-26 | 2002-09-26 | 暗号通信装置 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2004030270A1 true WO2004030270A1 (ja) | 2004-04-08 |
Family
ID=32040305
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2002/009950 WO2004030270A1 (ja) | 2002-09-26 | 2002-09-26 | 暗号通信装置 |
Country Status (8)
Country | Link |
---|---|
US (1) | US7649996B2 (ja) |
EP (1) | EP1445890B1 (ja) |
JP (1) | JP4398374B2 (ja) |
KR (1) | KR100631242B1 (ja) |
CN (1) | CN1589544A (ja) |
AU (1) | AU2002338042A1 (ja) |
DE (1) | DE60220083T2 (ja) |
WO (1) | WO2004030270A1 (ja) |
Cited By (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2006203559A (ja) * | 2005-01-20 | 2006-08-03 | Mitsubishi Electric Corp | 量子暗号通信システム及び方法 |
JP2006261834A (ja) * | 2005-03-15 | 2006-09-28 | Nippon Telegr & Teleph Corp <Ntt> | 秘密鍵配送装置および秘密鍵配送方法 |
JP2007116521A (ja) * | 2005-10-21 | 2007-05-10 | Nippon Telegr & Teleph Corp <Ntt> | 量子秘密鍵配送システムおよび量子秘密鍵配送方法 |
JP2007129386A (ja) * | 2005-11-02 | 2007-05-24 | Hitachi Ltd | 光通信装置 |
WO2008013008A1 (fr) * | 2006-07-26 | 2008-01-31 | Japan Science And Technology Agency | Procédé de communication secrète et dispositif de communication secrète de celui-ci |
JP2008154019A (ja) * | 2006-12-19 | 2008-07-03 | Nec Corp | 共有情報の管理方法およびシステム |
CN100403152C (zh) * | 2004-07-28 | 2008-07-16 | Magiq技术公司 | 具有后向散射抑制的双向qkd系统 |
JP2009509366A (ja) * | 2005-09-19 | 2009-03-05 | ザ チャイニーズ ユニバーシティー オブ ホンコン | 波長ルーティングを用いたマルチユーザのwdmネットワーク上での量子鍵配布方法およびシステム |
JP2011521581A (ja) * | 2008-05-19 | 2011-07-21 | キネテイツク・リミテツド | 可動鍵装置を伴う量子鍵配送 |
CN102196425A (zh) * | 2011-07-01 | 2011-09-21 | 安徽量子通信技术有限公司 | 基于量子密钥分配网络的移动加密系统及其通信方法 |
US8050566B2 (en) | 2005-09-19 | 2011-11-01 | The Chinese University Of Hong Kong | System and methods for quantum key distribution over WDM links |
JP4862159B2 (ja) * | 2005-01-24 | 2012-01-25 | 大学共同利用機関法人情報・システム研究機構 | 量子鍵配送方法、通信システムおよび通信装置 |
JP2016136673A (ja) * | 2015-01-23 | 2016-07-28 | 株式会社東芝 | 量子鍵配送装置、量子鍵配送システムおよびプログラム |
JP2016181814A (ja) * | 2015-03-24 | 2016-10-13 | 株式会社東芝 | 量子鍵配送装置、量子鍵配送システムおよび量子鍵配送方法 |
WO2020121451A1 (ja) * | 2018-12-12 | 2020-06-18 | 日本電気株式会社 | 乱数供給方法および装置 |
US11616645B1 (en) * | 2019-05-08 | 2023-03-28 | Cable Television Laboratories, Inc. | Encrypted data transmission in optical- and radio-access networks based on quantum key distribution |
Families Citing this family (60)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7227955B2 (en) * | 2003-02-07 | 2007-06-05 | Magiq Technologies, Inc. | Single-photon watch dog detector for folded quantum key distribution system |
US8503885B2 (en) * | 2004-08-04 | 2013-08-06 | The United States Of America As Represented By The Secretary Of The Army | Quantum based information transmission system and method |
JP4775820B2 (ja) * | 2004-09-02 | 2011-09-21 | アイディー クアンティック エス.アー. | 非直交2状態量子暗号法及び盗聴探知のために量子ビット内及び量子ビット間干渉を有する装置 |
JP4654649B2 (ja) * | 2004-10-07 | 2011-03-23 | ソニー株式会社 | 量子暗号通信方法、および量子暗号通信装置、並びに量子暗号通信システム |
US20060083379A1 (en) * | 2004-10-19 | 2006-04-20 | Brookner George M | Cryptographic communications session security |
GB0512229D0 (en) * | 2005-06-16 | 2005-07-27 | Hewlett Packard Development Co | Quantum key distribution apparatus & method |
US9191198B2 (en) | 2005-06-16 | 2015-11-17 | Hewlett-Packard Development Company, L.P. | Method and device using one-time pad data |
JP4912772B2 (ja) * | 2005-09-22 | 2012-04-11 | 富士通株式会社 | 暗号化方法,暗号復号化方法,暗号化装置,暗号復号化装置,送受信システムおよび通信システム |
US7809143B2 (en) * | 2005-10-24 | 2010-10-05 | Magiq Technologies, Inc. | QKD system with synchronization channel verification |
JP4829628B2 (ja) * | 2005-10-31 | 2011-12-07 | 富士通株式会社 | 暗号化方法,暗号復号化方法,暗号化装置,暗号復号化装置および通信システム |
WO2008056667A1 (fr) * | 2006-11-10 | 2008-05-15 | Laputa, Inc. | Système de gestion d'informations et système de cryptage |
KR100890389B1 (ko) | 2006-12-05 | 2009-03-26 | 한국전자통신연구원 | 편광 무의존 단방향 양자 암호 수신 및 송수신 장치 |
US20080298583A1 (en) * | 2007-05-31 | 2008-12-04 | Lucent Technologies Inc. | System and method of quantum encryption |
KR100983008B1 (ko) * | 2008-05-30 | 2010-09-20 | 한국전자통신연구원 | 양자 암호 시스템 및 양자 암호 키의 분배 방법 |
DE602008003566D1 (de) * | 2008-07-16 | 2010-12-30 | Alcatel Lucent | Adaptiver Nichtlinearitätsausgleich in einem kohärenten Empfänger |
MY148910A (en) * | 2008-07-23 | 2013-06-14 | Mimos Berhad | Quantum network relay |
JP2011130120A (ja) * | 2009-12-16 | 2011-06-30 | Sony Corp | 量子公開鍵暗号システム、鍵生成装置、暗号化装置、復号装置、鍵生成方法、暗号化方法、及び復号方法 |
US20110149398A1 (en) * | 2009-12-18 | 2011-06-23 | Donald Wortzman | Instant messaging method-much faster than light communication |
WO2013096952A1 (en) * | 2011-12-23 | 2013-06-27 | President And Fellows Of Harvard College | Unforgeable noise-tolerant quantum tokens |
KR101233860B1 (ko) | 2012-02-08 | 2013-02-15 | 고려대학교 산학협력단 | 양자 부호 설계 장치 및 방법 |
CN103699352A (zh) * | 2012-09-27 | 2014-04-02 | 陈志波 | 量子数码 |
US9258114B2 (en) * | 2012-12-05 | 2016-02-09 | Intel Corporation | Quantum key distribution (QSD) scheme using photonic integrated circuit (PIC) |
CN103067093B (zh) * | 2012-12-26 | 2015-07-08 | 中国电力科学研究院 | 一种适用于高压架空电力线路的量子纠错编码方法 |
CN103259601A (zh) * | 2013-04-23 | 2013-08-21 | 安徽问天量子科技股份有限公司 | 用于量子密钥通信的光信号相位调制装置 |
JP6157974B2 (ja) * | 2013-07-31 | 2017-07-05 | 株式会社東芝 | 送信機、受信機、量子鍵配送(QKD;QuantumKeyDistribution)システム及び量子鍵配送方法 |
US9471279B2 (en) | 2014-01-14 | 2016-10-18 | The Regents Of The University Of Michigan | Random number generation using untrusted quantum devices |
US9471280B2 (en) | 2014-01-14 | 2016-10-18 | The Regents Of The University Of Michigan | Extraction of random numbers from physical systems |
KR101517361B1 (ko) * | 2014-01-24 | 2015-05-06 | 고려대학교 산학협력단 | 수신기 측의 불완전한 얽힌 큐비트의 오류를 정정하는 방법 |
KR102208226B1 (ko) * | 2014-03-25 | 2021-01-27 | 한국전자통신연구원 | 송수신 방법 및 장치 |
KR101610747B1 (ko) * | 2014-08-19 | 2016-04-08 | 한국과학기술연구원 | 양자 암호 통신 장치 및 방법 |
KR101675674B1 (ko) * | 2015-04-07 | 2016-11-11 | 이화여자대학교 산학협력단 | 양자 메시지에 대한 양자 서명 장치 |
GB2542751B (en) * | 2015-07-02 | 2021-08-18 | Kent Adrian | Future position commitment |
CN105049201A (zh) * | 2015-08-18 | 2015-11-11 | 安徽问天量子科技股份有限公司 | 基于量子密码的移动设备保密通信系统及方法 |
EP3226461A1 (en) * | 2016-03-30 | 2017-10-04 | Universität Wien | Secure probabilistic one-time program by quantum state distribution |
US20210334692A1 (en) * | 2016-03-30 | 2021-10-28 | Universität Wien | Secure probabilistic one-time program by quantum state distribution |
KR101965184B1 (ko) * | 2016-09-01 | 2019-04-05 | 광주과학기술원 | 경로중첩을 이용한 양자보안 직접통신 장치 및 방법 |
KR101960426B1 (ko) * | 2016-09-06 | 2019-03-20 | 한국전자통신연구원 | 다자간 양자키 분배 장치 및 방법 |
KR101955484B1 (ko) * | 2017-02-09 | 2019-03-07 | 국민대학교산학협력단 | 양자 채널 기반의 인증 수행 방법 및 인증 요청 방법 |
CN108199781B (zh) * | 2018-01-31 | 2020-03-20 | 清华大学 | 用于检测量子通信系统安全性的装置及检测方法 |
US11343087B1 (en) | 2018-03-09 | 2022-05-24 | Wells Fargo Bank, N.A. | Systems and methods for server-side quantum session authentication |
US10855454B1 (en) | 2018-03-09 | 2020-12-01 | Wells Fargo Bank, N.A. | Systems and methods for quantum session authentication |
US10812258B1 (en) | 2018-03-09 | 2020-10-20 | Wells Fargo Bank, N.A. | Systems and methods for quantum session authentication |
US10728029B1 (en) | 2018-03-09 | 2020-07-28 | Wells Fargo Bank, N.A. | Systems and methods for multi-server quantum session authentication |
US11025416B1 (en) | 2018-03-09 | 2021-06-01 | Wells Fargo Bank, N.A. | Systems and methods for quantum session authentication |
US11115199B2 (en) | 2018-07-18 | 2021-09-07 | Kabushiki Kaisha Toshiba | Information processing method, and computer program product |
US11095439B1 (en) | 2018-08-20 | 2021-08-17 | Wells Fargo Bank, N.A. | Systems and methods for centralized quantum session authentication |
US10540146B1 (en) | 2018-08-20 | 2020-01-21 | Wells Fargo Bank, N.A. | Systems and methods for single chip quantum random number generation |
US10855453B1 (en) | 2018-08-20 | 2020-12-01 | Wells Fargo Bank, N.A. | Systems and methods for time-bin quantum session authentication |
US11240013B1 (en) | 2018-08-20 | 2022-02-01 | Wells Fargo Bank, N.A. | Systems and methods for passive quantum session authentication |
US10855457B1 (en) | 2018-08-20 | 2020-12-01 | Wells Fargo Bank, N.A. | Systems and methods for single chip quantum random number generation |
US10552120B1 (en) | 2018-08-20 | 2020-02-04 | Wells Fargo Bank, N.A. | Systems and methods for single chip quantum random number generation |
US11190349B1 (en) | 2018-08-20 | 2021-11-30 | Wells Fargo Bank, N.A. | Systems and methods for providing randomness-as-a-service |
CN110519048A (zh) * | 2019-07-31 | 2019-11-29 | 中国科学技术大学 | 一种量子信息传输方法及系统 |
US11343088B1 (en) * | 2019-10-01 | 2022-05-24 | National Technology & Engineering Solutions Of Sandia, Llc | Systems and methods for quantum optical device authentication |
US11245519B1 (en) | 2019-10-04 | 2022-02-08 | Wells Fargo Bank, N.A. | Systems and methods for quantum entanglement random number generation |
US11387993B2 (en) * | 2020-07-10 | 2022-07-12 | Accenture Global Solutions Limited | Quantum information interception prevention |
CN112929163B (zh) * | 2021-01-25 | 2022-01-07 | 中南大学 | 测量装置无关的连续变量量子密钥分发方法及系统 |
US20230198633A1 (en) * | 2021-12-20 | 2023-06-22 | Leidos, Inc. | Quantum communications capability for eavesdrop defense |
WO2024063173A1 (ko) * | 2022-09-21 | 2024-03-28 | 엘지전자 주식회사 | 양자 통신 시스템에서 정보를 전송하기 위한 방법 및 이를 위한 장치 |
CN117579178B (zh) * | 2024-01-15 | 2024-03-29 | 北京量子信息科学研究院 | 基于随机数的量子通信方法和装置、量子通信系统 |
Family Cites Families (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CA2168851C (en) * | 1993-09-09 | 1999-11-02 | Keith James Blow | System and method for quantum cryptography |
JP3542699B2 (ja) | 1997-05-16 | 2004-07-14 | 日本電信電話株式会社 | 量子暗号の構成方法 |
JP2000201144A (ja) | 1999-01-05 | 2000-07-18 | Nippon Telegr & Teleph Corp <Ntt> | 認証通信方法および認証通信装置 |
JP2000286841A (ja) | 1999-03-30 | 2000-10-13 | Nec Corp | 量子暗号を用いた鍵配布方法 |
JP3646561B2 (ja) | 1999-05-12 | 2005-05-11 | 日本電気株式会社 | 量子暗号を用いた鍵配布方法 |
JP4647748B2 (ja) | 2000-06-12 | 2011-03-09 | キヤノン株式会社 | 暗号化装置及び方法、ならびに通信方法及びシステム |
JP3949879B2 (ja) | 2000-07-18 | 2007-07-25 | 三菱電機株式会社 | 量子ビットコミットメント送信装置及び量子ビットコミットメント受信装置及び量子ビットコミットメント通信システム |
JP3664966B2 (ja) | 2000-10-19 | 2005-06-29 | 日本電信電話株式会社 | 秘密証拠供託方法および秘密証拠供託プログラムを記録した記録媒体 |
-
2002
- 2002-09-26 AU AU2002338042A patent/AU2002338042A1/en not_active Abandoned
- 2002-09-26 EP EP02770218A patent/EP1445890B1/en not_active Expired - Lifetime
- 2002-09-26 US US10/496,368 patent/US7649996B2/en not_active Expired - Fee Related
- 2002-09-26 KR KR1020047007969A patent/KR100631242B1/ko not_active IP Right Cessation
- 2002-09-26 CN CN02822808.1A patent/CN1589544A/zh active Pending
- 2002-09-26 JP JP2004539435A patent/JP4398374B2/ja not_active Expired - Fee Related
- 2002-09-26 DE DE60220083T patent/DE60220083T2/de not_active Expired - Lifetime
- 2002-09-26 WO PCT/JP2002/009950 patent/WO2004030270A1/ja active IP Right Grant
Non-Patent Citations (1)
Title |
---|
SHIN'ICHI IKENO, KENJI KOYAMA: "Gendai ango riron, 3rd edition", 20 May 1989, THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION OF ENGINEERS, pages: 67 - 73, XP002960762 * |
Cited By (25)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN100403152C (zh) * | 2004-07-28 | 2008-07-16 | Magiq技术公司 | 具有后向散射抑制的双向qkd系统 |
JP4684663B2 (ja) * | 2005-01-20 | 2011-05-18 | 三菱電機株式会社 | 量子暗号通信システム及び方法 |
JP2006203559A (ja) * | 2005-01-20 | 2006-08-03 | Mitsubishi Electric Corp | 量子暗号通信システム及び方法 |
JP4862159B2 (ja) * | 2005-01-24 | 2012-01-25 | 大学共同利用機関法人情報・システム研究機構 | 量子鍵配送方法、通信システムおよび通信装置 |
JP2006261834A (ja) * | 2005-03-15 | 2006-09-28 | Nippon Telegr & Teleph Corp <Ntt> | 秘密鍵配送装置および秘密鍵配送方法 |
JP4575813B2 (ja) * | 2005-03-15 | 2010-11-04 | 日本電信電話株式会社 | 秘密鍵配送装置および秘密鍵配送方法 |
JP2009509366A (ja) * | 2005-09-19 | 2009-03-05 | ザ チャイニーズ ユニバーシティー オブ ホンコン | 波長ルーティングを用いたマルチユーザのwdmネットワーク上での量子鍵配布方法およびシステム |
US8050566B2 (en) | 2005-09-19 | 2011-11-01 | The Chinese University Of Hong Kong | System and methods for quantum key distribution over WDM links |
JP2007116521A (ja) * | 2005-10-21 | 2007-05-10 | Nippon Telegr & Teleph Corp <Ntt> | 量子秘密鍵配送システムおよび量子秘密鍵配送方法 |
JP2007129386A (ja) * | 2005-11-02 | 2007-05-24 | Hitachi Ltd | 光通信装置 |
US8239680B2 (en) | 2006-07-26 | 2012-08-07 | Japan Science And Technology Agency | Secret communication method and secret communication device thereof |
GB2453471B (en) * | 2006-07-26 | 2012-03-28 | Japan Science & Tech Corp | Secret communication method and secret communication device thereof |
WO2008013008A1 (fr) * | 2006-07-26 | 2008-01-31 | Japan Science And Technology Agency | Procédé de communication secrète et dispositif de communication secrète de celui-ci |
GB2479288A (en) * | 2006-07-26 | 2011-10-05 | Japan Science & Tech Agency | An encryption method which uses a "confidentiality increase matrix" to combat a predetermined amount eavesdropping |
GB2453471A (en) * | 2006-07-26 | 2009-04-08 | Japan Science & Tech Corp | Secret communication method and secret communication device thereof |
GB2479288B (en) * | 2006-07-26 | 2012-03-28 | Japan Science & Tech Agency | Secret communication method and secret communication device thereof |
JP2008154019A (ja) * | 2006-12-19 | 2008-07-03 | Nec Corp | 共有情報の管理方法およびシステム |
JP2011521581A (ja) * | 2008-05-19 | 2011-07-21 | キネテイツク・リミテツド | 可動鍵装置を伴う量子鍵配送 |
CN102196425A (zh) * | 2011-07-01 | 2011-09-21 | 安徽量子通信技术有限公司 | 基于量子密钥分配网络的移动加密系统及其通信方法 |
JP2016136673A (ja) * | 2015-01-23 | 2016-07-28 | 株式会社東芝 | 量子鍵配送装置、量子鍵配送システムおよびプログラム |
JP2016181814A (ja) * | 2015-03-24 | 2016-10-13 | 株式会社東芝 | 量子鍵配送装置、量子鍵配送システムおよび量子鍵配送方法 |
WO2020121451A1 (ja) * | 2018-12-12 | 2020-06-18 | 日本電気株式会社 | 乱数供給方法および装置 |
JPWO2020121451A1 (ja) * | 2018-12-12 | 2021-10-21 | 日本電気株式会社 | 乱数供給方法および装置 |
JP7124887B2 (ja) | 2018-12-12 | 2022-08-24 | 日本電気株式会社 | 乱数供給方法および装置 |
US11616645B1 (en) * | 2019-05-08 | 2023-03-28 | Cable Television Laboratories, Inc. | Encrypted data transmission in optical- and radio-access networks based on quantum key distribution |
Also Published As
Publication number | Publication date |
---|---|
CN1589544A (zh) | 2005-03-02 |
KR20040058326A (ko) | 2004-07-03 |
JP4398374B2 (ja) | 2010-01-13 |
JPWO2004030270A1 (ja) | 2006-01-26 |
AU2002338042A1 (en) | 2004-04-19 |
DE60220083T2 (de) | 2008-01-10 |
US20050157875A1 (en) | 2005-07-21 |
DE60220083D1 (de) | 2007-06-21 |
KR100631242B1 (ko) | 2006-10-02 |
EP1445890A1 (en) | 2004-08-11 |
EP1445890B1 (en) | 2007-05-09 |
US7649996B2 (en) | 2010-01-19 |
EP1445890A4 (en) | 2005-01-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP4398374B2 (ja) | 暗号通信装置 | |
US7831050B2 (en) | Fast multi-photon key distribution scheme secured by quantum noise | |
US7787628B2 (en) | Double phase encoding quantum key distribution | |
US7760883B2 (en) | Any-point-to-any-point (AP2AP) quantum key distribution protocol for optical ring network | |
US7620182B2 (en) | QKD with classical bit encryption | |
US20060059343A1 (en) | Key expansion for qkd | |
Trinh et al. | Quantum key distribution over FSO: Current development and future perspectives | |
WO2021213631A1 (en) | Improved cryptographic method and system | |
US7359512B1 (en) | Authentication in a quantum cryptographic system | |
Naseri | An efficient protocol for quantum secure dialogue with authentication by using single photons | |
Thangavel et al. | Performance of integrated quantum and classical cryptographic model for password authentication | |
Barbosa | Fast and secure key distribution using mesoscopic coherent states of light | |
Genovese et al. | Review on qudits production and their application to quantum communication and studies on local realism | |
RU2360367C1 (ru) | Поляризационная квантовая криптосистема | |
WO2023078639A1 (en) | Quantum-secured communication | |
Ranganathan et al. | A three party authentication for key distributed protocol using classical and quantum cryptography | |
Zhai | An Overview of Quantum Key Distribution Protocols and Experimental Implementations | |
Yin | Unconditionally secure key distribution without quantum channel | |
Grice et al. | Quantum Key Distribution for the Smart Grid | |
Chitikela | Noise analysis for two quantum cryptography protocols | |
Faraj et al. | Simulation of a Quantum Cryptographic Protocol | |
Grzywak et al. | Quantum cryptography: opportunities and challenges | |
Adamski | Introduction to optical quantum cryptography | |
Jackson | Quantum Cryptography and Secure Data Transfer | |
Singh et al. | Entropy Security in Quantum Cryptography |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WWE | Wipo information: entry into national phase |
Ref document number: 2004539435 Country of ref document: JP |
|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NO NZ OM PH PL PT RO RU SD SE SG SI SK SL TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR IE IT LU MC NL PT SE SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2002770218 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 20028228081 Country of ref document: CN |
|
WWE | Wipo information: entry into national phase |
Ref document number: 10496368 Country of ref document: US |
|
WWE | Wipo information: entry into national phase |
Ref document number: 1020047007969 Country of ref document: KR |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
WWP | Wipo information: published in national office |
Ref document number: 2002770218 Country of ref document: EP |
|
WWG | Wipo information: grant in national office |
Ref document number: 2002770218 Country of ref document: EP |