WO2005076519A1 - 量子鍵配送方法および通信装置 - Google Patents
量子鍵配送方法および通信装置 Download PDFInfo
- Publication number
- WO2005076519A1 WO2005076519A1 PCT/JP2004/001385 JP2004001385W WO2005076519A1 WO 2005076519 A1 WO2005076519 A1 WO 2005076519A1 JP 2004001385 W JP2004001385 W JP 2004001385W WO 2005076519 A1 WO2005076519 A1 WO 2005076519A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- communication device
- information
- parity check
- check matrix
- transmission data
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H03—ELECTRONIC CIRCUITRY
- H03M—CODING; DECODING; CODE CONVERSION IN GENERAL
- H03M13/00—Coding, decoding or code conversion, for error detection or error correction; Coding theory basic assumptions; Coding bounds; Error probability evaluation methods; Channel models; Simulation or testing of codes
- H03M13/03—Error detection or forward error correction by redundancy in data representation, i.e. code words containing more digits than the source words
- H03M13/05—Error detection or forward error correction by redundancy in data representation, i.e. code words containing more digits than the source words using block codes, i.e. a predetermined number of check bits joined to a predetermined number of information bits
- H03M13/11—Error detection or forward error correction by redundancy in data representation, i.e. code words containing more digits than the source words using block codes, i.e. a predetermined number of check bits joined to a predetermined number of information bits using multiple parity bits
- H03M13/1102—Codes on graphs and decoding on graphs, e.g. low-density parity check [LDPC] codes
- H03M13/1148—Structural properties of the code parity-check or generator matrix
- H03M13/1151—Algebraically constructed LDPC codes, e.g. LDPC codes derived from Euclidean geometries [EG-LDPC codes]
-
- H—ELECTRICITY
- H03—ELECTRONIC CIRCUITRY
- H03M—CODING; DECODING; CODE CONVERSION IN GENERAL
- H03M13/00—Coding, decoding or code conversion, for error detection or error correction; Coding theory basic assumptions; Coding bounds; Error probability evaluation methods; Channel models; Simulation or testing of codes
- H03M13/03—Error detection or forward error correction by redundancy in data representation, i.e. code words containing more digits than the source words
- H03M13/05—Error detection or forward error correction by redundancy in data representation, i.e. code words containing more digits than the source words using block codes, i.e. a predetermined number of check bits joined to a predetermined number of information bits
- H03M13/11—Error detection or forward error correction by redundancy in data representation, i.e. code words containing more digits than the source words using block codes, i.e. a predetermined number of check bits joined to a predetermined number of information bits using multiple parity bits
- H03M13/1102—Codes on graphs and decoding on graphs, e.g. low-density parity check [LDPC] codes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0852—Quantum cryptography
-
- H—ELECTRICITY
- H03—ELECTRONIC CIRCUITRY
- H03M—CODING; DECODING; CODE CONVERSION IN GENERAL
- H03M13/00—Coding, decoding or code conversion, for error detection or error correction; Coding theory basic assumptions; Coding bounds; Error probability evaluation methods; Channel models; Simulation or testing of codes
- H03M13/29—Coding, decoding or code conversion, for error detection or error correction; Coding theory basic assumptions; Coding bounds; Error probability evaluation methods; Channel models; Simulation or testing of codes combining two or more codes or code structures, e.g. product codes, generalised product codes, concatenated codes, inner and outer codes
- H03M13/2957—Turbo codes and decoding
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/34—Encoding or coding, e.g. Huffman coding or error correction
Definitions
- the present invention relates to a quantum key distribution method capable of generating a highly secure symmetric key, and more particularly to a quantum key distribution method capable of correcting a data error using a bright error correction code. And a communication device capable of realizing the quantum key distribution 1 transmission.
- optical communication has been widely used as a high-speed, large-capacity communication technology.
- communication is performed with light on and off, and a large amount of photons is transmitted when on. Therefore, it is not a communication system where the quantum effect appears directly.
- a quantum cryptosystem photons are used as a communication medium, and one bit of information is transmitted with one photon so that quantum effects such as the uncertainty principle occur.
- the eavesdropper chooses an appropriate base and measures photons without knowing the quantum state such as its polarization and phase, the quantum state changes. Therefore, the receiving side can recognize whether or not the transmission data has been eavesdropped by checking the change in the quantum state of the photons.
- Fig. 10 is a diagram showing the outline of conventional quantum key distribution using polarization.
- a measuring instrument that can distinguish between horizontal and vertical polarizations will have a horizontal (
- a measuring instrument that can identify the polarization in the oblique direction uses the light polarized in the 45 ° direction and the light polarized in the 135 ° direction on the quantum communication path. And are correctly identified. In this way, each measuring instrument can correctly recognize the light polarized in the specified direction, but for example, converts the light polarized in the oblique direction into the light in the horizontal and vertical directions (0 °, 90 °).
- the light polarized horizontally and vertically is randomly identified with a probability of 50%, respectively. In other words, when a measuring instrument that does not correspond to the identifiable polarization direction is used, even if the measurement result is analyzed, the polarized direction cannot be correctly identified.
- the uncertainty is used to share the key between the sender and the receiver without the knowledge of the eavesdropper (for example, non-patented). See Reference 1.).
- the sender and the receiver can use a public communication channel other than the quantum communication channel.
- the sender generates a random number sequence (sequence of 1, 0: transmission data), and furthermore, a transmission code (+: corresponds to a measuring instrument that can identify light polarized horizontally and vertically, X: diagonally (Corresponding to a measuring instrument that can identify polarized light)).
- a transmission code (+: corresponds to a measuring instrument that can identify light polarized horizontally and vertically
- X diagonally (Corresponding to a measuring instrument that can identify polarized light)).
- the polarization direction of the transmitted light is automatically determined by the combination of the random number sequence and the transmission code.
- a horizontally polarized light with a combination of 0 and + a vertically polarized light with a combination of 1 and +, a 45 ° -polarized light with a combination of 0 and X
- IEs of 1 and X light polarized in the direction of 135 ° is transmitted to the quantum channel (transmitted signal).
- the receiver randomly determines the receiving code (+: a measuring device that can identify light polarized in the horizontal and vertical directions, X: a measuring device that can identify light polarized in the oblique direction). Measure the light on the communication path (received signal). Then, reception data is obtained by a combination of the reception code and the reception signal.
- the received data is 0 for a combination of horizontally polarized light and +, 1 for a combination of vertically polarized light and +, and X and 45 ° polarized light. 0 is obtained by the combination of, and 1 is obtained by the combination of the light polarized in the direction of 135 ° and X.
- the receiver sends the received code to the sender via a public communication channel to check whether the measurement was performed by the correct measuring device.
- Receive command The sender who receives the code checks whether it is correct or not, and returns the result to the receiver via a public communication channel.
- the receiver leaves only the received data corresponding to the received signal received by the correct measuring instrument, and discards the others. At this point, the remaining received data has been reliably shared between the sender and the receiver.
- the sender and the receiver transmit a predetermined number of data selected from the shared data to the respective communication partners via the public communication channel. Then, it checks whether the received data matches its own data. For example, if even one of the confirmed data does not match, it is determined that there is an eavesdropper and the shared data is discarded, and the key sharing procedure is restarted from the beginning. On the other hand, if all the confirmed data matches, it is determined that there is no eavesdropper, the data used for confirmation is discarded, and the remaining shared data is used as the shared key between the sender and the receiver.
- a sender divides transmission data into a plurality of blocks and transmits parity for each block on a public communication channel in order to detect a data error. Then, the receiver checks the data error by comparing the parity of each block received via the open communication channel with the parity of the corresponding block in the received data. At this time, if there is a different parity, the receiver returns information indicating which block has a different parity on the public communication path. Then, the sender further divides the block into a first half block and a second half block, and returns, for example, the parity of the first half on a public communication path (binary search). Thereafter, the sender and the receiver identify the position of the error bit by repeatedly executing the above binary search, and the receiver finally corrects the bit.
- the sender assumes that there is a parity that is determined to be correct due to an even number of errors, even though there is an error in the data.
- the block is divided into a plurality of blocks, and the error correction process is again performed by the binary search. Then, all data errors are corrected by repeatedly executing this error correction process by random permutation.
- Non-patent document 1 1.
- the present invention has been made in view of the above, and generates a highly secure common key while correcting a data error on a transmission path using an error correction code having extremely high characteristics.
- the purpose is to provide a quantum key distribution method that can do this.
- a quantum chain distribution method in a quantum cryptography system comprising: A parity check matrix generating step (corresponding to steps SI and S11 in an embodiment to be described later) for generating the same parity check matrix (a matrix whose elements are “0” or “1”).
- the communication device on the receiving side generates a cyclic code (CRC: Cyclic Redundancy check) for error detection (corresponding to step S2); and the communication device on the receiving side correctly identifies the light direction.
- CRC Cyclic Redundancy check
- a transmission / reception step which holds reception data with probability information obtained as a result of measurement by a possible measuring instrument, and wherein the communication device on the transmission side holds transmission data corresponding to the reception data (part of an L-number sequence).
- the communication device on the transmission side generates error correction information based on the parity check matrix and the transmission data;
- An information notifying step (corresponding to steps S5 and S14) of notifying the error detection information generated based on a code and the transmission data to the communication device on the receiving side via a public communication path;
- a communication data estimating step of estimating the transmission data based on the parity check matrix, the reception data with the probability information, the error correction information, and the error detection information (corresponding to step S15) )
- each of the communication devices discards a part of the transmission data according to the disclosed information amount and generates an encryption key using the remaining information (steps S6 and S16). Equivalent) and And wherein the door.
- a data error of shared information is corrected using a parity check matrix for “Irregu 1 ar-LDPC code” that is deterministic and has stable characteristics, and is further shared using a cyclic code CRC.
- a parity check matrix for “Irregu 1 ar-LDPC code” that is deterministic and has stable characteristics, and is further shared using a cyclic code CRC.
- FIG. 1 is a diagram showing the configuration of a quantum cryptographic system (communication device on the transmission side and the reception side) according to the present invention
- FIG. 2 is a flowchart showing an outline of quantum key distribution.
- FIG. 3 is a flowchart showing an outline of quantum key distribution
- FIG. 4 is a flowchart showing a method of constructing “Irregu 1 ar—LDPC code” based on finite affine geometry.
- Fig. 6 shows the matrix of the finite-affine geometric code AG (2, 2 2 ) .
- Fig. 6 shows the final column weight distribution; I ( ⁇ ; ) and the row weight distribution p u .
- FIG. 7 is a diagram showing an example of a cyclic code CRC (n X d matrix)
- FIG. 8 is a schematic configuration of a method for generating a syndrome S a and the cyclic code syndrome S c of m a
- FIG. 9 is a flowchart showing a syndrome decoding method according to the present embodiment
- FIG. 10 is a diagram showing an outline of conventional quantum key distribution using polarization.
- Quantum key distribution is a key distribution method that guarantees security irrespective of the eavesdropper's computational power.For example, in order to generate a shared key more efficiently, data generated by passing through a transmission path Must be removed. Therefore, in the present embodiment, a description will be given of quantum key distribution in which error correction is performed using a low-density parity check (LDP :: Low-Density Parity-Check) code, which is known to have extremely high characteristics. '
- FIG. 1 is a diagram showing a configuration of a quantum cryptography system (transmission-side and reception-side communication devices) according to the present invention.
- the quantum cryptography system received with the transmitting communication apparatus example Bei a function of transmitting information m a, information m a affected by noise or the like on a transmission path, i.e. a function of receiving information m b It consists of a communication device on the side and power.
- the communication device on the transmitting side transmits the information m a via the quantum
- An encryption key generation unit 1 that transmits a syndrome S A via a cryptographic key and generates an encryption key (a common key with the receiving side) based on the transmission information, and an encryption unit 21 that performs encryption based on the encryption key the phased data
- a communication unit 2 for transmitting and receiving unit 2 2 is exchanged via the public communication path, comprising a receiving communication device receives the information m b via the quantum channel, the public communication path
- the encryption key generation unit 3 receives the syndrome S A via the encryption key and generates an encryption key (a common key with the transmission side) based on the received information, and the encryption unit 42 encrypts the key based on the encryption key.
- a communication unit 4 in which the transmitting / receiving unit 41 exchanges the obtained data via a public communication path. .
- the communication apparatus of the transmitting side as the information m a to be transmitted to the quantum communication path, the light is polarized in a predetermined direction using a polarizing filters, that sends to the receiving-side communication device.
- the communication equipment on the receiving side has a measuring device that can identify the polarization in the horizontal and vertical directions (0 ° and 90 °) and a measuring device that can identify the polarization in the oblique directions (45 ° and 135 °).
- Each measuring instrument can correctly recognize the light polarized in the specified direction.For example, it can distinguish the light polarized in the oblique direction from the light in the horizontal and vertical directions (0 °, 90 °).
- the horizontally and vertically polarized light are each randomly identified with a 50% probability. In other words, if a measuring instrument that does not correspond to the identifiable polarization direction is used, the polarization direction cannot be correctly identified even if the measurement results are analyzed.
- FIG. 2 shows the processing of the communication device on the transmitting side
- FIG. 4 shows the processing of the communication device on the receiving side.
- the parity check matrix generators 10 and 30 determine a parity check matrix H (n ⁇ k matrix) of a specific linear code.
- a description will be given of quantum key distribution when an LDPC code having excellent characteristics very close to the Shannon limit is used as the specific linear code.
- the LDPC code is used as the error correction method.
- the present invention is not limited to this.
- another linear code such as a turbo code
- another linear code such as a turbo code
- an error correction protocol in which error correction information (syndrome) described later is represented by a product Hm A of an appropriate matrix H and transmission data m A (part of information m a ) Error correction protocol corresponding to the “quantum key distribution capable of correcting data errors on the transmission path” described above, that is, if the linearity between the error correction information and the transmission data m A is ensured
- the matrix H may be used as a parity check matrix.
- FIG. 4 is a flow chart showing a configuration method of “Irregu1ar—LDPC code” based on finite Affine geometry. Note that the parity check matrix generation section 30 operates in the same manner as the parity check matrix generation section 10, and a description thereof will be omitted.
- parity check matrix generation process in the present embodiment may be configured to be executed by parity check matrix generation section 10 according to, for example, set parameters, or may be another control device (such as a computer) outside the communication device. May be executed.
- the check matrix generation process according to the present embodiment is performed outside the communication device, the generated check matrix is stored in the communication device.
- parity check matrix generation section 10 a case will be described in which the above-described processing is executed by parity check matrix generation section 10.
- the parity check matrix IJ generator 10 selects a finite affine geometric code AG (2, 2 s ) as a base of a check matrix for “I rregular—LDPC code” (FIG. 4, step S twenty one) .
- the row and column weights are 2 s each It becomes.
- Fig. 5 is a diagram showing the matrix of the finite affine geometric code AG (2, 2 2 ), even if f (blank represents 0).
- the parity check matrix generation unit 10 determines the maximum value of the column weight (2 ⁇ ⁇ 2 s ) (step S22). Then, the code rate rate (one syndrome length / key length) is determined (step S22).
- the parity check matrix generating unit 10 using optimization by the Gaussian Approximation (Gaussian Approxi mation), tentatively, the weight distribution of the column lambda (y,) and determining the weight allocation P u line ( Step S23).
- the weight u is an integer of u 2
- p u is the weight in the row Indicates the ratio of u.
- the parity check row generation unit 10 selects a row weight ⁇ u, u + 1 ⁇ , which can be formed by dividing a row of finite-affine geometry, and furthermore, a division coefficient satisfying the equation (1).
- ⁇ Bu , bu + J are obtained (step S24).
- b u and b u + 1 are non-negative integers.
- b u is obtained from the following equation (2), and b u + 1 is obtained from the above equation (1).
- uxb u is obtained from the following equation (2), and b u + 1 is obtained from the above equation (1).
- the parity check matrix generation unit 10 obtains the weight ratio of the row updated by the parameters u, u + 1, b u , and b u + 1 determined above, p u +, using Equation (3) ( Step S25).
- the parity check matrix generation unit 1 o tentatively uses the optimization by the Gaussian approximation method and further uses the u, u + 1, Pu- 1, PuH ”obtained above as fixed parameters, Weight distribution: I (Ti) is obtained (step S26), where weight is an integer of 2, and (Yi) represents the ratio of the weight in the column, and the weight ( ⁇ ⁇ yi / ⁇ t , where i is a positive integer) is deleted from the candidates, where w t represents the total number of 1s contained in AG (2, 2 s ).
- Step S27 select a set of column weight candidates ⁇ ⁇ 2 , ⁇ -y l ( ⁇ ⁇ 2 s ) ⁇ that satisfies the weight distribution obtained above and satisfies the following equation (4) ( Step S27). If there is a column weight 7i that does not satisfy the following equation (4), the column weight is deleted from the candidates.
- each a represents a coefficient that is a non-negative integer with respect to ⁇ is ⁇ 2 ,... ⁇ for forming the column weight 2 s , i and j are positive integers, and represents the column weight , Represent the maximum weight of the column.
- the parity check matrix generation unit 10 adjusts the column weight distribution; and the row weight distribution Pu before performing the division process (step S29 ).
- the weight distribution after adjustment should be as close as possible to the value obtained by the Gaussian approximation method.
- Fig. 6 shows the final column weight distribution in step S29; I ( ⁇ and row weight distribution p u FIG.
- n (7i) represents the total number of columns of the weight unit, n u denotes the total number of lines of the weight unit.
- the rows and columns in the finite affinity geometry are divided (step S30) to generate an nX k parity check column ⁇ .
- “1” is randomly extracted from each row or each column, instead of being regularly divided. In this extraction process, any method may be used as long as the randomness is maintained.
- the communication device on the transmitting side since the communication device may not be able to accurately estimate the transmission data m a (if no match Guarding estimated funnel m c to be described later transmission data m a), in particular, the probability of erroneous determination due to the presence of an eavesdropper
- the cyclic code generator 16 generates a cyclic code CRC (Cyclic Redundancy check) for error detection (see FIG. 2, Step S 2).
- a cyclic CRC C (n X d matrix) is generated.
- the CRC check polynomial x d — (x— 1 ) can be expressed as the following equation (5).
- Fig. 7 is a diagram showing an example of a cyclic code CRC (nX d matrix).
- a random number generating unit 1 1, random number sequence m a (1, 0 column: transmission data) generated Then, a transmission code (+: a code corresponding to a measuring instrument capable of distinguishing light polarized horizontally and vertically, X: a code corresponding to a measuring instrument capable of distinguishing light polarized obliquely) is used. Decide at random (Fig. 2, step S3).
- the random number generator 31 received code (+: code corresponding to a measuring instrument that can identify light polarized in horizontal and vertical directions, X: can identify light polarized in an oblique direction)
- the code corresponding to the measuring instrument is determined randomly (Fig. 3, step S12).
- Step S 4 For example, horizontally polarized light with a combination of 0 and +, vertically polarized light with a combination of 1 and +, 45 ° polarized light with a combination of 0 and X, and 1
- the light polarized in the 135 ° direction by the combination of X and X is transmitted to the quantum channel (transmission signal).
- the photon receiving unit 32 of the communication device on the receiving side that has received the optical signal of the photon generating unit 12 measures the light on the quantum communication path (received signal). And a set of reception code and reception signal Obtain received data m b which automatically determined by the alignment viewed (step S 13).
- the received data m b 0 a combination of the light polarized in the horizontal direction +, one with a combination of the light polarized in the vertical direction +, 45 ° direction polarized light and X 0 is obtained by the combination and 0 by the combination of the light polarized in the 135 ° direction and X.
- the received data mb is a hard decision value with probability information.
- the communication device on the receiving side sends the received code to the communication device on the transmitting side via the open communication channel to check whether the above measurement was performed by the correct measuring instrument. Is transmitted (step S13).
- the transmitting communication device that has received the received code checks whether the above measurement was performed by the correct measuring instrument, and transmits the result to the receiving communication device via the public communication path (step S4).
- the communication device on the receiving side and the communication device on the transmitting side leave only the data corresponding to the received signal received by the correct measuring device, and discard the others (steps S4 and S13).
- the remaining data is stored in a memory or the like, and n bits are read out in order from the beginning, and these are read out from the formal transmission data m A and reception data m B (m B is affected by noise or the like on the transmission path.
- m a: and mB m a + e (noise, etc.)). That is, here, the next n bits are read out as necessary, and transmission data m A and reception data m B are generated.
- the bit positions of the remaining data can be shared between the transmitting communication device and the receiving communication device.
- m B is a hard decision value with probability information, similarly to the above-described m b .
- 8 is a diagram showing a schematic configuration of a method for generating a syndrome S A and the cyclic code syndrome S c of m A.
- the syndrome S A (k bits of information) and the cyclic code syndrome S c (d bits of information) m A is likely to be known to the eavesdropper.
- the receiving-side communication device receives the syndrome S A Contact and cyclic codes Shindoro one beam S c of m A in public communication path communication unit 34, you notify the syndrome decoding unit 33 (Step S 14 ).
- the syndrome decoding unit 33 estimates the original transmission data m A using the syndrome decoding method of the present embodiment (step S15). Specifically, the error of the hard decision value m B with probability information due to noise or the like to generate by connexion estimated after m c to correct, it original if there is no error in the estimated after m c transmit data m Judge as A.
- S A Hm c" a m c satisfying estimated from the hard decision value m B with probability information, the estimated result m sharing information it if there is no error in c m A.
- the syndrome decoding method of the present embodiment will be described in detail.
- FIG. 9 is a flowchart showing a syndrome decoding method according to the present embodiment.
- the element in the i-th column (l ⁇ i ⁇ n) and the j-th row (l ⁇ jk) is expressed as I do.
- the external values rij (0) and rij (1) are updated for all the column and row combinations (i, j) that satisfy (step S32 ).
- the external values r ij (0) and; (1) are updated using (7).
- r ir (0) Kx ⁇ (nqi'j (m ci ') P (m Bi ,
- i'eA (i) ⁇ jr ir (l) Kx ⁇ ( ⁇ ( ⁇ ⁇ .) ⁇ ( ⁇ ,
- the above P (m B I m c ) represents the conditional probability, that is, the probability of the received data m B when the estimated word m c is “0” or “1”.
- the subset A (i) represents a set of row indexes where “1” stands in the i-th column of the parity check matrix H
- the subset B (j) represents “ Represents a set of column indexes where "1" stands.
- a temporary estimated word in Equation (18) is obtained, where the determination process is performed for each iteration.
- the syndrome decoding unit 33 checks whether or not the temporary fixed word m can be said to be the transmission data m A (step S35).
- 3 ⁇ 4 c (m ci , m C2 ,..., M Cn ).
- Step S36, No if the above condition is not satisfied and 1 ⁇ 1 max (Step S36, No), the counter value 1 is incremented, and the process of Step S32 is performed again using the updated value. I do. Later, (in the range of 1 rather l max) to satisfy the above condition, it repeats the processing of steps S 32 ⁇ S 3 6 using the updated values.
- the communication apparatus on the transmission side is generated, estimate the cyclic code syndrome S generated based on the estimated word m c, the error detection of putative word m c It was decided to do.
- the received data; misjudgment probability estimation word m c was decipher from m B can be significantly lower ', dropping. That is, the original transmission data m A can be estimated with high accuracy.
- the received data m B and m b was hard decision value with probability information, not limited to this, for example, it may be a soft decision value.
- the shared key generation unit 35 transmits the published error correction information (the information of the k bits which may have been eavesdropped). : A part of the shared information (m A ) is discarded in accordance with S A ), and an encryption chain r with information amount of nk bits is generated (FIG. 3, step S 16). That is, the shared key generation unit 35 generates ⁇ 1 ⁇ by the following equation (22) using G ⁇ 1 (nx (nk)) calculated in advance. The communication device of the receiving unit j uses this secret key as a shared key with the communication device on the transmission side.
- the shared key generation unit 15 generates the shared information (m) in accordance with the published error correction information (the above-mentioned k-bit information that may have been eavesdropped: S A ). A ) is discarded, and an encryption key r having nk bits of information * is generated (FIG. 2, step S6). That is, the shared key generation unit 15 generates the encryption key r by the above equation (22) using G- 1 (nx (nk)) calculated in advance (step S6).
- the communication device on the transmitting side uses the encryption key r as a shared key with the communication device on the receiving side.
- the shared key may be rearranged using a regular random matrix R.
- confidentiality can be enhanced.
- the communication device on the transmitting side generates a regular random matrix R ((n ⁇ k) X (nk)), and furthermore, the R is transmitted to the communication device on the receiving side via a public communication channel. Notify the device. However, this processing may be performed by the communication device on the receiving side.
- the transmitting side and the communication device of the reception rule generate an encryption key r by the following equation (23) using G- 1 (nX (nk)) and the random matrix R calculated earlier.
- the data error of the shared information is corrected using the deterministic and stable characteristic parity check matrix for “Irregu 1 ar -LDPC code”, and further, the cyclic code CRC is used.
- the system detects errors in shared 'I' green reports (estimated words), and then discards a portion of the shared information in accordance with the published error correction information. This eliminates the necessity of transmitting and receiving the parity a large number of times for error correction, and performs error correction control only by transmitting error correction information, thereby greatly reducing the time required for error correction processing.
- the communication device on the receiving side performs error detection on the estimated word using the error detection information generated by the communication device on the transmitting side.
- the erroneous determination probability of the estimated word can be significantly reduced, and the original transmission data can be estimated with high accuracy.
- the present invention is not limited to this, and a part of the shared information (n) may be discarded, and an encryption key r having an information amount of m (m ⁇ nk) bits may be generated.
- mapping F ( ⁇ ) that maps a two-dimensional vector to an m-dimensional vector
- F ( ⁇ ) is a mapping function for any m-dimensional vector V in order to guarantee the security of the shared key. It is necessary to satisfy the condition that the number of elements of the inverse image (F ⁇ G) 1 (V) in the composite map F ⁇ G of F and the generator matrix G is constant (2 “+”) regardless of V
- a configuration may be adopted in which a part of the shared information is discarded using the characteristic of the parity check matrix H without using the generator matrix G- 1.
- 515, 35 power Random permutation is performed on the columns of the parity check matrix H generated in steps S 1 and S 11 above, and bits discarded between communication devices
- a specific “1” is selected from the first column of the original finite-affine geometry AG (2, 2 s ), and its position is disclosed to the public.
- the shared key generation units 15 and 35 determine the positions after division corresponding to the above “1” and the above “ Identify the position after division corresponding to ⁇ 1 '' and correspond to the identified position Discard the bits in specific information m A, the remaining data to the encryption key r.
- complex generator matrix G it is possible to remove the G-1 of the arithmetic processing.
- the quantum key distribution method and the communication device according to the present invention are highly secure. This technique is useful as a technique for generating a common key whose assurance is guaranteed, and is particularly suitable for communication on a transmission path where an eavesdropper may exist.
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Theoretical Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Probability & Statistics with Applications (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Mathematical Physics (AREA)
- Electromagnetism (AREA)
- Discrete Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Error Detection And Correction (AREA)
Abstract
Description
Claims
Priority Applications (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNA2004800415235A CN1914851A (zh) | 2004-02-10 | 2004-02-10 | 量子密钥分发方法以及通信装置 |
EP04709713.4A EP1715615B1 (en) | 2004-02-10 | 2004-02-10 | Quantum key delivering method and communication device |
PCT/JP2004/001385 WO2005076519A1 (ja) | 2004-02-10 | 2004-02-10 | 量子鍵配送方法および通信装置 |
JP2005517606A JP4554523B2 (ja) | 2004-02-10 | 2004-02-10 | 量子鍵配送方法および通信装置 |
US10/588,803 US7881472B2 (en) | 2004-02-10 | 2004-02-10 | Quantum key distribution method and communication apparatus |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/JP2004/001385 WO2005076519A1 (ja) | 2004-02-10 | 2004-02-10 | 量子鍵配送方法および通信装置 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2005076519A1 true WO2005076519A1 (ja) | 2005-08-18 |
Family
ID=34835772
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2004/001385 WO2005076519A1 (ja) | 2004-02-10 | 2004-02-10 | 量子鍵配送方法および通信装置 |
Country Status (5)
Country | Link |
---|---|
US (1) | US7881472B2 (ja) |
EP (1) | EP1715615B1 (ja) |
JP (1) | JP4554523B2 (ja) |
CN (1) | CN1914851A (ja) |
WO (1) | WO2005076519A1 (ja) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2008005046A (ja) * | 2006-06-20 | 2008-01-10 | Oki Electric Ind Co Ltd | 暗号通信システム |
JP2012049765A (ja) * | 2010-08-26 | 2012-03-08 | Mitsubishi Electric Corp | 秘匿性増強処理演算装置およびこれを備えた量子暗号通信端末 |
Families Citing this family (29)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7853011B2 (en) * | 2005-05-13 | 2010-12-14 | Ciena Corporation | Methods and apparatus for monitoring the integrity of a quantum channel supporting multi-quanta pulse transmission |
US7747019B2 (en) * | 2005-09-28 | 2010-06-29 | Nortel Networks Limited | Methods and systems for communicating over a quantum channel |
WO2007088288A1 (fr) * | 2006-02-03 | 2007-08-09 | Advanced Track & Trace | Procede et dispositif d'authentification |
JP4664850B2 (ja) * | 2006-03-30 | 2011-04-06 | 株式会社東芝 | 鍵生成装置、プログラム及び方法 |
GB2455283A (en) * | 2007-10-31 | 2009-06-10 | Hewlett Packard Development Co | Error correction in data communication apparatus using toroidal-web Tanner graph |
JP5631743B2 (ja) | 2008-01-25 | 2014-11-26 | キネテイツク・リミテツド | 量子暗号装置 |
GB0801408D0 (en) | 2008-01-25 | 2008-03-05 | Qinetiq Ltd | Multi-community network with quantum key distribution |
GB0801492D0 (en) | 2008-01-28 | 2008-03-05 | Qinetiq Ltd | Optical transmitters and receivers for quantum key distribution |
GB0809044D0 (en) | 2008-05-19 | 2008-06-25 | Qinetiq Ltd | Multiplexed QKD |
GB0809045D0 (en) * | 2008-05-19 | 2008-06-25 | Qinetiq Ltd | Quantum key distribution involving moveable key device |
GB0822254D0 (en) | 2008-12-05 | 2009-01-14 | Qinetiq Ltd | Method of performing authentication between network nodes |
GB0822356D0 (en) | 2008-12-08 | 2009-01-14 | Qinetiq Ltd | Non-linear optical device |
US8800049B2 (en) * | 2009-08-26 | 2014-08-05 | Avaya Inc. | Licensing and certificate distribution via secondary or divided signaling communication pathway |
GB201020424D0 (en) | 2010-12-02 | 2011-01-19 | Qinetiq Ltd | Quantum key distribution |
KR101233860B1 (ko) * | 2012-02-08 | 2013-02-15 | 고려대학교 산학협력단 | 양자 부호 설계 장치 및 방법 |
US9419653B1 (en) * | 2012-03-14 | 2016-08-16 | Marvell International Ltd. | Systems and methods for combining constrained codes and error correcting codes |
US8693691B2 (en) * | 2012-05-25 | 2014-04-08 | The Johns Hopkins University | Embedded authentication protocol for quantum key distribution systems |
JP6211818B2 (ja) * | 2013-06-11 | 2017-10-11 | 株式会社東芝 | 通信装置、通信方法、プログラムおよび通信システム |
US10574461B2 (en) * | 2013-09-30 | 2020-02-25 | Triad National Security, Llc | Streaming authentication and multi-level security for communications networks using quantum cryptography |
JP6165637B2 (ja) * | 2014-01-08 | 2017-07-19 | 株式会社東芝 | 量子通信装置、量子通信方法及びプログラム |
KR101559076B1 (ko) * | 2014-01-24 | 2015-10-08 | 고려대학교 산학협력단 | 양자 채널을 통한 터보 코드 방식의 효율적인 정보 재건 기법 |
CN105553648B (zh) | 2014-10-30 | 2019-10-29 | 阿里巴巴集团控股有限公司 | 量子密钥分发、隐私放大及数据传输方法、装置及系统 |
GB2542751B (en) * | 2015-07-02 | 2021-08-18 | Kent Adrian | Future position commitment |
CN106411521B (zh) | 2015-07-31 | 2020-02-18 | 阿里巴巴集团控股有限公司 | 用于量子密钥分发过程的身份认证方法、装置及系统 |
CN106470101B (zh) * | 2015-08-18 | 2020-03-10 | 阿里巴巴集团控股有限公司 | 用于量子密钥分发过程的身份认证方法、装置及系统 |
CN109274485B (zh) * | 2017-07-17 | 2021-06-15 | 科大国盾量子技术股份有限公司 | 一种数据加密方法、数据认证方法及相关设备和系统 |
CN109728900B (zh) * | 2017-10-30 | 2021-07-30 | 科大国盾量子技术股份有限公司 | 离散变量量子密钥分发中ldpc纠错码率自适应方法及系统 |
RU2736870C1 (ru) * | 2019-12-27 | 2020-11-23 | Открытое Акционерное Общество "Информационные Технологии И Коммуникационные Системы" | Комплекс для защищенной передачи данных в цифровой сети передачи данных с использованием однопроходной системы квантового распределения ключей и способ согласования ключей при работе комплекса |
US11942965B1 (en) * | 2022-10-11 | 2024-03-26 | Samsung Electronics Co., Ltd. | Soft reed-solomon decoder for a non-volatile memory |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2001230677A (ja) * | 2000-02-16 | 2001-08-24 | Kawasaki Steel Corp | ターボ復号器 |
Family Cites Families (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5732139A (en) * | 1996-08-26 | 1998-03-24 | Lo; Hoi-Kwong | Quantum cryptographic system with reduced data loss |
JP3239795B2 (ja) | 1997-04-23 | 2001-12-17 | 三菱電機株式会社 | 誤り訂正復号装置および誤り訂正復号方式 |
WO2001061867A1 (fr) | 2000-02-15 | 2001-08-23 | Kawasaki Steel Corporation | Turbodecodeur |
AU2002362018A1 (en) * | 2001-12-21 | 2003-07-24 | Magiq Technologies, Inc. | Decoupling error correction from privacy amplification in quantum key distribution |
US7403623B2 (en) * | 2002-07-05 | 2008-07-22 | Universite Libre De Bruxelles | High-rate quantum key distribution scheme relying on continuously phase and amplitude-modulated coherent light pulses |
JP4290401B2 (ja) | 2002-09-18 | 2009-07-08 | 三菱電機株式会社 | 量子鍵配送方法および通信装置 |
JP4346929B2 (ja) | 2003-03-10 | 2009-10-21 | 三菱電機株式会社 | 量子鍵配送方法および通信装置 |
KR100511552B1 (ko) | 2003-04-04 | 2005-08-31 | 한국전자통신연구원 | 이동통신에서 ldpc부호의 복호 복잡도 감소 방법. |
-
2004
- 2004-02-10 CN CNA2004800415235A patent/CN1914851A/zh active Pending
- 2004-02-10 US US10/588,803 patent/US7881472B2/en not_active Expired - Fee Related
- 2004-02-10 WO PCT/JP2004/001385 patent/WO2005076519A1/ja not_active Application Discontinuation
- 2004-02-10 EP EP04709713.4A patent/EP1715615B1/en not_active Expired - Lifetime
- 2004-02-10 JP JP2005517606A patent/JP4554523B2/ja not_active Expired - Fee Related
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2001230677A (ja) * | 2000-02-16 | 2001-08-24 | Kawasaki Steel Corp | ターボ復号器 |
Non-Patent Citations (3)
Title |
---|
ISHIZUKA Y. ET AL: "Ryoshi Ango Muke LDPC Fugo no Jisso to Hyoka", 2004 NEN ANGO TO JOHO SECURITY SYMPOSIUM YOKOSHU, vol. I, 27 January 2004 (2004-01-27), pages 253 - 258, XP004956112 * |
MACKAY D.J.C.: "Near Shannon limit performance of low density parity check codes", IEE ELECTRONICS LETTERS, vol. 32, no. 18, 29 August 1996 (1996-08-29), pages 1645 - 1646, XP000637810 * |
See also references of EP1715615A4 * |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2008005046A (ja) * | 2006-06-20 | 2008-01-10 | Oki Electric Ind Co Ltd | 暗号通信システム |
JP2012049765A (ja) * | 2010-08-26 | 2012-03-08 | Mitsubishi Electric Corp | 秘匿性増強処理演算装置およびこれを備えた量子暗号通信端末 |
Also Published As
Publication number | Publication date |
---|---|
EP1715615A1 (en) | 2006-10-25 |
EP1715615B1 (en) | 2016-04-06 |
CN1914851A (zh) | 2007-02-14 |
JP4554523B2 (ja) | 2010-09-29 |
JPWO2005076519A1 (ja) | 2007-08-23 |
US20080144833A1 (en) | 2008-06-19 |
US7881472B2 (en) | 2011-02-01 |
EP1715615A4 (en) | 2011-03-02 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2005076519A1 (ja) | 量子鍵配送方法および通信装置 | |
KR100697476B1 (ko) | 양자키 배송 방법 및 통신 장치 | |
JP4862159B2 (ja) | 量子鍵配送方法、通信システムおよび通信装置 | |
KR100742450B1 (ko) | 양자키 배송 방법 및 통신 장치 | |
Fung et al. | Practical issues in quantum-key-distribution postprocessing | |
JP5871142B2 (ja) | 暗号鍵共有システムにおける通信装置および暗号鍵生成方法 | |
EP1715614B1 (en) | Quantum key delivering method and communication device | |
JP6165638B2 (ja) | 量子通信装置、量子通信方法及びプログラム | |
JP4459526B2 (ja) | 量子鍵配送方法および通信装置 | |
KR100822933B1 (ko) | 양자 키 배송 방법 및 통신 장치 | |
JP4231926B2 (ja) | 量子鍵配送方法および通信装置 | |
KR100822507B1 (ko) | 양자 키 배송 방법 및 통신 장치 | |
Bari | Soft Decoding Techniques for Quantum Key Distribution (QKD) and Weak Energy Optical Communication |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WWE | Wipo information: entry into national phase |
Ref document number: 200480041523.5 Country of ref document: CN |
|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): BW GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LU MC NL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
WWE | Wipo information: entry into national phase |
Ref document number: 2005517606 Country of ref document: JP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2004709713 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 1020067015968 Country of ref document: KR |
|
WWE | Wipo information: entry into national phase |
Ref document number: 10588803 Country of ref document: US |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
WWW | Wipo information: withdrawn in national office |
Ref document number: DE |
|
WWP | Wipo information: published in national office |
Ref document number: 2004709713 Country of ref document: EP |