Ensuring Quality of Shared Keys Through Quantum Key Distribution for Practical Application

We investigated the characteristics of shared keys obtained through quantum key distribution (QKD) from the viewpoint of application in cipher communication. We demonstrated that the shared keys at each stage in QKD satisfy the criteria determined by a standardized randomness test by physically compensating for randomness degrading factors. We also examined the increase in the error rate of the shared keys produced by privacy amplification, and succeeded in suppressing the error rate increase by applying a new privacy amplification scheme, which yielded a sufficiently low error rate for the final keys. These investigations showed that the final keys obtained using quantum cryptosystems are available as crypto keys in cipher communication.

[1]  Shor,et al.  Simple proof of security of the BB84 quantum key distribution protocol , 2000, Physical review letters.

[2]  Won-Young Hwang Quantum key distribution with high loss: toward global secure communication. , 2003, Physical review letters.

[3]  N. Gisin,et al.  Quantum key distribution over 67 km with a plug , 2002 .

[4]  John Preskill,et al.  Security of quantum key distribution with imperfect devices , 2002, International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings..

[5]  Gilles Brassard,et al.  Quantum Cryptography , 2005, Encyclopedia of Cryptography and Security.

[6]  Masahito Hayashi,et al.  Experimental Decoy State Quantum Key Distribution with Unconditional Security Incorporating Finite Statistics , 2007, 0705.3081.

[7]  Xiongfeng Ma,et al.  Decoy state quantum key distribution. , 2004, Physical review letters.

[8]  Xiongfeng Ma,et al.  ar X iv : q ua ntp h / 05 12 08 0 v 2 1 1 A pr 2 00 6 TIMESHIFT ATTACK IN PRACTICAL QUANTUM , 2005 .

[9]  Richard J. Hughes,et al.  Practical long-distance quantum key distribution system using decoy levels , 2008, 0806.3085.

[10]  A. Tajima,et al.  Practical Quantum Cryptosystem for Metro Area Applications , 2007, IEEE Journal of Selected Topics in Quantum Electronics.

[11]  Hugo Krawczyk,et al.  LFSR-based Hashing and Authentication , 1994, CRYPTO.

[12]  C. G. Peterson,et al.  Long-distance decoy-state quantum key distribution in optical fiber. , 2006, Physical review letters.

[13]  Gilles Brassard,et al.  Experimental Quantum Cryptography , 1990, EUROCRYPT.

[14]  Xuemin Chen,et al.  Error-Control Coding for Data Networks , 1999 .

[15]  N. Imoto,et al.  Quantum cryptography with coherent states , 1995, Technical Digest. CLEO/Pacific Rim'95. The Pacific Rim Conference on Lasers and Electro-Optics.

[16]  B. Baek,et al.  Ultra fast quantum key distribution over a 97 km installed telecom fiber with wavelength division multiplexing clock synchronization. , 2008, Optics express.

[17]  Gilles Brassard,et al.  Privacy Amplification by Public Discussion , 1988, SIAM J. Comput..

[18]  A. Tajima,et al.  Fortnight quantum key generation field trial using QBER monitoring , 2005, 2005 IEEE LEOS Annual Meeting Conference Proceedings.

[19]  Gilles Brassard,et al.  Secret-Key Reconciliation by Public Discussion , 1994, EUROCRYPT.

[20]  Dag R. Hjelme,et al.  Faked states attack on quantum cryptosystems , 2005 .

[21]  H. Inamori,et al.  Unconditional security of practical quantum key distribution , 2007 .

[22]  Xiang‐Bin Wang,et al.  Beating the PNS attack in practical quantum cryptography , 2004 .

[23]  Z. Yuan,et al.  Quantum key distribution over 122 km of standard telecom fiber , 2004, quant-ph/0412171.

[24]  J. Dynes,et al.  Gigahertz decoy quantum key distribution with 1 Mbit/s secure key rate. , 2008, Optics express.