WEKO3
アイテム
{"_buckets": {"deposit": "29c055d0-ca1d-4749-b1ce-8d562664ce6e"}, "_deposit": {"created_by": 1, "id": "1241", "owners": [1], "pid": {"revision_id": 0, "type": "depid", "value": "1241"}, "status": "published"}, "_oai": {"id": "oai:ir.soken.ac.jp:00001241", "sets": ["24"]}, "author_link": ["10171", "10172", "10170"], "item_1_biblio_info_21": {"attribute_name": "書誌情報(ソート用)", "attribute_value_mlt": [{"bibliographicIssueDates": {"bibliographicIssueDate": "2004-03-24", "bibliographicIssueDateType": "Issued"}, "bibliographic_titles": [{}]}]}, "item_1_creator_2": {"attribute_name": "著者名", "attribute_type": "creator", "attribute_value_mlt": [{"creatorNames": [{"creatorName": "玉木, 潔"}], "nameIdentifiers": [{"nameIdentifier": "10170", "nameIdentifierScheme": "WEKO"}]}]}, "item_1_creator_3": {"attribute_name": "フリガナ", "attribute_type": "creator", "attribute_value_mlt": [{"creatorNames": [{"creatorName": "タマキ, キヨシ"}], "nameIdentifiers": [{"nameIdentifier": "10171", "nameIdentifierScheme": "WEKO"}]}]}, "item_1_date_granted_11": {"attribute_name": "学位授与年月日", "attribute_value_mlt": [{"subitem_dategranted": "2004-03-24"}]}, "item_1_degree_grantor_5": {"attribute_name": "学位授与機関", "attribute_value_mlt": [{"subitem_degreegrantor": [{"subitem_degreegrantor_name": "総合研究大学院大学"}]}]}, "item_1_degree_name_6": {"attribute_name": "学位名", "attribute_value_mlt": [{"subitem_degreename": "博士(理学)"}]}, "item_1_description_1": {"attribute_name": "ID", "attribute_value_mlt": [{"subitem_description": "2004058", "subitem_description_type": "Other"}]}, "item_1_description_12": {"attribute_name": "要旨", "attribute_value_mlt": [{"subitem_description": "In this thesis, we analyze the security of the Bennett 1992 quantum key-distribution protocol (B92 protocol) over a realistic channel assuming that bit values are encoded in single photon polarization states.\u003cbr /\u003e First, we study the security of the B92 protocol against individual attack. In the individual attack, eavesdropper (Eve) interacts a qubit emitted by the sender (Alice) with her probe system followed by a measurement on each probe. To make our analysis simple, we propose a modified B92 protocol. Using this protocol, Alice and the receiver (Bob) can estimate Eve\u0027s information gain as a function of a few parameters that reflect the imperfections of devices or Eve\u0027s disturbance. We find a counter-intuitive behavior of Eve\u0027s maximum information gain, i.e., it decreases as the amount of disturbances increases. We also estimate the secret key gain that is the net growth of the secret key per one pulse. We show the region where the modified B92 protocol over a realistic channel is secure against individual attack.\u003cbr /\u003e Next, we study the unconditional security of the B92 protocol, which is the security against any attack. To prove the security, we first propose a protocol that is unconditionally secure and can be reduced to the B92 protocol. This protocol employs the entanglement distillation protocol (EDP) based on a filtering operation and the Calderbank-Shor-Steane (CSS) quantum error correcting codes. The bit errors and the phase errors, which have to be estimated for the EDP based on the CSS codes, are correlated after the filtering operation, and we can bound the amount of phase errors from the observed bit errors by an estimation method involving nonorthogonal measurements. The angle between the two states shows a trade-off between accuracy of the estimation and robustness to noises. We show a way to run the unconditionally secure B92.", "subitem_description_type": "Other"}]}, "item_1_description_7": {"attribute_name": "学位記番号", "attribute_value_mlt": [{"subitem_description": "総研大甲第790号", "subitem_description_type": "Other"}]}, "item_1_select_14": {"attribute_name": "所蔵", "attribute_value_mlt": [{"subitem_select_item": "有"}]}, "item_1_select_8": {"attribute_name": "研究科", "attribute_value_mlt": [{"subitem_select_item": "先導科学研究科"}]}, "item_1_select_9": {"attribute_name": "専攻", "attribute_value_mlt": [{"subitem_select_item": "22 光科学専攻"}]}, "item_1_text_10": {"attribute_name": "学位授与年度", "attribute_value_mlt": [{"subitem_text_value": "2003"}]}, "item_1_text_20": {"attribute_name": "業務メモ", "attribute_value_mlt": [{"subitem_text_value": "(2018年2月20日)本籍など個人情報の記載がある旧要旨・審査要旨を個人情報のない新しいものに差し替えた。承諾書等未確認。要確認該当項目修正のこと。"}]}, "item_creator": {"attribute_name": "著者", "attribute_type": "creator", "attribute_value_mlt": [{"creatorNames": [{"creatorName": "TAMAKI, Kiyoshi", "creatorNameLang": "en"}], "nameIdentifiers": [{"nameIdentifier": "10172", "nameIdentifierScheme": "WEKO"}]}]}, "item_files": {"attribute_name": "ファイル情報", "attribute_type": "file", "attribute_value_mlt": [{"accessrole": "open_date", "date": [{"dateType": "Available", "dateValue": "2016-02-17"}], "displaytype": "simple", "download_preview_message": "", "file_order": 0, "filename": "甲790_要旨.pdf", "filesize": [{"value": "143.3 kB"}], "format": "application/pdf", "future_date_message": "", "is_thumbnail": false, "licensetype": "license_11", "mimetype": "application/pdf", "size": 143300.0, "url": {"label": "要旨・審査要旨 / Abstract, Screening Result", "url": "https://ir.soken.ac.jp/record/1241/files/甲790_要旨.pdf"}, "version_id": "55b393bb-7981-4e23-9bcc-027e59fbe0ef"}]}, "item_language": {"attribute_name": "言語", "attribute_value_mlt": [{"subitem_language": "eng"}]}, "item_resource_type": {"attribute_name": "資源タイプ", "attribute_value_mlt": [{"resourcetype": "thesis", "resourceuri": "http://purl.org/coar/resource_type/c_46ec"}]}, "item_title": "Security analysis of the Bennett 1992 quantum key-distribution protocol over a realistic channel", "item_titles": {"attribute_name": "タイトル", "attribute_value_mlt": [{"subitem_title": "Security analysis of the Bennett 1992 quantum key-distribution protocol over a realistic channel"}, {"subitem_title": "Security analysis of the Bennett 1992 quantum key-distribution protocol over a realistic channel", "subitem_title_language": "en"}]}, "item_type_id": "1", "owner": "1", "path": ["24"], "permalink_uri": "https://ir.soken.ac.jp/records/1241", "pubdate": {"attribute_name": "公開日", "attribute_value": "2010-02-22"}, "publish_date": "2010-02-22", "publish_status": "0", "recid": "1241", "relation": {}, "relation_version_is_last": true, "title": ["Security analysis of the Bennett 1992 quantum key-distribution protocol over a realistic channel"], "weko_shared_id": 1}
Security analysis of the Bennett 1992 quantum key-distribution protocol over a realistic channel
https://ir.soken.ac.jp/records/1241
https://ir.soken.ac.jp/records/1241846edac8-894f-4de7-b87e-670ef76c8264
名前 / ファイル | ライセンス | アクション |
---|---|---|
![]() |
Item type | 学位論文 / Thesis or Dissertation(1) | |||||
---|---|---|---|---|---|---|
公開日 | 2010-02-22 | |||||
タイトル | ||||||
タイトル | Security analysis of the Bennett 1992 quantum key-distribution protocol over a realistic channel | |||||
タイトル | ||||||
言語 | en | |||||
タイトル | Security analysis of the Bennett 1992 quantum key-distribution protocol over a realistic channel | |||||
言語 | ||||||
言語 | eng | |||||
資源タイプ | ||||||
資源タイプ識別子 | http://purl.org/coar/resource_type/c_46ec | |||||
資源タイプ | thesis | |||||
著者名 |
玉木, 潔
× 玉木, 潔 |
|||||
フリガナ |
タマキ, キヨシ
× タマキ, キヨシ |
|||||
著者 |
TAMAKI, Kiyoshi
× TAMAKI, Kiyoshi |
|||||
学位授与機関 | ||||||
学位授与機関名 | 総合研究大学院大学 | |||||
学位名 | ||||||
学位名 | 博士(理学) | |||||
学位記番号 | ||||||
内容記述タイプ | Other | |||||
内容記述 | 総研大甲第790号 | |||||
研究科 | ||||||
値 | 先導科学研究科 | |||||
専攻 | ||||||
値 | 22 光科学専攻 | |||||
学位授与年月日 | ||||||
学位授与年月日 | 2004-03-24 | |||||
学位授与年度 | ||||||
2003 | ||||||
要旨 | ||||||
内容記述タイプ | Other | |||||
内容記述 | In this thesis, we analyze the security of the Bennett 1992 quantum key-distribution protocol (B92 protocol) over a realistic channel assuming that bit values are encoded in single photon polarization states.<br /> First, we study the security of the B92 protocol against individual attack. In the individual attack, eavesdropper (Eve) interacts a qubit emitted by the sender (Alice) with her probe system followed by a measurement on each probe. To make our analysis simple, we propose a modified B92 protocol. Using this protocol, Alice and the receiver (Bob) can estimate Eve's information gain as a function of a few parameters that reflect the imperfections of devices or Eve's disturbance. We find a counter-intuitive behavior of Eve's maximum information gain, i.e., it decreases as the amount of disturbances increases. We also estimate the secret key gain that is the net growth of the secret key per one pulse. We show the region where the modified B92 protocol over a realistic channel is secure against individual attack.<br /> Next, we study the unconditional security of the B92 protocol, which is the security against any attack. To prove the security, we first propose a protocol that is unconditionally secure and can be reduced to the B92 protocol. This protocol employs the entanglement distillation protocol (EDP) based on a filtering operation and the Calderbank-Shor-Steane (CSS) quantum error correcting codes. The bit errors and the phase errors, which have to be estimated for the EDP based on the CSS codes, are correlated after the filtering operation, and we can bound the amount of phase errors from the observed bit errors by an estimation method involving nonorthogonal measurements. The angle between the two states shows a trade-off between accuracy of the estimation and robustness to noises. We show a way to run the unconditionally secure B92. | |||||
所蔵 | ||||||
値 | 有 |