{"created":"2023-06-20T13:21:08.210440+00:00","id":1241,"links":{},"metadata":{"_buckets":{"deposit":"29c055d0-ca1d-4749-b1ce-8d562664ce6e"},"_deposit":{"created_by":1,"id":"1241","owners":[1],"pid":{"revision_id":0,"type":"depid","value":"1241"},"status":"published"},"_oai":{"id":"oai:ir.soken.ac.jp:00001241","sets":["2:431:24"]},"author_link":["10171","10172","10170"],"item_1_creator_2":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"玉木, 潔"}],"nameIdentifiers":[{"nameIdentifier":"10170","nameIdentifierScheme":"WEKO"}]}]},"item_1_creator_3":{"attribute_name":"フリガナ","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"タマキ, キヨシ"}],"nameIdentifiers":[{"nameIdentifier":"10171","nameIdentifierScheme":"WEKO"}]}]},"item_1_date_granted_11":{"attribute_name":"学位授与年月日","attribute_value_mlt":[{"subitem_dategranted":"2004-03-24"}]},"item_1_degree_grantor_5":{"attribute_name":"学位授与機関","attribute_value_mlt":[{"subitem_degreegrantor":[{"subitem_degreegrantor_name":"総合研究大学院大学"}]}]},"item_1_degree_name_6":{"attribute_name":"学位名","attribute_value_mlt":[{"subitem_degreename":"博士(理学)"}]},"item_1_description_12":{"attribute_name":"要旨","attribute_value_mlt":[{"subitem_description":"In this thesis, we analyze the security of the Bennett 1992 quantum key-distribution protocol (B92 protocol) over a realistic channel assuming that bit values are encoded in single photon polarization states.
  First, we study the security of the B92 protocol against individual attack. In the individual attack, eavesdropper (Eve) interacts a qubit emitted by the sender (Alice) with her probe system followed by a measurement on each probe. To make our analysis simple, we propose a modified B92 protocol. Using this protocol, Alice and the receiver (Bob) can estimate Eve's information gain as a function of a few parameters that reflect the imperfections of devices or Eve's disturbance. We find a counter-intuitive behavior of Eve's maximum information gain, i.e., it decreases as the amount of disturbances increases. We also estimate the secret key gain that is the net growth of the secret key per one pulse. We show the region where the modified B92 protocol over a realistic channel is secure against individual attack.
  Next, we study the unconditional security of the B92 protocol, which is the security against any attack. To prove the security, we first propose a protocol that is unconditionally secure and can be reduced to the B92 protocol. This protocol employs the entanglement distillation protocol (EDP) based on a filtering operation and the Calderbank-Shor-Steane (CSS) quantum error correcting codes. The bit errors and the phase errors, which have to be estimated for the EDP based on the CSS codes, are correlated after the filtering operation, and we can bound the amount of phase errors from the observed bit errors by an estimation method involving nonorthogonal measurements. The angle between the two states shows a trade-off between accuracy of the estimation and robustness to noises. We show a way to run the unconditionally secure B92.","subitem_description_type":"Other"}]},"item_1_description_7":{"attribute_name":"学位記番号","attribute_value_mlt":[{"subitem_description":"総研大甲第790号","subitem_description_type":"Other"}]},"item_1_select_14":{"attribute_name":"所蔵","attribute_value_mlt":[{"subitem_select_item":"有"}]},"item_1_select_8":{"attribute_name":"研究科","attribute_value_mlt":[{"subitem_select_item":"先導科学研究科"}]},"item_1_select_9":{"attribute_name":"専攻","attribute_value_mlt":[{"subitem_select_item":"22 光科学専攻"}]},"item_1_text_10":{"attribute_name":"学位授与年度","attribute_value_mlt":[{"subitem_text_value":"2003"}]},"item_creator":{"attribute_name":"著者","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"TAMAKI, Kiyoshi","creatorNameLang":"en"}],"nameIdentifiers":[{"nameIdentifier":"10172","nameIdentifierScheme":"WEKO"}]}]},"item_files":{"attribute_name":"ファイル情報","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_date","date":[{"dateType":"Available","dateValue":"2016-02-17"}],"displaytype":"simple","filename":"甲790_要旨.pdf","filesize":[{"value":"143.3 kB"}],"format":"application/pdf","licensetype":"license_11","mimetype":"application/pdf","url":{"label":"要旨・審査要旨 / Abstract, Screening Result","url":"https://ir.soken.ac.jp/record/1241/files/甲790_要旨.pdf"},"version_id":"55b393bb-7981-4e23-9bcc-027e59fbe0ef"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"eng"}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourcetype":"thesis","resourceuri":"http://purl.org/coar/resource_type/c_46ec"}]},"item_title":"Security analysis of the Bennett 1992 quantum key-distribution protocol over a realistic channel","item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"Security analysis of the Bennett 1992 quantum key-distribution protocol over a realistic channel"},{"subitem_title":"Security analysis of the Bennett 1992 quantum key-distribution protocol over a realistic channel","subitem_title_language":"en"}]},"item_type_id":"1","owner":"1","path":["24"],"pubdate":{"attribute_name":"公開日","attribute_value":"2010-02-22"},"publish_date":"2010-02-22","publish_status":"0","recid":"1241","relation_version_is_last":true,"title":["Security analysis of the Bennett 1992 quantum key-distribution protocol over a realistic channel"],"weko_creator_id":"1","weko_shared_id":1},"updated":"2023-06-20T14:39:56.744201+00:00"}