Quantum cryptography
QKD field test
-
K. Yoshino, M. Fujiwara, A. Tanaka, S. Takahashi, Y. Nambu, A. Tomita, S. Miki, T. Yamashita, Z. Wang, M. Sasaki, and A. Tajima,
"High-speed wavelength-division multiplexing quantum key distribution system,"
Opt. Lett. 37 (2), pp. 223--225 (2012).
-
M. Sasaki, M. Fujiwara, H. Ishizuka, W. Klaus, K. Wakui, M. Takeoka, A. Tanaka, K. Yoshino, Y. Nambu, S. Takahashi, A. Tajima, A. Tomita, T. Domeki, T. Hasegawa, Y. Sakai, H. Kobayashi, T. Asai, K. Shimizu, T. Tokura, T. Tsurumaru, M. Matsui, T. Honjo, K. Tamaki, H. Takesue, Y. Tokura, J. F. Dynes, A. R. Dixon, A. W. Sharpe, Z. L. Yuan, A. J. Shields, S. Uchikoga, M. Legré, S. Robyr, P. Trinkler, L. Monat, J.-B. Page, G. Ribordy, A. Poppe, A. Allacher, O. Maurhart, T. Länger, M. Peev, and A. Zeilinger,
"Field test of quantum key distribution in the Tokyo QKD Network,"
Opt. Express 19 (11), pp. 10387--10409 (2011).
-
M. Peev, C. Pacher, R. Alléaume, C. Barreiro, J. Bouda, W. Boxleitner, T. Debuisschert, E. Diamanti, M. Dianati, J. F. Dynes, S. Fasel, S. Fossier, M. Fürst, J.-D. Gautier, O. Gay, N. Gisin, P. Grangier, A. Happe, Y. Hasani, M. Hentschel, H. Hübel, G. Humer, T. Länger, M. Legré, R. Lieger, J. Lodewyck, T. Lorünser, N. Lütkenhaus, A. Marhold, T. Matyus, O. Maurhart, L. Monat, S. Nauerth, J.-B. Page, A. Poppe, E. Querasser, G. Ribordy, S. Robyr, L. Salvail, A. W. Sharpe, A. J. Shields, D. Stucki, M. Suda, C. Tamas, T. Themel, R. T. Thew, Y. Thoma, A. Treiber, P. Trinkler, R. Tualle-Brouri, F. Vannel, N. Walenta, H. Weier, H. Weinfurter, I. Wimberger, Z. L. Yuan, H. Zbinden, and A. Zeilinger,
"The SECOQC quantum key distribution network in Vienna,"
New J. of Phys. 11, pp. 075001/1--37 (2009).
-
A. Tanaka, M. Fujiwara, S. W. Nam, Y. Nambu, S. Takahashi, W. Maeda, K. Yoshino, S. Miki, B. Baek, Z. Wang, A. Tajima, M. Sasaki, and A. Tomita,
"Ultra fast quantum key distribution over a 97 km installed telecom fiber with wavelength division multiplexing clock synchronization,"
Opt. Express. 16 (15), pp. 11354--11360 (2008).
QKD implementation
-
A. R. Dixon, Z. L. Yuan, J. F. Dynes, A. W. Sharpe, and A. J. Shields,
"Continuous operation of high bit rate quantum key distribution,"
Appl. Phys. Lett., 96 (16), p. 161102/1--3 (2010).
Security threats
-
M. Fujiwara, S. Miki, T. Yamashita, Z. Wang, and M. Sasaki,
"Photon level crosstalk between parallel fibers installed in urban area,"
Opt. Express. 18 (21), pp. 22199--22207 (2010).
Countermeasures against attacks
-
Z. L. Yuan, J. F. Dynes, and A. J. Shields,
"Avoiding the blinding attack in QKD,"
Nature Photonics 4 (12), pp.800--801 (2010).
Protocol proposal and countermeasure against side-channels
-
K. Tamaki, H.-K. Lo, C.-H. Fred Fung, and B. Qi,
"Phase encoding schemes for measurement device independent quantum key distribution and basis-dependent flaw,"
arXiv:1111.3413v2 [quant-ph] , pp. 1--14 (2011).
Protocol improvement
-
M. Hayashi and T. Tsurumaru,
"Simple and Tight Security Analysis of the Bennett-Brassard 1984 Protocol with Finite Key Lengths,"
arXiv:1107.0589v1.
-
T. Tsurumaru and M. Hayashi,
"Dual universality of hash functions and its applications to classical and quantum cryptography,"
arXiv:1101.0064v2.
-
M. Hayashi,
"Optimal ratio between phase basis and bit basis in quantum key distributions,"
Physical Review A 79(2), pp. 020303/1--4 (2009).
Protocol proposal
-
R. Matsumoto and S. Watanabe,
"Narrow basis angle doubles secret key in the BB84 protocol,"
Journal of Physics A: Mathematical and Theoretical 43(14), p. 145302 (2010).
-
M. Lucamarini, G. Di Giuseppe, and K. Tamaki,
"Robust Unconditionally Secure Quantum Key Distribution with Two Nonorthogonal and Uninformative States,"
Phys. Rev. A 80(3), pp. 032327/1--7 (2009).
-
S. Watanabe, R. Matsumoto, and T. Uyematsu,
"Tomography increases key rates of quantum-key-distribution protocols,"
Physical Review A 78(4), p. 042316 (2008).
Security analysis
-
Y. Sano, R. Matsumoto, and T. Uyematsu,
"Secure key rate of the BB84 protocol using finite sample bits,"
Journal of Physics A: Mathematical and Theoretical 43(49), p. 495302 (2010).
-
G. Kato and K. Tamaki,
"Security of six-state quantum key distribution protocol with threshold detectors,"
arXiv:1008.4663v1 [quant-ph] , pp. 1--4 (2010).
Proof technique
-
K. Tamaki and G. Kato,
"Quantum circuit for security proof of quantum key distribution without encryption of error syndrome and noisy processing,"
Phys. Rev. A 81, p. 022316 (2010).
Error correction
-
K. Kasai, M. Hagiwara, H. Imai and K. Sakaniwa,
"Quantum Error Correction beyond the Bounded Distance Decoding Limit,"
IEEE Trans. Information Theory PP(99), pp. 1--9 (2012).
-
K. Kasai, D. Declercq, C. Poulliat and K. Sakaniwa,
"Multiplicatively Repeated Nonbinary LDPC Codes,"
IEEE Transactions on Information Theory 57(10), pp. 6788 -- 6795 (2011).
-
K. Kasai, R. Matsumoto and K. Sakaniwa,
"Information Reconciliation for QKD with Rate-Compatible Non-Binary LDPC Codes,"
Proc. of IEICE International Symposium on Information Theory and its Applications (ISITA 2010), pp. 922 -- 927 (2010).