Nippon Telegraph and Telephone Corporation(NTT; Kiyoshi Tamaki)
Mitsubishi Electric Corporation
Hokkaido University
Nagoya University
Tokyo Institute of Technology(Titech)
Proposal of dual unversal2 hash functionsa
— From Quantum Cryptography to Modern Cryptography —
Research loop to close security loopholes
— Toward guaranteeing the implementation security —
According to the existing analysis, called GLLP, the key rate R decreases significantly with slight imperfections in preparing the states. We have proposed "loss-tolerant protocol" to solve this problem, in which we exploit basis mismatched instances and only three flawed states.
K. Tamaki, M. Curty, G. Kato, H.-K. Lo, and K. Azuma, Phys. Rev. A 90, 052314 (2014).
Slide 5
We have generalized our loss-tolerant protocol for easier characterization of the source and for taking into account the finite-size effect of the sending pulses.
Easier characterization based on modulation regimes | Finite-size effect |
---|
Slide 6
Requirements on device characteristics
Criteria for phase randamization
We related randomization to a mearsurable quantity: visibility of interface
Inter-pulse phase correlation for 10GHz
Intensity fluctuation in Decoy-state QKD
Intensity fluctuation in Gain-Switched LD
State preparation flaw
Improved implementation
Supression of phase uncertainty
Titech
Before 2014, finite key length analysis of the B92 protocol had not been done. We applied the convex optimization technique previously introduced by us into the QKD area, and we obtained secure key rate of the B92 as above. (ISIT 2014).
NTT