Research and Development

Overview

Research loop in the project and contribution of Subject B

1st page slide

Slide 1


Results

(3-1) Efficient error correcting codes / Titech

2nd page slide

Slide 2


(3-2) Efficient Privacy amplification / Nagoya Univ., Mitsubishi

Proposal of dual unversal2 hash functionsa

— From Quantum Cryptography to Modern Cryptography —

3rd  page slide

Slide 3


Research loop to close security loopholes

— Toward guaranteeing the implementation security —

4th  page slide

Slide 4


(3-3) Theoretical Countermeasures against security loopholes / NTT

5th  page figures

Figures from slide 5

According to the existing analysis, called GLLP, the key rate R decreases significantly with slight imperfections in preparing the states. We have proposed "loss-tolerant protocol" to solve this problem, in which we exploit basis mismatched instances and only three flawed states.

K. Tamaki, M. Curty, G. Kato, H.-K. Lo, and K. Azuma, Phys. Rev. A 90, 052314 (2014).

Slide 5


We have generalized our loss-tolerant protocol for easier characterization of the source and for taking into account the finite-size effect of the sending pulses.


Easier characterization based on modulation regimes Finite-size effect
6th  page figures

Figures from slide 6

  • item pointOur protocol is now implemented by a number of experiments
  • item pointOur results are a step forward toward guaranteeing the implementation security of QKD

Slide 6


(3-4) Device characterization experiments / Hokkaido Univ.

Requirements on device characteristics

7th page figures

Slide 7


Criteria for phase randamization

We related randomization to a mearsurable quantity: visibility of interface

8th page drawing

Slide 8


Inter-pulse phase correlation for 10GHz

9th page slide

Slide 9


Intensity fluctuation in Decoy-state QKD

10th page slide

Slide 10


Intensity fluctuation in Gain-Switched LD


  • item pointTarget range: 3σ / μ < 5%, determined from security theories
  • item pointIntensity fluctuation was measured for a gain-switched LD
  • item pointGain switching LD can satisfy the above criterion by strong excitation
    • recursed item pointDC bias is limited by the phase correlation between pulses
    • recursed item pointPulse current is limited by a LD-driver
  • item pointLarge fluctuation was observed for weak excitation
  • item pointWe found unstable gain switching when the pulse period is comparable with carrier lifetime
11th page figures

Slide 11


State preparation flaw


12th page slide

Slide 12


Improved implementation


13th page slide

Slide 13


Supression of phase uncertainty


14th page slide

Slide 14


(3-5) Contributions to basic research

Titech


Before 2014, finite key length analysis of the B92 protocol had not been done. We applied the convex optimization technique previously introduced by us into the QKD area, and we obtained secure key rate of the B92 as above. (ISIT 2014).

15th page figures

Slide 15


NTT


14th page slide

Slide 16