Browse > Article

Efficient Post-Processing for Quantum Communication Systems  

Lee, Sun Yui (광운대학교 전파공학과 소속 유비쿼터스 통신 연구실)
Jung, Kuk Hyun (광운대학교 전파공학과 소속 유비쿼터스 통신 연구실)
Kim, Jin Young (광운대학교 전파공학과 소속 유비쿼터스 통신 연구실)
Publication Information
Journal of Satellite, Information and Communications / v.9, no.4, 2014 , pp. 7-12 More about this Journal
Abstract
Quantum cryptography is one of the most feasible fields using quantum mechanics. Therefore, quantum cryptography has consistently been researched, and a variety of cryptographic exchange method has been developed, such as BB84, etc. This paper explains a basic concept of quantum communications and quantum key distribution systems using quantum mechanics. Also, it introduces a reason of the development of quantum cryptography and attack scenarios which threaten the security of QKD. Finally, the experiment of this paper simulates quantum key attack by estimating qubit phases through a modeled quantum channel, and discusses needs of post-processing methods for overcoming eavesdropping.
Keywords
Entanglement; No-cloning theorem; qubit; SPIR(Symmetrically privae information retrieval); QKD(Quantum Key Distribution); PNS(Photon number splitting); SSPDs(Superconducting Singlephoton Detectors); SPD(Single Photon Detector);
Citations & Related Records
연도 인용수 순위
  • Reference
1 N.Gisin,G. Ribordy,W. Tittel, andH. Zbinden, "Quantum cryptography,"Rev. Mod. Phys., vol. 74, pp. 145-95, 2002.   DOI   ScienceOn
2 K. Inoue, E. Waks, and Y. Yamamoto, "Differential-phase-shift quantum key distribution,"Phys. Rev. Lett., vol. 89, no. 3, pp. 037902-1-37902-3, Jul. 2002.   DOI   ScienceOn
3 K. Inoue, E. Waks, and Y. Yamamoto, "Differential-phase-shift quantum key distribution using coherent light,"Phys. Rev. A, vol. 68, pp. 022317-1-022317-3, Aug. 2003.   DOI
4 C. H. Bennett, G. Brassard, C. Crepeau, and U. M. Maurer, "Generalized privacy amplification,"IEEE Trans. Inf. Theory, vol. 41, no. 6, pp. 1915-1923, Nov. 1995.   DOI   ScienceOn
5 E. Waks, H. Takesue, and Y. Yamamoto, "Security of differential-phaseshift quantum key distribution against individual attacks,"Phys. Rev. A, vol. 73, no. 7, pp. 012344-1-12344-9, Jan. 2006.   DOI
6 M. Curty, L. L. Zhang, H. -H. Lo, and N. Lutkenhaus, "Sequential attacks against differential-phase-shift quantum key distribution with weak coherent states,"Quant. Inf. Comput., vol. 7, no. 7, pp. 665-88,
7 F. Gao, B. Liu, Q.-YWen, and H. Chen, "Flexible quantum private queries based on quantum key distribution,"Opt. Exp., vol. 20, pp. 17411-7420, 2012.   DOI
8 J. Zhang, F.-Z Guo, F. Gao, B. Liu, and Q.-Y Wen, "Private database queries based on counterfactual quantum key distribution,"Phys. Rev. A, vol. 88, p. 022334, 2013.   DOI
9 M. V. P. Rao and M. Jakobi, "Towards communication-efficient quantum oblivious key distribution," Phys. Rev. A, vol. 87, p. 012331, 2013.   DOI