• Title/Summary/Keyword: 양자오류보정

Search Result 5, Processing Time 0.027 seconds

Secret key information reconciliation protocol using LDPC code (LDPC 부호를 이용한 암호키 정보 보정 프로토콜)

  • Lee, Sunghoon;Heo, Jun
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2014.11a
    • /
    • pp.228-229
    • /
    • 2014
  • 양자 키 분배는 안정한 통신을 위해 고안된 암호 체계이다. 양자 키 분배의 후처리 과정 중 정보 보정은 두 적법한 사용자 간의 연관 관계가 있는 정보를 일치시키는 과정이다. 고전 오류 정정 과정과 비슷하며 이 과정을 위해 추가 정보를 주고받기 때문에 도청자에게 일정량의 정보가 노출된다. 따라서 정보 보정 프로토콜에서 노출된 정보량은 프로토콜의 성능을 결정하는 중요한 요인이 된다. 본 논문에서는 Winnow 프로토콜과 LDPC 부호를 이용한 프로토콜을 노출된 정보량과 평균 통신 횟수 측면에서 비교한다. 그 결과로 Winnow 프로토콜에 비해 LDPC 부호를 이용한 프로토콜이 현재 양자 키 분배 시스템에서 더 좋은 기술이 될 수 있음을 보인다. 또한 LDPC 부호를 이용한 프로토콜이 가지는 단점을 극복할 수 있는 향후 연구 방향을 제시한다.

  • PDF

Technology Trends of Fault-tolerant Quantum Computing (결함허용 양자컴퓨팅 시스템 기술 연구개발 동향)

  • Hwang, Y.;Kim, T.W.;Baek, C.H.;Cho, S.U.;Kim, H.S.;Choi, B.S.
    • Electronics and Telecommunications Trends
    • /
    • v.37 no.2
    • /
    • pp.1-10
    • /
    • 2022
  • Similar to present computers, quantum computers comprise quantum bits (qubits) and an operating system. However, because the quantum states are fragile, we need to correct quantum errors using entangled physical qubits with quantum error correction (QEC) codes. The combination of entangled physical qubits with a QEC protocol and its computational model are called a logical qubit and fault-tolerant quantum computation, respectively. Thus, QEC is the heart of fault-tolerant quantum computing and overcomes the limitations of noisy intermediate-scale quantum computing. Therefore, in this study, we briefly survey the status of QEC codes and the physical implementation of logical qubit over various qubit technologies. In summary, we emphasize 1) the error threshold value of a quantum system depends on the configurations and 2) therefore, we cannot set only any specific theoretical and/or physical experiment suggestion.

Performance of privacy Amplification in Quantum Key Distribution Systems (양자 키 분배 시스템에서 보안성 증폭의 성능 분석)

  • Lee, Sun-Yui;Kim, Jin-Young
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.18 no.5
    • /
    • pp.111-116
    • /
    • 2018
  • This paper introduces the concept of a random universal hash function to amplify security in a quantum key distribution system. It seems to provide security amplification using the relationship between quantum error correction and security. In addition, the approach in terms of security amplification shows that phase error correction offers better security. We explain how the universal hash function enhances security using the BB84 protocol, which is a typical example of QKD(Quantum Key Distribution). Finally, we show that the BB84 protocol using random privacy amplification is safe at higher key rates than Mayers' performance at the same error rate.

A Image Post-processing Method using Modified MSDS (수정된 MSDS를 이용한 영상의 후처리 기법)

  • 김은석;채병조;오승준
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.24 no.8B
    • /
    • pp.1480-1489
    • /
    • 1999
  • In this paper, we propose a new post-processing method which can solve a problem of MSDS(Mean Squared Difference of Slope) method. Using that method the blocking artifacts can significantly be reduced without any restriction, which is a major drawback of block-based DCT compression method. In this approach, the OSLD(Overlapped Sub-Laplacian Distribution) of dequantized block boundary pixel difference values is defined and used to categorize each block of an image into one of four types. Those types are also classified into one of two classes: an edge and a non-edge classes. A slope across the block boundary is used to quantify discontinuity of the image. If an absolute estimated quantization error value of a DCT coefficient is greater than the corresponding quantization step size, it is saturated to the step size in the edge class. The proposed post-processing method can improve not only the PSNR value up to 0.1~O.3 dB but visual quality without any constraints determined by ad-hoc manner.

  • PDF

Privacy Amplification of Quantum Key Distribution Systems Using Dual Universal Hush Function (듀얼 유니버셜 해쉬 함수를 이용한 양자 키 분배 시스템의 보안성 증폭)

  • Lee, Sun Yui;Kim, Jin Young
    • Journal of Satellite, Information and Communications
    • /
    • v.12 no.1
    • /
    • pp.38-42
    • /
    • 2017
  • This paper introduces the concept of a dual hash function to amplify security in a quantum key distribution system. We show the use of the relationship between quantum error correction and security to provide security amplification. Also, in terms of security amplification, the approach shows that phase error correction offers better security. We describe the process of enhancing security using the universal hash function using the BB84 protocol, which is a typical example of QKD. Finally, the deterministic universal hash function induces the security to be evaluated in the quantum Pauli channel without depending on the length of the message.