Zum Hauptinhalt springen

Showing 1–2 of 2 results for author: Tamaki, K

Searching in archive cs. Search in all archives.
.
  1. arXiv:0905.4325  [pdf, other

    quant-ph cs.CR

    Updating Quantum Cryptography Report ver. 1

    Authors: Donna Dodson, Mikio Fujiwara, Philippe Grangier, Masahito Hayashi, Kentaro Imafuku, Ken-ichi Kitayama, Prem Kumar, Christian Kurtsiefer, Gaby Lenhart, Norbert Luetkenhaus, Tsutomu Matsumoto, William J. Munro, Tsuyoshi Nishioka, Momtchil Peev, Masahide Sasaki, Yutaka Sata, Atsushi Takada, Masahiro Takeoka, Kiyoshi Tamaki, Hidema Tanaka, Yasuhiro Tokura, Akihisa Tomita, Morio Toyoshima, Rodney van Meter, Atsuhiro Yamagishi , et al. (2 additional authors not shown)

    Abstract: Quantum cryptographic technology (QCT) is expected to be a fundamental technology for realizing long-term information security even against as-yet-unknown future technologies. More advanced security could be achieved using QCT together with contemporary cryptographic technologies. To develop and spread the use of QCT, it is necessary to standardize devices, protocols, and security requirements a… ▽ More

    Submitted 27 May, 2009; originally announced May 2009.

    Comments: 74 pages

  2. Phase-Remapping Attack in Practical Quantum Key Distribution Systems

    Authors: Chi-Hang Fred Fung, Bing Qi, Kiyoshi Tamaki, Hoi-Kwong Lo

    Abstract: Quantum key distribution (QKD) can be used to generate secret keys between two distant parties. Even though QKD has been proven unconditionally secure against eavesdroppers with unlimited computation power, practical implementations of QKD may contain loopholes that may lead to the generated secret keys being compromised. In this paper, we propose a phase-remapping attack targeting two practical… ▽ More

    Submitted 5 March, 2007; v1 submitted 17 January, 2006; originally announced January 2006.

    Comments: 13 pages, 8 figures

    Journal ref: Phys. Rev. A 75, 032314 (2007)