Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
QIT (2nd) |
2014-11-17 13:30 |
Miyagi |
Tohoku Univ. |
[Poster Presentation]
Continuos Variable Quantum Key Distribution system for high-speed operation Yusuke Oguri, Vanou Ishii, Takuto Matsubara, Tsubasa Ichikawa, Takuya Hirano (Gakushuin Univ.), Kenta Kasai, Ryutaroh Matsumoto (Tokyo Tech.), Toyohiro Tsurumaru (Mitsubishi Electric) |
We report an experimental implementation of a continuous variable quantum key distribution (CV-QKD) protocol with discre... [more] |
|
ISEC |
2014-09-05 13:45 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Problem with Interpretation of Trace Distance as Failure Probability in Quantum Key Distribution: Part II Takehisa Iwakoshi (Tamagawa Univ.) ISEC2014-48 |
Quantum Key Distribution (QKD) has been attracting attention as an important technique to share a provably secure key un... [more] |
ISEC2014-48 pp.9-11 |
QIT (2nd) |
2014-05-12 14:50 |
Aichi |
Nagoya Univ. |
[Invited Talk]
Quantum key distribution: From fundamental research to construction of network Kiyoshi Tamaki (NTT BRL) |
Part of experimental researches on quantum key distribution (QKD) has gone beyond the phase of basic researches, and now... [more] |
|
QIT (2nd) |
2014-05-12 16:30 |
Aichi |
Nagoya Univ. |
Problem with Interpretation of Trace Distance as Failure Probability in Quantum Key Distribution Takehisa Iwakoshi, Osamu Hirota (Tamagawa Univ.) |
Quantum Key Distribution (QKD) has been attracting attention as an important technique to share an information-theoretic... [more] |
|
QIT (2nd) |
2013-11-18 - 2013-11-19 |
Tokyo |
Waseda Univ. |
[Poster Presentation]
Evaluation of the phase correlation between the optical pulses for transmission in quantum key distribution at 10 GHz Toshiya Kobayashi, Akihisa Tomita, Atsushi Okamoto (Hokkaido Univ.) |
Quantum key distribution (BB84) using a weak coherent state light source have been shown secure on the assumption that t... [more] |
|
SCE |
2013-10-03 09:55 |
Miyagi |
Tohoku University, RIEC |
Fabrication of superconducting single-photon detector with ultralow dark count rate and quantum key distribution over 300 km Hiroyuki Shibata, Kaoru Shimizu, Toshimori Honjo, Hiroki Takesue, Yasuhiro Tokura (NTT) SCE2013-30 |
We report the fabrication of a superconducting nanowire single-photon detector (SSPD) with an ultralow dark count rate (... [more] |
SCE2013-30 pp.61-66 |
QIT (2nd) |
2013-05-27 10:30 |
Hokkaido |
Hokkaido Univ. |
On misconception of Koashi's key rate theory of quantum key distribution Osamu Hirota (Tamagawa Univ.) |
It has been pointed out many times by Yuen that the security theory of quantum key distribution(QKD) originated by Shor-... [more] |
|
IT, ISEC, WBS |
2013-03-08 11:45 |
Osaka |
Kwansei Gakuin Univ., Osaka-Umeda Campus |
On fundamental defect of rate theory of quantum key distribution and quantum repeater Osamu Hirota (Tamagawa Univ.) IT2012-92 ISEC2012-110 WBS2012-78 |
It has been pointed out many times by several researchers that the security theory of quantum key distribution(QKD) orig... [more] |
IT2012-92 ISEC2012-110 WBS2012-78 pp.189-194 |
QIT (2nd) |
2012-11-27 - 2012-11-28 |
Kanagawa |
Keio Univ. Hiyoshi Campus |
[Poster Presentation]
Evaluation of the phase correlation between the optical pulses for transmission in quantum key distribution Toshiya Kobayashi, Akihisa Tomita, Atsushi Okamoto (Hokkaido Univ.) |
Security proofs of the quantum key distribution (BB84) have been performed on the assumption that the phase correlation ... [more] |
|
QIT (2nd) |
2012-11-27 - 2012-11-28 |
Kanagawa |
Keio Univ. Hiyoshi Campus |
[Poster Presentation]
On the Key Rate of Continuous Variable Quantum Key Distribution with Discrete Modulations under Entangling Cloner Attacks Tsubasa Ichikawa, Kazuhiro Murayama, Takuya Hirano (Gakushuin Univ.) |
We present a security analysis of a continuous-variable quantum key distribution protocol with discrete modulations, ass... [more] |
|
ISEC |
2012-05-18 13:25 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Incompleteness of the criterion for information theoretically key agreement Osamu Hirota (Tamagawa Univ.) ISEC2012-2 |
Despite theoretical haughty claim on the security of quantum key distribution (QKD), even the security for the basic mod... [more] |
ISEC2012-2 pp.5-10 |
CS, OCS (Joint) |
2012-01-27 11:40 |
Mie |
ISESHI-KANKOUBUNKAKAIKAN |
Limit of quantitative evaluation of the security of quantum key distribution Osamu Hirota (Tamagawa Univ.) OCS2011-117 |
Recently, many experimental results breaking the quantum key distribution (QKD) have been reported. In addition, a serio... [more] |
OCS2011-117 pp.67-72 |
SANE, SAT (Joint) |
2011-02-25 15:30 |
Hyogo |
NICT Kobe Research Laboratories |
Study on high speed mobile laser communications and secure global quantum key distribution technology Morio Toyoshima, Takashi Sasaki, Hideki Takenaka, Yoshihisa Takayama, Mikio Fujiwara, Masahiro Takeoka, Masahide Sasaki, Zhen Wang, Shigehito Miki, Taro Yamashita, Hidema Tanaka, Atsushi Waseda, Seiho Uratsuka, Toshihiko Umehara, Jyunpei Uemoto (NICT) SANE2010-167 |
National Institute of Information and Communications Technology (NICT) successfully developed the quantum entanglement s... [more] |
SANE2010-167 pp.49-51 |
OCS, CS (Joint) |
2011-01-27 14:50 |
Tokushima |
The University of Tokushima |
Development of a key distillation hardware engine for high speed quantum-key distribution Akihiro Tanaka (NEC), Mikio Fujiwara (NICT), Akihisa Tomita (Hokkaido univ), Akio Tajima (NEC) OCS2010-103 |
Not only the improvement of single photon transmission performance, but also the improvement of the subsequent signal pr... [more] |
OCS2010-103 pp.25-30 |
OCS, CS (Joint) |
2011-01-27 15:15 |
Tokushima |
The University of Tokushima |
Defect of quantum key distribution and proposal of a new method Osamu Hirota, Dan Murakami (Tamagawa Univ.) OCS2010-104 |
Recently, a serious defect in the quantitative evaluation for quantum key distribution has been derived. So we need to... [more] |
OCS2010-104 pp.31-36 |
ITE-BCT, OCS, OFT, IEE-CMN (Joint) [detail] |
2010-11-18 15:20 |
Osaka |
SEI Ikoma Seminar House |
Inappropriateness in network application and insecurity of single photon quantum cryptography
-- Impractical network by quantum key distribution -- Osamu Hirota (Tamagawa Univ.) OCS2010-89 |
The real network requires good balance of the communication property and the security. The paper will show first the poo... [more] |
OCS2010-89 pp.1-6 |
IT, ISEC, WBS |
2010-03-05 13:50 |
Nagano |
Nagano-Engineering Campus, Shinshu University |
Secure Key Rate of the BB84 Protocol using Finite Sample Bits Yousuke Sano, Ryutaroh Matsumoto, Tomohiko Uyematsu (Tokyo Inst. of Tech.) IT2009-138 ISEC2009-146 WBS2009-117 |
We improve the nonasymptotic key rate shown by Scarani and Renner by proposing several methods to construct tighter cons... [more] |
IT2009-138 ISEC2009-146 WBS2009-117 pp.427-432 |
IT, ISEC, WBS |
2010-03-05 14:15 |
Nagano |
Nagano-Engineering Campus, Shinshu University |
Bit Transmission Probability Maximizing the Key Rate of the BB84 Protocol Sonny Lumbantoruan, Ryutaroh Matsumoto, Tomohiko Uyematsu (Tokyo Inst. of Tech.) IT2009-139 ISEC2009-147 WBS2009-118 |
In all papers on the BB84 protocol, the transmission probability of each bit value is usually set to be equal. In this p... [more] |
IT2009-139 ISEC2009-147 WBS2009-118 pp.433-438 |
SCE |
2010-01-20 11:30 |
Tokyo |
Kikai-Shinkou-Kaikan Bldg. |
Comparison of timing jitter between NbN superconducting single-photon detector and avalanche photodiode Tadakiyo Seki, Hiroyuki Shibata (NTT Corp./Osaka Univ.), Hiroki Takesue, Yasuhiro Tokura (NTT), Nobuyuki Imoto (Osaka Univ.) SCE2009-26 |
We report the pulse-to-pulse timing jitter measurement of a niobium nitride (NbN) superconducting single-photon detector... [more] |
SCE2009-26 pp.11-15 |
IT |
2009-09-30 13:00 |
Tokyo |
Sophia Univ. |
[Invited Talk]
Problems in application of LDPC codes to information reconciliation in quantum key distribution protocols Ryutaroh Matsumoto (Tokyo Inst. of Tech.) IT2009-41 |
The information reconciliation in a quantum key distribution protocol
can be studied separately from other steps in the... [more] |
IT2009-41 pp.49-52 |