特集_03-07.Q3C

Similar documents

量子暗号通信の仕組みと開発動向

<4D F736F F D20838A B F955C8E8682A982E796DA8E9F914F5F A815B FD B A5F E646F63>

21 Key Exchange method for portable terminal with direct input by user

( )

Research Question Unacceptable Files:FS GQM 1 2 GQM s r 2.1 GQM Goal-Question-Metric GQM [2] GQM 3 Qustions GQM 3 GQM 2.2 UFs AFs Acceptable Fi

21 Quantum calculator simulator based on reversible operation

1 DHT Fig. 1 Example of DHT 2 Successor Fig. 2 Example of Successor 2.1 Distributed Hash Table key key value O(1) DHT DHT 1 DHT 1 ID key ID IP value D

4 i

1 Fig. 1 Extraction of motion,.,,, 4,,, 3., 1, 2. 2.,. CHLAC,. 2.1,. (256 ).,., CHLAC. CHLAC, HLAC. 2.3 (HLAC ) r,.,. HLAC. N. 2 HLAC Fig. 2

TCP/IP IEEE Bluetooth LAN TCP TCP BEC FEC M T M R M T 2. 2 [5] AODV [4]DSR [3] 1 MS 100m 5 /100m 2 MD 2 c 2009 Information Processing Society of

untitled

ID 3) 9 4) 5) ID 2 ID 2 ID 2 Bluetooth ID 2 SRCid1 DSTid2 2 id1 id2 ID SRC DST SRC 2 2 ID 2 2 QR 6) 8) 6) QR QR QR QR

/02/ /09/ /05/ /02/ CA /11/09 OCSP SubjectAltName /12/02 SECOM Passport for Web SR

YMS-VPN1_User_Manual

EQUIVALENT TRANSFORMATION TECHNIQUE FOR ISLANDING DETECTION METHODS OF SYNCHRONOUS GENERATOR -REACTIVE POWER PERTURBATION METHODS USING AVR OR SVC- Ju

°Å¹æ¥Ï¥Ã¥·¥å´Ø¿ô

/07/ /10/12 I

[2] , [3] 2. 2 [4] 2. 3 BABOK BABOK(Business Analysis Body of Knowledge) BABOK IIBA(International Institute of Business Analysis) BABOK 7

IPSJ SIG Technical Report 1, Instrument Separation in Reverberant Environments Using Crystal Microphone Arrays Nobutaka ITO, 1, 2 Yu KITANO, 1


(3.6 ) (4.6 ) 2. [3], [6], [12] [7] [2], [5], [11] [14] [9] [8] [10] (1) Voodoo 3 : 3 Voodoo[1] 3 ( 3D ) (2) : Voodoo 3D (3) : 3D (Welc

THE INSTITUTE OF ELECTRONICS, INFORMATION AND COMMUNICATION ENGINEERS TECHNICAL REPORT OF IEICE.

橡qc_report.PDF

,,, 2 ( ), $[2, 4]$, $[21, 25]$, $V$,, 31, 2, $V$, $V$ $V$, 2, (b) $-$,,, (1) : (2) : (3) : $r$ $R$ $r/r$, (4) : 3

[I486S] 暗号プロトコル理論

Wikipedia YahooQA MAD 4)5) MAD Web 6) 3. YAMAHA 7) 8) Vocaloid PV YouTube 1 minato minato ussy 3D MAD F EDis ussy

自然言語処理16_2_45

A Feasibility Study of Direct-Mapping-Type Parallel Processing Method to Solve Linear Equations in Load Flow Calculations Hiroaki Inayoshi, Non-member

28 Horizontal angle correction using straight line detection in an equirectangular image

大学論集第42号本文.indb

29 jjencode JavaScript

1 Web [2] Web [3] [4] [5], [6] [7] [8] S.W. [9] 3. MeetingShelf Web MeetingShelf MeetingShelf (1) (2) (3) (4) (5) Web MeetingShelf

IR0036_62-3.indb

IPSJ SIG Technical Report Vol.2012-CG-148 No /8/29 3DCG 1,a) On rigid body animation taking into account the 3D computer graphics came

1

Vol.53 No (Mar. 2012) 1, 1,a) 1, 2 1 1, , Musical Interaction System Based on Stage Metaphor Seiko Myojin 1, 1,a


IPSJ SIG Technical Report Vol.2014-GN-90 No.16 Vol.2014-CDS-9 No.16 Vol.2014-DCC-6 No /1/24 1,a) 2,b) 2,c) 1,d) QUMARION QUMARION Kinect Kinect

untitled

Bulletin of JSSAC(2014) Vol. 20, No. 2, pp (Received 2013/11/27 Revised 2014/3/27 Accepted 2014/5/26) It is known that some of number puzzles ca

( ) [1] [4] ( ) 2. [5] [6] Piano Tutor[7] [1], [2], [8], [9] Radiobaton[10] Two Finger Piano[11] Coloring-in Piano[12] ism[13] MIDI MIDI 1 Fig. 1 Syst

ESIGN-TSH 1.0 NTT

1., 1 COOKPAD 2, Web.,,,,,,.,, [1]., 5.,, [2].,,.,.,, 5, [3].,,,.,, [4], 33,.,,.,,.. 2.,, 3.., 4., 5., ,. 1.,,., 2.,. 1,,

1

258 5) GPS 1 GPS 6) GPS DP 7) 8) 10) GPS GPS ) GPS Global Positioning System

Fig. 3 Flow diagram of image processing. Black rectangle in the photo indicates the processing area (128 x 32 pixels).

Carter Wegman[8] [1] error-correctiong code[9] [6] [14]( ) Impagliazzo,Levin,Luby [17] leftover hash lemma ( leftover hash lemma Impagliazzo Zu

The 15th Game Programming Workshop 2010 Magic Bitboard Magic Bitboard Bitboard Magic Bitboard Bitboard Magic Bitboard Magic Bitboard Magic Bitbo

B HNS 7)8) HNS ( ( ) 7)8) (SOA) HNS HNS 4) HNS ( ) ( ) 1 TV power, channel, volume power true( ON) false( OFF) boolean channel volume int

IPSJ SIG Technical Report Secret Tap Secret Tap Secret Flick 1 An Examination of Icon-based User Authentication Method Using Flick Input for

1: 2: 3: 4: 2. 1 Exploratory Search [4] Exploratory Search 2. 1 [7] [8] [9] [10] Exploratory Search

2007/8 Vol. J90 D No. 8 Stauffer [7] 2 2 I 1 I 2 2 (I 1(x),I 2(x)) 2 [13] I 2 = CI 1 (C >0) (I 1,I 2) (I 1,I 2) Field Monitoring Server

Vol. 42 No MUC-6 6) 90% 2) MUC-6 MET-1 7),8) 7 90% 1 MUC IREX-NE 9) 10),11) 1) MUCMET 12) IREX-NE 13) ARPA 1987 MUC 1992 TREC IREX-N

Microsoft Excelを用いた分子軌道の描画の実習

Adult Attachment Projective AAP PARS PARS PARS PARS Table

01ⅢⅣⅤⅥⅦⅧⅨⅩ一二三四五六七八九零壱弐02ⅢⅣⅤⅥⅦⅧⅨⅩ一二三四五六七八九零壱弐03ⅢⅣⅤⅥⅦⅧⅨⅩ一二三四五六七八九零壱弐04ⅢⅣⅤⅥⅦⅧⅨⅩ一二三四五六七八九零壱弐05ⅢⅣⅤⅥⅦⅧⅨⅩ一二三四五六七八九零壱弐06ⅢⅣⅤⅥⅦⅧⅨⅩ一二三四五六

ScanFront300/300P セットアップガイド

量子情報科学−情報科学の物理限界への挑戦- 2018

2) TA Hercules CAA 5 [6], [7] CAA BOSS [8] 2. C II C. ( 1 ) C. ( 2 ). ( 3 ) 100. ( 4 ) () HTML NFS Hercules ( )

大学における原価計算教育の現状と課題


1 4 4 [3] SNS 5 SNS , ,000 [2] c 2013 Information Processing Society of Japan

2 ( ) i

2011 Future University Hakodate 2011 System Information Science Practice Group Report Project Name Visualization of Code-Breaking Group Name Implemati

YUHO

main.dvi

Web Web Web Web Web, i

(check matrices and minimum distances) H : a check matrix of C the minimum distance d = (the minimum # of column vectors of H which are linearly depen

2). 3) 4) 1.2 NICTNICT DCRA Dihedral Corner Reflector micro-arraysdcra DCRA DCRA DCRA 3D DCRA PC USB PC PC ON / OFF Velleman K8055 K8055 K8055

i

,,,,., C Java,,.,,.,., ,,.,, i

Vol. 45 No Web ) 3) ),5) 1 Fig. 1 The Official Gazette. WTO A

ScanFront 220/220P 取扱説明書

ScanFront 220/220P セットアップガイド

1,a) 1,b) TUBSTAP TUBSTAP Offering New Benchmark Maps for Turn Based Strategy Game Tomihiro Kimura 1,a) Kokolo Ikeda 1,b) Abstract: Tsume-shogi and Ts

On Japanese empathy and interpretation IKEDA, Masatoshi In this paper I compared it with empathy as a manner of psychotherapist about interpretation a

Fig. 3 3 Types considered when detecting pattern violations 9)12) 8)9) 2 5 methodx close C Java C Java 3 Java 1 JDT Core 7) ) S P S

2013 M

Vol.55 No (Jan. 2014) saccess 6 saccess 7 saccess 2. [3] p.33 * B (A) (B) (C) (D) (E) (F) *1 [3], [4] Web PDF a m

21 B92 B92 Quantum cryptography simulator

ActionScript Flash Player 8 ActionScript3.0 ActionScript Flash Video ActionScript.swf swf FlashPlayer AVM(Actionscript Virtual Machine) Windows

04.™ƒ”R/’Ô”�/’Xfl©

untitled

& Vol.5 No (Oct. 2015) TV 1,2,a) , Augmented TV TV AR Augmented Reality 3DCG TV Estimation of TV Screen Position and Ro

Fig. 2 Signal plane divided into cell of DWT Fig. 1 Schematic diagram for the monitoring system

(Visual Secret Sharing Scheme) VSSS VSSS 3 i

_念3)医療2009_夏.indd

2) 3) LAN 4) 2 5) 6) 7) K MIC NJR4261JB0916 8) 24.11GHz V 5V 3kHz 4 (1) (8) (1)(5) (2)(3)(4)(6)(7) (1) (2) (3) (4)

08-特集04.indd

Fig. 1 Experimental apparatus.

IPSJ SIG Technical Report Vol.2013-GN-87 No /3/ Research of a surround-sound field adjustmen system based on loudspeakers arrangement Ak

Kyushu Communication Studies 第2号

生研ニュースNo.132

Microsoft Word - toyoshima-deim2011.doc

IPSJ SIG Technical Report Vol.2009-BIO-17 No /5/26 DNA 1 1 DNA DNA DNA DNA Correcting read errors on DNA sequences determined by Pyrosequencing

:


cp57_h1_0312_n

Key Words: average behavior, upper and lower bounds, Mori-Tanaka theory, composites, polycrystals

Transcription:

3-7 Error Detection and Authentication in Quantum Key Distribution YAMAMURA Akihiro and ISHIZUKA Hirokazu Detecting errors in a raw key and authenticating a private key are crucial for quantum key distribution schemes. Our aim is to propose practical methods for error detection and authentication in quantum key distribution schemes. We introduce several concepts about neighborhood collision free properties of Boolean functions, which are closely related to hash functions, and propose methods based on neighborhood collision free functions and error correcting codes such as Reed-Solomon code. We also examine whether or not widely used cryptographic hash functions SHA-1 and MD5 satisfy the neighborhood collision free property by computation experiments. Quantum cryptography, Error detection and correction, Neighborhood collision, Hash functions 141

142 51 12 2005

143

144 51 12 2005

145

146 51 12 2005

147

148 51 12 2005

149

150 51 12 2005

C.H.Bennett and G.Brassard, Quantum cryptography : Public-key distribution and coin tossing, Proc. Int. Conf. on Computers, Systems and Signal Processing, Bangalore, India, pp.175-179, 1984. C.H.Bennett, Quantum Cryptography Using Any Two Nonorthogonal States, Phys. Rev. Lett., Vol.68, pp.3121-3124, 1992. C.H.Bennett, G.Brassard, C.Crepeau, and U.M.Maurer, Generalized privacy amplification, IEEE Trans. Information Theory, Vol.41, pp.1915-1923, 1995. C.H.Bennett, G.Brassard, and J.M.Robert, Privacy amplification by Public Discussion, SIAM J Comput., Vol.17, pp.210-229, 1988. C.H.Bennett, F.Bessette, G.Brassard, L.Salvail, and J.Smolin, Experimental Quantum Cryptography, J.Cryptology, Vol.5, pp.3-28, 1992. D.Bouwmeester, A.Ekert, and A.Zeilinger, The Physics of Quantum Information, Springer- Verlag, Berlin Heidelberg New York, 2000. B.Chor, O.Goldreich, J.Hastad, J.Freidmann, S.Rudich, and R.Smolensky, The Bit Extraction Problem or t-resilient Functions, 26th IEEE Symp. Foundations of Computer Science, pp.396-407, 1985. A.K.Ekert, Quantum Cryptography Based on Bell's Theorem, Phys. Rev. Lett. Vol.67, No.6, pp.661-663, 1991. FIPS 180-1 : Secure Hash Standard, Federal Information Processing Standard FIPS, Publication 180-1, National Institute of Standards and Technology, US Department of Commerce, Washington D.C., April, 1995. U.M.Maurer, Secret Key Agreement by Public Discussion from Common Information, IEEE Trans. Information Theory, Vol.39, pp.733-742, 1993. I.S.Reed and G.Solomon, Polynomial Codes over Certain Finite Fields, J.Soc. Indust. Appl. Math. Vol.8, pp.300-304, 1960. R.L.Rivest, "The MD5 Message-digest algorithm, Request for Comments (RFC) 1321, Internet Activities Board, Internet Task Force, April, 1992. C.E.Shannon, "Communication Theory of Secrecy Systems, Bell Syst. Tech. J., Vol.28, pp.656-715, 1948. G.S.Vernam, Cipher Printing Telegraph Systems for Secret Wire and Radio Telegraphic Communications, J.Amer. Inst. Elect. Eng., Vol.55, pp.109-115, 1926. H.Zbinden, H.Bechmann-Pasquinucci, N.Gisin, and G.Ribordy, Quantum Cryptography, Applied Physics B, Vol.67, pp.743-748, 1998. 151

A.Yamamura and H.Ishizuka, Detecting errors and authentication in quantum key distribution, Information Security and Privacy ACISP2001, LNCS 2119, Springer-Verlag, pp.260-273, 2001. 152 51 12 2005