-
Tight scaling of key rate for differential-phase-shift quantum key distribution
Abstract: The performance of quantum key distribution (QKD) protocols is evaluated based on the ease of implementation and key generation rate. Among major protocols, the differential-phase-shift (DPS) protocol has the advantage of simple implementation using a train of coherent pulses and a passive detection unit. Unfortunately, however, its key rate is known to be at least proportional to $η^2$ with respe… ▽ More
Submitted 16 May, 2024; originally announced May 2024.
Comments: 11 pages, 1 figure
-
Indistinguishability between quantum randomness and pseudo-randomness under efficiently calculable randomness measures
Abstract: We present a no-go theorem for the distinguishability between quantum random numbers (i.e., random numbers generated quantum mechanically) and pseudo-random numbers (i.e., random numbers generated algorithmically). The theorem states that one cannot distinguish these two types of random numbers if the quantum random numbers are efficiently classically simulatable and the randomness measure used fo… ▽ More
Submitted 15 January, 2024; v1 submitted 20 September, 2023; originally announced September 2023.
Comments: 17 pages, 8 figures, 3 tables. title updated, minor revision
Journal ref: Phys. Rev. A, 109, 022243 (2024)
-
Information-theoretically secure equality-testing protocol with dispute resolution
Abstract: There are often situations where two remote users each have data, and wish to (i) verify the equality of their data, and (ii) whenever a discrepancy is found afterwards, determine which of the two modified his data. The most common example is where they want to authenticate messages they exchange. Another possible example is where they have a huge database and its mirror in remote places, and when… ▽ More
Submitted 26 December, 2022; originally announced December 2022.
Comments: 7 pages, 2 figures
Journal ref: 2023 IEEE International Symposium on Information Theory (ISIT), Taipei, Taiwan, 2023, pp. 472-476
-
Long-term secure distributed storage using quantum key distribution network with third-party verification
Abstract: The quantum key distribution network with Vernam's One Time Pad encryption and secret sharing are powerful security tools to realize an information theoretically secure distributed storage system. In our previous work, a single-password-authenticated secret sharing scheme based on the QKD network and Shamir's secret sharing was experimentally demonstrated; it confirmed ITS data transmission, stora… ▽ More
Submitted 22 December, 2021; originally announced December 2021.
Comments: 12 pages, 5 figures; Accepted in IEEE trans. Quantum Technology
-
Advantage of the key relay protocol over secure network coding
Abstract: The key relay protocol (KRP) plays an important role in improving the performance and the security of quantum key distribution (QKD) networks. On the other hand, there is also an existing research field called secure network coding (SNC), which has similar goal and structure. We here analyze differences and similarities between the KRP and SNC rigorously. We found, rather surprisingly, that there… ▽ More
Submitted 19 April, 2022; v1 submitted 26 November, 2021; originally announced November 2021.
Comments: 15 pages, 14 figures. v2: We improved Theorem 2
Journal ref: IEEE Transactions on Quantum Engineering, vol. 4, 4100517 (2023)
-
Equivalence of three classical algorithms with quantum side information: Privacy amplification, error correction, and data compression
Abstract: Privacy amplification (PA) is an indispensable component in classical and quantum cryptography. Error correction (EC) and data compression (DC) algorithms are also indispensable in classical and quantum information theory. We here study these three algorithms (PA, EC, and DC) in the presence of quantum side information, and show that they all become equivalent in the one-shot scenario. As an appli… ▽ More
Submitted 4 November, 2021; v1 submitted 18 September, 2020; originally announced September 2020.
Comments: 16 pages, 5 figures. v2: Comparison with the previous literature added, presentation improved, typos corrected
Journal ref: IEEE Transactions on Information Theory, vol. 68, no. 2, pp. 1016-1031 (2022)
-
Secure random number generation from parity symmetric radiations
Abstract: The random number generators (RNGs) are an indispensable tool in cryptography. Of various types of RNG method, those using radiations from nuclear decays (radioactive RNG) has a relatively long history but their security has never been discussed rigorously in the literature. In this paper we propose a new method of the radioactive RNG that admits a simple and rigorous proof of security. The securi… ▽ More
Submitted 19 December, 2019; originally announced December 2019.
Comments: 8 pages, 4 figures
Journal ref: Commun Phys 5, 147 (2022)
-
arXiv:1809.05479 [pdf, ps, other]
Leftover hashing from quantum error correction: Unifying the two approaches to the security proof of quantum key distribution
Abstract: We show that the Mayers-Shor-Preskill approach and Renner's approach to proving the security of quantum key distribution (QKD) are essentially the same. We begin our analysis by considering a special case of QKD called privacy amplification (PA). PA itself is an important building block of cryptography, both classical and quantum. The standard theoretical tool used for its security proof is called… ▽ More
Submitted 18 May, 2020; v1 submitted 14 September, 2018; originally announced September 2018.
Comments: 20 pages, no figure. v2: Typos and minor technical errors corrected; presentation improved. v3: Comparison with the previous literature added, references added, and typos and minor technical errors corrected
Journal ref: IEEE Transactions on Information Theory, Volume 66, Issue 6, 3465 - 3484 (2020)
-
arXiv:1502.04802 [pdf, ps, other]
Multi-partite squash operation and its application to device-independent quantum key distribution
Abstract: The squash operation, or the squashing model, is a useful mathematical tool for proving the security of quantum key distribution systems using practical (i.e., non-ideal) detectors. At the present, however, this method can only be applied to a limited class of detectors, such as the threshold detector of the Bennett-Brassard 1984 type. In this paper we generalize this method to include multi-parti… ▽ More
Submitted 14 October, 2016; v1 submitted 17 February, 2015; originally announced February 2015.
Comments: 28 pages, 1 figure; v2: minor correction, v3: errors in the previous security proof corrected, with a somewhat smaller key generation rate, v4: minor correction
Journal ref: New J. Phys. 18 (2016) 103043
-
arXiv:1311.5322 [pdf, ps, other]
More Efficient Privacy Amplification with Less Random Seeds via Dual Universal Hash Function
Abstract: We explicitly construct random hash functions for privacy amplification (extractors) that require smaller random seed lengths than the previous literature, and still allow efficient implementations with complexity $O(n\log n)$ for input length $n$. The key idea is the concept of dual universal$_2$ hash function introduced recently. We also use a new method for constructing extractors by concatenat… ▽ More
Submitted 18 August, 2015; v1 submitted 21 November, 2013; originally announced November 2013.
Comments: 33 pages, no figure, 1 table; v3: revised arguments with new hash functions proposed additionally, v4: minor corrections and clarifications, some new references added, v5: minor corrections, and enhanced arguments related with applications
Journal ref: IEEE Transactions on Information Theory, Volume 62, Issue 4, 2213 - 2232 (2016)
-
arXiv:1107.0589 [pdf, ps, other]
Concise and Tight Security Analysis of the Bennett-Brassard 1984 Protocol with Finite Key Lengths
Abstract: We present a tight security analysis of the Bennett-Brassard 1984 protocol taking into account the finite size effect of key distillation, and achieving unconditional security. We begin by presenting a concise analysis utilizing the normal approximation of the hypergeometric function. Then next we show that a similarly tight bound can also be obtained by a rigorous argument without relying on any… ▽ More
Submitted 17 May, 2012; v1 submitted 4 July, 2011; originally announced July 2011.
Comments: 40 pages, 4 figures, revised arguments on security, and detailed explanaions on how to use theoretical results
Journal ref: New J. Phys. 14 (2012) 093014
-
Field test of quantum key distribution in the Tokyo QKD Network
Abstract: A novel secure communication network with quantum key distribution in a metropolitan area is reported. Different QKD schemes are integrated to demonstrate secure TV conferencing over a distance of 45km, stable long-term operation, and application to secure mobile phones.
Submitted 18 March, 2011; originally announced March 2011.
Comments: 21 pages, 19 figures
Journal ref: Optics Express Vol. 19, Iss. 11, pp. 10387-10409 (2011)
-
arXiv:1101.0064 [pdf, ps, other]
Dual universality of hash functions and its applications to quantum cryptography
Abstract: In this paper, we introduce the concept of dual universality of hash functions and present its applications to quantum cryptography. We begin by establishing the one-to-one correspondence between a linear function family {\cal F} and a code family {\cal C}, and thereby defining \varepsilon-almost dual universal_2 hash functions, as a generalization of the conventional universal_2 hash functions. T… ▽ More
Submitted 13 November, 2012; v1 submitted 30 December, 2010; originally announced January 2011.
Comments: 18 pages, 2 figures; revised argument concerning the relation with the δ-biased family
Journal ref: IEEE Transactions on Information Theory, Volume 59, Issue 7, 4700 - 4717 (2013)
-
arXiv:0910.2326 [pdf, ps, other]
Squash Operator and Symmetry
Abstract: This paper begins with a simple proof of the existence of squash operators compatible with the Bennett-Brassard 1984 (BB84) protocol which suits single-mode as well as multi-mode threshold detectors. The proof shows that, when a given detector is symmetric under cyclic group C_4, and a certain observable associated with it has rank two as a matrix, then there always exists a corresponding squash… ▽ More
Submitted 19 October, 2009; v1 submitted 13 October, 2009; originally announced October 2009.
Comments: 4 pages, no figures; minor grammatical corrections
Journal ref: Phys. Rev. A 81, 012328 (2010)
-
arXiv:0803.4226 [pdf, ps, other]
Security proof for QKD systems with threshold detectors
Abstract: In this paper, we rigorously prove the intuition that in security proofs for BB84 one may regard an incoming signal to Bob as a qubit state. From this result, it follows that all security proofs for BB84 based on a virtual qubit entanglement distillation protocol, which was originally proposed by Lo and Chau [H.-K. Lo and H. F. Chau, Science 283, 2050 (1999)], and Shor and Preskill [P. W. Shor a… ▽ More
Submitted 11 September, 2008; v1 submitted 31 March, 2008; originally announced March 2008.
Comments: 6 pages, 4 figures; references changed; revised argument for the security proof; typos corrected
Journal ref: Phys. Rev. A 78, 032302 (2008)
-
arXiv:0710.4989 [pdf, ps, other]
Exact minimum and maximum of yield with a finite number of decoy light intensities
Abstract: In this paper, for the decoy state method using a finite number of decoy light intensities, we present an improved upper and lower bounds for the asymptotic yield y_n for n-photon states. In particular if all the light intensities are less than or equal to one, they are not only a lower or upper bound, but in fact are the exact minimum or maximum.
Submitted 28 October, 2007; v1 submitted 26 October, 2007; originally announced October 2007.
Comments: 20 pages, 2 figures
Journal ref: Phys. Rev. A 77, 022319 (2008)
-
Sequential Attack with Intensity Modulation on the Differential-Phase-Shift Quantum Key Distribution Protocol
Abstract: In this paper, we discuss the security of the differential-phase-shift quantum key distribution (DPSQKD) protocol by introducing an improved version of the so-called sequential attack, which was originally discussed by Waks et al. Our attack differs from the original form of the sequential attack in that the attacker Eve modulates not only the phases but also the amplitude in the superposition o… ▽ More
Submitted 25 December, 2006; originally announced December 2006.
Comments: 6 pages, 2 figures
Journal ref: Phys. Rev. A 75, 062319 (2007)
-
Group Covariant Protocols for Quantum String Commitment
Abstract: We study the security of quantum string commitment (QSC) protocols with group covariant encoding scheme. First we consider a class of QSC protocol, which is general enough to incorporate all the QSC protocols given in the preceding literatures. Then among those protocols, we consider group covariant protocols and show that the exact upperbound on the binding condition can be calculated. Next usi… ▽ More
Submitted 16 October, 2006; v1 submitted 5 June, 2006; originally announced June 2006.
Comments: 5 pages, no figure, typos corrected
Journal ref: Phys. Rev. A, 74, 042307 (2006)
-
Implementable Quantum Bit-String Commitment Protocol
Abstract: Quantum bit-string commitment[A.Kent, Phys.Rev.Lett., 90, 237901 (2003)] or QBSC is a variant of bit commitment (BC). In this paper, we propose a new QBSC protocol that can be implemented using currently available technology, and prove its security under the same security criteria as discussed by Kent. QBSC is a generalization of BC, but has slightly weaker requirements, and our proposed protoco… ▽ More
Submitted 5 January, 2005; v1 submitted 22 July, 2004; originally announced July 2004.
Comments: To appear in Phys. Rev. A., 9 pages, 2 figures
Journal ref: Phys. Rev. A, 71, 012313 (2005)
-
Instantons, Monopoles and the Flux Quantization in the Faddeev-Niemi Decomposition
Abstract: We study how instantons arise in the low energy effective theory of the SU(2) Yang-Mills theory in the context of the non-linear sigma model recently propose by Faddeev and Niemi. We find a simple relation between the instanton number $ν$ and the charge m of the monopole that appears in the effective theory. It is given by $ν= m Φ/(2π)$, where $Φ$ is the quantized flux associated with a U(1) gau… ▽ More
Submitted 23 May, 2000; v1 submitted 8 May, 2000; originally announced May 2000.
Comments: Tex, 12 pages, 3 figures (eps), references added
Report number: KEK Preprint 2000-18
Journal ref: Nucl.Phys. B589 (2000) 659-668
-
On Topological Terms in the O(3) Nonlinear Sigma Model
Abstract: Topological terms in the O(3) nonlinear sigma model in (1+1) and (2+1) dimensions are re-examined based on the description of the SU(2)-valued field $g$. We first show that the topological soliton term in (1+1) dimensions arises from the unitary representations of the group characterizing the global structure of the symmetry inherent in the description, in a manner analogous to the appearance of… ▽ More
Submitted 24 May, 1999; originally announced May 1999.
Comments: 15 pages, 1 figure
Report number: KEK 99-19
Journal ref: Phys.Lett. B460 (1999) 94-102
-
Localized and Extended States in One-Dimensional Disordered System: Random-Mass Dirac Fermions
Abstract: System of Dirac fermions with random-varying mass is studied in detail. We reformulate the system by transfer-matrix formalism. Eigenvalues and wave functions are obtained numerically for various configurations of random telegraphic mass m(x). Localized and extended states are identified. For quasi-periodic m(x), low-energy wave functions are also quasi-periodic and extended, though we are n… ▽ More
Submitted 26 March, 1999; originally announced March 1999.
Comments: 27 pages, including 8 EPS figures
Report number: UT-Komaba 98-23, ICRR-Report-452-99-10
Journal ref: Nucl. Phys. B556 (1999) 545