HTML5 Webook
22/72

M. Peev, and A. Zeilinger, “Field test of quantum key distribution in the Tokyo QKD Network,” Opt. Express, 19(11), pp.10387–10409 2011.13The Project UQCC (Updating Quantum Cryptography and Communications). http://www.uqcc.org/14M. Fujiwara, T. Domeki, S. Moriai, and M. Sasaki, “Highly secure net-work switches with quantum key distribution systems,” Int. J. Network security 17, pp.34–39 2015.15特許第5791112号「通信方法及び通信システム」藤原幹生、佐々木雅英.(2015 年8 月14 日登録)16M. Sasaki. QKD Platform and its Applications. Presentation in Part II Fiber Network, The Fourth International Conference on Updating Quantum Cryptography and Communications (UQCC 2015), Tokyo, Sept. 28, 2015. Recorded video is available in http://2015.uqcc.org/pro-gram/index.html17NICT プレスリリース2015 年9 月28 日.ドローンの通信の安全性を強化する技術を開発.http://www.nict.go.jp/press/2015/09/28-1.html18M. Sasaki. Tokyo Free Space Optical Testbed. Presentation in Part III Space Network, The Fourth International Conference on Updating Quantum Cryptography and Communications (UQCC 2015), Tokyo, Sept. 28, 2015. Recorded video is available in http://2015.uqcc.org/pro-gram/index.html19NECプレスリリース2015年9月28日.NEC、量子暗号システムの実用化に向けた評価実験をサイバーセキュリティ・ファクトリーで開始.http://jpn.nec.com/press/201509/20150928_03.html.20東芝プレスリリース2015年6月18日.盗聴が理論上不可能な量子暗号通信システムの実証試験の開始について.http://www.toshiba.co.jp/about/press/2015_ 06/pr_j1801.htm.21Q. Zhang. Quantum Network in China. Presentation in Part V Relay Talk and Discussion, The Fourth International Conference on Updating Quantum Cryptography and Communications (UQCC 2015), Tokyo, Sept. 28, 2015. Recorded video and slide are available in http://2015. uqcc.org/program/index.html22N. Walenta, D. Caselunghe, S. Chuard, M. Domergue, M. Hagerman, R. Hart, D. Hayford, R. Houlmann, M. Legr e, T. McCandlish, L. Monat, A. Morrow, G. Ribordy, D. Stucki, M. Tourville, P. Trinkler, and R. Wolterman. Towards a North American QKD Backbone with Certifiable Security. Contributed talk in the afternoon session on Sept. 28, The Fifth International Conference on Quantum Cryptography (QCrypt2015), Tokyo, Sept. 28{-Oct. 2, 2015, http://2015.qcrypt.net/sci-entfic-program/23W. Tittel, J. Brendel, H. Zbinden, and N. Gisin, “Quantum cryptography using entangled photons in energy-time Bell states,” Phys. Rev. Lett. 84(29), pp.4737–4740 2000.24H.-K. Lo, X. Ma, and K. Chen, “Decoy state quantum key distribution,” Phys. Rev. Lett. 94(23), 230504 2005.25X. Ma, B. Qi, Y. Zhao, and H.-K. Lo, “Practical decoy state for quantum key distribution,” Phys. Rev. A72(1), 012326 2005.26L. Carter and M. Wegman. New hash functions and their use in au-thentication and set equality. J. Comput. Syst. Sci, 22:265–279 1981.27M. Fujiwara, A. Waseda, R. Nojima, S. Moriai, W. Ogata, and M. Sasaki, “Unbreakable distributed storage with quantum key distribution network and password-authenticated secret sharing,” Sci. Reports, 6, 28988-1-8 2016.藤原幹生 (ふじわら みきお)未来ICT研究所量子ICT先端開発センター研究マネージャー博士(理学)量子鍵配送、光子検出技術、極低温エレクトロニクス佐々木雅英 (ささき まさひで)未来ICT研究所主管研究員理学博士量子通信、量子暗号18   情報通信研究機構研究報告 Vol. 63 No. 1 (2017)3 量子光ネットワーク技術

元のページ  ../index.html#22

このブックを見る