HTML5 Webook
37/72

secret key generation exploiting reactance-domain scalar response of multipath fading channels,” IEEE Trans. Antennas Propag, vol.53, no.11, pp.3776–3784, Nov. 2005.8S. Mathur, W. Trappe, N. Mandayam, C. Ye, and A. Reznik, “Radiotelepathy: Extracting a secret key from an unauthenticated wire-less channel,” in Proc. 14th Annu. Int. Conf. Mobile Comput. Netw., pp.128–139, 2008.9Jana, S., Pnemath, S., N., Clark, M., Kasera, S., K., Patwari, N., and Krishnamurthy, S., V., “On the effectiveness of secret key extraction from wireless signal strength in real environments,” Proc. 15th Annu. Int. Conf. Mobile Comput. Netw., pp.321–332 , 2009.10S. N. Premnath, S. Jana, J. Croft, P. L. Gowda, M. Clark, S. K. Kasera, N. Patwari, and S. Krishnamurthy, “Secret key extraction from wireless signal strength in real environments,” IEEE Trans. Mobile Comput., vol.12, no.5, pp. 917–930, May 2013.11J. Zhang, T. Q. Duong, A. Marshall, and R. Woods, “Key generation from wireless channels: A review,” IEEE Access, vol.4, pp.614–626, Jan. 2016.12Y. S. Shiu, S. Y. Chang, H. C. Wu, S. C. H. Huang, and H. H. Chen, “Physical layer security in wireless networks: a tutorial,” IEEE Wireless Commun. vol.18, no.2, pp.66–74, April 2011.13C. H. Bennett and G. Brassard, “Quantum cryptography: public-key distribution and coin tossing,” in Proc. IEEE ICCSSP, pp.175–179, 1984.14N. Gisin, G. Ribordy, W. Tittel, and H. Zbinden, “Quantum cryptogra-phy,” Rev. Mod. Phys., vol.74, no.1, pp.145–195, Jan. 2002.15V. Scarani, H. Bechmann-Pasquinucci, N. J. Cerf, M. Düsek, N. Lütkenhaus, and M. Peev, “The security of practical quantum key distribution,” Rev. Mod. Phys., vol.81, no.3, pp.1301–1350, July 2009.16C. Elliott, et al., “Current status of the DARPA quantum network,” quantum information and computation III Proc. SPIE 5815 pp.138–149, 2005. 17M. Peev, et al. “The SECOQC quantum key distribution network in Vienna,” New J. Phys., 11, 075001, July 2009.18M. Sasaki, et al., “Field test of quantum key distribution in the Tokyo QKD network,” Opt. Express, vol.19, no.11, pp.10387–10409, May 2011.19D. Stucki, et al., “Long-term performance of the SwissQuantum quantum key distribution net-work in a field environment,” New J. Phys. vol.13, 123001, Dec. 2011.20S. Wang, et al., “Field and long-term demonstration of a wide area quantum key distribution network,” Opt. Express, vol.22, no.18, pp.21739–21756, Sept. 2014.21ID Quantique (2001), http://www.idquantique.com/; MagiQ Technologies, Inc. (1999), http://www.magiqtech.com/MagiQ/Home.html; QuintessenceLabs Pty Ltd. (2006), http://www.quintes-sencelabs.com/; QuantumCTekCo., Ltd. (2009), http://www.quantum-info.com.22A. R. Dixon, et al., “High speed prototype quantum key distribution system and long term field trial,” Opt. Express, vol.23, no.6, pp.7583–7592, March 2015.23N. Wang, X. Song, J. Cheng, and V. C. M. Leung, “Enhancing the se-curity of free-space optical communications with secret sharing and key agreement,” IEEE/OSA J. Opt. Commun. Netw., vol.6, no.12, pp.1072–1081, Dec. 2014.24F. J. Lopez-Martinez, G. Gomez, and J. M. Garrido-Balsells, “Physical-layer security in free-space optical communications,” IEEE Photon. J., vol.7, no.2, 7901014, April 2015.25A. Mostafa, and L. Lampe, “Physical-layer security for MISO visible light communication channels,” IEEE J. Sel. Areas Commun, vol.33, no.9, pp.1806–1818, Sept. 2015.26H. Endo, T. S. Han, T. Aoki, and M. Sasaki, “Numerical study on se-crecy capacity and code length dependence of the performances in optical wiretap channels,” IEEE Photon. J., vol.7, no.5, 7903418, Sept. 2015.27X. Sun and I. B. Djordjevic, “Physical-layer security in orbital angular momentum multiplexing free-space optical communications,” IEEE Photon. J., vol.8, no.1, 7901110, Feb. 2016.28D. Zou and Z. Xu, “Information security risks outside the laser beam in terrestrial free-space optical communication,” IEEE Photon. J., vol.8, no.5, 7804809, Jan. 2016.29M. Hayashi, “Exponential decreasing rate of leaked information in uni-versal random privacy amplification,” IEEE Trans. Inf. Theory, vol.57, no.6, pp.3989–4001, Jun. 2011.30T. S. Han, H. Endo, and M. Sasaki, “Reliability and secrecy functions of the wiretap channel under cost constraint,” IEEE Trans. Inform. Theory, vol.60, no.11, pp.6819–6843, Nov. 2014.31J. Hou and G. Kramer, “Effective secrecy: Reliability, confusion and stealth,” in proc. IEEE ISIT, pp.601–605, June 2014.32G. Brassard, and L. Salvail, “Secret key reconciliation by public discus-sion,” In Proc. EUROCRYPT '93, pp.410–423, 1994.33C. H. Bennett, G. Brassard, and J.-M. Robert, “Privacy amplification by public discussion,” SIAM J. Comput., vol.17, no.2, pp.210–229, 1988.34C. H. Bennett, G. Brassard, C. Crepeau, and U. M. Maurer, “Generalized privacy amplification,” IEEE Trans. Inform. Theory, vol.41, no.6, pp.1915–1923, June 1995.35R. Renner, “Security of quantum key distribution,” Ph.D. dissertation, Dept. Comput. Sci., ETH Zurich, Zurich, Switzerland, 2005.36J. L. Carter and M. N.Wegman, “Universal classes of hash functions,” J. Comp. Syst. Sci., vol.18, pp.143–154, 1979.37H. Endo, M. Fujiwara, M. Kitamura, T. Ito, M. Toyoshima, Y. Takayama, H. Takenaka, R. Shimizu, N. Laurenti, G. Vallone, P. Villoresi, T. Aoki, and M. Sasaki, “Free-space optical channel estimation for physical layer security,” Opt. Express, vol.24, no.8, 259736, April 2016.38H. Endo, M. Fujiwara, M. Kitamura, T. Ito, M. Toyoshima, H. Takenaka, R. Shimizu, T. Aoki, and M. Sasaki, “Physical layer cryptography in free-space optical communications: Performance estimation in real-field experiment and coding method,” IEICE Tech. Report, vol.IEICE-116, no.183, pp.7–12, Aug. 2016.遠藤寛之 (えんどう ひろゆき)未来ICT研究所量子ICT先端開発センター研究員博士(理学)物理レイヤ暗号、光空間通信藤原幹生 (ふじわら みきお)未来ICT研究所量子ICT先端開発センター研究マネージャー博士(理学)量子鍵配送、光子検出技術、極低温エレクトロニクス北村光雄 (きたむら みつお)未来ICT研究所量子ICT先端開発センター研究技術員光通信都筑織衛 (つづき おりえ)未来ICT研究所量子ICT先端開発センター研究技術員光空間通信333-3 光空間通信における物理レイヤ暗号に向けた通信路推定実験

元のページ  ../index.html#37

このブックを見る