HTML5 Webook
24/84
the block of the saved cryptographic key and receive a new cryptographic key from the QKD platform to maintain robust security on the network. e data format for key management (outline) used in the key management layer of the QKD platform is shown in Fig. 6.4Summarye principles of a QKD link and a QKD platform that enables operation of a QKD network are introduced in this article. ese technologies enable improvement of the safety of transmission channels and storage of data such as genomic data that require safety for a very long term by collaboration with present cryptography technology such as secret sharing [27]. Each country still continues to re-search energetically in the theory and technology of QKD and the barrier to pay cost in protecting important infor-mation is disappearing. NICT will continue to make eorts in improving the technology level in this eld so as to maintain and develop technology of the best performance in the world and to oer solutions that ensure safe com-munication even if technology for decrypting cryptography suddenly appears.Acknowledgmentse outcomes described in this article were mainly achieved from NICT contract research in “Research and development on secure photonic network technology” (No.157) implemented from FY2011to FY2015 and the ImPACT project “quantum secure photonic network.” Hence, the results are the fruits of eorts made by all of the members of quantum ICT advanced technology center and who participated in the projects. I truly thank them for their collaboration in the research and development. I also thank the members of the JGN, Information and Communication System Laboratory, and Security Fundamentals Laboratory for their kind support.ReferenceR1Recommendation for Key Management: Part 1: General. http://csrc.nist.gov/publications/nistpubs/800-57/sp800-57 part1 rev3 general.pdf. 2M. Fujiwara, S. Miki, T. Yamashita, Z. Wang, and M. Sasaki, “Photon level crosstalk between parallel fibers installed in urban area,” Opt. Express, 18(21) 22199–22207, 2010. 3C. H. Bennett and G. Brassard, “Quantum cryptography: public key distribution and coin. Tossing,” In Proceedings of the IEEE International Conference on Computers Systems and Signal Processing, Bangalore, India, pp.175–179. IEEE, New York, 1984. 4N. Gisin, G. Ribordy, W. Tittel, and H. Zbinden, “Quantum cryptography,” Rev. Mod. Phys. 74(1), pp.145–195 2002. 5V. Scarani, H. Bechmann-Pasquinucci, N. J. Cerf, M. Dusek, and M. P. Norbert Lütkenhaus, “The Security of Practical Quantum Key Distribution,” Review of Modern Physics 81:1301–1353 2009.6id Quantique SA. http://www.idquantique.com/ 7MagiQ Technologies, Inc. http://www.magiqtech.com/Home.html. 8QuintessenceLabs Pty Ltd. http://www.quintessencelabs.com/ 9C. Elliott, A. Colvin, D. Pearson, O. Pikalo, J. Schlafer, and H. Yeh. Current status of thDARPA Quantum Network (Invited Paper). In Quantum Information and Computation III, Proc. SPIE, vol.5815, pp.138{149, Orlando, Florida, March 2005.10M. Peev, C. Pacher, R. Alleaume, C. Barreiro, W. Boxleitner, J. Bouda, R.Tualle-Brouri, E. Diamanti, M. Dianati, T. Debuisschert, J. F. Dynes, S.Fasel, S. Fossier, M. Fuerst, J.-D. Gautier, O. Gay, N. Gisin, P. Grangier, A. Happe, Y. Hasani, M. Hentchel, H. Hübel, G. Humer, T. Länger, M.Legre, R. Lieger, J. Lodewyck, T. Lorünser, N. Lütkenhaus, A. Marhold, T. Matyus, O. Maurhart, L. Monat, S. Nauerth, J.-B. Page, E. Querasser, G. Ribordy, A. Poppe, L. Salvail, S. Robyr, M. Suda, A. W. Sharpe, A. J. Shields, D. Stucki, C. Tamas, T. Themel, R. T. Thew, Y. Thoma, A. Treiber, P. Trinkler, F. Vannel, N. Walenta, H. Weier, H. Weinfurter, I. Wimberger, Z. L. Yuan, H. Zbinden, and A. Zeilinger, “The SECOQC quantum key distribution network in Vienna,” New J. Phys. 11(7), 075001/1–37 (2009).11Quantum Key Distribution - Industry Specification Group (QKD-ISG), European Telecommunications Standards Institute. http://www.etsi.org/technol-ogies-clusters/technologies/quantum-key-distribution.12M. Sasaki, M. Fujiwara, H. Ishizuka, W. Klaus, K. Wakui, M. Takeoka, A. Tanaka, K. Yoshino, Y. Nambu, S. Takahashi, A. Tajima, A. Tomita, T. Domeki, T. Hasegawa, Y. Sakai, H. Kobayashi, T. Asai, K. Shimizu, T. Tokura, T. Tsurumaru, M. Matsui, T. Honjo, K. Tamaki, H. Takesue, Y. Tokura, J. F. Dynes, A. R. Dixon, A. W. Sharpe, Z. L. Yuan, A. J. Shields, S. Uchikoga, M. Legre, S. Robyr, P. Trinkler, L. Monat, J.-B. Page, G. Ribordy, A. Poppe, A. Allacher, O. Maurhart, T. Langer, M. Peev, and A. Zeilinger, “Field test of quantum key distribution in the Tokyo QKD Network,” Opt. Express, 19(11), pp.10387–10409 2011.13The Project UQCC (Updating Quantum Cryptography and Communications). http://www. uqcc.org/14M. Fujiwara, T. Domeki, S. Moriai, and M. Sasaki, “Highly secure network switches with quantum key distribution systems,” Int. J. Network security 17, pp.34–39 2015.15Japanese Patent No. 5791112, “Communication method and communication system,” M. Fujiwara and M. Sasaki, Aug. 14th 2015. 16M. Sasaki. QKD Platform and its Applications. Presentation in Part II Fiber Network, The Fourth International Conference on Updating Quantum Cryptography and Communications (UQCC 2015), Tokyo, Sept. 28, 2015. Recorded video is available in http://2015.uqcc.org/program/index.html17NICT press release “Secure communication technology for control and com-munication of drones,” Sept. 28th 2015. http://www.nict.go.jp/press/2015/09/28-1.html18M. Sasaki. Tokyo Free Space Optical Testbed. Presentation in Part III Space Network, The Fourth International Conference on Updating Quantum Cryptography and Communications (UQCC 2015), Tokyo, Sept. 28, 2015. Recorded video is available in http://2015.uqcc.org/program/index.html19NEC press release Sept. 28th 2015 “Field operation test of the Quantum key distribution system in Cybersecurity factory of NEC for practical application. http://jpn.nec.com/press/201509/20150928 03.html.20Toshiba press release June 18th 2015 “Demonstration of Quantum cryptography system.”21Q. Zhang. Quantum Network in China. Presentation in Part V Relay Talk and Discussion, The Fourth International Conference on Updating Quantum Cryptography and Communications(UQCC 2015), Tokyo, Sept. 28, 2015. Recorded video and slide are available in http://2015. uqcc.org/program/index.html22N. Walenta, D. Caselunghe, S. Chuard, M. Domergue, M. Hagerman, R. Hart, D. Hayford, R. Houlmann, M. Legre, T. McCandlish, L. Monat, A. Morrow, 3 Quantum Key Distribution Network20 Journal of the National Institute of Information and Communications Technology Vol. 64 No. 1 (2017)
元のページ
../index.html#24