HTML5 Webook
25/84

G. Ribordy, D. Stucki, M. Tourville, P. Trinkler, and R. Wolterman. Towards a North American QKD Backbone with Certifiable Security. Contributed talk in the afternoon session on Sept. 28, The Fifth International Conference on Quantum Cryptography (QCrypt2015), Tokyo, Sept. 28{-Oct. 2, 2015, http://2015.qcrypt.net/scientfic-program/23W. Tittel, J. Brendel, H. Zbinden, and N. Gisin, “Quantum cryptography using entangled photons in energy-time Bell states,” Phys. Rev. Lett. 84(29), pp.4737–4740 2000.24H.-K. Lo, X. Ma, and K. Chen, “Decoy state quantum key distribution,” Phys. Rev. Lett. 94(23), 230504 2005.25X. Ma, B. Qi, Y. Zhao, and H.-K. Lo, “Practical decoy state for quantum key distribution,” Phys. Rev. A72(1), 012326 2005.26L. Carter and M. Wegman. New hash functions and their use in authentication and set equality. J. Comput. Syst. Sci, 22:265–279 1981.27M. Fujiwara, A. Waseda, R. Nojima, S. Moriai, W. Ogata, and M. Sasaki, “Unbreakable distributed storage with quantum key distribution network and password-authenticated secret sharing,” Sci. Reports, 6, 28988-1-8 2016.Mikio FUJIWARA, Ph.DResearch Manager, Qunatum ICT Advanced Development Center, Advanced ICT Reseach InstituteQuantum key distribution, Photon detection techology, Cryogenic electronicsMasahide SASAKI, Ph.DDistinguished Researcher, Advanced ICT Research InstituteQuantum communication, Quantum cryptography213-1 Research and Development of Quantum Key Distribution Network in NICT

元のページ  ../index.html#25

このブックを見る