HTML5 Webook
42/84

12Y. S. Shiu, S. Y. Chang, H. C. Wu, S. C. H. Huang, and H. H. Chen, “Physical layer security in wireless networks: a tutorial,” IEEE Wireless Commun. vol.18, no.2, pp.66–74, April 2011.13C. H. Bennett and G. Brassard, “Quantum cryptography: public-key distribution and coin tossing,” in Proc. IEEE ICCSSP, pp.175–179, 1984.14N. Gisin, G. Ribordy, W. Tittel, and H. Zbinden, “Quantum cryptography,” Rev. Mod. Phys., vol.74, no.1, pp.145–195, Jan. 2002.15V. Scarani, H. Bechmann-Pasquinucci, N. J. Cerf, M. Düsek, N. Lütkenhaus, and M. Peev, “The security of practical quantum key distribution,” Rev. Mod. Phys., vol.81, no.3, pp.1301–1350, July 2009.16C. Elliott, et al., “Current status of the DARPA quantum network,” quantum information and computation III Proc. SPIE 5815 pp.138–149, 2005. 17M. Peev, et al. “The SECOQC quantum key distribution network in Vienna,” New J. Phys., 11, 075001, July 2009.18M. Sasaki, et al., “Field test of quantum key distribution in the Tokyo QKD network,” Opt. Express, vol.19, no.11, pp.10387–10409, May 2011.19D. Stucki, et al., “Long-term performance of the SwissQuantum quantum key distribution net-work in a field environment,” New J. Phys. vol.13, 123001, Dec. 2011.20S. Wang, et al., “Field and long-term demonstration of a wide area quantum key distribution network,” Opt. Express, vol.22, no.18, pp.21739–21756, Sept. 2014.21ID Quantique (2001), http://www.idquantique.com/; MagiQ Technologies, Inc. (1999), http://www.magiqtech.com/MagiQ/Home.html; QuintessenceLabs Pty Ltd. (2006), http://www.quintes-sencelabs.com/; QuantumCTekCo., Ltd. (2009), http://www.quantum-info.com.22A. R. Dixon, et al., “High speed prototype quantum key distribution system and long term field trial,” Opt. Express, vol.23, no.6, pp.7583–7592, March 2015.23N. Wang, X. Song, J. Cheng, and V. C. M. Leung, “Enhancing the security of free-space optical communications with secret sharing and key agreement,” IEEE/OSA J. Opt. Commun. Netw., vol.6, no.12, pp.1072–1081, Dec. 2014.24F. J. Lopez-Martinez, G. Gomez, and J. M. Garrido-Balsells, “Physical-layer security in free-space optical communications,” IEEE Photon. J., vol.7, no.2, 7901014, April 2015.25A. Mostafa and L. Lampe, “Physical-layer security for MISO visible light com-munication channels,” IEEE J. Sel. Areas Commun, vol.33, no.9, pp.1806–1818, Sept. 2015.26H. Endo, T. S. Han, T. Aoki, and M. Sasaki, “Numerical study on secrecy capac-ity and code length dependence of the performances in optical wiretap chan-nels,” IEEE Photon. J., vol.7, no.5, 7903418, Sept. 2015.27X. Sun and I. B. Djordjevic, “Physical-layer security in orbital angular momen-tum multiplexing free-space optical communications,” IEEE Photon. J., vol.8, no.1, 7901110, Feb. 2016.28D. Zou and Z. Xu, “Information security risks outside the laser beam in ter-restrial free-space optical communication,” IEEE Photon. J., vol.8, no.5, 7804809, Jan. 2016.29M. Hayashi, “Exponential decreasing rate of leaked information in universal random privacy amplification,” IEEE Trans. Inf. Theory, vol.57, no.6, pp.3989–4001, June 2011.30T. S. Han, H. Endo, and M. Sasaki, “Reliability and secrecy functions of the wiretap channel under cost constraint,” IEEE Trans. Inform. Theory, vol.60, no.11, pp.6819–6843, Nov. 2014.31J. Hou and G. Kramer, “Effective secrecy: Reliability, confusion and stealth,” in proc. IEEE ISIT, pp.601–605, June 2014.32G. Brassard, and L. Salvail, “Secret key reconciliation by public discussion,” In Proc. EUROCRYPT ‘93, pp.410–423, 1994.33C. H. Bennett, G. Brassard, and J.-M. Robert, “Privacy amplification by public discussion,” SIAM J. Comput., vol.17, no.2, pp.210–229, 1988.34C. H. Bennett, G. Brassard, C. Crepeau, and U. M. Maurer, “Generalized pri-vacy amplification,” IEEE Trans. Inform. Theory, vol.41, no.6, pp.1915–1923, June 1995.35R. Renner, “Security of quantum key distribution,” Ph.D. dissertation, Dept. Comput. Sci., ETH Zurich, Zurich, Switzerland, 2005.36J. L. Carter and M. N.Wegman, “Universal classes of hash functions,” J. Comp. Syst. Sci., vol.18, pp.143–154, 1979.37H. Endo, M. Fujiwara, M. Kitamura, T. Ito, M. Toyoshima, Y. Takayama, H. Takenaka, R. Shimizu, N. Laurenti, G. Vallone, P. Villoresi, T. Aoki, and M. Sasaki, “Free-space optical channel estimation for physical layer security,” Opt. Express, vol.24, no.8, 259736, April 2016.38H. Endo, M. Fujiwara, M. Kitamura, T. Ito, M. Toyoshima, H. Takenaka, R. Shimizu, T. Aoki, and M. Sasaki, “Physical layer cryptography in free-space optical communications: Performance estimation in real-field experiment and coding method,” IEICE Tech. Report, vol.IEICE-116, no.183, pp.7–12, Aug. 2016.Hiroyuki ENDO, Ph.DResearcher, Quantum ICT Advanced Development Center, Advanced ICT Reseach InstitutePhysical layer cryptography, Free space optical communicationMikio FUJIWARA, Ph.DResearch Manager, Qunatum ICT Advanced Development Center, Advanced ICT Reseach InstituteQuantum key distribution, Photon detection techology, Cryogenic electronicsMitsuo KITAMURA Technical researcher, Quantum ICT Advanced Development Center, Advanced ICT Reseach InstituteOptical communicationOrie TSUZUKITechnical researcher, Quantum ICT Advanced Development Center, Advanced ICT Reseach InstituteFree space optical communicationToshiyuki ITOH, Ph.DResearcher, Quantum ICT Advanced Development Center, Advanced ICT Reseach InstitutePhysical layer cryptography, Free space optical communication3 Quantum Key Distribution Network38   Journal of the National Institute of Information and Communications Technology Vol. 64 No. 1 (2017)

元のページ  ../index.html#42

このブックを見る