Skip to main content

Error Detection and Authentication in Quantum Key Distribution

  • Conference paper
  • First Online:
Book cover Information Security and Privacy (ACISP 2001)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2119))

Included in the following conference series:

Abstract

Detecting errors in a raw key and authenticating a private key are crucial for quantum key distribution schemes. Our aim is to propose practical methods for error detection and authentication in quantum key distribution schemes. We introduce several concepts about neighborhood collision free properties of Boolean functions, which are closely related to hash functions, and propose methods based on neighborhood collision free functions and error correcting codes such as Reed-Solomon code. We also examine whether or not widely used cryptographic hash functions SHA-1 and MD5 satisfy the neighborhood collision free property by computation experiments.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Bennett, C.H., Brassard, G.: Quantum cryptography: Public-key distribution and coin tossing. Proc. Int. Conf. on Computers, Systems and Signal Processing, Bangalore, India (1984) 175–179

    Google Scholar 

  2. Bennett, C.H.: Quantum Cryptography Using Any Two Nonorthogonal States. Phys. Rev. Lett. 68 (1992) 3121–3124

    Article  MATH  MathSciNet  Google Scholar 

  3. Bennett, C.H., Brassard, G., Crépeau, C., Maurer, U.M.: Generalized Privacy Amplification. IEEE Trans. Information Theory 41 (1995) 1915–1923

    Article  MATH  Google Scholar 

  4. Bennett, C.H., Brassard, G., Robert, J.M.: Privacy Amplification by Public Discussion. SIAM J Comput. 17 (1988) 210–229

    Article  MathSciNet  Google Scholar 

  5. Bennett, C.H., Bessette, F., Brassard, G., Salvail, L., Smolin, J.: Experimental Quantum Cryptography. J.Cryptology 5 (1992) 3–28

    Article  Google Scholar 

  6. Bouwmeester, D., Ekert, A., Zeilinger, A.: The Physics of Quantum Information. Springer-Verlag, Berlin Heidelberg New York (2000)

    MATH  Google Scholar 

  7. Chor, B., Goldreich, O., Hastad, J., Freidmann, J., Rudich, S., Smolensky, R.: The Bit Extraction Problem or t-resilient Functions. 26th IEEE Symp. Foundations of Computer Science, (1985) 396–407

    Google Scholar 

  8. Ekert, A.K.: Quantum Cryptography Based on Bell’s Theorem. Phys. Rev. Lett. 67, No. 6 (1991) 661–663

    Article  MATH  MathSciNet  Google Scholar 

  9. FIPS 180-1: Secure Hash Standard, Federal Information Processing Standard (FIPS), Publication 180-1, National Institute of Standards and Technology, US Department of Commerce, Washington D.C., April (1995)

    Google Scholar 

  10. Maurer, U.M.: Secret Key Agreement by Public Discussion from Common Information. IEEE Trans. Information Theory 39 (1993) 733–742

    Article  MATH  MathSciNet  Google Scholar 

  11. Reed, I.S., Solomon, G.: Polynomial Codes over Certain Finite Fields, J. Soc. Indust. Appl. Math. 8 (1960) 300–304

    Article  MATH  MathSciNet  Google Scholar 

  12. Rivest, R.L.: The MD5 Message-digest algorithm, Request for Comments (RFC) 1321, Internet Activities Board, Internet Task Force, April (1992)

    Google Scholar 

  13. Shannon, C.E.: Communication Theory of Secrecy Systems. Bell Syst.Tech.J. 28 (1948) 656–715

    MathSciNet  Google Scholar 

  14. Vernam, G.S.: Cipher Printing Telegraph Systems for Secret Wire and Radio Telegraphic Communications. J. Amer. Inst. Elect. Eng. 55 (1926) 109–115

    Google Scholar 

  15. Zbinden, H., Bechmann-Pasquinucci, H., Gisin, N., Ribordy, G.: Quantum Cryptography. Applied Physics B 67 (1998) 743–748

    Article  Google Scholar 

  16. http://www.mitsubishielectric.com/pressreleases/2000/mel0502.html

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2001 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Yamamura, A., Ishizuka, H. (2001). Error Detection and Authentication in Quantum Key Distribution. In: Varadharajan, V., Mu, Y. (eds) Information Security and Privacy. ACISP 2001. Lecture Notes in Computer Science, vol 2119. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-47719-5_22

Download citation

  • DOI: https://doi.org/10.1007/3-540-47719-5_22

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-42300-3

  • Online ISBN: 978-3-540-47719-8

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics