摘要:
In a secret communication network including a center node and multiple remote nodes, the center node is provided with a virtual remote node which functions as a remote node similar to each of the remote nodes. Random numbers shared between the center node and each remote node are managed based on random number sequences used in cipher communication between the virtual remote node and one of the remote nodes.
摘要:
A sender transmits to a receiver an optical signal that is phase-modulated in accordance with source data and a basis stored in a memory. The receiver phase-modulates the received optical signal in accordance with a basis, obtains detection data through interference, and stores the detection data in a memory. An inter-device address difference (GD) and an intra-device address difference (DI) are provisionally set. The detection data are checked against the source data while sequentially changing the values of GD and DI within a predetermined adjustment range. Based on the result of this checking, GD and DI are determined.
摘要翻译:发送方向接收机发送根据源数据和存储在存储器中的基准进行相位调制的光信号。 接收机根据基础对接收的光信号进行相位调制,通过干扰获得检测数据,并将检测数据存储在存储器中。 临时设置设备间地址差异(G SUB)和设备间地址差异(D SUB I / I)。 在预定的调节范围内顺序地改变G D D和D I I的值,检测数据与源数据相对应。 基于该检查的结果,确定了G&D&D&D>和D< I< / SUB>。
摘要:
A clock signal of a master clock of a sender is transmitted to a receiver through a classical channel and is returned from the receiver. The clock signal is transmitted with strong light from a sender-side quantum unit to a receiver-side quantum unit through a quantum channel. A sender-side synchronization section establishes phase synchronization between the clock signal returned from the receiver and the clock signal detected by the sender-side quantum unit, and generates a calibration clock signal. At the receiver as well, a receiver-side synchronization section establishes phase synchronization between the clock signal detected from the classical channel and the clock signal detected by the receiver-side quantum unit, and generates a calibration clock signal.
摘要:
A cryptographic key management method and device are provided by which cryptographic keys of multiple nodes can be managed easily and stably. A system includes at least one first node and a plurality of second nodes connected to the first node, and the first node individually generates and consumes a cryptographic key with each of the second nodes connected to the first node itself. A cryptographic key management device in such a system has a monitor that monitors the stored key amounts of cryptographic keys of the individual second nodes, stored at the first node, and a key management control section that performs key generation control on the first node, based on the stored key amounts.
摘要:
For an error rate QBER, threshold values are preset, including a threshold value Qbit for frame synchronization processing, a threshold value Qphase for phase correction processing, and a threshold value QEve for eavesdropping detection. Upon the distribution of a quantum key from a sender to a receiver, when the measurement value of QBER is deteriorated more than Qbit, frame synchronization processing is performed. When the measurement value of QBER is deteriorated more than Qphase, phase correction processing and frame synchronization processing are performed. When QBER does not become better than QEve even after these recovery-processing steps are repeated N times, it is determined that there is a possibility of eavesdropping, and the processing is stopped.
摘要:
A cryptographic key management method and device are provided by which cryptographic keys of multiple nodes can be managed easily and stably. A system includes at least one first node and a plurality of second nodes connected to the first node, and the first node individually generates and consumes a cryptographic key with each of the second nodes connected to the first node itself. A cryptographic key management device in such a system has a monitor that monitors the stored key amounts of cryptographic keys of the individual second nodes, stored at the first node, and a key management control section that performs key generation control on the first node, based on the stored key amounts.
摘要:
A communication system and a timing control method are proposed that optimize timing in a sender and thereby enable information to be stably transmitted at the right timing. Under instructions from a timing controller in a receiver, the timing of driving a phase modulator in a sender is shifted by one step after another, and the then amount of clock shift and result of interference are monitored at the receiver and stored in a memory. The optimum timing is determined based on the stored data. Thus, a clock for driving the phase modulator in the sender can be set at the right timing. This is equivalent to compensating for group velocity dispersion due to wavelength dispersion that occurs when an optical signal channel and a clock signal channel are transmitted by wavelength division multiplexing transmission.
摘要:
In a quantum cryptographic transmitter (11), a phase modulator (1103, 1104) and an LN intensity modulator (1105) apply optical phase modulation and light intensity modulation to an optical signal based on desired data to generate a desired optical signal to be transmitted to a quantum cryptographic receiver (13). Based on the number of photons detected from the desired optical signal, a bias control circuit (1108) controls an operating point in light intensity modulation of the LN intensity modulator (1105).
摘要:
For an error rate QBER, threshold values are preset, including a threshold value Qbit for frame synchronization processing, a threshold value Qphase for phase correction processing, and a threshold value QEve for eavesdropping detection. Upon the distribution of a quantum key from a sender to a receiver, when the measurement value of QBER is deteriorated more than Qbit, frame synchronization processing is performed. When the measurement value of QBER is deteriorated more than Qphase, phase correction processing and frame synchronization processing are performed. When QBER does not become better than QEve even after these recovery-processing steps are repeated N times, it is determined that there is a possibility of eavesdropping, and the processing is stopped.
摘要:
A communication system capable of employing polarization-dependent phase modulators with a reversing configuration that preserves security against disturbance of a polarization state at a transmission path but without using Faraday mirrors and a communication method using the same are provided.A quantum cryptography system of the present invention includes a first station 1, a transmission path 2, and a second station 3. The first station 1 has means for emitting time-divided optical pulses into the transmission path 2 and measuring a phase difference between the optical pulses returning from the transmission path 2. The transmission path 2 is a medium of light. The second station 3 has means for reversing traveling directions of the optical pulses, means for producing a phase difference, corresponding to a random number bit value to be transmitted, between the time-divided optical pulses, means for splitting the entering optical pulse into orthogonally polarized components and producing a 180-degree phase difference therebetween, means for rotating each polarization direction by 90 degrees, means for eliminating a component resulting from a deviation from the polarization rotation angle of 90 degrees, and means for attenuating optical pulse intensity to include no more than 1 photon per bit.