2019
|
14. | Akihiro Mizutani; Go Kato; Koji Azuma; Marcos Curty; Rikizo Ikuta; Takashi Yamamoto; Nobuyuki Imoto; Hoi-Kwong Lo; Kiyoshi Tamaki Quantum key distribution with setting-choice-independently correlated light sources (Journal Article) In: npj Quantum Information, 5 , pp. 8, 2019. @article{Mizutani2019,
title = {Quantum key distribution with setting-choice-independently correlated light sources},
author = {Akihiro Mizutani and Go Kato and Koji Azuma and Marcos Curty and Rikizo Ikuta and Takashi Yamamoto and Nobuyuki Imoto and Hoi-Kwong Lo and Kiyoshi Tamaki},
url = {https://www.nature.com/articles/s41534-018-0122-y},
doi = {10.1038/s41534-018-0122-y},
year = {2019},
date = {2019-01-23},
journal = {npj Quantum Information},
volume = {5},
pages = {8},
keywords = {quantum cryptography},
pubstate = {published},
tppubtype = {article}
}
|
13. | Akihiro Mizutani; Go Kato; Koji Azuma; Marcos Curty; Rikizo Ikuta; Takashi Yamamoto; Nobuyuki Imoto; Hoi-Kwong Lo; Kiyoshi Tamaki Quantum key distribution with setting-choice-independently correlated light sources (Journal Article) In: npj Quantum Information, 5 , pp. 8, 2019. @article{Mizutani2019b,
title = {Quantum key distribution with setting-choice-independently correlated light sources},
author = {Akihiro Mizutani and Go Kato and Koji Azuma and Marcos Curty and Rikizo Ikuta and Takashi Yamamoto and Nobuyuki Imoto and Hoi-Kwong Lo and Kiyoshi Tamaki},
url = {https://www.nature.com/articles/s41534-018-0122-y},
doi = {10.1038/s41534-018-0122-y},
year = {2019},
date = {2019-01-23},
journal = {npj Quantum Information},
volume = {5},
pages = {8},
keywords = {quantum cryptography},
pubstate = {published},
tppubtype = {article}
}
|
2017
|
12. | Akihiro Mizutani; Toshihiko Sasaki; Go Kato; Yuki Takeuchi; Kiyoshi Tamaki Information-theoretic security proof of differential-phase-shift quantum key distribution protocol based on complementarity (Journal Article) In: Quantum Science and Technology, 3 (1), pp. 014003, 2017. @article{2058-9565-3-1-014003,
title = {Information-theoretic security proof of differential-phase-shift quantum key distribution protocol based on complementarity},
author = {Akihiro Mizutani and Toshihiko Sasaki and Go Kato and Yuki Takeuchi and Kiyoshi Tamaki},
url = {http://stacks.iop.org/2058-9565/3/i=1/a=014003},
year = {2017},
date = {2017-10-01},
journal = {Quantum Science and Technology},
volume = {3},
number = {1},
pages = {014003},
abstract = {We prove the information-theoretic security of the differential-phase-shift (DPS) quantum key distribution (QKD) protocol in the asymptotic regime based on the complementarity approach (arXiv:0704.3661 (2007)). Our security proof provides a slightly better key generation rate compared to the one derived in the previous security proof in (arXiv:1208.1995 (2012)) that is based on the Shor\textendashPreskill approach (Shor and Preskill 2000 Phys. Rev. Lett. 85 441). This improvement is obtained because the complementarity approach can employ more detailed information on Alice’s sending state in estimating the leaked information to an eavesdropper. Moreover, we remove the necessity of the numerical calculation that was needed in the previous analysis to estimate the leaked information. This leads to an advantage that our security proof enables us to evaluate the security of the DPS protocol with any block size. This paper highlights one of the fundamental differences between the Shor\textendashPreskill and the complementarity approaches.},
keywords = {quantum cryptography},
pubstate = {published},
tppubtype = {article}
}
We prove the information-theoretic security of the differential-phase-shift (DPS) quantum key distribution (QKD) protocol in the asymptotic regime based on the complementarity approach (arXiv:0704.3661 (2007)). Our security proof provides a slightly better key generation rate compared to the one derived in the previous security proof in (arXiv:1208.1995 (2012)) that is based on the Shor–Preskill approach (Shor and Preskill 2000 Phys. Rev. Lett. 85 441). This improvement is obtained because the complementarity approach can employ more detailed information on Alice’s sending state in estimating the leaked information to an eavesdropper. Moreover, we remove the necessity of the numerical calculation that was needed in the previous analysis to estimate the leaked information. This leads to an advantage that our security proof enables us to evaluate the security of the DPS protocol with any block size. This paper highlights one of the fundamental differences between the Shor–Preskill and the complementarity approaches. |
11. | Akihiro Mizutani; Toshihiko Sasaki; Go Kato; Yuki Takeuchi; Kiyoshi Tamaki Information-theoretic security proof of differential-phase-shift quantum key distribution protocol based on complementarity (Journal Article) In: Quantum Science and Technology, 3 (1), pp. 014003, 2017. @article{2058-9565-3-1-014003b,
title = {Information-theoretic security proof of differential-phase-shift quantum key distribution protocol based on complementarity},
author = {Akihiro Mizutani and Toshihiko Sasaki and Go Kato and Yuki Takeuchi and Kiyoshi Tamaki},
url = {http://stacks.iop.org/2058-9565/3/i=1/a=014003},
year = {2017},
date = {2017-10-01},
journal = {Quantum Science and Technology},
volume = {3},
number = {1},
pages = {014003},
abstract = {We prove the information-theoretic security of the differential-phase-shift (DPS) quantum key distribution (QKD) protocol in the asymptotic regime based on the complementarity approach (arXiv:0704.3661 (2007)). Our security proof provides a slightly better key generation rate compared to the one derived in the previous security proof in (arXiv:1208.1995 (2012)) that is based on the Shor\textendashPreskill approach (Shor and Preskill 2000 Phys. Rev. Lett. 85 441). This improvement is obtained because the complementarity approach can employ more detailed information on Alice’s sending state in estimating the leaked information to an eavesdropper. Moreover, we remove the necessity of the numerical calculation that was needed in the previous analysis to estimate the leaked information. This leads to an advantage that our security proof enables us to evaluate the security of the DPS protocol with any block size. This paper highlights one of the fundamental differences between the Shor\textendashPreskill and the complementarity approaches.},
keywords = {quantum cryptography},
pubstate = {published},
tppubtype = {article}
}
We prove the information-theoretic security of the differential-phase-shift (DPS) quantum key distribution (QKD) protocol in the asymptotic regime based on the complementarity approach (arXiv:0704.3661 (2007)). Our security proof provides a slightly better key generation rate compared to the one derived in the previous security proof in (arXiv:1208.1995 (2012)) that is based on the Shor–Preskill approach (Shor and Preskill 2000 Phys. Rev. Lett. 85 441). This improvement is obtained because the complementarity approach can employ more detailed information on Alice’s sending state in estimating the leaked information to an eavesdropper. Moreover, we remove the necessity of the numerical calculation that was needed in the previous analysis to estimate the leaked information. This leads to an advantage that our security proof enables us to evaluate the security of the DPS protocol with any block size. This paper highlights one of the fundamental differences between the Shor–Preskill and the complementarity approaches. |
10. | Yuki Hatakeyama; Akihiro Mizutani; Go Kato; Nobuyuki Imoto; Kiyoshi Tamaki Differential-phase-shift quantum-key-distribution protocol with a small number of random delays (Journal Article) In: Phys. Rev. A, 95 , pp. 042301, 2017. @article{PhysRevA.95.042301,
title = {Differential-phase-shift quantum-key-distribution protocol with a small number of random delays},
author = {Yuki Hatakeyama and Akihiro Mizutani and Go Kato and Nobuyuki Imoto and Kiyoshi Tamaki},
url = {https://link.aps.org/doi/10.1103/PhysRevA.95.042301},
doi = {10.1103/PhysRevA.95.042301},
year = {2017},
date = {2017-04-01},
journal = {Phys. Rev. A},
volume = {95},
pages = {042301},
publisher = {American Physical Society},
keywords = {quantum cryptography},
pubstate = {published},
tppubtype = {article}
}
|
9. | Yuki Hatakeyama; Akihiro Mizutani; Go Kato; Nobuyuki Imoto; Kiyoshi Tamaki Differential-phase-shift quantum-key-distribution protocol with a small number of random delays (Journal Article) In: Phys. Rev. A, 95 , pp. 042301, 2017. @article{PhysRevA.95.042301b,
title = {Differential-phase-shift quantum-key-distribution protocol with a small number of random delays},
author = {Yuki Hatakeyama and Akihiro Mizutani and Go Kato and Nobuyuki Imoto and Kiyoshi Tamaki},
url = {https://link.aps.org/doi/10.1103/PhysRevA.95.042301},
doi = {10.1103/PhysRevA.95.042301},
year = {2017},
date = {2017-04-01},
journal = {Phys. Rev. A},
volume = {95},
pages = {042301},
publisher = {American Physical Society},
keywords = {quantum cryptography},
pubstate = {published},
tppubtype = {article}
}
|
2016
|
8. | Yuichi Nagamatsu; Akihiro Mizutani; Rikizo Ikuta; Takashi Yamamoto; Nobuyuki Imoto; Kiyoshi Tamaki Security of quantum key distribution with light sources that are not independently and identically distributed (Journal Article) In: Phys. Rev. A, 93 , pp. 042325, 2016. @article{PhysRevA.93.042325,
title = {Security of quantum key distribution with light sources that are not independently and identically distributed},
author = {Yuichi Nagamatsu and Akihiro Mizutani and Rikizo Ikuta and Takashi Yamamoto and Nobuyuki Imoto and Kiyoshi Tamaki},
url = {https://link.aps.org/doi/10.1103/PhysRevA.93.042325},
doi = {10.1103/PhysRevA.93.042325},
year = {2016},
date = {2016-04-01},
journal = {Phys. Rev. A},
volume = {93},
pages = {042325},
publisher = {American Physical Society},
keywords = {quantum cryptography},
pubstate = {published},
tppubtype = {article}
}
|
7. | Yuichi Nagamatsu; Akihiro Mizutani; Rikizo Ikuta; Takashi Yamamoto; Nobuyuki Imoto; Kiyoshi Tamaki Security of quantum key distribution with light sources that are not independently and identically distributed (Journal Article) In: Phys. Rev. A, 93 , pp. 042325, 2016. @article{PhysRevA.93.042325b,
title = {Security of quantum key distribution with light sources that are not independently and identically distributed},
author = {Yuichi Nagamatsu and Akihiro Mizutani and Rikizo Ikuta and Takashi Yamamoto and Nobuyuki Imoto and Kiyoshi Tamaki},
url = {https://link.aps.org/doi/10.1103/PhysRevA.93.042325},
doi = {10.1103/PhysRevA.93.042325},
year = {2016},
date = {2016-04-01},
journal = {Phys. Rev. A},
volume = {93},
pages = {042325},
publisher = {American Physical Society},
keywords = {quantum cryptography},
pubstate = {published},
tppubtype = {article}
}
|
2015
|
6. | Akihiro Mizutani; Nobuyuki Imoto; Kiyoshi Tamaki Robustness of the round-robin differential-phase-shift quantum-key-distribution protocol against source flaws (Journal Article) In: Phys. Rev. A, 92 , pp. 060303, 2015. @article{PhysRevA.92.060303,
title = {Robustness of the round-robin differential-phase-shift quantum-key-distribution protocol against source flaws},
author = {Akihiro Mizutani and Nobuyuki Imoto and Kiyoshi Tamaki},
url = {https://link.aps.org/doi/10.1103/PhysRevA.92.060303},
doi = {10.1103/PhysRevA.92.060303},
year = {2015},
date = {2015-12-01},
journal = {Phys. Rev. A},
volume = {92},
pages = {060303},
publisher = {American Physical Society},
keywords = {quantum cryptography},
pubstate = {published},
tppubtype = {article}
}
|
5. | Akihiro Mizutani; Nobuyuki Imoto; Kiyoshi Tamaki Robustness of the round-robin differential-phase-shift quantum-key-distribution protocol against source flaws (Journal Article) In: Phys. Rev. A, 92 , pp. 060303, 2015. @article{PhysRevA.92.060303b,
title = {Robustness of the round-robin differential-phase-shift quantum-key-distribution protocol against source flaws},
author = {Akihiro Mizutani and Nobuyuki Imoto and Kiyoshi Tamaki},
url = {https://link.aps.org/doi/10.1103/PhysRevA.92.060303},
doi = {10.1103/PhysRevA.92.060303},
year = {2015},
date = {2015-12-01},
journal = {Phys. Rev. A},
volume = {92},
pages = {060303},
publisher = {American Physical Society},
keywords = {quantum cryptography},
pubstate = {published},
tppubtype = {article}
}
|
4. | Akihiro Mizutani; Marcos Curty; Charles Ci Wen Lim; Nobuyuki Imoto; Kiyoshi Tamaki Finite-key security analysis of quantum key distribution with imperfect light sources (Journal Article) In: New Journal of Physics, 17 (9), pp. 093011, 2015. @article{1367-2630-17-9-093011,
title = {Finite-key security analysis of quantum key distribution with imperfect light sources},
author = {Akihiro Mizutani and Marcos Curty and Charles Ci Wen Lim and Nobuyuki Imoto and Kiyoshi Tamaki},
url = {http://stacks.iop.org/1367-2630/17/i=9/a=093011},
year = {2015},
date = {2015-09-01},
journal = {New Journal of Physics},
volume = {17},
number = {9},
pages = {093011},
abstract = {In recent years, the gap between theory and practice in quantum key distribution (QKD) has been significantly narrowed, particularly for QKD systems with arbitrarily flawed optical receivers. The status for QKD systems with imperfect light sources is however less satisfactory, in the sense that the resulting secure key rates are often overly dependent on the quality of state preparation. This is especially the case when the channel loss is high. Very recently, to overcome this limitation, Tamaki et al proposed a QKD protocol based on the so-called ‘rejected data analysis’, and showed that its security\textemdashin the limit of infinitely long keys\textemdashis almost independent of any encoding flaw in the qubit space, being this protocol compatible with the decoy state method. Here, as a step towards practical QKD, we show that a similar conclusion is reached in the finite-key regime, even when the intensity of the light source is unstable. More concretely, we derive security bounds for a wide class of realistic light sources and show that the bounds are also efficient in the presence of high channel loss. Our results strongly suggest the feasibility of long distance provably secure communication with imperfect light sources.},
keywords = {quantum cryptography},
pubstate = {published},
tppubtype = {article}
}
In recent years, the gap between theory and practice in quantum key distribution (QKD) has been significantly narrowed, particularly for QKD systems with arbitrarily flawed optical receivers. The status for QKD systems with imperfect light sources is however less satisfactory, in the sense that the resulting secure key rates are often overly dependent on the quality of state preparation. This is especially the case when the channel loss is high. Very recently, to overcome this limitation, Tamaki et al proposed a QKD protocol based on the so-called ‘rejected data analysis’, and showed that its security—in the limit of infinitely long keys—is almost independent of any encoding flaw in the qubit space, being this protocol compatible with the decoy state method. Here, as a step towards practical QKD, we show that a similar conclusion is reached in the finite-key regime, even when the intensity of the light source is unstable. More concretely, we derive security bounds for a wide class of realistic light sources and show that the bounds are also efficient in the presence of high channel loss. Our results strongly suggest the feasibility of long distance provably secure communication with imperfect light sources. |
3. | Akihiro Mizutani; Marcos Curty; Charles Ci Wen Lim; Nobuyuki Imoto; Kiyoshi Tamaki Finite-key security analysis of quantum key distribution with imperfect light sources (Journal Article) In: New Journal of Physics, 17 (9), pp. 093011, 2015. @article{1367-2630-17-9-093011b,
title = {Finite-key security analysis of quantum key distribution with imperfect light sources},
author = {Akihiro Mizutani and Marcos Curty and Charles Ci Wen Lim and Nobuyuki Imoto and Kiyoshi Tamaki},
url = {http://stacks.iop.org/1367-2630/17/i=9/a=093011},
year = {2015},
date = {2015-09-01},
journal = {New Journal of Physics},
volume = {17},
number = {9},
pages = {093011},
abstract = {In recent years, the gap between theory and practice in quantum key distribution (QKD) has been significantly narrowed, particularly for QKD systems with arbitrarily flawed optical receivers. The status for QKD systems with imperfect light sources is however less satisfactory, in the sense that the resulting secure key rates are often overly dependent on the quality of state preparation. This is especially the case when the channel loss is high. Very recently, to overcome this limitation, Tamaki et al proposed a QKD protocol based on the so-called ‘rejected data analysis’, and showed that its security\textemdashin the limit of infinitely long keys\textemdashis almost independent of any encoding flaw in the qubit space, being this protocol compatible with the decoy state method. Here, as a step towards practical QKD, we show that a similar conclusion is reached in the finite-key regime, even when the intensity of the light source is unstable. More concretely, we derive security bounds for a wide class of realistic light sources and show that the bounds are also efficient in the presence of high channel loss. Our results strongly suggest the feasibility of long distance provably secure communication with imperfect light sources.},
keywords = {quantum cryptography},
pubstate = {published},
tppubtype = {article}
}
In recent years, the gap between theory and practice in quantum key distribution (QKD) has been significantly narrowed, particularly for QKD systems with arbitrarily flawed optical receivers. The status for QKD systems with imperfect light sources is however less satisfactory, in the sense that the resulting secure key rates are often overly dependent on the quality of state preparation. This is especially the case when the channel loss is high. Very recently, to overcome this limitation, Tamaki et al proposed a QKD protocol based on the so-called ‘rejected data analysis’, and showed that its security—in the limit of infinitely long keys—is almost independent of any encoding flaw in the qubit space, being this protocol compatible with the decoy state method. Here, as a step towards practical QKD, we show that a similar conclusion is reached in the finite-key regime, even when the intensity of the light source is unstable. More concretely, we derive security bounds for a wide class of realistic light sources and show that the bounds are also efficient in the presence of high channel loss. Our results strongly suggest the feasibility of long distance provably secure communication with imperfect light sources. |
2014
|
2. | Akihiro Mizutani; Kiyoshi Tamaki; Rikizo Ikuta; Takashi Yamamoto; Nobuyuki Imoto Measurement-device-independent quantum key distribution for Scarani-Acin-Ribordy-Gisin 04 protocol (Journal Article) In: Scientific reports, 4 , pp. 5236, 2014. @article{mizutani2014measurement,
title = {Measurement-device-independent quantum key distribution for Scarani-Acin-Ribordy-Gisin 04 protocol},
author = {Akihiro Mizutani and Kiyoshi Tamaki and Rikizo Ikuta and Takashi Yamamoto and Nobuyuki Imoto},
doi = {10.1038/srep05236},
year = {2014},
date = {2014-06-01},
journal = {Scientific reports},
volume = {4},
pages = {5236},
publisher = {Nature Publishing Group},
keywords = {quantum cryptography},
pubstate = {published},
tppubtype = {article}
}
|
1. | Akihiro Mizutani; Kiyoshi Tamaki; Rikizo Ikuta; Takashi Yamamoto; Nobuyuki Imoto Measurement-device-independent quantum key distribution for Scarani-Acin-Ribordy-Gisin 04 protocol (Journal Article) In: Scientific reports, 4 , pp. 5236, 2014. @article{mizutani2014measurementb,
title = {Measurement-device-independent quantum key distribution for Scarani-Acin-Ribordy-Gisin 04 protocol},
author = {Akihiro Mizutani and Kiyoshi Tamaki and Rikizo Ikuta and Takashi Yamamoto and Nobuyuki Imoto},
doi = {10.1038/srep05236},
year = {2014},
date = {2014-06-01},
journal = {Scientific reports},
volume = {4},
pages = {5236},
publisher = {Nature Publishing Group},
keywords = {quantum cryptography},
pubstate = {published},
tppubtype = {article}
}
|