Abstract
Detecting errors in a raw key and authenticating a private key are crucial for quantum key distribution schemes. Our aim is to propose practical methods for error detection and authentication in quantum key distribution schemes. We introduce several concepts about neighborhood collision free properties of Boolean functions, which are closely related to hash functions, and propose methods based on neighborhood collision free functions and error correcting codes such as Reed-Solomon code. We also examine whether or not widely used cryptographic hash functions SHA-1 and MD5 satisfy the neighborhood collision free property by computation experiments.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Bennett, C.H., Brassard, G.: Quantum cryptography: Public-key distribution and coin tossing. Proc. Int. Conf. on Computers, Systems and Signal Processing, Bangalore, India (1984) 175–179
Bennett, C.H.: Quantum Cryptography Using Any Two Nonorthogonal States. Phys. Rev. Lett. 68 (1992) 3121–3124
Bennett, C.H., Brassard, G., Crépeau, C., Maurer, U.M.: Generalized Privacy Amplification. IEEE Trans. Information Theory 41 (1995) 1915–1923
Bennett, C.H., Brassard, G., Robert, J.M.: Privacy Amplification by Public Discussion. SIAM J Comput. 17 (1988) 210–229
Bennett, C.H., Bessette, F., Brassard, G., Salvail, L., Smolin, J.: Experimental Quantum Cryptography. J.Cryptology 5 (1992) 3–28
Bouwmeester, D., Ekert, A., Zeilinger, A.: The Physics of Quantum Information. Springer-Verlag, Berlin Heidelberg New York (2000)
Chor, B., Goldreich, O., Hastad, J., Freidmann, J., Rudich, S., Smolensky, R.: The Bit Extraction Problem or t-resilient Functions. 26th IEEE Symp. Foundations of Computer Science, (1985) 396–407
Ekert, A.K.: Quantum Cryptography Based on Bell’s Theorem. Phys. Rev. Lett. 67, No. 6 (1991) 661–663
FIPS 180-1: Secure Hash Standard, Federal Information Processing Standard (FIPS), Publication 180-1, National Institute of Standards and Technology, US Department of Commerce, Washington D.C., April (1995)
Maurer, U.M.: Secret Key Agreement by Public Discussion from Common Information. IEEE Trans. Information Theory 39 (1993) 733–742
Reed, I.S., Solomon, G.: Polynomial Codes over Certain Finite Fields, J. Soc. Indust. Appl. Math. 8 (1960) 300–304
Rivest, R.L.: The MD5 Message-digest algorithm, Request for Comments (RFC) 1321, Internet Activities Board, Internet Task Force, April (1992)
Shannon, C.E.: Communication Theory of Secrecy Systems. Bell Syst.Tech.J. 28 (1948) 656–715
Vernam, G.S.: Cipher Printing Telegraph Systems for Secret Wire and Radio Telegraphic Communications. J. Amer. Inst. Elect. Eng. 55 (1926) 109–115
Zbinden, H., Bechmann-Pasquinucci, H., Gisin, N., Ribordy, G.: Quantum Cryptography. Applied Physics B 67 (1998) 743–748
“http://www.mitsubishielectric.com/pressreleases/2000/mel0502.html”
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2001 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Yamamura, A., Ishizuka, H. (2001). Error Detection and Authentication in Quantum Key Distribution. In: Varadharajan, V., Mu, Y. (eds) Information Security and Privacy. ACISP 2001. Lecture Notes in Computer Science, vol 2119. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-47719-5_22
Download citation
DOI: https://doi.org/10.1007/3-540-47719-5_22
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-42300-3
Online ISBN: 978-3-540-47719-8
eBook Packages: Springer Book Archive