Skip to main content

Showing 1–6 of 6 results for author: Iwakoshi, T

.
  1. arXiv:2001.11150  [pdf

    quant-ph cs.CR cs.IT

    Analysis of Y00 Protocol under Quantum Generalization of a Fast Correlation Attack: Toward Information-Theoretic Security

    Authors: Takehisa Iwakoshi

    Abstract: In our previous work, it was demonstrated that the attacker could not pin-down the correct keys to start the Y00 protocol with a probability of one under the assistance of unlimitedly long known-plaintext attacks and optimal quantum measurements on the attacker's quantum memory. However, there were several assumptions that the Y00 system utilized linear-feedback shift registers as pseudo-random-nu… ▽ More

    Submitted 29 January, 2020; originally announced January 2020.

    Comments: Accepted to a journal (Early access is already available at https://ieeexplore.ieee.org/document/8970381)

  2. arXiv:1902.05192  [pdf

    cs.CR quant-ph

    Potentially Information-theoretic Secure Y00 Quantum Stream Cipher with Limited Key Lengths beyond One-Time Pad

    Authors: Takehisa Iwakoshi

    Abstract: The previous work showed that the Y00 protocol could stay secure with the eavesdropper's guessing probability on the secret keys being strictly less than one under an unlimitedly long known-plaintext attack with quantum memory. However, an assumption that at least a fast correlation attack is completely disabled by irregular map**. The present study shows that the Y00 protocol can be information… ▽ More

    Submitted 13 February, 2019; originally announced February 2019.

    Comments: Comments are appreciated

  3. Guessing probability under unlimited known-plaintext attack on secret keys for Y00 quantum stream cipher by quantum multiple hypotheses testing

    Authors: Takehisa Iwakoshi

    Abstract: Although quantum key distribution is regarded as promising secure communication, security of Y00 protocol proposed by Yuen in 2000 for the affinity to conventional optical communication is not well-understood yet; its security has been evaluated only by the eavesdropper's error probabilities of detecting individual signals or masking size, the number of hidden signal levels under quantum and class… ▽ More

    Submitted 11 December, 2018; originally announced December 2018.

    Comments: Not exactly same as the submitted version, rather close to before the revision. The open-access published version is on the publisher's site. https://doi.org/10.1117/1.OE.57.12.126103

    Journal ref: Optical Engineering 57(12), 126103 (10 December 2018)

  4. Security of Quantum Key Distribution from Attacker's View

    Authors: Takehisa Iwakoshi

    Abstract: In 2005, trace distance between an ideal quantum state to be distributed and an actual quantum state distributed was introduced as a valid security measure of Quantum Key Distribution (QKD) by R. Renner et al., then it has been perceived that the trace can be interpreted as a maximum failure probability of QKD. While such a perspective has been widely accepted, H. P. Yuen and O. Hirota have been w… ▽ More

    Submitted 9 November, 2017; originally announced November 2017.

    Comments: in Japanese and English. The part of this unpublished work is now published in SPIE proceedings (Open Access), http://dx.doi.org/10.1117/12.2278625

  5. Yuen's Criticisms on Security of Quantum Key Distribution and Onward

    Authors: Takehisa Iwakoshi

    Abstract: Quantum Key Distribution (QKD) has been attracting researchers that it would provide provable security to distribute secret keys since its birth in 1984. Since 2005, the trace distance between an ideal quantum state and an actually distributed state has been employed to evaluate its security level, and the trace distance was given an interpretation that it would be a maximum failure probability in… ▽ More

    Submitted 26 July, 2018; v1 submitted 9 November, 2017; originally announced November 2017.

    Comments: The part of this unpublished work is now published in SPIE Proceedings (Open Access), http://dx.doi.org/10.1117/12.2278625 2018-07-27, fixed links which was expired

  6. Test of the Conserved Vector Current Hypothesis by beta-ray Angular Distribution Measurement in the Mass-8 System

    Authors: T. Sumikama, K. Matsuta, T. Nagatomo, M. Ogura, T. Iwakoshi, Y. Nakashima, H. Fujiwara, M. Fukuda, M. Mihara, K. Minamisono, T. Yamaguchi, T. Minamisono

    Abstract: The beta-ray angular correlations for the spin alignments of 8Li and 8B have been observed in order to test the conserved vector current (CVC) hypothesis. The alignment correlation terms were combined with the known beta-alpha-angular correlation terms to determine all the matrix elements contributing to the correlation terms. The weak magnetism term, 7.5\pm0.2, deduced from the beta-ray correlati… ▽ More

    Submitted 9 May, 2011; originally announced May 2011.

    Comments: 31 pages, 12 figures, Accepted for publication in Phys. Rev. C

    Journal ref: Phys.Rev.C83:065501,2011