The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. ex. Some numerals are expressed as "XNUMX".
Copyrights notice
The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. Copyrights notice
양자 암호화는 광범위한 관심의 대상이 되었습니다. 특히 양자시스템을 활용해 안전한 키 합의를 제공하는 양자키분배는 양자암호의 가장 중요한 응용 분야로 꼽힌다. 양자 키 분배는 "무조건" 보안 인프라를 달성할 수 있는 잠재력을 가지고 있습니다. 또한 현재 "현대 암호화"를 기반으로 하는 암호화 도구도 많이 있습니다. 이는 인터넷과 같은 개방형 네트워크를 통한 안전한 통신을 보장하기 위한 노력의 일환으로 사용되고 있습니다. 불행하게도 그들의 궁극적인 효능은 의심스럽습니다. 양자 키 분배 시스템은 실용적이고 상업적인 용도에 근접한 것으로 여겨집니다. 본 논문에서는 양자 암호화를 통신에 적용하기 위해 무엇을 해야 하는지 논의합니다. 또한 양자 키 배포를 현대 암호화 기반의 암호화 도구와 결합하거나 대체하는 방법에 대해서도 논의합니다.
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
부
Yasuyuki SAKAI, Hidema TANAKA, "Changes to Quantum Cryptography" in IEICE TRANSACTIONS on Fundamentals,
vol. E93-A, no. 5, pp. 872-879, May 2010, doi: 10.1587/transfun.E93.A.872.
Abstract: Quantum cryptography has become a subject of widespread interest. In particular, quantum key distribution, which provides a secure key agreement by using quantum systems, is believed to be the most important application of quantum cryptography. Quantum key distribution has the potential to achieve the "unconditionally" secure infrastructure. We also have many cryptographic tools that are based on "modern cryptography" at the present time. They are being used in an effort to guarantee secure communication over open networks such as the Internet. Unfortunately, their ultimate efficacy is in doubt. Quantum key distribution systems are believed to be close to practical and commercial use. In this paper, we discuss what we should do to apply quantum cryptography to our communications. We also discuss how quantum key distribution can be combined with or used to replace cryptographic tools based on modern cryptography.
URL: https://global.ieice.org/en_transactions/fundamentals/10.1587/transfun.E93.A.872/_p
부
@ARTICLE{e93-a_5_872,
author={Yasuyuki SAKAI, Hidema TANAKA, },
journal={IEICE TRANSACTIONS on Fundamentals},
title={Changes to Quantum Cryptography},
year={2010},
volume={E93-A},
number={5},
pages={872-879},
abstract={Quantum cryptography has become a subject of widespread interest. In particular, quantum key distribution, which provides a secure key agreement by using quantum systems, is believed to be the most important application of quantum cryptography. Quantum key distribution has the potential to achieve the "unconditionally" secure infrastructure. We also have many cryptographic tools that are based on "modern cryptography" at the present time. They are being used in an effort to guarantee secure communication over open networks such as the Internet. Unfortunately, their ultimate efficacy is in doubt. Quantum key distribution systems are believed to be close to practical and commercial use. In this paper, we discuss what we should do to apply quantum cryptography to our communications. We also discuss how quantum key distribution can be combined with or used to replace cryptographic tools based on modern cryptography.},
keywords={},
doi={10.1587/transfun.E93.A.872},
ISSN={1745-1337},
month={May},}
부
TY - JOUR
TI - Changes to Quantum Cryptography
T2 - IEICE TRANSACTIONS on Fundamentals
SP - 872
EP - 879
AU - Yasuyuki SAKAI
AU - Hidema TANAKA
PY - 2010
DO - 10.1587/transfun.E93.A.872
JO - IEICE TRANSACTIONS on Fundamentals
SN - 1745-1337
VL - E93-A
IS - 5
JA - IEICE TRANSACTIONS on Fundamentals
Y1 - May 2010
AB - Quantum cryptography has become a subject of widespread interest. In particular, quantum key distribution, which provides a secure key agreement by using quantum systems, is believed to be the most important application of quantum cryptography. Quantum key distribution has the potential to achieve the "unconditionally" secure infrastructure. We also have many cryptographic tools that are based on "modern cryptography" at the present time. They are being used in an effort to guarantee secure communication over open networks such as the Internet. Unfortunately, their ultimate efficacy is in doubt. Quantum key distribution systems are believed to be close to practical and commercial use. In this paper, we discuss what we should do to apply quantum cryptography to our communications. We also discuss how quantum key distribution can be combined with or used to replace cryptographic tools based on modern cryptography.
ER -