{"created":"2021-03-01T06:17:12.794435+00:00","id":669,"links":{},"metadata":{"_buckets":{"deposit":"d343e0f4-11d9-413c-83d7-057dcf832f6b"},"_deposit":{"id":"669","owners":[],"pid":{"revision_id":0,"type":"depid","value":"669"},"status":"published"},"_oai":{"id":"oai:repository.dl.itc.u-tokyo.ac.jp:00000669","sets":["6:155:156","9:10:11"]},"item_2_biblio_info_7":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicIssueDates":{"bibliographicIssueDate":"2014-05-22","bibliographicIssueDateType":"Issued"},"bibliographicPageEnd":"478","bibliographicPageStart":"475","bibliographicVolumeNumber":"509","bibliographic_titles":[{"bibliographic_title":"Nature"}]}]},"item_2_description_5":{"attribute_name":"抄録","attribute_value_mlt":[{"subitem_description":"Quantum cryptograph exploits the fundamental laws of quantum mechanics to provide a secure way to exchange private information. Such an exchange requires a common random bit sequence, called a key, to be shared secretly between the sender and the receiver. The basic idea behind quantum key distribution (QKD) has widely been understood as the property that any attempt to distinguish encoded quantum states causes a disturbance in the signal. As a result, implementation of a QKD protocol involves an estimation of the experimental parameters influenced by the eavesdropper’s intervention, which is achieved by randomly sampling the signal. If the estimation of many parameters with high precision is required, the portion of the signal that is sacrificed increases, thus decreasing the efficiency of the protocol. Here we propose a QKD protocol based on an entirely different principle. The sender encodes a bit sequence onto non-orthogonal quantum states and the receiver randomly dictates how a single bit should be calculated from the sequence. The eavesdropper, who is unable to learn the whole of the sequence, cannot guess the bit value correctly. An achievable rate of secure key distribution is calculated by considering complementary choices between quantum measurements of two conjugate observables. We found that a practical implementation using a laser pulse train achieves a key rate comparable to a decoy-state QKD protocol, an often-used technique for lasers. It also has a better tolerance of bit errors and of finite-sized-key effects. We anticipate that this finding will give new insight into how the probabilistic nature of quantum mechanics can be related to secure communication, and will facilitate the simple and efficient use of conventional lasers for QKD.","subitem_description_type":"Abstract"}]},"item_2_description_6":{"attribute_name":"内容記述","attribute_value_mlt":[{"subitem_description":"UTokyo Research掲載「量子暗号に30年ぶりの新原理」 URI: http://www.u-tokyo.ac.jp/ja/utokyo-research/research-news/first-breakthrough-in-quantum-cryptography-in-30-years/","subitem_description_type":"Other"},{"subitem_description":"UTokyo Research \"First breakthrough in quantum cryptography in 30 years\" URI: http://www.u-tokyo.ac.jp/en/utokyo-research/research-news/first-breakthrough-in-quantum-cryptography-in-30-years/","subitem_description_type":"Other"}]},"item_2_publisher_20":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"Nature Publishing Group"}]},"item_2_relation_11":{"attribute_name":"DOI","attribute_value_mlt":[{"subitem_relation_type_id":{"subitem_relation_type_id_text":"info:doi/10.1038/nature13303","subitem_relation_type_select":"DOI"}}]},"item_2_relation_25":{"attribute_name":"関係URI","attribute_value_mlt":[{"subitem_relation_type_id":{"subitem_relation_type_id_text":"http://www.u-tokyo.ac.jp/ja/utokyo-research/research-news/first-breakthrough-in-quantum-cryptography-in-30-years/","subitem_relation_type_select":"URI"}},{"subitem_relation_type_id":{"subitem_relation_type_id_text":"http://www.u-tokyo.ac.jp/en/utokyo-research/research-news/first-breakthrough-in-quantum-cryptography-in-30-years/","subitem_relation_type_select":"URI"}},{"subitem_relation_type_id":{"subitem_relation_type_id_text":"http://www.nature.com/nature/journal/v509/n7501/abs/nature13303.html","subitem_relation_type_select":"URI"}}]},"item_2_rights_12":{"attribute_name":"権利","attribute_value_mlt":[{"subitem_rights":"Copyright (C) 2014, Rights Managed by Nature Publishing Group"}]},"item_2_select_14":{"attribute_name":"著者版フラグ","attribute_value_mlt":[{"subitem_select_item":"author"}]},"item_2_source_id_10":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AA00752384","subitem_source_identifier_type":"NCID"}]},"item_2_source_id_8":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"0028-0836","subitem_source_identifier_type":"ISSN"},{"subitem_source_identifier":"1476-4687","subitem_source_identifier_type":"ISSN"}]},"item_2_text_4":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"Photon Science Center, Graduate School of Engineering, The University of Tokyo"},{"subitem_text_value":"E. L. Ginzton Laboratory, Stanford University"},{"subitem_text_value":"National Institute of Informatics"}]},"item_creator":{"attribute_name":"著者","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Toshihiko, Sasaki"}],"nameIdentifiers":[{"nameIdentifier":"2385","nameIdentifierScheme":"WEKO"}]},{"creatorNames":[{"creatorName":"Yoshihisa, Yamamoto"}],"nameIdentifiers":[{"nameIdentifier":"2386","nameIdentifierScheme":"WEKO"}]},{"creatorNames":[{"creatorName":"Masato, Koashi"}],"nameIdentifiers":[{"nameIdentifier":"2387","nameIdentifierScheme":"WEKO"}]}]},"item_files":{"attribute_name":"ファイル情報","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_date","date":[{"dateType":"Available","dateValue":"2017-05-30"}],"displaytype":"detail","filename":"nature13303_author_version.pdf","filesize":[{"value":"971.7 kB"}],"format":"application/pdf","licensetype":"license_note","mimetype":"application/pdf","url":{"label":"nature13303_author_version.pdf","url":"https://repository.dl.itc.u-tokyo.ac.jp/record/669/files/nature13303_author_version.pdf"},"version_id":"2e08e7cd-5a3c-4bac-83a4-07a38a912fd6"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"Quantum information","subitem_subject_scheme":"Other"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"eng"}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourcetype":"journal article","resourceuri":"http://purl.org/coar/resource_type/c_6501"}]},"item_title":"Practical quantum key distribution protocol without monitoring signal disturbance","item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"Practical quantum key distribution protocol without monitoring signal disturbance"}]},"item_type_id":"2","owner":"1","path":["11","156"],"pubdate":{"attribute_name":"公開日","attribute_value":"2015-02-04"},"publish_date":"2015-02-04","publish_status":"0","recid":"669","relation_version_is_last":true,"title":["Practical quantum key distribution protocol without monitoring signal disturbance"],"weko_creator_id":"1","weko_shared_id":2},"updated":"2022-12-19T03:41:40.896787+00:00"}