Error Detection and Authentication in Quantum Key Distribution

  • Akihiro Yamamura
  • Hirokazu Ishizuka
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 2119)


Detecting errors in a raw key and authenticating a private key are crucial for quantum key distribution schemes. Our aim is to propose practical methods for error detection and authentication in quantum key distribution schemes. We introduce several concepts about neighborhood collision free properties of Boolean functions, which are closely related to hash functions, and propose methods based on neighborhood collision free functions and error correcting codes such as Reed-Solomon code. We also examine whether or not widely used cryptographic hash functions SHA-1 and MD5 satisfy the neighborhood collision free property by computation experiments.


Boolean Function Error Detection Quantum Channel Classical Channel Redundancy Part 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Bennett, C.H., Brassard, G.: Quantum cryptography: Public-key distribution and coin tossing. Proc. Int. Conf. on Computers, Systems and Signal Processing, Bangalore, India (1984) 175–179Google Scholar
  2. 2.
    Bennett, C.H.: Quantum Cryptography Using Any Two Nonorthogonal States. Phys. Rev. Lett. 68 (1992) 3121–3124zbMATHCrossRefMathSciNetGoogle Scholar
  3. 3.
    Bennett, C.H., Brassard, G., Crépeau, C., Maurer, U.M.: Generalized Privacy Amplification. IEEE Trans. Information Theory 41 (1995) 1915–1923zbMATHCrossRefGoogle Scholar
  4. 4.
    Bennett, C.H., Brassard, G., Robert, J.M.: Privacy Amplification by Public Discussion. SIAM J Comput. 17 (1988) 210–229CrossRefMathSciNetGoogle Scholar
  5. 5.
    Bennett, C.H., Bessette, F., Brassard, G., Salvail, L., Smolin, J.: Experimental Quantum Cryptography. J.Cryptology 5 (1992) 3–28CrossRefGoogle Scholar
  6. 6.
    Bouwmeester, D., Ekert, A., Zeilinger, A.: The Physics of Quantum Information. Springer-Verlag, Berlin Heidelberg New York (2000)zbMATHGoogle Scholar
  7. 7.
    Chor, B., Goldreich, O., Hastad, J., Freidmann, J., Rudich, S., Smolensky, R.: The Bit Extraction Problem or t-resilient Functions. 26th IEEE Symp. Foundations of Computer Science, (1985) 396–407Google Scholar
  8. 8.
    Ekert, A.K.: Quantum Cryptography Based on Bell’s Theorem. Phys. Rev. Lett. 67, No. 6 (1991) 661–663zbMATHCrossRefMathSciNetGoogle Scholar
  9. 9.
    FIPS 180-1: Secure Hash Standard, Federal Information Processing Standard (FIPS), Publication 180-1, National Institute of Standards and Technology, US Department of Commerce, Washington D.C., April (1995)Google Scholar
  10. 10.
    Maurer, U.M.: Secret Key Agreement by Public Discussion from Common Information. IEEE Trans. Information Theory 39 (1993) 733–742zbMATHCrossRefMathSciNetGoogle Scholar
  11. 11.
    Reed, I.S., Solomon, G.: Polynomial Codes over Certain Finite Fields, J. Soc. Indust. Appl. Math. 8 (1960) 300–304zbMATHCrossRefMathSciNetGoogle Scholar
  12. 12.
    Rivest, R.L.: The MD5 Message-digest algorithm, Request for Comments (RFC) 1321, Internet Activities Board, Internet Task Force, April (1992)Google Scholar
  13. 13.
    Shannon, C.E.: Communication Theory of Secrecy Systems. Bell Syst.Tech.J. 28 (1948) 656–715MathSciNetGoogle Scholar
  14. 14.
    Vernam, G.S.: Cipher Printing Telegraph Systems for Secret Wire and Radio Telegraphic Communications. J. Amer. Inst. Elect. Eng. 55 (1926) 109–115Google Scholar
  15. 15.
    Zbinden, H., Bechmann-Pasquinucci, H., Gisin, N., Ribordy, G.: Quantum Cryptography. Applied Physics B 67 (1998) 743–748CrossRefGoogle Scholar
  16. 16.

Copyright information

© Springer-Verlag Berlin Heidelberg 2001

Authors and Affiliations

  • Akihiro Yamamura
    • 1
  • Hirokazu Ishizuka
    • 2
  1. 1.Communications Research LaboratoryTokyoJapan
  2. 2.Mitsubishi Electric CorporationKanagawaJapan

Personalised recommendations