Cryptography – Communication system using cryptography
Reexamination Certificate
2007-08-21
2007-08-21
Jung, David (Department: 2134)
Cryptography
Communication system using cryptography
C380S257000, C380S028000
Reexamination Certificate
active
10363266
ABSTRACT:
Each of a transmitter (1) and a receiver (2) divides temporarily-shared data into one or more purification blocks and one or more disposable blocks, and mixes each purification block so as to enlarge a Hamming distance between corresponding purification blocks being held by the transmitter (1) and the receiver (2) by using a Hamming distance amplification effect. The transmitter (1) Vernam-encrypts the mixed data with the disposable data and transmits the mixed data to the receiver (2), and the receiver (2) decrypts the received Vernam-encrypted data by using a disposable block owned thereby, and compares the Hamming distance between the purification block owned thereby with the mixed data with a predetermined value so as to judge whether each purification block can be shared between the transmitter (1) and the receiver (2).
REFERENCES:
SPRiNG: synchronized random numbers for wireless securityPepyne, D.L.; Yu-Chi Ho; Qinghua Zheng;Wireless Communications and Networking, 2003. WCNC 2003. 2003 IEEEvol. 3, Mar. 16-20, 2003 pp. 2027-2032 vol. 3.
Secret Telephony as a Historical Example of Spread-Spectrum CommunicationBennett, W.;Communications, IEEE Transactions on [legacy, pre—1988]vol. 31, Issue 1, Jan. 1983 pp. 98-104.
Methodology for network security designGraft, D.; Pabrai, M.; Pabrai, U.;Communications Magazine, IEEEvol. 28, Issue 11, Nov. 1990 pp. 52-58.
Eli Biham, et al., “A Proof of the Security of Quantum Key Distribution”, Proceedings of the 32ndAnnual Symposium on Theory of Computing, Proceedings of the Annual ACM Symposium on Theory of Computing, IEEE, XP-02981935, May 21-23, 2000, pp. 715-724.
Peter W. Shor, “Fault-Tolerant Quantum Computation”, Foundations of Computer Science, IEEE Comput. Soc., XP-010202848, Oct. 14-16, 1996, pp. 56-65.
Markus Grassl, “Methods of Quantum Error Correction”, Circuits and Systems, ISCAS 2000, vol. 1, XP-010503305, May 28-31, 2000, pp. 1740-1743.
Charles H. Bennett et al.: “Experimetnal quantum cryptography” Journal of Cryptology, vol. 5, No. 1, pp. 3-28 1992.
Hoi-Kwong Lo et al.: “Quantum cryptology” Introduction to Quantum Computation and Information, pp. 76-119 1988.
Ishizuka Hirokazu
Yamamura Akihiro
Communications Research Laboratory, Independent Administrative I
Jung David
National Institute of Information and Communications Technology
Oblon & Spivak, McClelland, Maier & Neustadt P.C.
LandOfFree
Shared data refining device and shared data refining method does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Shared data refining device and shared data refining method, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Shared data refining device and shared data refining method will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3873736