{"created":"2023-05-15T12:35:43.325952+00:00","id":4748,"links":{},"metadata":{"_buckets":{"deposit":"ac0fb2a1-0076-4de6-ac0b-9ec2a58df8da"},"_deposit":{"created_by":91,"id":"4748","owners":[91],"pid":{"revision_id":0,"type":"depid","value":"4748"},"status":"published"},"_oai":{"id":"oai:nitech.repo.nii.ac.jp:00004748","sets":["31"]},"author_link":["8540","15248","15249","8540","11304"],"item_10001_biblio_info_28":{"attribute_name":"bibliographic_information","attribute_value_mlt":[{"bibliographicIssueDates":{"bibliographicIssueDate":"1999-10-20","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"10","bibliographicPageEnd":"2184","bibliographicPageStart":"2178","bibliographicVolumeNumber":"E82-A","bibliographic_titles":[{"bibliographic_title":"IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences","bibliographic_titleLang":"en"}]}]},"item_10001_description_36":{"attribute_name":"内容記述","attribute_value_mlt":[{"subitem_description":"In this paper, we show that the principle of quantum cryptography can be applied not only to a key distribution scheme but also to a data transmission scheme. We propose a secure data transmission scheme in which an eavesdropping can be detected based on sharing the bases Alice (the sender) and Bob (the receiver) have. We also show properties of this scheme.","subitem_description_language":"en","subitem_description_type":"Other"}]},"item_10001_full_name_27":{"attribute_name":"著者別名","attribute_value_mlt":[{"nameIdentifiers":[{"nameIdentifier":"8540","nameIdentifierScheme":"WEKO"},{"nameIdentifier":"1000030188130 ","nameIdentifierScheme":"NRID","nameIdentifierURI":"http://rns.nii.ac.jp/nr/1000030188130 "}],"names":[{"name":"内匠, 逸"}]}]},"item_10001_publisher_29":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"Institute of Electronics, Information and Communication Engineers","subitem_publisher_language":"en"}]},"item_10001_source_id_30":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"0916-8508","subitem_source_identifier_type":"ISSN"}]},"item_10001_source_id_32":{"attribute_name":"item_10001_source_id_32","attribute_value_mlt":[{"subitem_source_identifier":"AA10826239","subitem_source_identifier_type":"NCID"}]},"item_10001_version_type_33":{"attribute_name":"出版タイプ","attribute_value_mlt":[{"subitem_version_resource":"http://purl.org/coar/version/c_970fb48d4fbd8a85","subitem_version_type":"VoR"}]},"item_creator":{"attribute_name":"著者","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Kudo, Takamitsu","creatorNameLang":"en"}],"nameIdentifiers":[{"nameIdentifier":"15248","nameIdentifierScheme":"WEKO"}]},{"creatorNames":[{"creatorName":"Usuda, Tsuyoshi Sasaki","creatorNameLang":"en"}],"nameIdentifiers":[{"nameIdentifier":"15249","nameIdentifierScheme":"WEKO"}]},{"creatorNames":[{"creatorName":"Takumi, Ichi","creatorNameLang":"en"}],"nameIdentifiers":[{"nameIdentifier":"8540","nameIdentifierScheme":"WEKO"},{"nameIdentifier":"1000030188130 ","nameIdentifierScheme":"NRID","nameIdentifierURI":"http://rns.nii.ac.jp/nr/1000030188130 "}]},{"creatorNames":[{"creatorName":"Hata, Masayasu","creatorNameLang":"en"}],"nameIdentifiers":[{"nameIdentifier":"11304","nameIdentifierScheme":"WEKO"}]}]},"item_files":{"attribute_name":"ファイル情報","attribute_type":"file","attribute_value_mlt":[{"accessrole":"open_date","date":[{"dateType":"Available","dateValue":"2017-01-24"}],"displaytype":"detail","filename":"E82-A_2178.pdf","filesize":[{"value":"566.2 kB"}],"format":"application/pdf","license_note":"Copyright(c)1999 IEICE http://search.ieice.org/index.html","licensetype":"license_note","mimetype":"application/pdf","url":{"label":"本文_fulltext","url":"https://nitech.repo.nii.ac.jp/record/4748/files/E82-A_2178.pdf"},"version_id":"1123b8fc-84cd-4f25-b071-e3dbf650186d"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"eng"}]},"item_resource_type":{"attribute_name":"item_resource_type","attribute_value_mlt":[{"resourcetype":"journal article","resourceuri":"http://purl.org/coar/resource_type/c_6501"}]},"item_title":"Application of Quantum Cryptography to an Eavesdropping Detectable Data Transmission","item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"Application of Quantum Cryptography to an Eavesdropping Detectable Data Transmission","subitem_title_language":"en"}]},"item_type_id":"10001","owner":"91","path":["31"],"pubdate":{"attribute_name":"PubDate","attribute_value":"2013-06-25"},"publish_date":"2013-06-25","publish_status":"0","recid":"4748","relation_version_is_last":true,"title":["Application of Quantum Cryptography to an Eavesdropping Detectable Data Transmission"],"weko_creator_id":"91","weko_shared_id":-1},"updated":"2025-03-17T05:16:04.902962+00:00"}