Ȩ > ÀڷḶ´ç > ÀÚ·á°Ë»ö > Ç¥ÁØ
ÀÚ·á °Ë»ö°á°ú
| Ç¥ÁØÁ¾·ù | Á¤º¸Åë½Å´ÜüǥÁØ(TTAS) | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Ç¥ÁعøÈ£ | TTAK.KO-03.0027 | ±¸ Ç¥ÁعøÈ£ | |||||||||||||||
| Á¦°³Á¤ÀÏ | 2025-12-05 | ÃÑ ÆäÀÌÁö | 20 | ||||||||||||||
| ÇÑ±Û Ç¥Áظí | ¾çÀÚ Å° ºÐ¹è ÈÄó¸® °í¼Û ¿À·ùÁ¤Á¤¿ë ¿öµå¸¶½ºÅ© Àû¿ë ¿ä±¸»çÇ× ¹× ±¸Çö ÀýÂ÷ | ||||||||||||||||
| ¿µ¹® Ç¥Áظí | Requirements and Procedures of the Word Masking Application for the fast Error Correction in Post-processing of Quantum Key Distribution | ||||||||||||||||
| ÇÑ±Û ³»¿ë¿ä¾à | ÀÌ Ç¥ÁØÀº ¾çÀÚ Å° ºÐ¹è ÈÄó¸®ÀÇ ±¸Çö ½Ã, ¿À·ùÁ¤Á¤´Ü°èÀÇ È¿À²È¸¦ À§ÇÑ °í¼ÓÈ Ã³¸®¹æ¹ýÀ» ±¸Çö ¿ä±¸»çÇ×°ú ÇÔ²² Á¦½ÃÇϰí, TTAK.KO-12.0406°ú ¿¬°èÇÏ¿©, ¾çÀÚ Å° ºÐ¹è ÈÄó¸® ¿À·ùÁ¤Á¤ ±¸Çö ½Ã °í·ÁÇØ¾ß ÇÏ´Â µ¥ÀÌÅÍ Ã³¸®¹æ¹ýÀ» ¸í¼¼ÇÑ´Ù. ºÎ·Ï¿¡´Â À̸¦ ±¸ÇöÇÏ´Â ¹æ¹ýÀ» ¿¹½Ã·Î Á¦½ÃÇÑ´Ù.
ÀÌ Ç¥ÁØÀº ¾çÀÚ Å° ºÐ¹è (Quantum Key Distribution, QKD) ÈÄó¸® ¿À·ùÁ¤Á¤ °úÁ¤¿¡¼ È¿À²ÀûÀÌ°í ¾ÈÀüÇÑ ±¸ÇöÀ» À§ÇØ ÇÊ¿äÇÑ ±â¼ú ¿ä±¸»çÇ×À» Á¦½ÃÇϰí, À̸¦ Áö¿øÇÏ´Â ±¸ÇöÀýÂ÷¸¦ Á¦½ÃÇÑ´Ù. ƯÈ÷ ¿À·ùÁ¤Á¤ÀÇ °í¼Óȸ¦ À§ÇØ º´·Äó¸® ½ÇÇà ½Ã ¿öµå¸¶½ºÅ© »ý¼º ¹× ÈÄó¸® Åë½Å Àû¿ëÀ» ÅëÇØ ¾çÀÚ Å° ºÐ¹è ¾ÈÀü¼º¿¡ ¿µÇâÀ» ÁÖÁö ¾Ê´Â Åë½ÅÀýÂ÷¸¦ ¿î¿ëÇϱâ À§ÇÑ µ¥ÀÌÅÍ Ã³¸®¹æ¹ýÀ» ¸í¼¼ÇÑ´Ù. ÀÌ ±â¼ú ¿ä±¸»çÇ×Àº TTAK.KO-12.0406¿¡¼ ±â¼úµÈ ÈÄó¸® °úÁ¤ÀÇ º¸¾È¿ä±¸»çÇ׿¡ ºÎ°¡ÀûÀ¸·Î Àû¿ëµÉ ¼ö ÀÖ´Ù. |
||||||||||||||||
| ¿µ¹® ³»¿ë¿ä¾à |
The standard is to present high-speed processing methods for improving the efficiency of error correction in the post-processing phase of QKD. Together with the implementation requirements, it specifies data handling methods that shall be considered in connection with TTAK.KO-12.0406. An annex provides examples of the implementation.
This standard is to define the technical requirements for an efficient and secure implementation of error correction in QKD post-processing and to provide supporting implementation procedures. In particular, it specifies the data handling methods for parallel execution of error correction, where word-mask generation and post-processing communication are applied to ensure that communication procedures do not compromise QKD security. These technical requirements can be applied in addition to the security requirements for post-processing described in TTAK.KO-12.0406. |
||||||||||||||||
| °ü·Ã IPR È®¾à¼ | Á¢¼öµÈ IPR È®¾à¼ ¾øÀ½ | ||||||||||||||||
| °ü·ÃÆÄÀÏ |
|
||||||||||||||||
| Ç¥ÁØÀÌ·Â |
|
||||||||||||||||

