1,486 research outputs found
Low Cost and Compact Quantum Cryptography
We present the design of a novel free-space quantum cryptography system,
complete with purpose-built software, that can operate in daylight conditions.
The transmitter and receiver modules are built using inexpensive off-the-shelf
components. Both modules are compact allowing the generation of renewed shared
secrets on demand over a short range of a few metres. An analysis of the
software is shown as well as results of error rates and therefore shared secret
yields at varying background light levels. As the system is designed to
eventually work in short-range consumer applications, we also present a use
scenario where the consumer can regularly 'top up' a store of secrets for use
in a variety of one-time-pad and authentication protocols.Comment: 18 pages, 9 figures, to be published in New Journal of Physic
Free-Space Quantum Key Distribution
Based on the firm laws of physics rather than unproven foundations of
mathematical complexity, quantum cryptography provides a radically different
solution for encryption and promises unconditional security. Quantum
cryptography systems are typically built between two nodes connected to each
other through fiber optic. This chapter focuses on quantum cryptography systems
operating over free-space optical channels as a cost-effective and license-free
alternative to fiber optic counterparts. It provides an overview of the
different parts of an experimental free-space quantum communication link
developed in the Spanish National Research Council (Madrid, Spain).Comment: 22 pages, 15 figure
Practical long-distance quantum key distribution system using decoy levels
Quantum key distribution (QKD) has the potential for widespread real-world
applications. To date no secure long-distance experiment has demonstrated the
truly practical operation needed to move QKD from the laboratory to the real
world due largely to limitations in synchronization and poor detector
performance. Here we report results obtained using a fully automated, robust
QKD system based on the Bennett Brassard 1984 protocol (BB84) with low-noise
superconducting nanowire single-photon detectors (SNSPDs) and decoy levels.
Secret key is produced with unconditional security over a record 144.3 km of
optical fibre, an increase of more than a factor of five compared to the
previous record for unconditionally secure key generation in a practical QKD
system.Comment: 9 page
Quantum Key Distribution (QKD) and Commodity Security Protocols: Introduction and Integration
We present an overview of quantum key distribution (QKD), a secure key
exchange method based on the quantum laws of physics rather than computational
complexity. We also provide an overview of the two most widely used commodity
security protocols, IPsec and TLS. Pursuing a key exchange model, we propose
how QKD could be integrated into these security applications. For such a QKD
integration we propose a support layer that provides a set of common QKD
services between the QKD protocol and the security applicationsComment: 12Page
Physical-Layer Security, Quantum Key Distribution and Post-quantum Cryptography
The growth of data-driven technologies, 5G, and the Internet place enormous pressure on underlying information infrastructure. There exist numerous proposals on how to deal with the possible capacity crunch. However, the security of both optical and wireless networks lags behind reliable and spectrally efficient transmission. Significant achievements have been made recently in the quantum computing arena. Because most conventional cryptography systems rely on computational security, which guarantees the security against an efficient eavesdropper for a limited time, with the advancement in quantum computing this security can be compromised. To solve these problems, various schemes providing perfect/unconditional security have been proposed including physical-layer security (PLS), quantum key distribution (QKD), and post-quantum cryptography. Unfortunately, it is still not clear how to integrate those different proposals with higher level cryptography schemes. So the purpose of the Special Issue entitled “Physical-Layer Security, Quantum Key Distribution and Post-quantum Cryptography” was to integrate these various approaches and enable the next generation of cryptography systems whose security cannot be broken by quantum computers. This book represents the reprint of the papers accepted for publication in the Special Issue
- …