211 research outputs found
Recommended from our members
Quantum networks in the UK
We describe recent progress in quantum secured optical networks in the UK. The Cambridge Quantum Network has been operating for several years with 3 nodes separated by between 5-10 km of installed fibre. All links are secured by QKD systems operating with secure key rates in excess of 1 Mb/s, the highest recorded long term key rates in a deployed network. The network operates in the presence of 100Gb/s classical traffic with no significant reduction of secure key generation rate. In addition, the Bristol Quantum Network has four nodes 1-3km apart connected in a mesh protected by two pairs of QKD systems. The network is designed to be very dynamic, switching both QKD and WDM classical traffic to enable rapid reconfiguration and is used as a testbed for QKD protected dynamic applications. The two metropolitan networks are being connected by a 410 km QKD link, with 4 spans, the longest of which operates over 129km of fibre with an attenuation of 28dB achieving secure key rates of 2.7kb/s, the longest and highest loss QKD field trial to date. A 120km extension of the UK quantum network from Cambridge to BT Labs, Adastral Park operates with fully commercially available components and is an important testbed comprising 3 intermediate nodes and operates with 5 x 100Gb/s classical channels. This helps determine how to proceed with a large-scale commercial deployment of QKD
The Security of Practical Quantum Key Distribution
Quantum key distribution (QKD) is the first quantum information task to reach
the level of mature technology, already fit for commercialization. It aims at
the creation of a secret key between authorized partners connected by a quantum
channel and a classical authenticated channel. The security of the key can in
principle be guaranteed without putting any restriction on the eavesdropper's
power.
The first two sections provide a concise up-to-date review of QKD, biased
toward the practical side. The rest of the paper presents the essential
theoretical tools that have been developed to assess the security of the main
experimental platforms (discrete variables, continuous variables and
distributed-phase-reference protocols).Comment: Identical to the published version, up to cosmetic editorial change
Iterative Entanglement Distillation: Approaching full Elimination of Decoherence
The distribution and processing of quantum entanglement form the basis of
quantum communication and quantum computing. The realization of the two is
difficult because quantum information inherently has a high susceptibility to
decoherence, i.e. to uncontrollable information loss to the environment. For
entanglement distribution, a proposed solution to this problem is capable of
fully eliminating decoherence; namely iterative entanglement distillation. This
approach builds on a large number of distillation steps each of which extracts
a number of weakly decohered entangled states from a larger number of strongly
decohered states. Here, for the first time, we experimentally demonstrate
iterative distillation of entanglement. Already distilled entangled states were
further improved in a second distillation step and also made available for
subsequent steps.Our experiment displays the realization of the building blocks
required for an entanglement distillation scheme that can fully eliminate
decoherence
Updatable Encryption from Group Actions
Updatable Encryption (UE) allows to rotate the encryption key in the outsourced storage
setting while minimizing the bandwith used. The server can update ciphertexts to the new key using a
token provided by the client. UE schemes should provide strong confidentiality guarantees against an
adversary that can corrupt keys and tokens.
This paper studies the problem of building UE in the group action framework. We introduce a new
notion of Mappable Effective Group Action (MEGA) and show that we can build CCA secure UE from
a MEGA by generalizing the SHINE construction of Boyd et al. at Crypto 2020. Unfortunately, we do
not know how to instantiate this new construction in the post-quantum setting. Doing so would solve
the open problem of building a CCA secure post-quantum UE scheme.
Isogeny-based group actions are the most studied post-quantum group actions. Unfortunately, the
resulting group actions are not mappable. We show that we can still build UE from isogenies by
introducing a new algebraic structure called Effective Triple Orbital Group Action (ETOGA). We
prove that UE can be built from an ETOGA and show how to instantiate this abstract structure from
isogeny-based group actions. This new construction solves two open problems in ciphertext-independent
post-quantum UE. First, this is the first post-quantum UE scheme that supports an unbounded number
of updates. Second, our isogeny-based UE scheme is the first post-quantum UE scheme not based on
lattices
- …