130 research outputs found
Quantum Data Locking for Secure Communication against an Eavesdropper with Time-Limited Storage
Quantum cryptography allows for unconditionally secure communication against an eavesdropper endowed with unlimited computational power and perfect technologies, who is only constrained by the laws of physics. We review recent results showing that, under the assumption that the eavesdropper can store quantum information only for a limited time, it is possible to enhance the performance of quantum key distribution in both a quantitative and qualitative fashion. We consider quantum data locking as a cryptographic primitive and discuss secure communication and key distribution protocols. For the case of a lossy optical channel, this yields the theoretical possibility of generating secret key at a constant rate of 1 bit per mode at arbitrarily long communication distances.United States. Army Research Office (United States. Defense Advanced Research Projects Agency. Quiness Program (W31P4Q-12-1-0019
Continuous-variable quantum enigma machines for long-distance key distribution
Quantum physics allows for unconditionally secure communication through
insecure communication channels. The achievable rates of quantum-secured
communication are fundamentally limited by the laws of quantum physics and in
particular by the properties of entanglement. For a lossy communication line,
this implies that the secret-key generation rate vanishes at least
exponentially with the communication distance. We show that this fundamental
limitation can be violated in a realistic scenario where the eavesdropper can
store quantum information for only a finite, yet arbitrarily long, time. We
consider communication through a lossy bononic channel (modeling linear loss in
optical fibers) and we show that it is in principle possible to achieve a
constant rate of key generation of one bit per optical mode over arbitrarily
long communication distances.Comment: 13 pages. V2: new title, new result on active attacks, increased
rigour in the security proo
Quantum enigma machine: Experimentally demonstrating quantum data locking
Shannon proved in 1949 that information-theoretic-secure encryption is possible if the encryption key is used only once, is random, and is at least as long as the message itself. Notwithstanding, when information is encoded in a quantum system, the phenomenon of quantum data locking allows one to encrypt a message with a shorter key and still provide information-theoretic security. We present one of the first feasible experimental demonstrations of quantum data locking for direct communication and propose a scheme for a quantum enigma machine that encrypts 6 bits per photon (containing messages, new encryption keys, and forward error correction bits) with less than 6 bits per photon of encryption key while remaining information-theoretically secure
Programmable dispersion on a photonic integrated circuit for classical and quantum applications
We demonstrate a large-scale tunable-coupling ring resonator array, suitable for high-dimensional classical and quantum transforms, in a CMOS-compatible silicon photonics platform. The device consists of a waveguide coupled to 15 ring-based dispersive elements with programmable linewidths and resonance frequencies. The ability to control both quality factor and frequency of each ring provides an unprecedented 30 degrees of freedom in dispersion control on a single spatial channel. This programmable dispersion control system has a range of applications, including mode-locked lasers, quantum key distribution, and photon-pair generation. We also propose a novel application enabled by this circuit – high-speed quantum communications using temporal-mode-based quantum data locking – and discuss the utility of the system for performing the high-dimensional unitary optical transformations necessary for a quantum data locking demonstration
Boson Sampling Private-Key Quantum Cryptography
We introduce a quantum private-key encryption protocol based on multi-photon interference in linear optics networks. The scheme builds upon Boson Sampling, and we show that it is hard to break, even for a quantum computer. We present an information-theoretic proof of the security of our protocol against an eavesdropper with unlimited (quantum) computational power but time-limited quantum storage. This protocol is shown to be optimal in the sense that it asymptotically encrypts all the information that passes through the interferometer using an exponentially smaller private key. This is the first practical application of Boson Sampling in quantum communication. Our scheme requires only moderate photon numbers and is experimentally feasible with current technology
- …