130 research outputs found

    Quantum Data Locking for Secure Communication against an Eavesdropper with Time-Limited Storage

    Get PDF
    Quantum cryptography allows for unconditionally secure communication against an eavesdropper endowed with unlimited computational power and perfect technologies, who is only constrained by the laws of physics. We review recent results showing that, under the assumption that the eavesdropper can store quantum information only for a limited time, it is possible to enhance the performance of quantum key distribution in both a quantitative and qualitative fashion. We consider quantum data locking as a cryptographic primitive and discuss secure communication and key distribution protocols. For the case of a lossy optical channel, this yields the theoretical possibility of generating secret key at a constant rate of 1 bit per mode at arbitrarily long communication distances.United States. Army Research Office (United States. Defense Advanced Research Projects Agency. Quiness Program (W31P4Q-12-1-0019

    Continuous-variable quantum enigma machines for long-distance key distribution

    Get PDF
    Quantum physics allows for unconditionally secure communication through insecure communication channels. The achievable rates of quantum-secured communication are fundamentally limited by the laws of quantum physics and in particular by the properties of entanglement. For a lossy communication line, this implies that the secret-key generation rate vanishes at least exponentially with the communication distance. We show that this fundamental limitation can be violated in a realistic scenario where the eavesdropper can store quantum information for only a finite, yet arbitrarily long, time. We consider communication through a lossy bononic channel (modeling linear loss in optical fibers) and we show that it is in principle possible to achieve a constant rate of key generation of one bit per optical mode over arbitrarily long communication distances.Comment: 13 pages. V2: new title, new result on active attacks, increased rigour in the security proo

    Quantum enigma machine: Experimentally demonstrating quantum data locking

    Get PDF
    Shannon proved in 1949 that information-theoretic-secure encryption is possible if the encryption key is used only once, is random, and is at least as long as the message itself. Notwithstanding, when information is encoded in a quantum system, the phenomenon of quantum data locking allows one to encrypt a message with a shorter key and still provide information-theoretic security. We present one of the first feasible experimental demonstrations of quantum data locking for direct communication and propose a scheme for a quantum enigma machine that encrypts 6 bits per photon (containing messages, new encryption keys, and forward error correction bits) with less than 6 bits per photon of encryption key while remaining information-theoretically secure

    Programmable dispersion on a photonic integrated circuit for classical and quantum applications

    Get PDF
    We demonstrate a large-scale tunable-coupling ring resonator array, suitable for high-dimensional classical and quantum transforms, in a CMOS-compatible silicon photonics platform. The device consists of a waveguide coupled to 15 ring-based dispersive elements with programmable linewidths and resonance frequencies. The ability to control both quality factor and frequency of each ring provides an unprecedented 30 degrees of freedom in dispersion control on a single spatial channel. This programmable dispersion control system has a range of applications, including mode-locked lasers, quantum key distribution, and photon-pair generation. We also propose a novel application enabled by this circuit – high-speed quantum communications using temporal-mode-based quantum data locking – and discuss the utility of the system for performing the high-dimensional unitary optical transformations necessary for a quantum data locking demonstration

    Boson Sampling Private-Key Quantum Cryptography

    Full text link
    We introduce a quantum private-key encryption protocol based on multi-photon interference in linear optics networks. The scheme builds upon Boson Sampling, and we show that it is hard to break, even for a quantum computer. We present an information-theoretic proof of the security of our protocol against an eavesdropper with unlimited (quantum) computational power but time-limited quantum storage. This protocol is shown to be optimal in the sense that it asymptotically encrypts all the information that passes through the interferometer using an exponentially smaller private key. This is the first practical application of Boson Sampling in quantum communication. Our scheme requires only moderate photon numbers and is experimentally feasible with current technology
    • …
    corecore