5,234 research outputs found
Deploying hybrid quantum-secured infrastructure for applications: When quantum and post-quantum can work together
Most currently used cryptographic tools for protecting data are based on
certain computational assumptions, which makes them vulnerable with respect to
technological and algorithmic developments, such as quantum computing. One
existing option to counter this potential threat is quantum key distribution,
whose security is based on the laws of quantum physics. Quantum key
distribution is secure against unforeseen technological developments. A second
approach is post-quantum cryptography, which is a set of cryptographic
primitives that are believed to be secure even against attacks with both
classical and quantum computing technologies. From this perspective, this study
reviews recent progress in the deployment of the quantum-secured infrastructure
based on quantum key distribution, post-quantum cryptography, and their
combinations. Various directions in the further development of the full-stack
quantum-secured infrastructure are also indicated. Distributed applications,
such as blockchains and distributed ledgers, are also discussed.Comment: 11 pages, 0 figures, 1 table; Perspective pape
Orthogonal-state-based cryptography in quantum mechanics and local post-quantum theories
We introduce the concept of cryptographic reduction, in analogy with a
similar concept in computational complexity theory. In this framework, class
of crypto-protocols reduces to protocol class in a scenario , if for
every instance of , there is an instance of and a secure
transformation that reproduces given , such that the security of
guarantees the security of . Here we employ this reductive framework to
study the relationship between security in quantum key distribution (QKD) and
quantum secure direct communication (QSDC). We show that replacing the
streaming of independent qubits in a QKD scheme by block encoding and
transmission (permuting the order of particles block by block) of qubits, we
can construct a QSDC scheme. This forms the basis for the \textit{block
reduction} from a QSDC class of protocols to a QKD class of protocols, whereby
if the latter is secure, then so is the former. Conversely, given a secure QSDC
protocol, we can of course construct a secure QKD scheme by transmitting a
random key as the direct message. Then the QKD class of protocols is secure,
assuming the security of the QSDC class which it is built from. We refer to
this method of deduction of security for this class of QKD protocols, as
\textit{key reduction}. Finally, we propose an orthogonal-state-based
deterministic key distribution (KD) protocol which is secure in some local
post-quantum theories. Its security arises neither from geographic splitting of
a code state nor from Heisenberg uncertainty, but from post-measurement
disturbance.Comment: 12 pages, no figure, this is a modified version of a talk delivered
by Anirban Pathak at Quantum 2014, INRIM, Turin, Italy. This version is
published in Int. J. Quantum. Info
Twisted Photons: New Quantum Perspectives in High Dimensions
Quantum information science and quantum information technology have seen a
virtual explosion world-wide. It is all based on the observation that
fundamental quantum phenomena on the individual particle or system-level lead
to completely novel ways of encoding, processing and transmitting information.
Quantum mechanics, a child of the first third of the 20th century, has found
numerous realizations and technical applications, much more than was thought at
the beginning. Decades later, it became possible to do experiments with
individual quantum particles and quantum systems. This was due to technological
progress, and for light in particular, the development of the laser. Hitherto,
nearly all experiments and also nearly all realizations in the fields have been
performed with qubits, which are two-level quantum systems. We suggest that
this limitation is again mainly a technological one, because it is very
difficult to create, manipulate and measure more complex quantum systems. Here,
we provide a specific overview of some recent developments with
higher-dimensional quantum systems. We mainly focus on Orbital Angular Momentum
(OAM) states of photons and possible applications in quantum information
protocols. Such states form discrete higher-dimensional quantum systems, also
called qudits. Specifically, we will first address the question what kind of
new fundamental properties exist and the quantum information applications which
are opened up by such novel systems. Then we give an overview of recent
developments in the field by discussing several notable experiments over the
past 2-3 years. Finally, we conclude with several important open questions
which will be interesting for investigations in the future.Comment: 15 pages, 7 figure
Cryptography from tensor problems
We describe a new proposal for a trap-door one-way function. The new proposal belongs to the "multivariate quadratic" family but the trap-door is different from existing methods, and is simpler
Single-Quadrature Continuous-Variable Quantum Key Distribution
Most continuous-variable quantum key distribution schemes are based on the
Gaussian modulation of coherent states followed by continuous quadrature
detection using homodyne detectors. In all previous schemes, the Gaussian
modulation has been carried out in conjugate quadratures thus requiring two
independent modulators for their implementations. Here, we propose and
experimentally test a largely simplified scheme in which the Gaussian
modulation is performed in a single quadrature. The scheme is shown to be
asymptotically secure against collective attacks, and considers asymmetric
preparation and excess noise. A single-quadrature modulation approach renders
the need for a costly amplitude modulator unnecessary, and thus facilitates
commercialization of continuous-variable quantum key distribution.Comment: 13 pages, 7 figure
Quantum key distribution session with 16-dimensional photonic states
The secure transfer of information is an important problem in modern
telecommunications. Quantum key distribution (QKD) provides a solution to this
problem by using individual quantum systems to generate correlated bits between
remote parties, that can be used to extract a secret key. QKD with
D-dimensional quantum channels provides security advantages that grow with
increasing D. However, the vast majority of QKD implementations has been
restricted to two dimensions. Here we demonstrate the feasibility of using
higher dimensions for real-world quantum cryptography by performing, for the
first time, a fully automated QKD session based on the BB84 protocol with
16-dimensional quantum states. Information is encoded in the single-photon
transverse momentum and the required states are dynamically generated with
programmable spatial light modulators. Our setup paves the way for future
developments in the field of experimental high-dimensional QKD.Comment: 8 pages, 3 figure
- …