10,530 research outputs found
Implementation vulnerabilities in general quantum cryptography
Quantum cryptography is information-theoretically secure owing to its solid
basis in quantum mechanics. However, generally, initial implementations with
practical imperfections might open loopholes, allowing an eavesdropper to
compromise the security of a quantum cryptographic system. This has been shown
to happen for quantum key distribution (QKD). Here we apply experience from
implementation security of QKD to several other quantum cryptographic
primitives. We survey quantum digital signatures, quantum secret sharing,
source-independent quantum random number generation, quantum secure direct
communication, and blind quantum computing. We propose how the eavesdropper
could in principle exploit the loopholes to violate assumptions in these
protocols, breaking their security properties. Applicable countermeasures are
also discussed. It is important to consider potential implementation security
issues early in protocol design, to shorten the path to future applications.Comment: 13 pages, 8 figure
Observation of three-body correlations for photons coupled to a Rydberg superatom
We report on the experimental observation of non-trivial three-photon
correlations imprinted onto initially uncorrelated photons through interaction
with a single Rydberg superatom. Exploiting the Rydberg blockade mechanism, we
turn a cold atomic cloud into a single effective emitter with collectively
enhanced coupling to a focused photonic mode which gives rise to clear
signatures in the connected part of the three-body correlation function of the
out-going photons. We show that our results are in good agreement with a
quantitative model for a single, strongly coupled Rydberg superatom.
Furthermore, we present an idealized but exactly solvable model of a single
two-level system coupled to a photonic mode, which allows for an interpretation
of our experimental observations in terms of bound states and scattering
states
Experimental measurement-device-independent quantum digital signatures over a metropolitan network
Quantum digital signatures (QDS) provide a means for signing electronic
communications with informationtheoretic security. However, all previous
demonstrations of quantum digital signatures assume trusted measurement
devices. This renders them vulnerable against detector side-channel attacks,
just like quantum key distribution. Here, we exploit a
measurement-device-independent (MDI) quantum network, over a
200-square-kilometer metropolitan area, to perform a field test of a
three-party measurement-device-independent quantum digital signature (MDI-QDS)
scheme that is secure against any detector side-channel attack. In so doing, we
are able to successfully sign a binary message with a security level of about
1E-7. Remarkably, our work demonstrates the feasibility of MDI-QDS for
practical applications.Comment: 5 pages, 1 figure, 2 tables, supplemental materials included as
ancillary fil
Quantum cryptography: key distribution and beyond
Uniquely among the sciences, quantum cryptography has driven both
foundational research as well as practical real-life applications. We review
the progress of quantum cryptography in the last decade, covering quantum key
distribution and other applications.Comment: It's a review on quantum cryptography and it is not restricted to QK
- …