[go: up one dir, main page]

Clarke et al., 2012 - Google Patents

Experimental demonstration of quantum digital signatures using phase-encoded coherent states of light

Clarke et al., 2012

View HTML @Full View
Document ID
8689717730101795855
Author
Clarke P
Collins R
Dunjko V
Andersson E
Jeffers J
Buller G
Publication year
Publication venue
Nature communications

External Links

Snippet

Digital signatures are frequently used in data transfer to prevent impersonation, repudiation and message tampering. Currently used classical digital signature schemes rely on public key encryption techniques, where the complexity of so-called 'one-way'mathematical …
Continue reading at www.nature.com (HTML) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0852Quantum cryptography
    • H04L9/0858Details about key distillation or coding, e.g. reconciliation, error correction, privacy amplification, polarisation coding or phase coding
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3271Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/60Digital content management, e.g. content distribution

Similar Documents

Publication Publication Date Title
Clarke et al. Experimental demonstration of quantum digital signatures using phase-encoded coherent states of light
Chen et al. Twin-field quantum key distribution over a 511 km optical fibre linking two distant metropolitan areas
Pan et al. Experimental free-space quantum secure direct communication and its security analysis
Jain et al. Attacks on practical quantum key distribution systems (and how to prevent them)
Huang et al. Long-distance continuous-variable quantum key distribution by controlling excess noise
Roberts et al. Experimental measurement-device-independent quantum digital signatures
Sibson et al. Chip-based quantum key distribution
Wang et al. 25 MHz clock continuous-variable quantum key distribution system over 50 km fiber channel
Makarov et al. Effects of detector efficiency mismatch on security of quantum cryptosystems
Scarani et al. The security of practical quantum key distribution
Liang et al. Proof-of-principle experiment of reference-frame-independent quantum key distribution with phase coding
Fei et al. Quantum man-in-the-middle attack on the calibration process of quantum key distribution
Sharma et al. Identity based secure authentication scheme based on quantum key distribution for cloud computing
Pappa et al. Experimental plug and play quantum coin flipping
Zhu et al. W-state analyzer and multi-party measurement-device-independent quantum key distribution
Li et al. Randomness determines practical security of BB84 quantum key distribution
Xu et al. Quantum cryptography with realistic devices
Li et al. Quantum random number generation with uncharacterized laser and sunlight
Chang et al. Experimental realization of an entanglement access network and secure multi-party computation
Kumar et al. Experimental demonstration of quantum advantage for one-way communication complexity surpassing best-known classical protocol
He et al. Multiparty quantum secure direct communication immune to collective noise
Mao et al. Plug-and-play round-robin differential phase-shift quantum key distribution
Schiavon et al. Experimental realization of equiangular three-state quantum key distribution
Wang et al. Realizing the measure-device-independent quantum-key-distribution with passive heralded-single photon sources
Han et al. Proof-of-principle demonstration of semi-quantum key distribution based on the Mirror protocol