Clarke et al., 2012 - Google Patents
Experimental demonstration of quantum digital signatures using phase-encoded coherent states of lightClarke et al., 2012
View HTML- Document ID
- 8689717730101795855
- Author
- Clarke P
- Collins R
- Dunjko V
- Andersson E
- Jeffers J
- Buller G
- Publication year
- Publication venue
- Nature communications
External Links
Snippet
Digital signatures are frequently used in data transfer to prevent impersonation, repudiation and message tampering. Currently used classical digital signature schemes rely on public key encryption techniques, where the complexity of so-called 'one-way'mathematical …
- 230000001427 coherent 0 title abstract description 19
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0852—Quantum cryptography
- H04L9/0858—Details about key distillation or coding, e.g. reconciliation, error correction, privacy amplification, polarisation coding or phase coding
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3271—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/60—Digital content management, e.g. content distribution
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Clarke et al. | Experimental demonstration of quantum digital signatures using phase-encoded coherent states of light | |
Chen et al. | Twin-field quantum key distribution over a 511 km optical fibre linking two distant metropolitan areas | |
Pan et al. | Experimental free-space quantum secure direct communication and its security analysis | |
Jain et al. | Attacks on practical quantum key distribution systems (and how to prevent them) | |
Huang et al. | Long-distance continuous-variable quantum key distribution by controlling excess noise | |
Roberts et al. | Experimental measurement-device-independent quantum digital signatures | |
Sibson et al. | Chip-based quantum key distribution | |
Wang et al. | 25 MHz clock continuous-variable quantum key distribution system over 50 km fiber channel | |
Makarov et al. | Effects of detector efficiency mismatch on security of quantum cryptosystems | |
Scarani et al. | The security of practical quantum key distribution | |
Liang et al. | Proof-of-principle experiment of reference-frame-independent quantum key distribution with phase coding | |
Fei et al. | Quantum man-in-the-middle attack on the calibration process of quantum key distribution | |
Sharma et al. | Identity based secure authentication scheme based on quantum key distribution for cloud computing | |
Pappa et al. | Experimental plug and play quantum coin flipping | |
Zhu et al. | W-state analyzer and multi-party measurement-device-independent quantum key distribution | |
Li et al. | Randomness determines practical security of BB84 quantum key distribution | |
Xu et al. | Quantum cryptography with realistic devices | |
Li et al. | Quantum random number generation with uncharacterized laser and sunlight | |
Chang et al. | Experimental realization of an entanglement access network and secure multi-party computation | |
Kumar et al. | Experimental demonstration of quantum advantage for one-way communication complexity surpassing best-known classical protocol | |
He et al. | Multiparty quantum secure direct communication immune to collective noise | |
Mao et al. | Plug-and-play round-robin differential phase-shift quantum key distribution | |
Schiavon et al. | Experimental realization of equiangular three-state quantum key distribution | |
Wang et al. | Realizing the measure-device-independent quantum-key-distribution with passive heralded-single photon sources | |
Han et al. | Proof-of-principle demonstration of semi-quantum key distribution based on the Mirror protocol |