-
Practical Quantum Appointment Scheduling
Authors:
Dave Touchette,
Benjamin Lovitz,
Norbert Lütkenhaus
Abstract:
We propose a protocol based on coherent states and linear optics operations for solving the appointment-scheduling problem. Our main protocol leaks strictly less information about each party's input than the optimal classical protocol, even when considering experimental errors. Along with the ability to generate constant-amplitude coherent states over two modes, this protocol requires the ability…
▽ More
We propose a protocol based on coherent states and linear optics operations for solving the appointment-scheduling problem. Our main protocol leaks strictly less information about each party's input than the optimal classical protocol, even when considering experimental errors. Along with the ability to generate constant-amplitude coherent states over two modes, this protocol requires the ability to transfer these modes back-and-forth between the two parties multiple times with low coupling loss. The implementation requirements are thus still challenging. Along the way, we develop new tools to study quantum information cost of interactive protocols in the finite regime.
△ Less
Submitted 8 January, 2018;
originally announced January 2018.
-
The Engineering of a Scalable Multi-Site Communications System Utilizing Quantum Key Distribution (QKD)
Authors:
Piotr K. Tysowski,
Xinhua Ling,
Norbert Lütkenhaus,
Michele Mosca
Abstract:
Quantum Key Distribution (QKD) is a means of generating keys between a pair of computing hosts that is theoretically secure against cryptanalysis, even by a quantum computer. Although there is much active research into improving the QKD technology itself, there is still significant work to be done to apply engineering methodology and determine how it can be practically built to scale within an ent…
▽ More
Quantum Key Distribution (QKD) is a means of generating keys between a pair of computing hosts that is theoretically secure against cryptanalysis, even by a quantum computer. Although there is much active research into improving the QKD technology itself, there is still significant work to be done to apply engineering methodology and determine how it can be practically built to scale within an enterprise IT environment. Significant challenges exist in building a practical key management service for use in a metropolitan network. QKD is generally a point-to-point technique only and is subject to steep performance constraints. The integration of QKD into enterprise-level computing has been researched, to enable quantum-safe communication. A novel method for constructing a key management service is presented that allows arbitrary computing hosts on one site to establish multiple secure communication sessions with the hosts of another site. A key exchange protocol is proposed where symmetric private keys are granted to hosts while satisfying the scalability needs of an enterprise population of users. The key management service operates within a layered architectural style that is able to interoperate with various underlying QKD implementations. Variable levels of security for the host population are enforced through a policy engine. A network layer provides key generation across a network of nodes connected by quantum links. Scheduling and routing functionality allows quantum key material to be relayed across trusted nodes. Optimizations are performed to match the real-time host demand for key material with the capacity afforded by the infrastructure. The result is a flexible and scalable architecture that is suitable for enterprise use and independent of any specific QKD technology.
△ Less
Submitted 7 December, 2017;
originally announced December 2017.
-
Squashing model for detectors and applications to quantum key distribution protocols
Authors:
Oleg Gittsovich,
Normand J. Beaudry,
Varun Narasimhachar,
Ruben Romero Alvarez,
Tobias Moroder,
Norbert Lütkenhaus
Abstract:
We develop a framework that allows a description of measurements in Hilbert spaces that are smaller than their natural representation. This description, which we call a "squashing model", consists of a squashing map that maps the input states of the measurement from the original Hilbert space to the smaller one, followed by a targeted prescribed measurement on the smaller Hilbert space. This frame…
▽ More
We develop a framework that allows a description of measurements in Hilbert spaces that are smaller than their natural representation. This description, which we call a "squashing model", consists of a squashing map that maps the input states of the measurement from the original Hilbert space to the smaller one, followed by a targeted prescribed measurement on the smaller Hilbert space. This framework has applications in quantum key distribution, but also in other cryptographic tasks, as it greatly simplifies the theoretical analysis under adversarial conditions.
△ Less
Submitted 18 October, 2013;
originally announced October 2013.
-
Updating Quantum Cryptography Report ver. 1
Authors:
Donna Dodson,
Mikio Fujiwara,
Philippe Grangier,
Masahito Hayashi,
Kentaro Imafuku,
Ken-ichi Kitayama,
Prem Kumar,
Christian Kurtsiefer,
Gaby Lenhart,
Norbert Luetkenhaus,
Tsutomu Matsumoto,
William J. Munro,
Tsuyoshi Nishioka,
Momtchil Peev,
Masahide Sasaki,
Yutaka Sata,
Atsushi Takada,
Masahiro Takeoka,
Kiyoshi Tamaki,
Hidema Tanaka,
Yasuhiro Tokura,
Akihisa Tomita,
Morio Toyoshima,
Rodney van Meter,
Atsuhiro Yamagishi
, et al. (2 additional authors not shown)
Abstract:
Quantum cryptographic technology (QCT) is expected to be a fundamental technology for realizing long-term information security even against as-yet-unknown future technologies. More advanced security could be achieved using QCT together with contemporary cryptographic technologies. To develop and spread the use of QCT, it is necessary to standardize devices, protocols, and security requirements a…
▽ More
Quantum cryptographic technology (QCT) is expected to be a fundamental technology for realizing long-term information security even against as-yet-unknown future technologies. More advanced security could be achieved using QCT together with contemporary cryptographic technologies. To develop and spread the use of QCT, it is necessary to standardize devices, protocols, and security requirements and thus enable interoperability in a multi-vendor, multi-network, and multi-service environment. This report is a technical summary of QCT and related topics from the viewpoints of 1) consensual establishment of specifications and requirements of QCT for standardization and commercialization and 2) the promotion of research and design to realize New-Generation Quantum Cryptography.
△ Less
Submitted 27 May, 2009;
originally announced May 2009.
-
Using quantum key distribution for cryptographic purposes: a survey
Authors:
Romain Alléaume,
Cyril Branciard,
Jan Bouda,
Thierry Debuisschert,
Mehrdad Dianati,
Nicolas Gisin,
Mark Godfrey,
Philippe Grangier,
Thomas Langer,
Norbert Lutkenhaus,
Christian Monyk,
Philippe Painchault,
Momtchil Peev,
Andreas Poppe,
Thomas Pornin,
John Rarity,
Renato Renner,
Gregoire Ribordy,
Michel Riguidel,
Louis Salvail,
Andrew Shields,
Harald Weinfurter,
Anton Zeilinger
Abstract:
The appealing feature of quantum key distribution (QKD), from a cryptographic viewpoint, is the ability to prove the information-theoretic security (ITS) of the established keys. As a key establishment primitive, QKD however does not provide a standalone security service in its own: the secret keys established by QKD are in general then used by a subsequent cryptographic applications for which the…
▽ More
The appealing feature of quantum key distribution (QKD), from a cryptographic viewpoint, is the ability to prove the information-theoretic security (ITS) of the established keys. As a key establishment primitive, QKD however does not provide a standalone security service in its own: the secret keys established by QKD are in general then used by a subsequent cryptographic applications for which the requirements, the context of use and the security properties can vary. It is therefore important, in the perspective of integrating QKD in security infrastructures, to analyze how QKD can be combined with other cryptographic primitives. The purpose of this survey article, which is mostly centered on European research results, is to contribute to such an analysis. We first review and compare the properties of the existing key establishment techniques, QKD being one of them. We then study more specifically two generic scenarios related to the practical use of QKD in cryptographic infrastructures: 1) using QKD as a key renewal technique for a symmetric cipher over a point-to-point link; 2) using QKD in a network containing many users with the objective of offering any-to-any key establishment service. We discuss the constraints as well as the potential interest of using QKD in these contexts. We finally give an overview of challenges relative to the development of QKD technology that also constitute potential avenues for cryptographic research.
△ Less
Submitted 4 December, 2014; v1 submitted 23 January, 2007;
originally announced January 2007.