Skip to main content
Erschienen in: Quantum Information Processing 11/2018

01.11.2018

Quantum key distribution with quantum walks

verfasst von: Chrysoula Vlachou, Walter Krawec, Paulo Mateus, Nikola Paunković, André Souto

Erschienen in: Quantum Information Processing | Ausgabe 11/2018

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Quantum key distribution is one of the most fundamental cryptographic protocols. Quantum walks are important primitives for computing. In this paper, we take advantage of the properties of quantum walks to design new secure quantum key distribution schemes. In particular, we introduce a secure quantum key distribution protocol equipped with verification procedures against full man-in-the-middle attacks. Furthermore, we present a one-way protocol and prove its security. Finally, we propose a semi-quantum variation and prove its robustness against eavesdropping.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
Currently, there are three companies offering commercial QKD systems: ID Quantique (Geneva), MagiQ Technologies, Inc. (New York) and QuintessenceLabs (Australia).
 
Literatur
1.
Zurück zum Zitat Aharonov, D., Ambainis, A., Kempe, J., Vazirani, U.: Quantum walks on graphs. In: Proceedings of ACM Symposium on Theory of Computation (STOC ’01), pp. 50–59 (2001) Aharonov, D., Ambainis, A., Kempe, J., Vazirani, U.: Quantum walks on graphs. In: Proceedings of ACM Symposium on Theory of Computation (STOC ’01), pp. 50–59 (2001)
6.
Zurück zum Zitat Bavaresco, J., Herrera Valencia, N., Klckl, C., Pivoluska, M., Friis, N., Malik, M., Huber, M.: Two measurements are sufficient for certifying high-dimensional entanglement. arXiv:1709.07344 (2017) Bavaresco, J., Herrera Valencia, N., Klckl, C., Pivoluska, M., Friis, N., Malik, M., Huber, M.: Two measurements are sufficient for certifying high-dimensional entanglement. arXiv:​1709.​07344 (2017)
7.
Zurück zum Zitat Beaudry, N.J., Lucamarini, M., Mancini, S., Renner, R.: Security of two-way quantum key distribution. Phys. Rev. A 88(6), 062,302 (2013)CrossRef Beaudry, N.J., Lucamarini, M., Mancini, S., Renner, R.: Security of two-way quantum key distribution. Phys. Rev. A 88(6), 062,302 (2013)CrossRef
10.
Zurück zum Zitat Bennett, C., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. In: Proceedings of the IEEE International Conference on Computers, Systems and Signal Processing, pp. 175–179. IEEE Press, New York (1984) Bennett, C., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. In: Proceedings of the IEEE International Conference on Computers, Systems and Signal Processing, pp. 175–179. IEEE Press, New York (1984)
15.
Zurück zum Zitat Brassard, G., Lütkenhaus, N., Mor, T., Sanders, B.: Security aspects of practical quantum cryptography. In: In Advances in Cryptology? EUROCRYPT’2000, pp. 289–299 (2000)CrossRef Brassard, G., Lütkenhaus, N., Mor, T., Sanders, B.: Security aspects of practical quantum cryptography. In: In Advances in Cryptology? EUROCRYPT’2000, pp. 289–299 (2000)CrossRef
19.
23.
Zurück zum Zitat Childs, A., Cleve, R., Deotto, E., Farhi, E., Gutmann, S., Spielman, D.: Exponential algorithmic speedup by a quantum walk. In: Proceedings of the Thirty-Fifth Annual ACM Symposium on Theory of Computing, STOC ’03, pp. 59–68. ACM, New York, NY, USA (2003) Childs, A., Cleve, R., Deotto, E., Farhi, E., Gutmann, S., Spielman, D.: Exponential algorithmic speedup by a quantum walk. In: Proceedings of the Thirty-Fifth Annual ACM Symposium on Theory of Computing, STOC ’03, pp. 59–68. ACM, New York, NY, USA (2003)
32.
Zurück zum Zitat Dixon, A.R., Dynes, J.F., Lucamarini, M., Frhlich, B., Sharpe, A.W., Plews, A., Tam, W., Yuan, Z.L., Tanizawa, Y., Sato, H., Kawamura, S., Fujiwara, M., Sasaki, M., Shields, A.J.: Quantum key distribution with hacking countermeasures and long term field trial. Sci. Rep. 7, 1978 (2017). https://doi.org/10.1038/s41598-017-01884-0 ADSCrossRef Dixon, A.R., Dynes, J.F., Lucamarini, M., Frhlich, B., Sharpe, A.W., Plews, A., Tam, W., Yuan, Z.L., Tanizawa, Y., Sato, H., Kawamura, S., Fujiwara, M., Sasaki, M., Shields, A.J.: Quantum key distribution with hacking countermeasures and long term field trial. Sci. Rep. 7, 1978 (2017). https://​doi.​org/​10.​1038/​s41598-017-01884-0 ADSCrossRef
35.
41.
Zurück zum Zitat Harrington, J.W., Ettinger, J.M., Hughes, R.J., Nordholt, J.E.: Enhancing practical security of quantum key distribution with a few decoy states. arXiv:quant-ph/0503002 (2005) Harrington, J.W., Ettinger, J.M., Hughes, R.J., Nordholt, J.E.: Enhancing practical security of quantum key distribution with a few decoy states. arXiv:​quant-ph/​0503002 (2005)
51.
Zurück zum Zitat Krawec, W.O.: Security proof of a semi-quantum key distribution protocol. In: 2015 IEEE International Symposium on Information Theory (ISIT), pp. 686–690. IEEE (2015) Krawec, W.O.: Security proof of a semi-quantum key distribution protocol. In: 2015 IEEE International Symposium on Information Theory (ISIT), pp. 686–690. IEEE (2015)
53.
Zurück zum Zitat Krawec, W.O.: Security of a semi-quantum protocol where reflections contribute to the secret key. Quantum Inf. Process. 15(5), 2067–2090 (2016)ADSMathSciNetCrossRef Krawec, W.O.: Security of a semi-quantum protocol where reflections contribute to the secret key. Quantum Inf. Process. 15(5), 2067–2090 (2016)ADSMathSciNetCrossRef
70.
Zurück zum Zitat Lutkenhaus, N., Jahma, M.: Quantum key distribution with realistic states: photon-number statistics in the photon-number splitting attack. New J. Phys. 4(1), 44 (2002)ADSCrossRef Lutkenhaus, N., Jahma, M.: Quantum key distribution with realistic states: photon-number statistics in the photon-number splitting attack. New J. Phys. 4(1), 44 (2002)ADSCrossRef
75.
Zurück zum Zitat Manouchehri, K., Wang, J.: Physical Implementation of Quantum Walks. Springer Publishing Company, Incorporated, New York (2013)MATH Manouchehri, K., Wang, J.: Physical Implementation of Quantum Walks. Springer Publishing Company, Incorporated, New York (2013)MATH
77.
Zurück zum Zitat McGettrick, M.: One dimensional quantum walks with memory. Quantum Inf. Comput. 10(5), 509–524 (2010)MathSciNetMATH McGettrick, M.: One dimensional quantum walks with memory. Quantum Inf. Comput. 10(5), 509–524 (2010)MathSciNetMATH
83.
89.
Zurück zum Zitat Rohde, P.P., Fitzsimons, J.F., Gilchrist, A.: Quantum walks with encrypted data. Phys. Rev. Lett. 109(15), 150,501 (2012)CrossRef Rohde, P.P., Fitzsimons, J.F., Gilchrist, A.: Quantum walks with encrypted data. Phys. Rev. Lett. 109(15), 150,501 (2012)CrossRef
91.
Zurück zum Zitat Rosenberg, D., Peterson, C.G., Harrington, J.W., Rice, P.R., Dallmann, N., Tyagi, K.T., McCabe, K.P., Nam, S., Baek, B., Hadfield, R.H., Hughes, R.J., Nordholt, J.E.: Practical long-distance quantum key distribution system using decoy levels. New J. Phys. 11(4), 045,009 (2009)CrossRef Rosenberg, D., Peterson, C.G., Harrington, J.W., Rice, P.R., Dallmann, N., Tyagi, K.T., McCabe, K.P., Nam, S., Baek, B., Hadfield, R.H., Hughes, R.J., Nordholt, J.E.: Practical long-distance quantum key distribution system using decoy levels. New J. Phys. 11(4), 045,009 (2009)CrossRef
99.
Zurück zum Zitat Seyfarth, U., Nikolopoulos, G., Alber, G.: Symmetries and security of a quantum-public-key encryption based on single-qubit rotations. Phys. Rev. A 85(2), 022,342 (2012)CrossRef Seyfarth, U., Nikolopoulos, G., Alber, G.: Symmetries and security of a quantum-public-key encryption based on single-qubit rotations. Phys. Rev. A 85(2), 022,342 (2012)CrossRef
101.
Zurück zum Zitat Stipcević, M.: Preventing detector blinding attack and other random number generator attacks on quantum cryptography by use of an explicit random number generator. arXiv:1403.0143 (2014) Stipcević, M.: Preventing detector blinding attack and other random number generator attacks on quantum cryptography by use of an explicit random number generator. arXiv:​1403.​0143 (2014)
103.
Zurück zum Zitat Ursin, R., Tiefenbacher, F., Schmitt-Manderbach, T., Weier, H., Scheidl, T., Lindenthal, M., Blauensteiner, B., Jennewein, T., Perdigues, J., Trojek, P., Omer, B., Furst, M., Meyenburg, M., Rarity, J., Sodnik, Z., Barbieri, C., Weinfurter, H., Zeilinger, A.: Entanglement-based quantum communication over 144 km. Nat. Phys. 3, 481–486 (2007). https://doi.org/10.1038/nphys629 CrossRef Ursin, R., Tiefenbacher, F., Schmitt-Manderbach, T., Weier, H., Scheidl, T., Lindenthal, M., Blauensteiner, B., Jennewein, T., Perdigues, J., Trojek, P., Omer, B., Furst, M., Meyenburg, M., Rarity, J., Sodnik, Z., Barbieri, C., Weinfurter, H., Zeilinger, A.: Entanglement-based quantum communication over 144 km. Nat. Phys. 3, 481–486 (2007). https://​doi.​org/​10.​1038/​nphys629 CrossRef
106.
Zurück zum Zitat Vlachou, C., Rodrigues, J., Mateus, P., Paunković, N., Souto, A.: Quantum walk public-key cryptographic system. Int. J. Quantum Inf. 13(07), 1550,050 (2015)MathSciNetCrossRef Vlachou, C., Rodrigues, J., Mateus, P., Paunković, N., Souto, A.: Quantum walk public-key cryptographic system. Int. J. Quantum Inf. 13(07), 1550,050 (2015)MathSciNetCrossRef
109.
Zurück zum Zitat Wang, Q., Wang, X.B., Bjrk, G., Karlsson, A.: Improved practical decoy state method in quantum key distribution with parametric down-conversion source. EPL Europhys. Lett. 79(4), 40,001 (2007)MathSciNetCrossRef Wang, Q., Wang, X.B., Bjrk, G., Karlsson, A.: Improved practical decoy state method in quantum key distribution with parametric down-conversion source. EPL Europhys. Lett. 79(4), 40,001 (2007)MathSciNetCrossRef
112.
Zurück zum Zitat Wiechers, C., Lydersen, L., Wittmann, C., Elser, D., Skaar, J., Marquardt, C., Makarov, V., Leuchs, G.: After-gate attack on a quantum cryptosystem. New J. Phys. 13(1), 013043 (2011)ADSCrossRef Wiechers, C., Lydersen, L., Wittmann, C., Elser, D., Skaar, J., Marquardt, C., Makarov, V., Leuchs, G.: After-gate attack on a quantum cryptosystem. New J. Phys. 13(1), 013043 (2011)ADSCrossRef
115.
Zurück zum Zitat Yao, A.C.: How to generate and exchange secrets. In: 27th Annual Symposium on Foundations of Computer Science, 1986., pp. 162–167. IEEE (1986) Yao, A.C.: How to generate and exchange secrets. In: 27th Annual Symposium on Foundations of Computer Science, 1986., pp. 162–167. IEEE (1986)
116.
Zurück zum Zitat Yin, J., Cao, Y., Li, Y.H., Liao, S.K., Zhang, L., Ren, J.G., Cai, W.Q., Liu, W.Y., Li, B., Dai, H., Li, G.B., Lu, Q.M., Gong, Y.H., Xu, Y., Li, S.L., Li, F.Z., Yin, Y.Y., Jiang, Z.Q., Li, M., Jia, J.J., Ren, G., He, D., Zhou, Y.L., Zhang, X.X., Wang, N., Chang, X., Zhu, Z.C., Liu, N.L., Chen, Y.A., Lu, C.Y., Shu, R., Peng, C.Z., Wang, J.Y., Pan, J.W.: Satellite-based entanglement distribution over 1200 kilometers. Science 356, 1140–1144 (2017). https://doi.org/10.1126/science.aan3211 CrossRef Yin, J., Cao, Y., Li, Y.H., Liao, S.K., Zhang, L., Ren, J.G., Cai, W.Q., Liu, W.Y., Li, B., Dai, H., Li, G.B., Lu, Q.M., Gong, Y.H., Xu, Y., Li, S.L., Li, F.Z., Yin, Y.Y., Jiang, Z.Q., Li, M., Jia, J.J., Ren, G., He, D., Zhou, Y.L., Zhang, X.X., Wang, N., Chang, X., Zhu, Z.C., Liu, N.L., Chen, Y.A., Lu, C.Y., Shu, R., Peng, C.Z., Wang, J.Y., Pan, J.W.: Satellite-based entanglement distribution over 1200 kilometers. Science 356, 1140–1144 (2017). https://​doi.​org/​10.​1126/​science.​aan3211 CrossRef
117.
Metadaten
Titel
Quantum key distribution with quantum walks
verfasst von
Chrysoula Vlachou
Walter Krawec
Paulo Mateus
Nikola Paunković
André Souto
Publikationsdatum
01.11.2018
Verlag
Springer US
Erschienen in
Quantum Information Processing / Ausgabe 11/2018
Print ISSN: 1570-0755
Elektronische ISSN: 1573-1332
DOI
https://doi.org/10.1007/s11128-018-2055-y

Weitere Artikel der Ausgabe 11/2018

Quantum Information Processing 11/2018 Zur Ausgabe

Neuer Inhalt