Quantum Technology: A next generation solution for secure communication

Size: px
Start display at page:

Download "Quantum Technology: A next generation solution for secure communication"

Transcription

1 Quantum Technology: A next generation solution for secure communication Abdul R Mirza 1,2 and Francesco Petruccione 1,2,3 1 University of KwaZulu-Natal, Westville Campus, Durban, South Africa 2 QZN Technology (Pty) Ltd, Durban South Africa 3National Institute for Theoretical Physics, South Africa Abstract: Quantum Information Processing and Communication has the capability to revolutionize the ICT sector in the 21st Century, as did the semiconductor-based transistor in the previous century (USA United States of America, Committee on Technology, National Science and Technology Council, 2008). It fuses the laws of quantum physics into the current ICT framework to expand the limits of conventional ICT solutions. Quantum communication is the most advanced QIPC technology. It is driven by quantum encryption or, more correctly, Quantum Key Distribution (QKD): a secure method of transferring encryption keys between two distant parties, thus forming the base for inviolable global communication networks (Austria, ERA PROJECT Quantum Information Sciences and Technologies, 2005). This method of encryption differs from conventional methods in that it encodes data within quantum two-level systems (qubits). One is therefore required to physically measure the qubit in order to retrieve any intelligible data. As the measurement of an observable in a quantum system creates a perturbation in the complementary properties of the system, an eavesdropper will necessarily need to break the established laws of quantum mechanics in order to decipher the data while remaining unnoticed. Many physicists have mathematically proven that QKD is completely secure even if an insecure communication channel is used. This security is further independent of the adversary s technological advantage. Charles Bennett and Gilles Brassard initially developed the technology in 1984 as the BB84 protocol (Bennet and Brassard. 1984). Since then, a global effort has been undertaken in order to bring QKD on par with current ICT technology and mature the technology to an industrially acceptable standard. In this paper we provide an overview of this technology and its current status. Introduction: Conventional Information and Communication Technology (ICT) services the ever-growing need of today s knowledge-based society. Consumers continuously demand for faster, smaller and ecofriendly devices. This has necessitated the higher packaging density of components on computer chips to decrease inter-communication times. With this trend set to continue, the electrons per device will continue to decrease exponentially and are predicted to enter the quantum regime by 2015 (Spiller 2006). In accordance to Moore s Law, this has driven the ICT sector into the quantum paradigm by operating at an atomic scale where coherent quantum mechanical processes begin to dominate the physical properties. Quantum mechanical principles will therefore no longer be negligible in conventional data manipulation techniques. This has created a need for an alternative approach to information technology to provide capabilities beyond what conventional concepts can offer. Quantum Information Processing and Communication (QIPC) limits the technological manipulation of information only by the laws of physics (Corker 2005). Information can therefore be characterized, quantified and processed using the basic rules of quantum mechanics. Exploiting some of the fundamental features of the quantum world, such as Heisenberg s uncertainty principle, superposition and entanglement (Nielsen, 2000), QIPC is an enabling resource for future ICT solutions. Quantum cryptography is the most matured field in QIPC. The process uses a physical encoding of a quantum data carrier to secure communications at an OSI layer 1 level. It has been catalysed by the continuously expanding e-commerce industry, developments in efficient quantum factorization and the fact that quantum cryptography is the only known solution to provide long term data security (Corker 2005). The cryptographic industry has realized the potential threat that quantum computing and mathematical developments pose to conventional cryptography and therefore many leading IT firms (Toshiba, NECTEC, IBM, HP) have invested into the development of quantum

2 cryptographic technology while other companies dedicated to quantum-based technologies (QZN Technology) have been established in the past few years to cater for this emerging market. Various other quantum-powered technologies exist today. A quantum Random Number Generator (RNG) produces random bits as the result of a hardware-based, quantum physical process. This method of generation is therefore independent of the user environment unlike software-based generators commonly in use today. A generator with any form of dependence may be predictable to a certain degree and therefore create a compromise in the security system. Single photon sources and detectors are further quantum-enabled technologies with an extremely high intensity resolution. The devices are designed to produce and detect quantum particles of light (photons). This provides the basis for high precision instrumentation for application in research, sensory, imaging and metrology markets. Conventional Encryption Conventional key distribution routines, such as the Deffie-Hellman method [2], use mathematical algorithms to encapsulate the key bits during its distribution process. In particular, they use oneway functions that can efficiently be computed in one direction but require large resources to compute the inverse function. This makes the decryption infeasible relative to the value of the encrypted data. In the case of public key cryptography, the multiplication of large prime numbers serves as the one-way function. Due to the mathematical nature of the scheme, it is susceptible to decryption through advances in computing power and potential mathematical discoveries. This potentially compromises the future integrity and security of information encrypted in such a manner. Conventional techniques of parallel computing continue to challenge today s communication security standards within reasonable time scales. A prime example of this is the decipherment of the RSA 1024 encryption algorithm in 100 hours by researchers at the University of Michigan in May 2010 (Pellegrini 2010). Further to this, the nature of quantum computers provides an intrinsic capability to efficiently decipher current cryptographic systems (Nielsen 2000). Thus the development of such computing power will render conventional cryptography obsolete. Quantum-powered Encryption Quantum communication, or more correctly named, Quantum Key Distribution (QKD), is a cryptographic primitive for the generation of secure random cryptographic keys. It encodes the key bits using a physical parameter of a quantum two-level system (qubit). In this case, the qubit is the data carrier and hence any form of data retrieval requires a measurement of a physical property of the qubit. As the qubit evolves within a quantum regime, it obeys the respective laws. As the properties of quantum mechanical particles change fluidly when an observer interacts with them, there is no way to determine its complete quantum nature. The measurements of certain parameters of a quantum system create perturbations in the various other characteristics of system. This is known as Heisenberg s Uncertainty Principle and provides an intrinsic physical security for the next generation of communication systems. QKD shifts the security basis away from algorithms towards physical techniques of security through the encapsulation of data in quantum mechanical particles. Any form of measurement by an unauthorized party will result in a change of the qubit. The users will necessarily detect this, thus exposing any eavesdropper. QKD therefore offers secure communication independently of an adversary s technological advantage (Renner 2005).

3 Figure 1: The BB84 protocol is based on the fact that the two polarization sets are indistinguishable if encoded onto a single particle of light. This ensures that if an eavesdropper tries to intercept the communication, she will create errors, thereby notifying the legitimate users. Though there are many different ways to implement QKD, the original procedure that is still use by many platforms today encodes information within the polarization of light. Light is an electromagnetic wave that vibrates in a particular orientation. This phenomenon is known as polarization. A Polaroid sheet is only transparent to light of a particular polarization. This reduces the intensity of the light and may also shift the orientation of the polarization if the light and Polaroid are incorrectly aligned. In quantum cryptography the above principle is adapted for use with single particles of light - photons. The sender, Alice, transmits polarized photons to Bob, the receiver. Alice is able to choose the polarization in one of four options: horizontal, vertical, diagonal, or antidiagonal. The former (horizontal and vertical) and latter (diagonal and antidiagonal) pairs form two bases of transmission as shown in Figure 1. Due to the quantum superposition principle [], Eve, the eavesdropper, cannot distinguish the state of the sent particles with absolute certainty. When Bob receives a photon he randomly measures it on one of the bases. Due to Bob s measurement strategy, he will measure the photons in the correct basis 50% of the time. If Bob chooses the same basis as Alice, he will of course achieve the correct result. In any other case his results will be wrong or right with equal probability due to the superposition principle. This is illustrated in Table 1. Once the transmission of the photons is complete, Alice and Bob compare only the bases used in preparing and measuring the photons. This process, together with error correction and privacy amplification techniques, ensures that all the remaining bits in the key are identical, therefore providing a symmetric key for use in encryption. An unnoticed interception of photons by Eve is not possible since any measurement will destroy, or at the least alter, the polarization of the photon. By verifying the correctness of the final key, the users are able to predict if Eve was indeed eavesdropping. Table 1: If Alice and Bob transmit and measure on a common basis, a deterministic result should be obtained. However, the photon has a 50% probability to be measured in either state if Alice and Bob use different bases. In such a case the photons are discarded, thereby both parties have identical key streams after the completion of post-distribution processes. Alice s States Bob s Measurement Basis 100% 100% 50% 50% 50% 50% 100% 100% Quantum networks In the last decade the industry has witnessed great advances in photonic QKD technology with the research, development and commercialization of automated QKD devices by both academia and the corporate sector. However, these early generation solutions have appealed only to a niche

4 market due to QKD technology's bottleneck effect on the current ICT infrastructure. This is due to the stringent requirements of the qubit. The intrinsic absorption within the communication channel, together with the current lack to regeneration abilities for an optical qubit, has limited the key distribution distance of a photon to a distance of 120 km (Zhen-Qiang 2008) before it is absorbed. Thus one of the major bottlenecks in the commercialization of QKD is the limited spatial coverage that QKD offers. The recent investigations into quantum networking techniques have served to address this issue. Recent efforts have been made in developing QKD networks such as the Durban-QuantumCity project (Mirza 2010), SECOQC (Peev 2009), SwissQuantum (idq 2011) and Tokyo QKD network (Sasaki 2011). The QuantumCity initiative was launched in 2009 and is still currently operational. It is a star-topology network comprising of four nodes and running along the ethekwini municipality s optical infrastructure. The European FP6 project Secure Communication using Quantum Cryptography (SECOQC) project aimed to standardize QKD technology through a cross-platform interface allowing the integration of various QKD systems into one network known as the Quantum Back Bone network. The Durban-QuantumCity project seeks to test the long-term performance of QKD devices in a commercial environment. The City of Durban possesses optical fibre infrastructure that is primarily used to link the vital services of the Municipality [9]. The network is also available to educational institutes, hospitals and other corporates with the vision of providing broadband access to all residents in the City of Durban. The QuantumCity project uses this fibre infrastructure to provide QKD-secured communication between nodes on the network. This is the first time QKD systems have been deployed as a network in a commercial environment for extended periods of time. The QuantumStadium project was an extension of the QuantumCity project. It encrypted the link between Durban's Moses Mabhida Stadium in Durban and the ethekwini s offsite Joint Operations Centre. The system uses a layer 2 encryption process with an AES encryption scheme, but features a quantum-based key distribution system. The quantum communication link secures telephone, internet, video, data and traffic travelling across the fibre optic link at up to 1 Gigabit per second. Global QKD network Such link lengths are typical of a Municipal Area Network (MAN) and the examples have been mentioned above. A QKD solution spanning a global network will however require further investigation. The use of satellite technology in achieving a global quantum secured communication network has been of interest in the past few years. Many feasibility tests have been conducted (Bonato 2009 and Toyoshima 2011) however various challenges still prevent the realization of a ground to satellite QKD link. In this technique the satellites are considered to be trusted nodes. The nodes travel between various MANs creating a global backbone encryption key resource. The satellite network therefore requires an access point at each participating MAN network. The access point will require, further to a robust QKD link, the communication infrastructure to provide gateway functionality to the Metropolitan area. Unfortunately, most feasible sites for ground-to-satellite QKD links are in relatively remote and isolated in their surroundings. Although this ensures better visibility, it lacks the infrastructure to support a commercial global access point. As parallel step to the development of satellite-based global QKD networks, we are investigating the use of the commercial aircrafts network as secure transport mechanism to support the global QKD network. Commercial airliners create an ideal alternate global network for key distribution in terms of coverage, reliability and contact time. Further the airports at each connected city have the appropriate supporting infrastructure to serve as an access point for the MANs to the global network. The QKD process, implemented in the proposed scheme, will occur whilst the aircraft is docked at the airport. This allows a simple fibre-based QKD system is to be used for the key distribution

5 process. Due to the use of a fibre channel, the solution bypasses the additional synchronization techniques required when using a satellite-based network. The frequency and reliability of the link, further enhances the opportunities of this option. The initial systems that are to be used will require the aircraft to be a trusted zone although certified tamper-proofing techniques will be used. The long-term objective is to upgrade these initial systems to contain a quantum memory and an entangled photon source for QKD. As with the satellite solution, this would provide the idea untrusted network scenario. The commercial airliners are to serve as a global link between the MANs of connected cities, as such the airports serve as gateways. Each aircraft will be fitted with a tamper-proof QKD unit in the communications hub in the hull of the aircraft. This is a highly restricted zone and can therefore be assumed a secure location. This unit will be responsible for the quantum-secured key distribution between itself and the sister unit stationed in the respective airport. The secure key management layer, from within the airport building, will then manage the keys. This, in total will provide the access point to the MAN. Information can be encrypted on site and safely propagated through conventional communication networks or the keys sold onwards to the respective clients. Conclusion: It has only during the last 30 years that many of the theoretical and almost unintuitive predictions of quantum mechanics could be realised in the laboratory. Presently, we are witnessing the second quantum revolution, the quantum technology revolution. The miniaturization of technological devices necessitates the manipulation of objects at the nanoscale level, where coherent quantum mechanical processes start to dominate the physical properties. Among the basic tools of the new quantum technologies are quantum information, quantum computation, quantum metrology, quantum communication, and quantum control. Quantum cryptography has been the leading technology in this race. Today it is available as a commercial product to niche markets. Active research is however presently being conducted to further enhance the quality of service of this product to match the needs of the current information based society we live in today. References: Austria, ERA PROJECT Quantum Information Sciences and Technologies. (2005). Quantum Information Processing and Communication. Strategic Report on Current Status, Visions, and Goals for Research in Europe, Innsbruck. Bennett C.H. and Brassard G. (1984). Quantum Cryptography: Public key distribution and coin tossing. Proceedings of the IEEE International Conference on Computers, Systems, and Signal Processing. Bangalore. Bonato C, Tomaello A, Da Deppo V, Naletto G and Villoresi P (2009) Feasibility Analysis for Quantum Key Distribution between a LEO Satellite and Earth. New J. Phys Corker D., Ellsmore P., Abdullah F. and Howlett I. (2005). Commercial Prospects for Quantum Information Processing. Thesis submitted to fulfil the requirements of the MBA degree. The Saïd Business School, University of Oxford. idq (2010) SwissQuantum [online]. Available from: Nielsen M.A. and Chuang I.L. (2000) Quantum Computation and Quantum Information. Cambridge: Cambridge University Press. Peev M et.al. (2009) The SECOQC quantum key distribution network in Vienna. New J. of Phys Pellegrini A., Bertacco V. and Austin T. (2010) Fault-Based Attack of RSA Authentication. Proceedings of the Conference on Design, Automation and Test in Europe. Leuven, Belgium. Renner R., Gisin N. and Kraus B. (2005) Information-theoretic security proof for quantumkey-distribution protocols. Phys Rev A

6 Sasaki M et.al. (2011) Field test of quantum key distribution in the Tokyo QKD Network. Optics Express Spiller T.P. and Munro W. J. (2006) Towards a Quantum Information Technology Industry. J. Phys.: Condens. Matter 18, V1 V10. Toyoshima M, Takenaka H, Shoji Y, Takayama Y, Takeoka M, Fujiwara M and Sasaki M (2011) Polarization-Basis Tracking Scheme in Satellite Quantum Key Distribution. Intl J. of Optics United States of America, Committee on Technology, National Science and Technology Council. (2008). A federal Vision for Quantum information Science, Washington. Zhen-Qiang Y., Zheng-Fu H., Wei C., Fang-Xing X., Qing-Lin W. and Guang-Can G. (2008) Experimental Decoy State Quantum Key Distribution Over 120km Fibre. Chinese Phys. Lett

Security Implications of Quantum Technologies

Security Implications of Quantum Technologies Security Implications of Quantum Technologies Jim Alves-Foss Center for Secure and Dependable Software Department of Computer Science University of Idaho Moscow, ID 83844-1010 email: jimaf@cs.uidaho.edu

More information

Realization of B92 QKD protocol using id3100 Clavis 2 system

Realization of B92 QKD protocol using id3100 Clavis 2 system Realization of B92 QKD protocol using id3100 Clavis 2 system Makhamisa Senekane 1, Abdul Mirza 1, Mhlambululi Mafu 1 and Francesco Petruccione 1,2 1 Centre for Quantum Technology, School of Chemistry and

More information

Device-Independent Quantum Information Processing

Device-Independent Quantum Information Processing Device-Independent Quantum Information Processing Antonio Acín ICREA Professor at ICFO-Institut de Ciencies Fotoniques, Barcelona Chist-Era kick-off seminar, March 2012, Warsaw, Poland Quantum Information

More information

10 - February, 2010 Jordan Myronuk

10 - February, 2010 Jordan Myronuk 10 - February, 2010 Jordan Myronuk Classical Cryptography EPR Paradox] The need for QKD Quantum Bits and Entanglement No Cloning Theorem Polarization of Photons BB84 Protocol Probability of Qubit States

More information

Quantum Cryptography and Security of Information Systems

Quantum Cryptography and Security of Information Systems Quantum Cryptography and Security of Information Systems Dalibor Hrg University of Zagreb, Faculty of Electrical Engineering and Computing, Zagreb dalix@fly.srk.fer.hr Leo Budin University of Zagreb, Faculty

More information

quantum distribution of a sudoku key Sian K. Jones University of South Wales

quantum distribution of a sudoku key Sian K. Jones University of South Wales Games and Puzzles quantum distribution of a sudoku key Sian K. Jones University of South Wales sian-kathryn.jones@southwales.ac.uk Abstract: Sudoku grids are often cited as being useful in cryptography

More information

Quantum Cryptography. Areas for Discussion. Quantum Cryptography. Photons. Photons. Photons. MSc Distributed Systems and Security

Quantum Cryptography. Areas for Discussion. Quantum Cryptography. Photons. Photons. Photons. MSc Distributed Systems and Security Areas for Discussion Joseph Spring Department of Computer Science MSc Distributed Systems and Security Introduction Photons Quantum Key Distribution Protocols BB84 A 4 state QKD Protocol B9 A state QKD

More information

+ = OTP + QKD = QC. ψ = a. OTP One-Time Pad QKD Quantum Key Distribution QC Quantum Cryptography. θ = 135 o state 1

+ = OTP + QKD = QC. ψ = a. OTP One-Time Pad QKD Quantum Key Distribution QC Quantum Cryptography. θ = 135 o state 1 Quantum Cryptography Quantum Cryptography Presented by: Shubhra Mittal Instructor: Dr. Stefan Robila Intranet & Internet Security (CMPT-585-) Fall 28 Montclair State University, New Jersey Introduction

More information

Enigma Marian Rejewski, Jerzy Róz ycki, Henryk Zygalski

Enigma Marian Rejewski, Jerzy Róz ycki, Henryk Zygalski 1 Enigma Marian Rejewski, Jerzy Róz ycki, Henryk Zygalski What is the problem with classical cryptography? Secret key cryptography Requires secure channel for key distribution In principle every

More information

Quantum threat...and quantum solutions

Quantum threat...and quantum solutions Quantum threat...and quantum solutions How can quantum key distribution be integrated into a quantum-safe security infrastructure Bruno Huttner ID Quantique ICMC 2017 Outline Presentation of ID Quantique

More information

Quantum Information Transfer and Processing Miloslav Dušek

Quantum Information Transfer and Processing Miloslav Dušek Quantum Information Transfer and Processing Miloslav Dušek Department of Optics, Faculty of Science Palacký University, Olomouc Quantum theory Quantum theory At the beginning of 20 th century about the

More information

Cryptography CS 555. Topic 25: Quantum Crpytography. CS555 Topic 25 1

Cryptography CS 555. Topic 25: Quantum Crpytography. CS555 Topic 25 1 Cryptography CS 555 Topic 25: Quantum Crpytography CS555 Topic 25 1 Outline and Readings Outline: What is Identity Based Encryption Quantum cryptography Readings: CS555 Topic 25 2 Identity Based Encryption

More information

Network Security Based on Quantum Cryptography Multi-qubit Hadamard Matrices

Network Security Based on Quantum Cryptography Multi-qubit Hadamard Matrices Global Journal of Computer Science and Technology Volume 11 Issue 12 Version 1.0 July Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals Inc. (USA) Online ISSN:

More information

An Introduction. Dr Nick Papanikolaou. Seminar on The Future of Cryptography The British Computer Society 17 September 2009

An Introduction. Dr Nick Papanikolaou. Seminar on The Future of Cryptography The British Computer Society 17 September 2009 An Dr Nick Papanikolaou Research Fellow, e-security Group International Digital Laboratory University of Warwick http://go.warwick.ac.uk/nikos Seminar on The Future of Cryptography The British Computer

More information

WHITE PAPER ON QUANTUM COMPUTING AND QUANTUM COMMUNICATION

WHITE PAPER ON QUANTUM COMPUTING AND QUANTUM COMMUNICATION WHITE PAPER ON QUANTUM COMPUTING AND QUANTUM COMMUNICATION Based on the discussion during the respective workshop at the ZEISS Symposium Optics in the Quantum World on 18 April 2018 in Oberkochen, Germany

More information

Device-Independent Quantum Information Processing (DIQIP)

Device-Independent Quantum Information Processing (DIQIP) Device-Independent Quantum Information Processing (DIQIP) Maciej Demianowicz ICFO-Institut de Ciencies Fotoniques, Barcelona (Spain) Coordinator of the project: Antonio Acín (ICFO, ICREA professor) meeting,

More information

Quantum Technologies: Threats & Solutions to Cybersecurity

Quantum Technologies: Threats & Solutions to Cybersecurity Quantum Technologies: Threats & Solutions to Cybersecurity Bruno Huttner ID Quantique & Cloud Security Alliance, Quantum-Safe Security Working Group NIAS2017; Mons, Oct. 2017 ID Quantique Company Profile

More information

A New Wireless Quantum Key Distribution Protocol based on Authentication And Bases Center (AABC)

A New Wireless Quantum Key Distribution Protocol based on Authentication And Bases Center (AABC) A New Wireless Quantum Key Distribution Protocol based on Authentication And Bases Center (AABC) Majid Alshammari and Khaled Elleithy Department of Computer Science and Engineering University of Bridgeport

More information

An Introduction to Quantum Information. By Aditya Jain. Under the Guidance of Dr. Guruprasad Kar PAMU, ISI Kolkata

An Introduction to Quantum Information. By Aditya Jain. Under the Guidance of Dr. Guruprasad Kar PAMU, ISI Kolkata An Introduction to Quantum Information By Aditya Jain Under the Guidance of Dr. Guruprasad Kar PAMU, ISI Kolkata 1. Introduction Quantum information is physical information that is held in the state of

More information

Quantum Cryptography

Quantum Cryptography Quantum Cryptography Umesh V. Vazirani CS 161/194-1 November 28, 2005 Why Quantum Cryptography? Unconditional security - Quantum computers can solve certain tasks exponentially faster; including quantum

More information

Quantum Cryptography. Marshall Roth March 9, 2007

Quantum Cryptography. Marshall Roth March 9, 2007 Quantum Cryptography Marshall Roth March 9, 2007 Overview Current Cryptography Methods Quantum Solutions Quantum Cryptography Commercial Implementation Cryptography algorithms: Symmetric encrypting and

More information

Research Proposal for Secure Double slit experiment. Sandeep Cheema Security Analyst, Vichara Technologies. Abstract

Research Proposal for Secure Double slit experiment. Sandeep Cheema Security Analyst, Vichara Technologies. Abstract Research Proposal for Secure Double slit experiment Sandeep Cheema Security Analyst, Vichara Technologies Abstract The key objective of this research proposal is to resolve or advance with the measurement

More information

Quantum and quantum safe crypto technologies in Europe. Ales Fiala Future and Emerging Technologies European Commission

Quantum and quantum safe crypto technologies in Europe. Ales Fiala Future and Emerging Technologies European Commission Quantum and quantum safe crypto technologies in Europe 51214 Ales Fiala Future and Emerging Technologies European Commission Outline o Future and Emerging Technologies (FET) basics o Quantum Technologies

More information

Security of Quantum Cryptography using Photons for Quantum Key Distribution. Karisa Daniels & Chris Marcellino Physics C191C

Security of Quantum Cryptography using Photons for Quantum Key Distribution. Karisa Daniels & Chris Marcellino Physics C191C Security of Quantum Cryptography using Photons for Quantum Key Distribution Karisa Daniels & Chris Marcellino Physics C191C Quantum Key Distribution QKD allows secure key distribution Keys are then used

More information

Chapter 13: Photons for quantum information. Quantum only tasks. Teleportation. Superdense coding. Quantum key distribution

Chapter 13: Photons for quantum information. Quantum only tasks. Teleportation. Superdense coding. Quantum key distribution Chapter 13: Photons for quantum information Quantum only tasks Teleportation Superdense coding Quantum key distribution Quantum teleportation (Theory: Bennett et al. 1993; Experiments: many, by now) Teleportation

More information

A probabilistic quantum key transfer protocol

A probabilistic quantum key transfer protocol SECURITY AND COMMUNICATION NETWORKS Security Comm. Networks 013; 6:1389 1395 Published online 13 March 013 in Wiley Online Library (wileyonlinelibrary.com)..736 RESEARCH ARTICLE Abhishek Parakh* Nebraska

More information

Quantum Technologies for Cryptography

Quantum Technologies for Cryptography University of Sydney 11 July 2018 Quantum Technologies for Cryptography Mario Berta (Department of Computing) marioberta.info Quantum Information Science Understanding quantum systems (e.g., single atoms

More information

1 1D Schrödinger equation: Particle in an infinite box

1 1D Schrödinger equation: Particle in an infinite box 1 OF 5 1 1D Schrödinger equation: Particle in an infinite box Consider a particle of mass m confined to an infinite one-dimensional well of width L. The potential is given by V (x) = V 0 x L/2, V (x) =

More information

Ground-Satellite QKD Through Free Space. Steven Taylor

Ground-Satellite QKD Through Free Space. Steven Taylor Ground-Satellite QKD Through Free Space Steven Taylor Quantum Computation and Quantum Information, Spring 2014 Introduction: In this paper I will provide a brief introduction on what Quantum Key Distribution

More information

Technical Report Communicating Secret Information Without Secret Messages

Technical Report Communicating Secret Information Without Secret Messages Technical Report 013-605 Communicating Secret Information Without Secret Messages Naya Nagy 1, Marius Nagy 1, and Selim G. Akl 1 College of Computer Engineering and Science Prince Mohammad Bin Fahd University,

More information

Asymptotic Analysis of a Three State Quantum Cryptographic Protocol

Asymptotic Analysis of a Three State Quantum Cryptographic Protocol Asymptotic Analysis of a Three State Quantum Cryptographic Protocol Walter O. Krawec walter.krawec@gmail.com Iona College Computer Science Department New Rochelle, NY USA IEEE ISIT July, 2016 Quantum Key

More information

Cyber Security in the Quantum Era

Cyber Security in the Quantum Era T Computer Security Guest Lecture University of Edinburgh 27th November 2017 E H U N I V E R S I T Y O H F R G E D I N B U Outline Quantum Computers: Is it a threat to Cyber Security? Why should we act

More information

Research, Development and Simulation of Quantum Cryptographic Protocols

Research, Development and Simulation of Quantum Cryptographic Protocols http://dx.doi.org/1.5755/j1.eee.19.4.17 Research, Development and Simulation of Quantum Cryptographic Protocols C. Anghel 1 1 University Dunărea de Jos Galati, 2 Științei, 8146 Galati, Romania, phone:

More information

LECTURE NOTES ON Quantum Cryptography

LECTURE NOTES ON Quantum Cryptography Department of Software The University of Babylon LECTURE NOTES ON Quantum Cryptography By Dr. Samaher Hussein Ali College of Information Technology, University of Babylon, Iraq Samaher@itnet.uobabylon.edu.iq

More information

C. QUANTUM INFORMATION 99

C. QUANTUM INFORMATION 99 C. QUANTUM INFORMATION 99 C Quantum information C.1 Qubits C.1.a Single qubits Just as the bits 0 and 1 are represented by distinct physical states in a conventional computer, so the quantum bits (or qubits)

More information

Security of Quantum Key Distribution with Imperfect Devices

Security of Quantum Key Distribution with Imperfect Devices Security of Quantum Key Distribution with Imperfect Devices Hoi-Kwong Lo Dept. of Electrical & Comp. Engineering (ECE); & Dept. of Physics University of Toronto Email:hklo@comm.utoronto.ca URL: http://www.comm.utoronto.ca/~hklo

More information

Information Security in the Age of Quantum Technologies

Information Security in the Age of Quantum Technologies www.pwc.ru Information Security in the Age of Quantum Technologies Algorithms that enable a quantum computer to reduce the time for password generation and data decryption to several hours or even minutes

More information

C. QUANTUM INFORMATION 111

C. QUANTUM INFORMATION 111 C. QUANTUM INFORMATION 111 C Quantum information C.1 Qubits C.1.a Single qubits 1. Qubit: Just as the bits 0 and 1 are represented by distinct physical states, so the quantum bits (or qubits) 0i and 1i

More information

Quantum Key Distribution. The Starting Point

Quantum Key Distribution. The Starting Point Quantum Key Distribution Norbert Lütkenhaus The Starting Point Quantum Mechanics allows Quantum Key Distribution, which can create an unlimited amount of secret key using -a quantum channel -an authenticated

More information

The Quantum Threat to Cybersecurity (for CxOs)

The Quantum Threat to Cybersecurity (for CxOs) The Quantum Threat to Cybersecurity (for CxOs) Michele Mosca 5 th ETSI-IQC Workshop on Quantum-Safe Cryptography 13 September 2017 What is quantum?? E. Lucero, D. Mariantoni, and M. Mariantoni 2017 M.

More information

arxiv:quant-ph/ v1 13 Mar 2007

arxiv:quant-ph/ v1 13 Mar 2007 Quantum Key Distribution with Classical Bob Michel Boyer 1, Dan Kenigsberg 2 and Tal Mor 2 1. Département IRO, Université de Montréal Montréal (Québec) H3C 3J7 CANADA 2. Computer Science Department, Technion,

More information

1 1D Schrödinger equation: Particle in an infinite box

1 1D Schrödinger equation: Particle in an infinite box 1 OF 5 NOTE: This problem set is to be handed in to my mail slot (SMITH) located in the Clarendon Laboratory by 5:00 PM (noon) Tuesday, 24 May. 1 1D Schrödinger equation: Particle in an infinite box Consider

More information

Quantum technology popular science description

Quantum technology popular science description Quantum technology popular science description 1 Quantum physics, from theory to ongoing revolution In the early 1900s observations were made that were not consistent with traditional, classical physics.

More information

Quantum Cryptography

Quantum Cryptography Quantum Cryptography (Notes for Course on Quantum Computation and Information Theory. Sec. 13) Robert B. Griffiths Version of 26 March 2003 References: Gisin = N. Gisin et al., Rev. Mod. Phys. 74, 145

More information

Secrets of Quantum Information Science

Secrets of Quantum Information Science Secrets of Quantum Information Science Todd A. Brun Communication Sciences Institute USC Quantum computers are in the news Quantum computers represent a new paradigm for computing devices: computers whose

More information

Deterministic secure communications using two-mode squeezed states

Deterministic secure communications using two-mode squeezed states Deterministic secure communications using twomode squeezed states Alberto M. Marino* and C. R. Stroud, Jr. The Institute of Optics, University of Rochester, Rochester, New York 467, USA Received 5 May

More information

Cryptography in a quantum world

Cryptography in a quantum world T School of Informatics, University of Edinburgh 25th October 2016 E H U N I V E R S I T Y O H F R G E D I N B U Outline What is quantum computation Why should we care if quantum computers are constructed?

More information

DEVELOPMENT OF MECHANISM FOR ENHANCING DATA SECURITY IN QUANTUM CRYPTOGRAPHY.

DEVELOPMENT OF MECHANISM FOR ENHANCING DATA SECURITY IN QUANTUM CRYPTOGRAPHY. DEVELOPMENT OF MECHANISM FOR ENHANCING DATA SECURITY IN QUANTUM CRYPTOGRAPHY. Ajit Singh 1 and Nidhi Sharma 2 Department of Computer Science & Engineering and Information Technology BPS Mahila Vishwavidyalaya,

More information

Single and Entangled photons. Edward Pei

Single and Entangled photons. Edward Pei Single and Entangled photons Edward Pei War is most commonly thought of as men fighting with their fist, and power is determined by physical strength. Behind the lines, however, knowledge is power. For

More information

arxiv:quant-ph/ v1 13 Jan 2003

arxiv:quant-ph/ v1 13 Jan 2003 Deterministic Secure Direct Communication Using Ping-pong protocol without public channel Qing-yu Cai Laboratory of Magentic Resonance and Atom and Molecular Physics, Wuhan Institute of Mathematics, The

More information

A Matlab Realization of Shor s Quantum Factoring Algorithm

A Matlab Realization of Shor s Quantum Factoring Algorithm 1 A Matlab Realization of Shor s Quantum Factoring Algorithm S. Jha, P. Chatterjee, A.Falor and M. Chakraborty, Member IEEE Department of Information Technology Institute of Engineering & Management Kolkata,

More information

Calculation of the Key Length for Quantum Key Distribution

Calculation of the Key Length for Quantum Key Distribution http://dx.doi.org/10.5755/j01.eee.21.6.13768 ELEKTRONIKA IR ELEKTROTECHNIKA, ISSN 1392-1215, VOL. 21, NO. 6, 2015 Calculation of the Key Length for Quantum Key Distribution Miralem Mehic 1, Marcin Niemiec

More information

Standardization of Quantum Cryptography in China

Standardization of Quantum Cryptography in China Standardization of Quantum Cryptography in China Zhengfu Han University of Science and Technology of China Anhui Asky Quantum Technology Co.,Ltd November 7,2018 CONTENTS 1 Background on Quantum Cryptography

More information

Satellite-Relayed Intercontinental Quantum Network

Satellite-Relayed Intercontinental Quantum Network Satellite-Relayed Intercontinental Quantum Network Rachel Birchmier, Andrew Conrad, Darshan Chalise, Brian Doolittle [Sheng-Kai Liao, et al. Phys. Rev. Lett. 120, 030501 (19 January 2018)] [https://www.sciencemag.org/news/2017/06/china-s-quantum-satellite-achieves-spooky-action-record-distance]

More information

Summary. The prospect of a factoring. Consumer key generation. Future long range key. Commercial systems. Metro Networks. exchange. machine. Spin-off.

Summary. The prospect of a factoring. Consumer key generation. Future long range key. Commercial systems. Metro Networks. exchange. machine. Spin-off. The future of quantum cryptography BCS Meeting 17th Sept 2009 J. G. Rarity University of Bristol john.rarity@bristol.ac.uk Summary Commercial systems. Metro Networks. Future long range key exchange. Consumer

More information

5th March Unconditional Security of Quantum Key Distribution With Practical Devices. Hermen Jan Hupkes

5th March Unconditional Security of Quantum Key Distribution With Practical Devices. Hermen Jan Hupkes 5th March 2004 Unconditional Security of Quantum Key Distribution With Practical Devices Hermen Jan Hupkes The setting Alice wants to send a message to Bob. Channel is dangerous and vulnerable to attack.

More information

arxiv:quant-ph/ v1 6 Dec 2005

arxiv:quant-ph/ v1 6 Dec 2005 Quantum Direct Communication with Authentication Hwayean Lee 1,,4, Jongin Lim 1,, HyungJin Yang,3 arxiv:quant-ph/051051v1 6 Dec 005 Center for Information Security TechnologiesCIST) 1, Graduate School

More information

Detection of Eavesdropping in Quantum Key Distribution using Bell s Theorem and Error Rate Calculations

Detection of Eavesdropping in Quantum Key Distribution using Bell s Theorem and Error Rate Calculations Detection of Eavesdropping in Quantum Key Distribution using Bell s Theorem and Error Rate Calculations David Gaharia Joel Wibron under the direction of Prof. Mohamed Bourennane Quantum Information & Quantum

More information

Trustworthiness of detectors in quantum key distribution with untrusted detectors

Trustworthiness of detectors in quantum key distribution with untrusted detectors Trustworthiness of detectors in quantum key distribution with untrusted detectors Bing Qi Quantum Information Science Group, Computational Sciences and Engineering Division, Oak Ridge National Laboratory,

More information

QUANTUM COMPUTING & CRYPTO: HYPE VS. REALITY ABHISHEK PARAKH UNIVERSITY OF NEBRASKA AT OMAHA

QUANTUM COMPUTING & CRYPTO: HYPE VS. REALITY ABHISHEK PARAKH UNIVERSITY OF NEBRASKA AT OMAHA QUANTUM COMPUTING & CRYPTO: HYPE VS. REALITY ABHISHEK PARAKH UNIVERSITY OF NEBRASKA AT OMAHA QUANTUM COMPUTING: I CAN SUM IT UP IN ONE SLIDE Pure Magic! 2 SERIOUSLY: HOW DOES IT WORK? That s simple: Even

More information

A Genetic Algorithm to Analyze the Security of Quantum Cryptographic Protocols

A Genetic Algorithm to Analyze the Security of Quantum Cryptographic Protocols A Genetic Algorithm to Analyze the Security of Quantum Cryptographic Protocols Walter O. Krawec walter.krawec@gmail.com Iona College Computer Science Department New Rochelle, NY USA IEEE WCCI July, 2016

More information

APPLICATIONS. Quantum Communications

APPLICATIONS. Quantum Communications SOFT PROCESSING TECHNIQUES FOR QUANTUM KEY DISTRIBUTION APPLICATIONS Marina Mondin January 27, 2012 Quantum Communications In the past decades, the key to improving computer performance has been the reduction

More information

Stop Conditions Of BB84 Protocol Via A Depolarizing Channel (Quantum Cryptography)

Stop Conditions Of BB84 Protocol Via A Depolarizing Channel (Quantum Cryptography) Journal of Computer Science 3 (6): 44-49, 7 ISSN 549-3636 7 Science Publications Stop Conditions Of BB84 Protocol Via A Depolarizing Channel (Quantum Cryptography) Iyed Ben Slimen, Olfa Trabelsi, Houria

More information

EU investment in Quantum Technologies

EU investment in Quantum Technologies EU investment in Quantum Technologies ENISA Summer School, 26. September2018 Dr. Gustav Kalbe High Performance Computing and Quantum Technologies DG CNECT, European Commission 2 nd Quantumrevolution: manipulating/exploiting

More information

Ping Pong Protocol & Auto-compensation

Ping Pong Protocol & Auto-compensation Ping Pong Protocol & Auto-compensation Adam de la Zerda For QIP seminar Spring 2004 02.06.04 Outline Introduction to QKD protocols + motivation Ping-Pong protocol Security Analysis for Ping-Pong Protocol

More information

A Necessary Condition for the Security of Coherent- One-Way Quantum Key Distribution Protocol

A Necessary Condition for the Security of Coherent- One-Way Quantum Key Distribution Protocol Appl Math Inf Sci 8, No 6, 769-773 (4) 769 Applied Mathematics & Information Sciences An International Journal http://dxdoiorg/785/amis/86 A Necessary Condition for the Security of Coherent- One-Way Quantum

More information

Chapter 5. Quantum Cryptography

Chapter 5. Quantum Cryptography Chapter 5. Quantum Cryptography arxiv:1108.1718v1 [quant-ph] 8 Aug 2011 Dag Roar Hjelme Department of Electronics and Telecommunications, Norwegian University of Science and Technology, NO-7491 Trondheim,

More information

Introduction to Quantum Computing

Introduction to Quantum Computing Introduction to Quantum Computing Petros Wallden Lecture 1: Introduction 18th September 2017 School of Informatics, University of Edinburgh Resources 1. Quantum Computation and Quantum Information by Michael

More information

Quantum Cryptography

Quantum Cryptography http://tph.tuwien.ac.at/ svozil/publ/2005-qcrypt-pres.pdf Institut für Theoretische Physik, University of Technology Vienna, Wiedner Hauptstraße 8-10/136, A-1040 Vienna, Austria svozil@tuwien.ac.at 16.

More information

An entangled LED driven quantum relay over 1km

An entangled LED driven quantum relay over 1km An entangled LED driven quantum relay over 1km Christiana Varnava 1,2 R. Mark Stevenson 1, J. Nilsson 1, J. Skiba Szymanska 1, B. Dzurnak 1, M. Lucamarini 1, A. J. Bennett 1,M. B. Ward 1, R. V. Penty 2,I.

More information

Eavesdropping or Disrupting a Communication On the Weakness of Quantum Communications

Eavesdropping or Disrupting a Communication On the Weakness of Quantum Communications Eavesdropping or Disrupting a Communication On the Weakness of Quantum Communications Zhengjun Cao Abstract What is the behavior of an adversary to launch attacks against a communication? The good choice

More information

Massachusetts Institute of Technology Department of Electrical Engineering and Computer Science Quantum Optical Communication

Massachusetts Institute of Technology Department of Electrical Engineering and Computer Science Quantum Optical Communication Massachusetts Institute of Technology Department of Electrical Engineering and Computer Science 6.453 Quantum Optical Communication Date: Thursday, November 3, 016 Lecture Number 16 Fall 016 Jeffrey H.

More information

Lecture 1: Introduction to Public key cryptography

Lecture 1: Introduction to Public key cryptography Lecture 1: Introduction to Public key cryptography Thomas Johansson T. Johansson (Lund University) 1 / 44 Key distribution Symmetric key cryptography: Alice and Bob share a common secret key. Some means

More information

Experimental realization of quantum cryptography communication in free space

Experimental realization of quantum cryptography communication in free space Science in China Ser. G Physics, Mechanics & Astronomy 2005 Vol.48 No.2 237 246 237 Experimental realization of quantum cryptography communication in free space WANG Chuan 1, ZHANG Jingfu 1, WANG Pingxiao

More information

This is a repository copy of Unite to build a quantum internet. White Rose Research Online URL for this paper:

This is a repository copy of Unite to build a quantum internet. White Rose Research Online URL for this paper: This is a repository copy of Unite to build a quantum internet. White Rose Research Online URL for this paper: http://eprints.whiterose.ac.uk/98773/ Version: Accepted Version Article: Pirandola, Stefano

More information

Everything is Quantum. Our mission is to keep KPN reliable & secure and trusted by customers, partners and society part of the vital infra of NL

Everything is Quantum. Our mission is to keep KPN reliable & secure and trusted by customers, partners and society part of the vital infra of NL Everything is Quantum Our mission is to keep KPN reliable & secure and trusted by customers, partners and society part of the vital infra of NL Contents Whats the problem? Surveillance Problem / Weak Crypto

More information

Applications of Quantum Key Distribution (QKD)

Applications of Quantum Key Distribution (QKD) Applications of Quantum Key Distribution (QKD) Olav Tirkkonen, Iikka Elonsalo, Jari Lietzen, Teemu Manninen, Ilkka Tittonen, Roope Vehkalahti Departments of Communications and Networking & Micro and Nano,

More information

High rate quantum cryptography with untrusted relay: Theory and experiment

High rate quantum cryptography with untrusted relay: Theory and experiment High rate quantum cryptography with untrusted relay: Theory and experiment CARLO OTTAVIANI Department of Computer Science, The University of York (UK) 1st TWQI Conference Ann Arbor 27-3 July 2015 1 In

More information

arxiv:quant-ph/ v2 2 Jan 2007

arxiv:quant-ph/ v2 2 Jan 2007 Revisiting controlled quantum secure direct communication using a non-symmetric quantum channel with quantum superdense coding arxiv:quant-ph/06106v Jan 007 Jun Liu 1, Yan Xia and Zhan-jun Zhang 1,, 1

More information

Seminar Report On QUANTUM CRYPTOGRAPHY. Submitted by SANTHIMOL A. K. In the partial fulfillment of requirements in degree of

Seminar Report On QUANTUM CRYPTOGRAPHY. Submitted by SANTHIMOL A. K. In the partial fulfillment of requirements in degree of Seminar Report On QUANTUM CRYPTOGRAPHY Submitted by SANTHIMOL A. K. In the partial fulfillment of requirements in degree of Master of Technology in Computer and Information Science DEPARTMENT OF COMPUTER

More information

arxiv:quant-ph/ v1 27 Dec 2004

arxiv:quant-ph/ v1 27 Dec 2004 Multiparty Quantum Secret Sharing Zhan-jun Zhang 1,2, Yong Li 3 and Zhong-xiao Man 2 1 School of Physics & Material Science, Anhui University, Hefei 230039, China 2 Wuhan Institute of Physics and Mathematics,

More information

Quantum Key Distribution

Quantum Key Distribution Quantum Key Distribution QUT Mathematics Society September 2, 2015 Dr Douglas Stebila Outline 1. Qubits 2. Basic QKD BB84 3. Entanglement-based QKD 4. Classical processing 5. Authentication Security of

More information

APPLICATIONS OF THE QUANTUM KEY DISTRIBUTION (QKD) METHOD

APPLICATIONS OF THE QUANTUM KEY DISTRIBUTION (QKD) METHOD 2016/2500M-0054 ISSN 1797-3457 (verkkojulkaisu) ISBN (PDF) 978-951-25-2850-9 SUMMARY REPORT APPLICATIONS OF THE QUANTUM KEY DISTRIBUTION (QKD) METHOD Ilkka Tittonen, professor, Department of Micro- and

More information

Notes for Lecture 17

Notes for Lecture 17 U.C. Berkeley CS276: Cryptography Handout N17 Luca Trevisan March 17, 2009 Notes for Lecture 17 Scribed by Matt Finifter, posted April 8, 2009 Summary Today we begin to talk about public-key cryptography,

More information

Universal Single Server Blind Quantum Computation Revisited

Universal Single Server Blind Quantum Computation Revisited Universal Single Server Blind Quantum Computation Revisited Durgesh Pandey durgesh.pandey@research.iiit.ac.in Aditya Jain aditya.jain@research.iiit.ac.in ABSTRACT In this paper, we present an improvised

More information

Attacks against a Simplified Experimentally Feasible Semiquantum Key Distribution Protocol

Attacks against a Simplified Experimentally Feasible Semiquantum Key Distribution Protocol entropy Article Attacks against a Simplified Experimentally Feasible Semiquantum Key Distribution Protocol Michel Boyer, Rotem Liss, * and Tal Mor Département d Informatique et de Recherche Opérationnelle

More information

Two-Step Efficient Deterministic Secure Quantum Communication Using Three-Qubit W State

Two-Step Efficient Deterministic Secure Quantum Communication Using Three-Qubit W State Commun. Theor. Phys. 55 (2011) 984 988 Vol. 55, No. 6, June 15, 2011 Two-Step Efficient Deterministic Secure Quantum Communication Using Three-Qubit W State YUAN Hao ( ), 1, ZHOU Jun ( ), 1,2 ZHANG Gang

More information

Unconditionally secure deviceindependent

Unconditionally secure deviceindependent Unconditionally secure deviceindependent quantum key distribution with only two devices Roger Colbeck (ETH Zurich) Based on joint work with Jon Barrett and Adrian Kent Physical Review A 86, 062326 (2012)

More information

Introduction to Quantum Cryptography

Introduction to Quantum Cryptography Università degli Studi di Perugia September, 12th, 2011 BunnyTN 2011, Trento, Italy This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported License. Quantum Mechanics

More information

Quantum Information Processing and Diagrams of States

Quantum Information Processing and Diagrams of States Quantum Information and Diagrams of States September 17th 2009, AFSecurity Sara Felloni sara@unik.no / sara.felloni@iet.ntnu.no Quantum Hacking Group: http://www.iet.ntnu.no/groups/optics/qcr/ UNIK University

More information

Feasibility of the interlock protocol against man-in-the-middle attacks on quantum cryptography

Feasibility of the interlock protocol against man-in-the-middle attacks on quantum cryptography International Journal of Quantum Information c World Scientific Publishing Company Feasibility of the interlock protocol against man-in-the-middle attacks on quantum cryptography Karl Svozil Institut für

More information

Intrinsic-Stabilization Uni-Directional Quantum Key Distribution. Between Beijing and Tianjin

Intrinsic-Stabilization Uni-Directional Quantum Key Distribution. Between Beijing and Tianjin Intrinsic-Stabilization Uni-Directional Quantum Key Distribution Between Beijing and Tianjin Xiao-fan Mo 1, Bing Zhu 1, 2, Zheng-fu Han 1*, You-zhen Gui 1, Guang-can Guo 1 1 Key Lab of Quantum Information

More information

Quantum Error Correcting Codes and Quantum Cryptography. Peter Shor M.I.T. Cambridge, MA 02139

Quantum Error Correcting Codes and Quantum Cryptography. Peter Shor M.I.T. Cambridge, MA 02139 Quantum Error Correcting Codes and Quantum Cryptography Peter Shor M.I.T. Cambridge, MA 02139 1 We start out with two processes which are fundamentally quantum: superdense coding and teleportation. Superdense

More information

Practical quantum-key. key- distribution post-processing

Practical quantum-key. key- distribution post-processing Practical quantum-key key- distribution post-processing processing Xiongfeng Ma 马雄峰 IQC, University of Waterloo Chi-Hang Fred Fung, Jean-Christian Boileau, Hoi Fung Chau arxiv:0904.1994 Hoi-Kwong Lo, Norbert

More information

The quantum threat to cryptography

The quantum threat to cryptography The quantum threat to cryptography Michele Mosca 8 May 2016 Vienna, Austria Cryptography in the context of quantum computers E. Lucero, D. Mariantoni, and M. Mariantoni Harald Ritsch Y. Colombe/NIST How

More information

Error Reconciliation in QKD. Distribution

Error Reconciliation in QKD. Distribution Error Reconciliation in Quantum Key Distribution Richard P. Brent MSI, ANU 1 October 2009 Abstract The problem of "error reconciliation" arises in Quantum Cryptography, which is more accurately described

More information

Quantum key distribution

Quantum key distribution Quantum key distribution Eleni Diamanti eleni.diamanti@telecom-paristech.fr LTCI, CNRS, Télécom ParisTech Paris Centre for Quantum Computing Photonics@be doctoral school May 10, 2016 1 Outline Principles

More information

Quantum Computers. Todd A. Brun Communication Sciences Institute USC

Quantum Computers. Todd A. Brun Communication Sciences Institute USC Quantum Computers Todd A. Brun Communication Sciences Institute USC Quantum computers are in the news Quantum computers represent a new paradigm for computing devices: computers whose components are individual

More information

Introduction to Quantum Key Distribution

Introduction to Quantum Key Distribution Fakultät für Physik Ludwig-Maximilians-Universität München January 2010 Overview Introduction Security Proof Introduction What is information? A mathematical concept describing knowledge. Basic unit is

More information

Quantum Wireless Sensor Networks

Quantum Wireless Sensor Networks Quantum Wireless Sensor Networks School of Computing Queen s University Canada ntional Computation Vienna, August 2008 Main Result Quantum cryptography can solve the problem of security in sensor networks.

More information