WO2010151105A1 - Method for use in quantum cryptography - Google Patents

Method for use in quantum cryptography Download PDF

Info

Publication number
WO2010151105A1
WO2010151105A1 PCT/MY2010/000107 MY2010000107W WO2010151105A1 WO 2010151105 A1 WO2010151105 A1 WO 2010151105A1 MY 2010000107 W MY2010000107 W MY 2010000107W WO 2010151105 A1 WO2010151105 A1 WO 2010151105A1
Authority
WO
WIPO (PCT)
Prior art keywords
reference signals
quantum
signals
frequencies
bob
Prior art date
Application number
PCT/MY2010/000107
Other languages
French (fr)
Inventor
Sellami Ali
Mohamed Ridza Wahiddin
Original Assignee
Mimos Berhad
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Mimos Berhad filed Critical Mimos Berhad
Publication of WO2010151105A1 publication Critical patent/WO2010151105A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0852Quantum cryptography

Definitions

  • the present invention relates generally to a method for use in quantum cryptography and more particularly to a method for enhancing and thus allowing a more secured transmission of cryptographic keys of a quantum key distribution system.
  • An exemplary of a current approach or implementation in quantum cryptography involves the sender Alice sends photons to the receiver, Bob and these photons may be sent based on different states and orientations, which are also known as polarizations.
  • Bob being the receiver therefore must measure the photons he receives based on his selected states and orientations. Alice aids to solve this and thus provide the key for decryption by way providing the accurate states and orientations to Bob.
  • Eve may be able to obtain a perfect copy of the key after the reconciliation process, whereby Eve only has to send back to Bob a photon pulse within a duration much lesser than the total time thereby resulting to confusing Bob instead due to incorrect measurement of pulses at his end.
  • the system involves two unbalanced Mach-Zechnder interferometers, wherein at least one interferometer is adjusted to alternate with a second interferometer for every few seconds so as to compensate thermal drifts.
  • the present invention therefore seeks to provide an efficient scheme and method based on time and frequency factors which is expected to solve the aforementioned problems and primarily avoiding attacks by Eve.
  • This proposed method is used for security and forcing Eve to make errors and thus protect the quantum channel.
  • QKD quantum key distribution
  • QKD quantum key distribution
  • QKD quantum key distribution
  • QKD quantum key distribution
  • the present invention provides a method for use in quantum cryptography comprising the steps of: transmitting a plurality of reference signals (RS) with different frequencies and amplitudes within a predetermined period (T); transmitting a plurality of quantum signals (QS) with different interval times and amplitudes within a predetermined period
  • RS reference signals
  • QS quantum signals
  • said period is less than that of the period (T) for transmitting reference signals (RS); receiving the plurality of reference signals (RS) and quantum signals (QS); measuring the arrival times for said reference signals (RS) and quantum signals (QS); providing the accurate arrival time measurements for both reference signals (RS) and quantum signals (QS); discarding the inaccurate arrival time measurements for both reference signals (RS) and quantum signals (QS); providing the accurate basis of reference signals (RS) frequencies; checking the frequencies of the reference signals (RS) based on the provided accurate basis of reference signals (RS) frequencies; obtaining the cryptographic keys based on the gained accurate basis of reference signals (RS) frequencies and accurate arrival times of both reference signals (RS) and quantum signals (QS).
  • FIG 1 shows the transmission of reference signals (RS) in different frequencies and amplitudes followed by transmission of quantum signals (QS) in different interval times and amplitudes in accordance with a preferred embodiment of the present invention
  • the method of the present invention is developed based on the uncertainty in information between time and frequency. Accordingly, there are two photon sources, these are quantum signal source (QS) and reference signal source (RS). Based on these photon sources, the cryptographic key is obtained by way of measuring the arrival time between the reference signal (RS) and quantum signal (QS) at Bob's end.
  • QS quantum signal source
  • RS reference signal source
  • These reference signals (RS) are preferably sent with differing frequencies and amplitude within a predetermined period of time (T) so as to heighten the level of uncertainty or ambiguity particularly for Eve.
  • the Debuisschert and Boucher protocol is used as a reference with respect to the present invention, in which this particular approach emphasizes coding ambiguous and non ambiguous detection.
  • the method of the present invention however allows the measurement of pulses in separated in time, for instance the delay of quantum signal (QS) and reference signal (RS) is preferably used for coding.
  • QS quantum signal
  • RS reference signal
  • the method uses an approach of sending pulses randomly with different frequency, whilst sending pulses with different amplitudes aids to prevent photon number splitting attack (PNS).
  • PPS photon number splitting attack
  • FIG 1 shows the steps of Alice sending a reference signal (RS) with different frequencies and amplitudes, whereby said reference signal is used or taken as timing reference. Subsequently, Alice sends a quantum signal (QS) which is intended for preparing the cryptographic key to Bob. It is noted that the sending time of quantum signals with different amplitude is randomly prepared and based on t n , where trn ⁇ tn ⁇ trn+l .
  • Bob therefore measures the time of arrival for the reference and quantum signals, and accordingly reports to Alice on the results of measurement, as in the arrival time of the " reference and quantum signals at his end. Alice then accordingly informs Bob on which are accurate. Based on Alice's information, Bob keeps the accurate basis for obtaining the key and discards the erroneous ones. This process can be seen in FIG 2. In the final step, Bob reveals the items that he has detected in the data line. This step is known as the reconciliation step, which therefore results to the sifted or filtration of the key. Alice and Bob then evaluate the quantum bit error rate (denoted as Q) which is the scarifying part of the sifted key. In order to share the key, two additional standard steps are performed, said steps will be described herein shortly.
  • the first step in obtaining and thus share the key is to remove the errors from the key based on an error correction algorithm.
  • cancellation is performed with respect to the information of Eve on the key, said cancellation is based on a privacy amplification algorithm.
  • the information is coded by means of the delay between reference signals (RS) and quantum signals (QS).
  • RS reference signals
  • QS quantum signals
  • Alice sends the reference pulses with different frequencies thereby giving the time reference.
  • an additional delay with respect to that reference can be put on each quantum signals (QS). It is noted that preferred delays chosen are smaller than the pulse duration of reference signal (RS).
  • the method of the present invention is able to prevent such attack by way of sending reference signals (RS) with different frequency randomly where Eve would not be able to distinguish the various frequencies of reference signals. Accordingly, Eve is forced to make errors and thus the quantum channel can be protected.
  • RS reference signals
  • Bob performs a measurement in the frequency domain.
  • Bob sends at random the pulses he receives to a frequency meter to measure reference signal pulses (RS) frequency.
  • Bob and Alice evaluate the measurement of frequencies state by exchanging basis via public channel between them.
  • Bob keeps the right basis of the reference signals (RS) with frequencies f0 and fl and make them as reference time for quantum signals (QS) and to be used to obtain the cryptographic key.
  • the other arm of the input beam splitter is sent to the photocounter that is used to establish the key between Alice and Bob.
  • the control of the reference signals (RS) via frequency measurements allows coding the information only in the time domain.
  • the photocounters can have a response time lesser than 1 nanoseconds (ns).
  • the preferred pulse duration is within 10-20 nanoseconds (ns) range.

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Electromagnetism (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Optical Communication System (AREA)

Abstract

A method for use in quantum cryptography system, particularly for enhancing the security level of obtaining the cryptographic key to encode the information communicated between to legitimate parties. A plurality of reference signals (RS) with different frequencies and amplitudes are transmitted by Alice to Bob, followed by transmitting a plurality of quantum signals (QS) with different interval times and amplitudes. Bob measures the arrival time of the reference signals (RS) and quantum signals (QS) at his end, and reports to Alice. Alice provides the accurate arrival times and Bob discards the erroneous ones. Based on the preferred embodiments of the present invention, the key is obtained by way of measuring the the arrival times of reference signals (RS) and quantum signals (QS).

Description

METHOD FOR USE IN QUANTUM CRYPTOGRAPHY
FIELD OF INVENTION
The present invention relates generally to a method for use in quantum cryptography and more particularly to a method for enhancing and thus allowing a more secured transmission of cryptographic keys of a quantum key distribution system.
BACKGROUND OF INVENTION
Current methods and systems for ensuring secured communication or sharing information between two parties, a sender ("Alice") and a receiver ("Bob") in an open communication channel in absolute secrecy involve the effectiveness in delivering the cryptographic keys to both communicating parties. In this process, weak signals based on the cryptographic key are sent or transmitted over a quantum channel. It is a well established fact that the cryptographic key allows the recipient to decrypt delivered information or messages.
A common adversity in such quantum communication approach is the presence of an eavesdropper known as "Eve", often introducing errors to the keys. This however is considered as an unavoidable disturbance and eavesdropping will definitely be revealed to the legitimate communicating parties. This unique property of being alerted on the presence of the eavesdropper and that their communication has been compromised is a unique property of quantum cryptography communication systems. However, it is discovered that "Eve" can adapt to current technologies to enhance or devise her measurement capabilities in determining or gaining knowledge of the key.
The revolutionary changes in technology over the past decades have resulted to the development of diverse techniques and protocols configured particularly to avoid disturbances by eavesdropper, Eve and thus enhance the security level or threshold for producing a cryptographic key. Most of the current implementations to confuse Eve on measuring the key and heightened security are based on, among others, variation in measuring arrival time of signals or pulses between sender and receiver also known as time frequency uncertainty, Alice and Bob respectively, polarization-based coding, phase coding and issuing decoy signals within the channel.
An exemplary of a current approach or implementation in quantum cryptography involves the sender Alice sends photons to the receiver, Bob and these photons may be sent based on different states and orientations, which are also known as polarizations. Bob, being the receiver therefore must measure the photons he receives based on his selected states and orientations. Alice aids to solve this and thus provide the key for decryption by way providing the accurate states and orientations to Bob.
In the above case of BB84 and many other protocols, it is disovered that Eve can exploit multi-photon pulses in a lossy line to perform the photon-number-splitting attack whereby she would count the photons in each pulse, and whenever this number is larger than one, she keeps one photon in a quantum memory and forwards the remaining photons to Bob on a lossless line. To protect and thereby mask the transmission from that kind of attack, Alice sends randomly the quantum signals (QS) with different amplitude. One of the quantum signal (QS) pulses is used to distribute the key and the second one as decoy signal pulse is used to detect Eve. In this case Eve can not distinguish between the quantum signals as long as the photon numbers of the pulses are the same.
In implementations where measurement is merely performed based on the time as the fundamental factor, Eve may be able to obtain a perfect copy of the key after the reconciliation process, whereby Eve only has to send back to Bob a photon pulse within a duration much lesser than the total time thereby resulting to confusing Bob instead due to incorrect measurement of pulses at his end.
Following the above, although many methods may be expedient in ensuring secured delivery of cryptographic keys within the quantum key distribution system, the main challenge which would normally surface in most cases, is the need of continuous alignment of the system, particularly for polarization-based systems. It is known that in polarization- based systems the polarization has to be maintained stable typically over tens of kilometers in order to keep aligned the polarizers at Alice's and Bob's sides. To maintain the alignment can be an encumbrance to many users.
Similarly, for systems emphasizing interferometric approach, the system involves two unbalanced Mach-Zechnder interferometers, wherein at least one interferometer is adjusted to alternate with a second interferometer for every few seconds so as to compensate thermal drifts.
The present invention therefore seeks to provide an efficient scheme and method based on time and frequency factors which is expected to solve the aforementioned problems and primarily avoiding attacks by Eve. This proposed method is used for security and forcing Eve to make errors and thus protect the quantum channel.
Accordingly, it is a primary object of the present invention to provide method for use in enhancing the security of transmission of cryptographic key within a quantum channel.
It is yet another object of the present invention to provide a method for use in enhancing the security of a quantum key distribution (QKD) system that is not affected by polarization transformation in standard single mode communication fibers, random and changing with time.
It is a further object of the present invention to provide a method for use in enhancing security of a quantum key distribution (QKD) system, which can eliminate the drawback in phase drift in interferometer.
It is yet another object of the present invention to provide a method for use in enhancing security of a quantum key distribution (QKD) system wherein it is most suitable for use in fiber based and free space QKD systems and quantum network.
It is yet a further object of the present invention to provide a method for use in enhancing security of a quantum key distribution (QKD) system that is formed to be robust against propagation medium disturbances. It is yet another object of the present invention to provide a method for use in quantum key distribution (QKD) system that can be implemented with minimum amount of devices.
Further objects and advantages of the present invention may become apparent upon referring to the preferred embodiments of the present invention as shown in the accompanying drawings and as described in the following description.
SUMMARY OF INVENTION
The present invention provides a method for use in quantum cryptography comprising the steps of: transmitting a plurality of reference signals (RS) with different frequencies and amplitudes within a predetermined period (T); transmitting a plurality of quantum signals (QS) with different interval times and amplitudes within a predetermined period
(t/-n); said period is less than that of the period (T) for transmitting reference signals (RS); receiving the plurality of reference signals (RS) and quantum signals (QS); measuring the arrival times for said reference signals (RS) and quantum signals (QS); providing the accurate arrival time measurements for both reference signals (RS) and quantum signals (QS); discarding the inaccurate arrival time measurements for both reference signals (RS) and quantum signals (QS); providing the accurate basis of reference signals (RS) frequencies; checking the frequencies of the reference signals (RS) based on the provided accurate basis of reference signals (RS) frequencies; obtaining the cryptographic keys based on the gained accurate basis of reference signals (RS) frequencies and accurate arrival times of both reference signals (RS) and quantum signals (QS). BRIEF DESCRIPTION OF DRAWINGS
Other objects, features, and advantages of the invention will be apparent from the following description when read with reference to the accompanying drawings. In the drawings, wherein like reference numerals denote corresponding parts throughout the several views:
FIG 1 shows the transmission of reference signals (RS) in different frequencies and amplitudes followed by transmission of quantum signals (QS) in different interval times and amplitudes in accordance with a preferred embodiment of the present invention; and
DETAILED DESRIPTION OF THE PREFERRED EMBODIMENTS
In the following detailed description, numerous specific details are set forth in order to provide a thorough understanding of the invention. However, it will be understood by those or ordinary skill in the art that the invention may be practiced without these specific details. In other instances, well-known methods, procedures and/or components have not been described in detail so as not to obscure the invention. Reference will now be made in detail to the preferred embodiments of the present invention, examples of which are illustrated in the accompanying drawings.
Essentially, the method of the present invention is developed based on the uncertainty in information between time and frequency. Accordingly, there are two photon sources, these are quantum signal source (QS) and reference signal source (RS). Based on these photon sources, the cryptographic key is obtained by way of measuring the arrival time between the reference signal (RS) and quantum signal (QS) at Bob's end. These reference signals (RS) are preferably sent with differing frequencies and amplitude within a predetermined period of time (T) so as to heighten the level of uncertainty or ambiguity particularly for Eve.
The Debuisschert and Boucher protocol is used as a reference with respect to the present invention, in which this particular approach emphasizes coding ambiguous and non ambiguous detection. The method of the present invention however allows the measurement of pulses in separated in time, for instance the delay of quantum signal (QS) and reference signal (RS) is preferably used for coding. As in the monitoring line, the method uses an approach of sending pulses randomly with different frequency, whilst sending pulses with different amplitudes aids to prevent photon number splitting attack (PNS).
FIG 1 shows the steps of Alice sending a reference signal (RS) with different frequencies and amplitudes, whereby said reference signal is used or taken as timing reference. Subsequently, Alice sends a quantum signal (QS) which is intended for preparing the cryptographic key to Bob. It is noted that the sending time of quantum signals with different amplitude is randomly prepared and based on tn, where trn<tn<trn+l .
Bob therefore measures the time of arrival for the reference and quantum signals, and accordingly reports to Alice on the results of measurement, as in the arrival time of the " reference and quantum signals at his end. Alice then accordingly informs Bob on which are accurate. Based on Alice's information, Bob keeps the accurate basis for obtaining the key and discards the erroneous ones. This process can be seen in FIG 2. In the final step, Bob reveals the items that he has detected in the data line. This step is known as the reconciliation step, which therefore results to the sifted or filtration of the key. Alice and Bob then evaluate the quantum bit error rate (denoted as Q) which is the scarifying part of the sifted key. In order to share the key, two additional standard steps are performed, said steps will be described herein shortly.
The first step in obtaining and thus share the key is to remove the errors from the key based on an error correction algorithm. Next, cancellation is performed with respect to the information of Eve on the key, said cancellation is based on a privacy amplification algorithm.
As briefly described in the preceding paragraphs, the information is coded by means of the delay between reference signals (RS) and quantum signals (QS). Alice sends the reference pulses with different frequencies thereby giving the time reference. In order to encode the key, an additional delay with respect to that reference can be put on each quantum signals (QS). It is noted that preferred delays chosen are smaller than the pulse duration of reference signal (RS).
From here, Bob uses photocounters with a time resolution much better than the pulse duration of the reference signal. He then evaluates the delay by way of measuring the detection time with respect to the reference. It is noted that the measurement of pulses can be performed well separated in time. As mentioned previously, if a measurement is only performed in the time domain, Eve would be able to obtain a perfect copy of the key after the reconciliation process. In order to do this, Eve will only need to send back to Bob one photon pulses with a duration 7E much smaller than T and with a delay identical to the one she measured. Bob cannot distinguish T pulses from TE pulses with only one measurement.
Therefore, the method of the present invention is able to prevent such attack by way of sending reference signals (RS) with different frequency randomly where Eve would not be able to distinguish the various frequencies of reference signals. Accordingly, Eve is forced to make errors and thus the quantum channel can be protected. In parallel to the measurement in the time domain, Bob performs a measurement in the frequency domain.
Bob sends at random the pulses he receives to a frequency meter to measure reference signal pulses (RS) frequency. Bob and Alice evaluate the measurement of frequencies state by exchanging basis via public channel between them. As briefly mentioned earlier, Bob keeps the right basis of the reference signals (RS) with frequencies f0 and fl and make them as reference time for quantum signals (QS) and to be used to obtain the cryptographic key. The other arm of the input beam splitter is sent to the photocounter that is used to establish the key between Alice and Bob. The control of the reference signals (RS) via frequency measurements allows coding the information only in the time domain.
Based on the preferred embodiments of the present invention, the photocounters can have a response time lesser than 1 nanoseconds (ns). The preferred pulse duration is within 10-20 nanoseconds (ns) range.
We will thus consider pulse durations in the 10-20 ns range for which the time propagation of the pulses is only little affected by the propagation disturbances of the fiber. It should be noted that a low error rate requires precisions in the arrival time of about 1 nanosecond (ns) which therefore makes it insensitive to fiber thermal dilatation. The pulse spreading due to group velocity dispersion starts to be noticeable only in the ps range with the application of usual telecommunication fibers. The measurement of the arrival time of the photon does not require that the polarization of the photon be conserved. The measurement method of frequency is insensitive to polarization; in other words the whole system incorporated with the method of the present invention is potentially insensitive to polarization.
As will be readily apparent to those skilled in the art, the present invention may easily be produced in other specific forms without departing from its essential characteristics. The present embodiments is, therefore, to be considered as merely illustrative and not restrictive, the scope of the invention being indicated by the claims rather than the foregoing description, and all changes which come within therefore intended to be embraced therein.

Claims

A method for use in quantum cryptography comprising the steps of:
transmitting a plurality of reference signals (RS) with different frequencies and amplitudes within a predetermined period (T); transmitting a plurality of quantum signals (QS) with different interval times and amplitudes within a predetermined period (t/-n); said period is less than that of the period (T) for transmitting reference signals (RS); receiving the plurality of reference signals (RS) and quantum signals (QS); measuring the arrival times for said reference signals (RS) and quantum signals (QS); providing the accurate arrival time measurements for both reference signals (RS) and quantum signals (QS); discarding the inaccurate arrival time measurements for both reference signals (RS) and quantum signals (QS); providing the accurate basis of reference signals (RS) frequencies; checking the frequencies of the reference signals (RS) based on the provided accurate basis of reference signals (RS) frequencies; obtaining the cryptographic keys based on the gained accurate basis of reference signals (RS) frequencies and accurate arrival times of both reference signals (RS) and quantum signals (QS).
2. The method as claimed in Claim 1 further comprising the steps of removing the errors from the potential cryptographic keys based on an error algorithm and Danceling any information of an eavesdropper in relation to the key.
3. The method as claimed in Claims 1 and 2 wherein the information to be communication through the quantum channel is coded based on delays between the transmitted reference signals (RS) and quantum signals (QS).
4. The method as claimed in Claims 1 to 3 wherein the period of delays are preferably less than that of the pulse duration of the reference signals (RS).
5. The method as claimed in Claims 1 to 4 wherein obtaining the key further comprising the step of providing an additional delay with respect to the reference signals (RS) on the quantum signals (QS).
6. The method as claimed in Claims 1 to 5 wherein checking the frequencies of the received reference signals (RS) by exchanging frequency basis between the sender and receiver via a public channel.
7. The method as claimed in Claims 1 to 6 wherein the arrival time of the reference signals (RS) is controlled by way of shifting the frequency of reference signals randomly.
8. The method as claimed in Claims 1 to 7 wherein the reference signals (RS) are sent with different frequencies randomly.
PCT/MY2010/000107 2009-06-24 2010-06-23 Method for use in quantum cryptography WO2010151105A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
MYPI20092675 2009-06-24
MYPI20092675 MY149272A (en) 2009-06-24 2009-06-24 Method for use in quantum cryptography

Publications (1)

Publication Number Publication Date
WO2010151105A1 true WO2010151105A1 (en) 2010-12-29

Family

ID=43386725

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/MY2010/000107 WO2010151105A1 (en) 2009-06-24 2010-06-23 Method for use in quantum cryptography

Country Status (2)

Country Link
MY (1) MY149272A (en)
WO (1) WO2010151105A1 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106911474A (en) * 2017-05-10 2017-06-30 国家电网公司 A kind of quantum key encryption method and device based on service attribute
WO2018076175A1 (en) * 2016-10-25 2018-05-03 华为技术有限公司 Information processing method and apparatus
CN108667529A (en) * 2018-05-18 2018-10-16 全球能源互联网研究院有限公司 A kind of safety evaluation method and device of quantum secret communication system

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060018475A1 (en) * 2003-02-07 2006-01-26 Magiq Technologies, Inc. Kd systems with robust timing
US20070110241A1 (en) * 2003-12-22 2007-05-17 Alexel Trifonov Active stabilization of a one-way qkd system

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060018475A1 (en) * 2003-02-07 2006-01-26 Magiq Technologies, Inc. Kd systems with robust timing
US20070110241A1 (en) * 2003-12-22 2007-05-17 Alexel Trifonov Active stabilization of a one-way qkd system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
YANG L. ET AL.: "`Free-space quantum key distribution system with multi-photon quantum signal", QUANTUM COMMUNICATIONS AND QUANTUM IMAGING III, 25 August 2005 (2005-08-25), pages 1 - 3, Retrieved from the Internet <URL:http://spiedl.aip.org/getabs/servlet/GetabsServlet?prog=normal&id=PSISDG005893000001589306000001&idtype=cvips&gifs=yes&ref=no> [retrieved on 20100906] *

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018076175A1 (en) * 2016-10-25 2018-05-03 华为技术有限公司 Information processing method and apparatus
US10523430B2 (en) 2016-10-25 2019-12-31 Huawei Technologies Co., Ltd. Information processing method and apparatus
CN106911474A (en) * 2017-05-10 2017-06-30 国家电网公司 A kind of quantum key encryption method and device based on service attribute
CN108667529A (en) * 2018-05-18 2018-10-16 全球能源互联网研究院有限公司 A kind of safety evaluation method and device of quantum secret communication system
CN108667529B (en) * 2018-05-18 2020-08-25 全球能源互联网研究院有限公司 Security assessment method and device for quantum secret communication system

Also Published As

Publication number Publication date
MY149272A (en) 2013-08-15

Similar Documents

Publication Publication Date Title
JP6602410B2 (en) Photon communication system
KR100983008B1 (en) System And Method For Quantum Cryptograpy
Inoue et al. Robustness of differential-phase-shift quantum key distribution against photon-number-splitting attack
EP3399670B1 (en) Apparatus and method for decoy-state three-state quantum key distribution
US8374350B2 (en) Quantum communication system
Makarov et al. Faked states attack using detector efficiency mismatch on SARG04, phase-time, DPSK, and Ekert protocols
EP1808761B1 (en) Circuit and method for controlling quality of random numbers
KR100631242B1 (en) Cryptographic communication apparatus
US8311224B2 (en) Method and system utilizing quantum authentication
US7787628B2 (en) Double phase encoding quantum key distribution
US20050190921A1 (en) Systems and methods for framing quantum cryptographic links
US20080152147A1 (en) Large scale quantum cryptographic key distribution network
Inoue Quantum key distribution technologies
Debuisschert et al. Time coding protocols for quantum key distribution
EP4047862A1 (en) Communications system using pulse divider and associated methods
WO2010151105A1 (en) Method for use in quantum cryptography
KR101590105B1 (en) Method and system for quantum key distribution able to detect PNS attack in P2MP network
Zhu et al. Enhancing the performance of the measurement-device-independent quantum key distribution with heralded pair-coherent sources
Kim et al. Implementation of polarization-coded free-space BB84 quantum key distribution
GB2441364A (en) A quantum communication system which selects different protocols on the basis of security
RU2360367C1 (en) Polarisation quantum cryptosystem
US20040057526A1 (en) Quantum cryptography transmission method and system
EP1522166A4 (en) Watch dog detector for qkd system
EP4047863A1 (en) Quantum communications system using pulse divider and associated methods
Jacak et al. Quantum cryptography: Theoretical protocols for quantum key distribution and tests of selected commercial qkd systems in commercial fiber networks

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 10792380

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 10792380

Country of ref document: EP

Kind code of ref document: A1