An in fiber experimental approach to photonic quantum digital signatures that does not require quantum memory

Robert J. Collins, Ross J Donaldson, Vedran Dunjko, Petros Wallden, Patrick J. Clarke, Erika Andersson, John Jeffers, Gerald S. Buller

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Classical digital signatures are commonly used in e-mail, electronic financial transactions and other forms of electronic communications to ensure that messages have not been tampered with in transit, and that messages are transferrable. The security of commonly used classical digital signature schemes relies on the computational difficulty of inverting certain mathematical functions. However, at present, there are no such one-way functions which have been proven to be hard to invert. With enough computational resources certain implementations of classical public key cryptosystems can be, and have been, broken with current technology. It is nevertheless possible to construct information-theoretically secure signature schemes, including quantum digital signature schemes. Quantum signature schemes can be made information-theoretically secure based on the laws of quantum mechanics, while classical comparable protocols require additional resources such as secret communication and a trusted authority.

Early demonstrations of quantum digital signatures required quantum memory, rendering them impractical at present. Our present implementation is based on a protocol that does not require quantum memory. It also uses the new technique of unambiguous quantum state elimination, Here we report experimental results for a test-bed system, recorded with a variety of different operating parameters, along with a discussion of aspects of the system security.

Original languageEnglish
Title of host publicationEmerging Technologies in Security and Defence II; and Quantum-Physics-Based Information Security III
EditorsMT Gruneisen, M Dusek, JG Rarity, KL Lewis, RC Hollins, TJ Merlet, A Toet
Place of PublicationBellingham
PublisherSPIE
Number of pages10
DOIs
Publication statusPublished - 2014
EventConference on Emerging Technologies in Security and Defence II; and Quantum-Physics-based Information Security III - Amsterdam, Netherlands
Duration: 22 Sep 201423 Sep 2014

Publication series

NameProceedings of SPIE
PublisherSPIE-INT SOC OPTICAL ENGINEERING
Volume9254
ISSN (Print)0277-786X

Conference

ConferenceConference on Emerging Technologies in Security and Defence II; and Quantum-Physics-based Information Security III
CountryNetherlands
Period22/09/1423/09/14

Keywords

  • Quantum communications
  • digital signature
  • cryptography
  • quantum memory
  • quantum state elimination
  • KEY DISTRIBUTION-SYSTEM
  • COHERENT STATES
  • STORAGE
  • SI-28
  • LONG

Cite this

Collins, R. J., Donaldson, R. J., Dunjko, V., Wallden, P., Clarke, P. J., Andersson, E., ... Buller, G. S. (2014). An in fiber experimental approach to photonic quantum digital signatures that does not require quantum memory. In MT. Gruneisen, M. Dusek, JG. Rarity, KL. Lewis, RC. Hollins, TJ. Merlet, & A. Toet (Eds.), Emerging Technologies in Security and Defence II; and Quantum-Physics-Based Information Security III (Proceedings of SPIE; Vol. 9254). Bellingham : SPIE. https://doi.org/10.1117/12.2069859
Collins, Robert J. ; Donaldson, Ross J ; Dunjko, Vedran ; Wallden, Petros ; Clarke, Patrick J. ; Andersson, Erika ; Jeffers, John ; Buller, Gerald S. / An in fiber experimental approach to photonic quantum digital signatures that does not require quantum memory. Emerging Technologies in Security and Defence II; and Quantum-Physics-Based Information Security III. editor / MT Gruneisen ; M Dusek ; JG Rarity ; KL Lewis ; RC Hollins ; TJ Merlet ; A Toet. Bellingham : SPIE, 2014. (Proceedings of SPIE).
@inproceedings{9a040d7f89b24df1a54b0a9cf45407fe,
title = "An in fiber experimental approach to photonic quantum digital signatures that does not require quantum memory",
abstract = "Classical digital signatures are commonly used in e-mail, electronic financial transactions and other forms of electronic communications to ensure that messages have not been tampered with in transit, and that messages are transferrable. The security of commonly used classical digital signature schemes relies on the computational difficulty of inverting certain mathematical functions. However, at present, there are no such one-way functions which have been proven to be hard to invert. With enough computational resources certain implementations of classical public key cryptosystems can be, and have been, broken with current technology. It is nevertheless possible to construct information-theoretically secure signature schemes, including quantum digital signature schemes. Quantum signature schemes can be made information-theoretically secure based on the laws of quantum mechanics, while classical comparable protocols require additional resources such as secret communication and a trusted authority.Early demonstrations of quantum digital signatures required quantum memory, rendering them impractical at present. Our present implementation is based on a protocol that does not require quantum memory. It also uses the new technique of unambiguous quantum state elimination, Here we report experimental results for a test-bed system, recorded with a variety of different operating parameters, along with a discussion of aspects of the system security.",
keywords = "Quantum communications, digital signature, cryptography, quantum memory, quantum state elimination, KEY DISTRIBUTION-SYSTEM, COHERENT STATES, STORAGE, SI-28, LONG",
author = "Collins, {Robert J.} and Donaldson, {Ross J} and Vedran Dunjko and Petros Wallden and Clarke, {Patrick J.} and Erika Andersson and John Jeffers and Buller, {Gerald S.}",
year = "2014",
doi = "10.1117/12.2069859",
language = "English",
series = "Proceedings of SPIE",
publisher = "SPIE",
editor = "MT Gruneisen and M Dusek and JG Rarity and KL Lewis and RC Hollins and TJ Merlet and A Toet",
booktitle = "Emerging Technologies in Security and Defence II; and Quantum-Physics-Based Information Security III",
address = "United States",

}

Collins, RJ, Donaldson, RJ, Dunjko, V, Wallden, P, Clarke, PJ, Andersson, E, Jeffers, J & Buller, GS 2014, An in fiber experimental approach to photonic quantum digital signatures that does not require quantum memory. in MT Gruneisen, M Dusek, JG Rarity, KL Lewis, RC Hollins, TJ Merlet & A Toet (eds), Emerging Technologies in Security and Defence II; and Quantum-Physics-Based Information Security III. Proceedings of SPIE, vol. 9254, SPIE, Bellingham , Conference on Emerging Technologies in Security and Defence II; and Quantum-Physics-based Information Security III, Netherlands, 22/09/14. https://doi.org/10.1117/12.2069859

An in fiber experimental approach to photonic quantum digital signatures that does not require quantum memory. / Collins, Robert J.; Donaldson, Ross J; Dunjko, Vedran; Wallden, Petros; Clarke, Patrick J.; Andersson, Erika; Jeffers, John; Buller, Gerald S.

Emerging Technologies in Security and Defence II; and Quantum-Physics-Based Information Security III. ed. / MT Gruneisen; M Dusek; JG Rarity; KL Lewis; RC Hollins; TJ Merlet; A Toet. Bellingham : SPIE, 2014. (Proceedings of SPIE; Vol. 9254).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

TY - GEN

T1 - An in fiber experimental approach to photonic quantum digital signatures that does not require quantum memory

AU - Collins, Robert J.

AU - Donaldson, Ross J

AU - Dunjko, Vedran

AU - Wallden, Petros

AU - Clarke, Patrick J.

AU - Andersson, Erika

AU - Jeffers, John

AU - Buller, Gerald S.

PY - 2014

Y1 - 2014

N2 - Classical digital signatures are commonly used in e-mail, electronic financial transactions and other forms of electronic communications to ensure that messages have not been tampered with in transit, and that messages are transferrable. The security of commonly used classical digital signature schemes relies on the computational difficulty of inverting certain mathematical functions. However, at present, there are no such one-way functions which have been proven to be hard to invert. With enough computational resources certain implementations of classical public key cryptosystems can be, and have been, broken with current technology. It is nevertheless possible to construct information-theoretically secure signature schemes, including quantum digital signature schemes. Quantum signature schemes can be made information-theoretically secure based on the laws of quantum mechanics, while classical comparable protocols require additional resources such as secret communication and a trusted authority.Early demonstrations of quantum digital signatures required quantum memory, rendering them impractical at present. Our present implementation is based on a protocol that does not require quantum memory. It also uses the new technique of unambiguous quantum state elimination, Here we report experimental results for a test-bed system, recorded with a variety of different operating parameters, along with a discussion of aspects of the system security.

AB - Classical digital signatures are commonly used in e-mail, electronic financial transactions and other forms of electronic communications to ensure that messages have not been tampered with in transit, and that messages are transferrable. The security of commonly used classical digital signature schemes relies on the computational difficulty of inverting certain mathematical functions. However, at present, there are no such one-way functions which have been proven to be hard to invert. With enough computational resources certain implementations of classical public key cryptosystems can be, and have been, broken with current technology. It is nevertheless possible to construct information-theoretically secure signature schemes, including quantum digital signature schemes. Quantum signature schemes can be made information-theoretically secure based on the laws of quantum mechanics, while classical comparable protocols require additional resources such as secret communication and a trusted authority.Early demonstrations of quantum digital signatures required quantum memory, rendering them impractical at present. Our present implementation is based on a protocol that does not require quantum memory. It also uses the new technique of unambiguous quantum state elimination, Here we report experimental results for a test-bed system, recorded with a variety of different operating parameters, along with a discussion of aspects of the system security.

KW - Quantum communications

KW - digital signature

KW - cryptography

KW - quantum memory

KW - quantum state elimination

KW - KEY DISTRIBUTION-SYSTEM

KW - COHERENT STATES

KW - STORAGE

KW - SI-28

KW - LONG

U2 - 10.1117/12.2069859

DO - 10.1117/12.2069859

M3 - Conference contribution

T3 - Proceedings of SPIE

BT - Emerging Technologies in Security and Defence II; and Quantum-Physics-Based Information Security III

A2 - Gruneisen, MT

A2 - Dusek, M

A2 - Rarity, JG

A2 - Lewis, KL

A2 - Hollins, RC

A2 - Merlet, TJ

A2 - Toet, A

PB - SPIE

CY - Bellingham

ER -

Collins RJ, Donaldson RJ, Dunjko V, Wallden P, Clarke PJ, Andersson E et al. An in fiber experimental approach to photonic quantum digital signatures that does not require quantum memory. In Gruneisen MT, Dusek M, Rarity JG, Lewis KL, Hollins RC, Merlet TJ, Toet A, editors, Emerging Technologies in Security and Defence II; and Quantum-Physics-Based Information Security III. Bellingham : SPIE. 2014. (Proceedings of SPIE). https://doi.org/10.1117/12.2069859