Experimental demonstration of photonic quantum digital signatures

Robert John Collins, Patrick J Clarke, Vedran Dunjko, Erika Andersson, John Jeffers, Gerald Stuart Buller

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Digital signature schemes are often used in interconnected computer networks to verify the origin and authenticity of messages. Current classical digital signature schemes based on so-called "one-way functions" rely on computational complexity to provide security over sufficiently long timescales. However, there are currently no mathematical proofs that such functions will always be computationally complex. Quantum digital signatures offers a means of confirming both origin and authenticity of a message with security verified by information theoretical limits The message cannot be forged or repudiated. We have constructed, tested and analyzed the security of what is, to the best of our knowledge, the first example of an experimental quantum digital signature system.

Original languageEnglish
Title of host publicationElectro-Optical Remote Sensing, Photonic Technologies, and Applications VI
EditorsGary W Kamerman, Ove Steinvall, Gary J Bishop, John Gonglewski, Keith L Lewis, Richard C Hollins, Thomas J Merlet, Mark T Gruneisen, Miloslav Dusek, John G Rarity
PublisherSPIE
Number of pages14
ISBN (Print)9780819492838
DOIs
Publication statusPublished - 19 Nov 2012
EventConference on Electro-Optical Remote Sensing, Photonic Technologies, and Applications VI - Edinburgh, United Kingdom
Duration: 24 Sep 201226 Sep 2012

Publication series

NameProceedings of SPIE
Volume8542
ISSN (Print)1996-756X
ISSN (Electronic)0277-786X

Conference

ConferenceConference on Electro-Optical Remote Sensing, Photonic Technologies, and Applications VI
CountryUnited Kingdom
CityEdinburgh
Period24/09/1226/09/12

Keywords

  • MATHEMATICAL-THEORY
  • INEQUALITIES
  • KEY DISTRIBUTION
  • digital signatures
  • quantum information
  • COMMUNICATION
  • CRYPTOGRAPHY
  • LONG
  • information security
  • quantum digital signatures
  • quantum theory

Cite this