
Proceedings Paper
An in fiber experimental approach to photonic quantum digital signatures that does not require quantum memoryFormat | Member Price | Non-Member Price |
---|---|---|
$17.00 | $21.00 |
Paper Abstract
Classical digital signatures are commonly used in e-mail, electronic financial transactions and other forms of electronic
communications to ensure that messages have not been tampered with in transit, and that messages are transferrable. The
security of commonly used classical digital signature schemes relies on the computational difficulty of inverting certain
mathematical functions. However, at present, there are no such one-way functions which have been proven to be hard to
invert. With enough computational resources certain implementations of classical public key cryptosystems can be, and
have been, broken with current technology. It is nevertheless possible to construct information-theoretically secure
signature schemes, including quantum digital signature schemes. Quantum signature schemes can be made information theoretically
secure based on the laws of quantum mechanics, while classical comparable protocols require additional
resources such as secret communication and a trusted authority.
Early demonstrations of quantum digital signatures required quantum memory, rendering them impractical at present.
Our present implementation is based on a protocol that does not require quantum memory. It also uses the new technique
of unambiguous quantum state elimination, Here we report experimental results for a test-bed system, recorded with a
variety of different operating parameters, along with a discussion of aspects of the system security.
Paper Details
Date Published: 13 October 2014
PDF: 10 pages
Proc. SPIE 9254, Emerging Technologies in Security and Defence II; and Quantum-Physics-based Information Security III, 92540D (13 October 2014); doi: 10.1117/12.2069859
Published in SPIE Proceedings Vol. 9254:
Emerging Technologies in Security and Defence II; and Quantum-Physics-based Information Security III
Keith L. Lewis; Mark T. Gruneisen; Miloslav Dusek; Richard C. Hollins; Thomas J. Merlet; John G. Rarity; Alexander Toet, Editor(s)
PDF: 10 pages
Proc. SPIE 9254, Emerging Technologies in Security and Defence II; and Quantum-Physics-based Information Security III, 92540D (13 October 2014); doi: 10.1117/12.2069859
Show Author Affiliations
Robert J. Collins, Heriot-Watt Univ. (United Kingdom)
Ross J. Donaldon, Heriot-Watt Univ (United Kingdom)
Vedran Dunjko, Heriot-Watt Univ. (United Kingdom)
Univ. of Edinburgh (United Kingdom)
Ruđer Bošković Institute (Croatia)
Petros Wallden, Heriot-Watt Univ (United Kingdom)
Ross J. Donaldon, Heriot-Watt Univ (United Kingdom)
Vedran Dunjko, Heriot-Watt Univ. (United Kingdom)
Univ. of Edinburgh (United Kingdom)
Ruđer Bošković Institute (Croatia)
Petros Wallden, Heriot-Watt Univ (United Kingdom)
Patrick J. Clarke, Heriot-Watt Univ (United Kingdom)
Erika Andersson, Heriot-Watt Univ. (United Kingdom)
John Jeffers, Univ. of Strathclyde (United Kingdom)
Gerald S. Buller, Heriot-Watt Univ. (United Kingdom)
Erika Andersson, Heriot-Watt Univ. (United Kingdom)
John Jeffers, Univ. of Strathclyde (United Kingdom)
Gerald S. Buller, Heriot-Watt Univ. (United Kingdom)
Published in SPIE Proceedings Vol. 9254:
Emerging Technologies in Security and Defence II; and Quantum-Physics-based Information Security III
Keith L. Lewis; Mark T. Gruneisen; Miloslav Dusek; Richard C. Hollins; Thomas J. Merlet; John G. Rarity; Alexander Toet, Editor(s)
© SPIE. Terms of Use
