Share Email Print

Proceedings Paper

An in fiber experimental approach to photonic quantum digital signatures that does not require quantum memory
Author(s): Robert J. Collins; Ross J. Donaldon; Vedran Dunjko; Petros Wallden; Patrick J. Clarke; Erika Andersson; John Jeffers; Gerald S. Buller
Format Member Price Non-Member Price
PDF $17.00 $21.00

Paper Abstract

Classical digital signatures are commonly used in e-mail, electronic financial transactions and other forms of electronic communications to ensure that messages have not been tampered with in transit, and that messages are transferrable. The security of commonly used classical digital signature schemes relies on the computational difficulty of inverting certain mathematical functions. However, at present, there are no such one-way functions which have been proven to be hard to invert. With enough computational resources certain implementations of classical public key cryptosystems can be, and have been, broken with current technology. It is nevertheless possible to construct information-theoretically secure signature schemes, including quantum digital signature schemes. Quantum signature schemes can be made information theoretically secure based on the laws of quantum mechanics, while classical comparable protocols require additional resources such as secret communication and a trusted authority. Early demonstrations of quantum digital signatures required quantum memory, rendering them impractical at present. Our present implementation is based on a protocol that does not require quantum memory. It also uses the new technique of unambiguous quantum state elimination, Here we report experimental results for a test-bed system, recorded with a variety of different operating parameters, along with a discussion of aspects of the system security.

Paper Details

Date Published: 13 October 2014
PDF: 10 pages
Proc. SPIE 9254, Emerging Technologies in Security and Defence II; and Quantum-Physics-based Information Security III, 92540D (13 October 2014); doi: 10.1117/12.2069859
Show Author Affiliations
Robert J. Collins, Heriot-Watt Univ. (United Kingdom)
Ross J. Donaldon, Heriot-Watt Univ (United Kingdom)
Vedran Dunjko, Heriot-Watt Univ. (United Kingdom)
Univ. of Edinburgh (United Kingdom)
Ruđer Bošković Institute (Croatia)
Petros Wallden, Heriot-Watt Univ (United Kingdom)
Patrick J. Clarke, Heriot-Watt Univ (United Kingdom)
Erika Andersson, Heriot-Watt Univ. (United Kingdom)
John Jeffers, Univ. of Strathclyde (United Kingdom)
Gerald S. Buller, Heriot-Watt Univ. (United Kingdom)

Published in SPIE Proceedings Vol. 9254:
Emerging Technologies in Security and Defence II; and Quantum-Physics-based Information Security III
Keith L. Lewis; Mark T. Gruneisen; Miloslav Dusek; Richard C. Hollins; Thomas J. Merlet; John G. Rarity; Alexander Toet, Editor(s)

© SPIE. Terms of Use
Back to Top
Sign in to read the full article
Create a free SPIE account to get access to
premium articles and original research
Forgot your username?