• Open Access

Agile and Versatile Quantum Communication: Signatures and Secrets

Stefan Richter, Matthew Thornton, Imran Khan, Hannah Scott, Kevin Jaksch, Ulrich Vogl, Birgit Stiller, Gerd Leuchs, Christoph Marquardt, and Natalia Korolkova
Phys. Rev. X 11, 011038 – Published 24 February 2021
PDFHTMLExport Citation

Abstract

Agile cryptography allows for a resource-efficient swap of a cryptographic core in case the security of an underlying classical cryptographic algorithm becomes compromised. Conversely, versatile cryptography allows the user to switch the cryptographic task without requiring any knowledge of its inner workings. In this paper, we suggest how these related principles can be applied to the field of quantum cryptography by explicitly demonstrating two quantum cryptographic protocols, quantum digital signatures (QDS) and quantum secret sharing (QSS), on the same hardware sender and receiver platform. Crucially, the protocols differ only in their classical postprocessing. The system is also suitable for quantum key distribution (QKD) and is highly compatible with deployed telecommunication infrastructures, since it uses standard quadrature phase-shift keying encoding and heterodyne detection. For the first time, QDS protocols are modified to allow for postselection at the receiver, enhancing protocol performance. The cryptographic primitives QDS and QSS are inherently multipartite, and we prove that they are secure not only when a player internal to the task is dishonest, but also when (external) eavesdropping on the quantum channel is allowed. In our first proof-of-principle demonstration of an agile and versatile quantum communication system, the quantum states are distributed at GHz rates. A 1-bit message may be securely signed using our QDS protocols in less than 0.05 ms over a 2-km fiber link and in less than 0.2 s over a 20-km fiber link. To our knowledge, this also marks the first demonstration of a continuous-variable direct QSS protocol.

  • Figure
  • Figure
  • Figure
  • Figure
  • Figure
  • Figure
  • Figure
1 More
  • Received 27 January 2020
  • Revised 24 November 2020
  • Accepted 18 December 2020
  • Corrected 9 March 2021

DOI:https://doi.org/10.1103/PhysRevX.11.011038

Published by the American Physical Society under the terms of the Creative Commons Attribution 4.0 International license. Further distribution of this work must maintain attribution to the author(s) and the published article’s title, journal citation, and DOI.

Published by the American Physical Society

Physics Subject Headings (PhySH)

Quantum Information, Science & TechnologyInterdisciplinary PhysicsNetworks

Corrections

9 March 2021

Correction: The affiliation indicator for the second author was set incorrectly during production and has been fixed.

Authors & Affiliations

Stefan Richter1,2,*,‡, Matthew Thornton3,†,‡, Imran Khan1,2, Hannah Scott3, Kevin Jaksch1,2, Ulrich Vogl1,2, Birgit Stiller1,2, Gerd Leuchs1,2, Christoph Marquardt1,2, and Natalia Korolkova3

  • 1Max Planck Institute for the Science of Light, Staudtstraße 2, 91058 Erlangen, Germany
  • 2Institute of Optics, Information and Photonics, University of Erlangen-Nuremberg, Staudtstraße 7/B2, Erlangen, Germany
  • 3School of Physics and Astronomy, University of St Andrews, North Haugh, St Andrews KY16 9SS, United Kingdom

  • *stefan.richter@mpl.mpg.de
  • mt45@st-andrews.ac.uk
  • S. R. and M. T. contributed equally to this work.

Popular Summary

Throughout history, cryptography has been threatened by advances in mathematics and computational power. This typically leads to a cat-and-mouse effect as cryptosystems are repeatedly developed, attacked, and then hardened. Redeployment of a cryptosystem in the face of new attacks is a difficult and costly endeavor. But by providing a flexible and opaque middleware between the end user and the cryptographic algorithm, the deployed architecture can stay in place while the vulnerable algorithm is replaced. In our paper, we demonstrate this concept of “cryptographic agility” in a quantum communication setting.

Quantum communication protocols already offer provable security against the most powerful adversaries, but often require bespoke hardware setups. To translate agility to the quantum setting, we propose two related concepts: quantum cryptoagility, in which a cryptographic algorithm may be replaced without affecting the end user; and quantum cryptoversatility, in which multiple cryptographic tasks are performed over the same system. Our design structures allow for quantum-secure networks that can be more easily upgraded if a new attack vector emerges and can automatically pick the most efficient quantum protocol from an available pool to accomplish the selected task.

To illustrate these concepts we investigate three protocols—quantum digital signatures, quantum secret sharing, and quantum key distribution—over the same off-the-shelf hardware. Our digital signatures protocol can securely authenticate a single message in less than 0.05 ms, making it the fastest-ever demonstration of such a protocol.

Key Image

Article Text

Click to Expand

Supplemental Material

Click to Expand

References

Click to Expand
Issue

Vol. 11, Iss. 1 — January - March 2021

Subject Areas
Reuse & Permissions
Author publication services for translation and copyediting assistance advertisement

Authorization Required


×
×

Images

×

Sign up to receive regular email alerts from Physical Review X

Reuse & Permissions

It is not necessary to obtain permission to reuse this article or its components as it is available under the terms of the Creative Commons Attribution 4.0 International license. This license permits unrestricted use, distribution, and reproduction in any medium, provided attribution to the author(s) and the published article's title, journal citation, and DOI are maintained. Please note that some figures may have been included with permission from other third parties. It is your responsibility to obtain the proper permission from the rights holder directly for these figures.

×

Log In

Cancel
×

Search


Article Lookup

Paste a citation or DOI

Enter a citation
×