2017
DOI: 10.1103/physreva.95.042338
|View full text |Cite
|
Sign up to set email alerts
|

Experimental measurement-device-independent quantum digital signatures over a metropolitan network

Abstract: Quantum digital signatures (QDS) provide a means for signing electronic communications with informationtheoretic security. However, all previous demonstrations of quantum digital signatures assume trusted measurement devices. This renders them vulnerable against detector side-channel attacks, just like quantum key distribution. Here, we exploit a measurement-device-independent (MDI) quantum network, over a 200square-kilometer metropolitan area, to perform a field test of a three-party measurement-device-indepe… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
21
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
6
2
1

Relationship

1
8

Authors

Journals

citations
Cited by 62 publications
(22 citation statements)
references
References 28 publications
0
21
0
Order By: Relevance
“…This brings QDS in par with QKD in terms of practicality. Finally, MDI-QDS protocols, addressing measurement-device side-channel attacks, have been implemented over a metropolitan network [757] and at high rates by using a laser seeding technique together with a novel treatment of the finite-size effects [758].…”
Section: Proof-of-principlementioning
confidence: 99%
“…This brings QDS in par with QKD in terms of practicality. Finally, MDI-QDS protocols, addressing measurement-device side-channel attacks, have been implemented over a metropolitan network [757] and at high rates by using a laser seeding technique together with a novel treatment of the finite-size effects [758].…”
Section: Proof-of-principlementioning
confidence: 99%
“…In the last two decades, discrete-variable (DV) QDS protocols have first lifted this requirement [8][9][10][11] and then also have lifted the need for a trusted quantum channel [2,12], and have brought their hardware requirements closer to those of QKD [13]. Recently, DV QDS implementations based on deployed networks have been demonstrated successfully over metropolitan distances [14][15][16][17]. Indeed, in several QDS papers, a nascent form of quantum agility is mentioned, either explicity [14,16,18] or implicitly [15,17], but so far the comparison has always been that the distribution of quantum states for QDS is analogous-or in some cases identical-to that required for QKD.…”
Section: The Qds-b Protocolmentioning
confidence: 99%
“…Recently, DV QDS implementations based on deployed networks have been demonstrated successfully over metropolitan distances [14][15][16][17]. Indeed, in several QDS papers, a nascent form of quantum agility is mentioned, either explicity [14,16,18] or implicitly [15,17], but so far the comparison has always been that the distribution of quantum states for QDS is analogous-or in some cases identical-to that required for QKD. For example, Ref.…”
Section: The Qds-b Protocolmentioning
confidence: 99%
“…Fortunately, all security loopholes on the detection side are closed by measurement-device-independent QKD (MDIQKD) [8], which introduces an untrusted third party, Charlie, to perform two-photon Bell-state measurement in the intermediate node. Thus far, MDIQKD has made many theoretical and experimental breakthroughs [9][10][11][12][13][14][15][16][17][18][19][20][21][22][23][24].…”
Section: Introductionmentioning
confidence: 99%