2016
DOI: 10.1103/physrevlett.117.100503
|View full text |Cite
|
Sign up to set email alerts
|

Free-Space Quantum Signatures Using Heterodyne Measurements

Abstract: Digital signatures guarantee the authorship of electronic communications. Currently used "classical" signature schemes rely on unproven computational assumptions for security, while quantum signatures rely only on the laws of quantum mechanics to sign a classical message. Previous quantum signature schemes have used unambiguous quantum measurements. Such measurements, however, sometimes give no result, reducing the efficiency of the protocol. Here, we instead use heterodyne detection, which always gives a resu… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
53
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
5
2
1

Relationship

2
6

Authors

Journals

citations
Cited by 63 publications
(54 citation statements)
references
References 33 publications
1
53
0
Order By: Relevance
“…Hence, except with probability ε , the protocol will not abort unnecessarily and dishonest parties will not be able to forge, repudiate, or create non-transferable messages. Successful operation has been shown over a combination of installed optical fiber and additional channel loss corresponding to 134.2 ± 3.8 km of installed optical fiber at two security levels, ε  = 10 −4 , as used in many previous demonstrations of QDS 11, 14, 16, 17 and ε  = 10 −10 , as commonly used in QKD systems. The performance of this system is enhanced compared to that reported previously over 90 km of installed optical fiber 20 in that it can now sign approximately 5 bits per second at 90 km for an ε of 10 −4 , as opposed to 2 bits per second previously, and 2 bits per second at an ε of 10 −10 , as opposed to 1.…”
Section: Resultsmentioning
confidence: 96%
See 1 more Smart Citation
“…Hence, except with probability ε , the protocol will not abort unnecessarily and dishonest parties will not be able to forge, repudiate, or create non-transferable messages. Successful operation has been shown over a combination of installed optical fiber and additional channel loss corresponding to 134.2 ± 3.8 km of installed optical fiber at two security levels, ε  = 10 −4 , as used in many previous demonstrations of QDS 11, 14, 16, 17 and ε  = 10 −10 , as commonly used in QKD systems. The performance of this system is enhanced compared to that reported previously over 90 km of installed optical fiber 20 in that it can now sign approximately 5 bits per second at 90 km for an ε of 10 −4 , as opposed to 2 bits per second previously, and 2 bits per second at an ε of 10 −10 , as opposed to 1.…”
Section: Resultsmentioning
confidence: 96%
“…An experimental demonstration 16 using a variation of this scheme was able to successfully transmit signatures over 2 km of optical fiber in a laboratory environment. The first demonstration of QDS over a free-space link was conducted over 1.6 km in an urban environment 17 using a continuous-variable free-space QKD implementation 18, 19 as the underlying system. The first experimental demonstration of QDS over installed optical fiber 20 was only conducted over one optical fiber transmission channel at a fixed distance of 90 km.…”
Section: Introductionmentioning
confidence: 99%
“…For example, if Bob measures b ∈ C with Re (b) > 0 and Im (b) > 0 then he will "eliminate" states | − α and | − iα since these are the least likely of Alice's sent states to generate this outcome. Recipients Bob and Charlie each now possess an "eliminated signature" [7,8,11] of length L containing a record of which states were eliminated at each position in the sequence. Since measurements are performed immediately on receipt of the states, no quantum memory is required [7].…”
Section: Protocol Descriptionmentioning
confidence: 99%
“…The protocol fails if it allows a forging or repudiation attack, or if it aborts even when all parties are honest. The proofs of robustness and security against repudiation from [11] can be directly applied to our new protocol. For completeness we reproduce the key results in Eqs.…”
Section: Security Proof and Attack Analysismentioning
confidence: 99%
“…More recently, this passive state preparation scheme has been extended to measurement-device-independent CV QKD [23]. It could also be applied in other CV quantum communication protocols, such as quantum secret sharing [24] and quantum digital signature [25].…”
Section: Introductionmentioning
confidence: 99%