Abstract
We demonstrate high data-rate quantum-noise{protected data encryption through optical fibers using coherent states of light. Specifically, we demonstrate 650Mbps data encryption through a 10Gbps data-bearing, in-line amplified 200km-long line. In our protocol, legitimate users (who share a short secret-key) communicate using an M-ry signal set while an attacker (who does not share the secret-key) is forced to contend with the fundamental and irreducible quantum-measurement noise of coherent states. Implementations of our protocol using both polarization-encoded signal sets as well as polarization-insensitive phase-keyed signal sets are experimentally and theoretically evaluated. Different from the performance criteria of the cryptographic objective of key generation (quantum key generation), the performance criteria of data encryption are established and carefully considered.
- G. S. Vernam. Cipher printing telegraph systems for secret wire and radio telegraphic communications. J. Am. I. Electrical En., 45:109, 1926.Google Scholar
- B. Schneier. Applied Cryptography, 2nd Edition. John Wiley and Sons, Inc., New York, 1996. Google ScholarDigital Library
- J. Daemen and V. Rijmen. The block cipher Rijndael. In J. J. Quisquater and B. Schneier, editors, Smart Card Research and Applications, LNCS 1820, pages 288--296. Springer-Verlag, 2000. Google ScholarDigital Library
- C. H. Bennett and G. Brassard. Quantum cryptography: Public key distribution and coin tossing. In Proceedings of the IEEE International Conference on Computers, Systems, and Signal Processing, Bangalore, India, pages 175--179, 1984.Google Scholar
- A. K. Ekert. Quantum cryptography based on Bell's theorem. Physics Review Letters, 67, 1991.Google Scholar
- N. Gisin, G. Ribordy, W. Tittel, and H. Zbinden. Quantum cryptography. Reviews of Modern Physics, 74:145--195, 2002.Google ScholarCross Ref
- W. Tittel, J. Brendel, H. Zbinden, and N. Gisin. Quantum cryptography using entangled photons in energy-time Bell states. Physics Review Letters, 84, 2000.Google Scholar
- T. Jennewein, C. Simon, G. Weihs, H. Weinfurter, and A. Zeilinger. Quantum cryptography with entangled photons. Physics Review Letters, 84, 2000.Google Scholar
- H. P. Yuen. KCQ: A new approach to quantum cryptography I. General principles and qumode key generation. quant-ph/0311061, 2004.Google Scholar
- G. A. Barbosa, E. Corndorf, P. Kumar, and H. P. Yuen. Secure communication using mesoscopic coherent states. Physics Review Letters, 90:227901, 2003.Google ScholarCross Ref
- E. Corndorf, G. Barbosa, C. Liang, H. P. Yuen, and P. Kumar. High-speed data encryption over 25km of fiber by two-mode coherent-state quantum cryptography. Optics Letters, 28:2040--2042, 2003.Google ScholarCross Ref
- E. Corndorf, G. S. Kanter, C. Liang, and P. Kumar. Quantum-noise protected data encryption for wdm networks. In 2004 Conference on Lasers Electro Optics (CLEO'04) post-deadline, San Francisco, CA, 2004.Google Scholar
- E. Corndorf, G. S. Kanter, C. Liang, and P. Kumar. Data encryption over an inline-amplified 200km-long WDM line using coherent-state quantum cryptography. In Proceedings of the SPIE Defense and Security Symposium, Orlando, FL, April 2004.Google Scholar
- T. M. Cover and J. A. Thomas. Elements of Information Theory. John Wiley and Sons, Inc., New York, 1991. Google ScholarDigital Library
- C. E. Shannon. A mathematical theory of communication. Bell System Technical Journal, 27:379--423 and 623--656, 1948.Google ScholarCross Ref
- C. E. Shannon. Communication theory of secrecy systems. Bell System Technical Journal, 28:656--715, 1949.Google ScholarCross Ref
- J. L. Massey. An introduction to contemporary cryptology. Proceedings of the IEEE, 76(5):533--549, 1988.Google ScholarCross Ref
- T. Nishioka, T. Hasegawa, H. Ishizuka, K. Imafuku, and H. Imai. How much security does Y-00 protocol provide us? Physics Letters A, 327:28--32, 2004.Google ScholarCross Ref
- P. Kumar H. P. Yuen and E. Corndorf. Security of Y-00 and similar quantum cryptographic protocols. quant-ph/0407067, submitted to Phy. Lett. A, 2004.Google Scholar
- G. A. Barbosa. Fast and secure key distribution using mesoscopic coherent states of light. Physics Review A, 68:052307, 2003.Google ScholarCross Ref
Index Terms
- Quantum-noise: protected data encryption for WDM fiber-optic networks
Recommendations
Bit-oriented quantum public-key encryption based on quantum perfect encryption
A bit-oriented quantum public-key encryption scheme is presented. We use Boolean functions as private-key and randomly changed pairs of quantum state and classical string as public-keys. Following the concept of quantum perfect encryption, we prepare ...
Universal quantum encryption for quantum signature using the swap test
We suggest a universal quantum encryption scheme suitable for use in quantum signature. The verifier in a variety of quantum signature protocols usually checks for the falsification of the quantum signature state pair by using a swap test. However, ...
Symmetric quantum fully homomorphic encryption with perfect security
Suppose some data have been encrypted, can you compute with the data without decrypting them? This problem has been studied as homomorphic encryption and blind computing. We consider this problem in the context of quantum information processing, and ...
Comments