[go: up one dir, main page]

WO1994008409A1 - Quantum cryptography using discarded data - Google Patents

Quantum cryptography using discarded data Download PDF

Info

Publication number
WO1994008409A1
WO1994008409A1 PCT/GB1993/002075 GB9302075W WO9408409A1 WO 1994008409 A1 WO1994008409 A1 WO 1994008409A1 GB 9302075 W GB9302075 W GB 9302075W WO 9408409 A1 WO9408409 A1 WO 9408409A1
Authority
WO
WIPO (PCT)
Prior art keywords
spin
alphabets
transmitter
data
eavesdropper
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/GB1993/002075
Other languages
French (fr)
Inventor
Simon James Daniel Phoenix
Stephen Mark Barnett
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
British Telecommunications PLC
University of Strathclyde
Original Assignee
British Telecommunications PLC
University of Strathclyde
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by British Telecommunications PLC, University of Strathclyde filed Critical British Telecommunications PLC
Priority to AU51523/93A priority Critical patent/AU5152393A/en
Publication of WO1994008409A1 publication Critical patent/WO1994008409A1/en
Priority to EP94925579A priority patent/EP0717897B1/en
Priority to ES94925578T priority patent/ES2128579T3/en
Priority to KR1019960701243A priority patent/KR960705433A/en
Priority to ES94925577T priority patent/ES2126143T3/en
Priority to EP94925578A priority patent/EP0717896B1/en
Priority to DE69408152T priority patent/DE69408152T2/en
Priority to DE69415815T priority patent/DE69415815T2/en
Priority to CA002169746A priority patent/CA2169746C/en
Priority to JP50854195A priority patent/JP3645261B2/en
Priority to US08/612,880 priority patent/US5850441A/en
Priority to AU75441/94A priority patent/AU691197B2/en
Priority to CA002169552A priority patent/CA2169552C/en
Priority to DE69414864T priority patent/DE69414864T2/en
Priority to PCT/GB1994/001952 priority patent/WO1995007582A1/en
Priority to CA002169553A priority patent/CA2169553C/en
Priority to HK98109334A priority patent/HK1008766A1/en
Priority to KR1019960701188A priority patent/KR960705431A/en
Priority to JP50854295A priority patent/JP3756948B2/en
Priority to US08/617,848 priority patent/US5757912A/en
Priority to PCT/GB1994/001954 priority patent/WO1995007584A1/en
Priority to JP7508543A priority patent/JP2951408B2/en
Priority to EP94925580A priority patent/EP0739559B1/en
Priority to DE69432482T priority patent/DE69432482T2/en
Priority to PCT/GB1994/001953 priority patent/WO1995007583A1/en
Priority to AU75439/94A priority patent/AU693109B2/en
Priority to CA002168851A priority patent/CA2168851C/en
Priority to PCT/GB1994/001955 priority patent/WO1995007585A1/en
Priority to ES94925579T priority patent/ES2111950T3/en
Priority to EP94925577A priority patent/EP0717895B1/en
Priority to AU75440/94A priority patent/AU678049B2/en
Priority to AU75438/94A priority patent/AU678848B2/en
Priority to KR1019960701242A priority patent/KR960705432A/en
Priority to US08/612,881 priority patent/US5764765A/en
Priority to JP50854495A priority patent/JP3734830B2/en
Anticipated expiration legal-status Critical
Priority to KR1019960701187A priority patent/KR960705430A/en
Ceased legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0852Quantum cryptography
    • H04L9/0858Details about key distillation or coding, e.g. reconciliation, error correction, privacy amplification, polarisation coding or phase coding

Definitions

  • the present invention relates to a system for A communicating data using cryptographic techniques.
  • a method of operating a communication system using single-channel quantum cryptography includes the steps of:
  • step (b) randomly selecting at the receiver one of the different quantum mechanical operators and using that operator in detecting the signal transmitted in step (a) ;
  • step (e) comparing the signals transmitted and received in steps (a) and (b) to detect any discrepancy resulting from the presence of an eavesdropper; and, (f) in the event that in step (e) no eavesdropper is detected using at least some of the data transmitted in steps (a) and (b) as a key for encryption/decryption of subsequent transmissions.
  • a method of operating a communication system using single-channel quantum cryptography is characterised by analysing data determined to have been transmitted and detected using different operators at the transmitter and receiver and comparing the expected and measured relationship between the data transmitted and received to detect whether an eavesdropper is present .
  • quantum cryptography involves communication between the transmitter and receiver to determine which transmitted and detected bits were transmitted and received using the same quantum operators.
  • the transmitter randomly selects between alphabets formed from different linear polarization states or different rotational polarization states.
  • the transmitter and receiver then subsequently communicate to determine which signals were both encoded and decoded as different linear states and which were both encoded and decoded as different circular polarization states. Hitherto solely these signals have been used for the transmission of useful data and also for the detection of any eavesdropper.
  • the method may include the steps of both comparing the statistics of the transmitted and received rejected data to determine whether any eavesdropper has detected the communicated signal using a different quantum alphabet to those used by the transmitter and receiver; and also subsequently testing at least a sample of the other data to determine whether any eavesdropper has detected the communicated signal using a coding alphabet used by the transmitter and receiver.
  • the transmitter encodes data using a selected one of three or more different coding alphabets, the three or more coding alphabets having symbols which are eigenstates of mutually non-commuting operators, and the detector detecting signals using at least two of the alphabets.
  • the transmitter encodes the signals using one of spin-z, spin-7r/3 and spin-27r/3 alphabets and the receiver decodes the signal using at least two of the three transmitted alphabets.
  • separate tests are preferably carried out on discarded data encoded with the z, ⁇ /3 alphabets, the z, 27r/3 alphabets and ⁇ /3, 2 ⁇ /3 alphabets at the transmitter and receiver.
  • the receiver need only measure in two of the transmitted alphabets to achieve protection against eavesdropping. However, at least one of the users Alice and Bob need to use at least 3 alphabets for a rejected-data protocol to work.
  • a communication system comprising a single photon source and a single photon detector arranged to be connected to a communications channel, means for encoding a single photon signal from the single photon source using non-commuting quantum mechanical operators, means for detecting using non-commuting quantum mechanical operators a single photon signal received over the communications channel, and processing means for comparing the states of single photon signals as encoded and detected, thereby detecting the presence of any eavesdropper, characterised in that the processing means include means for analysing data determined to have been encoded and decoded using different operators and comparing the expected and measured relationship between the data encoded and detected to detect any eavesdropper.
  • Figure 1 is a diagram illustrating the mapping of an operator onto three orthogonal spin directions
  • Figure 2 is a diagram illustrating the transmission paths between users of the communication system and an eavesdropper
  • Figure 3 is a diagram illustrating different probability pathways for data encoded and decoded using a common operator in the presence of an eavesdropper
  • Figure 4 is a diagram showing probability pathways for transmissions in a system in accordance with the present invention with an eavesdropper re-transmitting in an intermediate alphabet
  • Figure 5 is a block diagram showing the layout of an example of a communication system in accordance with this invention
  • Figure 6 is an example of a single-photon source
  • Figure 7 shows a network used in implementing the invention.
  • Figures 8a and 8b are examples of polarisation modulators in a transmitter and receiver respectively for use in the network of Figure 7.
  • FIG. 5 shows a system suitable for implementing the quantum cryptography technique of the present invention.
  • a transmitter 1 transmits encrypted data over a channel 2 to a receiver 3.
  • the receiver and transmitter are also in communication via a second channel 4.
  • the encrypted channel is carried optically on a passive optical fibre network. It will be understood however that the present invention is by no means limited in applicability to optical networks, but may be used with other communication channels such as, for example, radio links.
  • the transmitter 1 includes a single photon source 5, the output of which is sent to an encoder filter 6.
  • the encoder filter 6 uses an electro-optic polarisation modulator to alter the states of polarization of single photons.
  • the modulator is a Mach- Zehnder interferometer with a phase modulator in one arm, switching at, say, 10 MHz.
  • the photon source 5 and encoder filter 6 are controlled by a first microprocessor 7.
  • FIG. 6 shows in further detail the photon source 5 used in this example.
  • a laser 51 which may be, e.g. a Ti .-Sapphire at 750 nm, is used to pump a nonlinear crystal 52, e.g. KDP.
  • the parametric downconversion effected by the crystal produces correlated twin beams of photons at 1.5 ⁇ m.
  • the photons in one beam are detected by a photodetector 53 and this triggers a gate 54 which opens a shutter to let through a single photon.
  • the receiver 3 employs a complementary architecture with the incoming optical signal being received via a decoder filter 8 at a photon detector 9.
  • the output of the photon detector 9 is fed to a second microprocessor 10 which also controls the decoder filter 8.
  • the decoder filter may be formed from an electro-optic polarisation modulator. Data is also transmitted between the microprocessors in the transmitter and receiver via the second channel 4.
  • the encoder and decoder filters are controlled by their respective microprocessors to encode or decode photons in different linear polarization states or different rotational polarization states.
  • Each microprocessor contains a record of which states have been encoded or measured for each bit which is transmitted. This information is exchanged via the public channel 4. Using this information the statistics of the received data are calculated and compared with the expected data. On the basis of this comparison it is determined whether there is any eavesdropper intercepting the data communicated on the encrypted channel 2.
  • Figure 5 shows only a single transmitter/receiver pair, in practice the present invention may be employed in systems using multiple-access networks, for example employing ring, star or tree topologies, as described and claimed in the present applicant's co-pending European Patent application no. 93307120.1, incorporated herein by reference.
  • Figure 7 shows a specific example of a broadcast network containing two receivers and a transmitter.
  • the transmitter 1 consists of a gain-switched semiconductor laser 79, which may be a DFB or Fabry-Perot device, an attenuator or intensity modulator 77, and a polarisation modulator 78 and control electronics 70.
  • the single-photon detectors in the receivers may be avalanche photodiodes (APDs) biased beyond breakdown and operating in the Geiger mode with passive quenching, as discussed in P. D. Townsend, J. G. Rarity and P. R. Tapster, Electronics Letters, 29, 634 (1993) .
  • Silicon APDs such as the SPCM- 100-PQ (GE Canada Electro Optics) can be used in the 400- 1060 nm wavelength range, while Germanium or InGaAs devices such as the NDL5102P or NDL5500P (NEC) can be used in 1000- 1550 nm range.
  • APD's are the preferred form of detector, the present invention is not limited to the use of APD's.
  • Each receiver 3 includes a microprocessor control unit 72, which receives the output of the APD via a discriminator/amplifier circuit 73.
  • the control unit 72 also controls an electronic filter 74 and local oscillator 75, as well as the APD bias supply 76.
  • the electronic filter 74 isolates the first harmonic of the frequency spectrum of the signal output by the APD in response to synchronising pulses received via the network. This generates a sinusoidal signal at the pulse frequency which locks the local oscillator 75.
  • the output of the local oscillator 75 is received at the control unit 72 to provide a timing reference during quantum transmissions.
  • the key distribution process is initiated by the transmitter sending a stream of timing pulses into the network.
  • the attenuator in the transmitter is not engaged at this point, so the pulses contain many photons and are received by both terminals.
  • the receivers set the reverse bias on their detectors to be well-below breakdown so that the internal gain is low.
  • the APDs can detect the multi-photon timing pulses without suffering from saturation.
  • Each APD output signal will contain a frequency component at the fundamental repetition rate of the pulsed source, and this is used to lock the local oscillator in the receiver as described above.
  • the attenuator in the transmitter is engaged so that the output pulses contain on the order of 0.1 photons on average.
  • Steps (a) to (c) of the quantum key distribution protocol are then carried out.
  • the system uses an encoding scheme in which polarisation states are used to establish the sequences of key bits.
  • Figure 7 shows the details of the polarisation modulators in this example.
  • the transmitter modulator is based on a 6-into-l optical switch that is switched randomly so that for each pulse one of the six possible polarisation states is coupled into the network.
  • the optical switch could be based on one or more electro-optic devices (e.g.
  • United Technology lithium niobate Y-switch "YBBM”) and the 6x1 coupler could be a fused fibre device (e.g. Sifa Fibre Optics P4S13C) .
  • the polarisation modulators in the receivers are similar in design. However, here the different polarisation channels contain fibre delays of differing lengths. This allows a single APD to be used at the output, with polarisation state identification performed by means of the time (within the laser period) at which the photo-count occurs.
  • a similar detection scheme to this is described in A. Muller, J. Breguet and N. Gisin, Europhysics Letters 1993 (submitted) .
  • the topology of optical fibre path from the control node to the terminals depends on the network architecture.
  • the path may split via a single 1-into-n coupler or some other combination of 1-into-m couplers, where n is the number of terminals on the network and m ⁇ n.
  • the central node After completing the quantum transmission, the central node sequentially polls each of the terminals on the network and carries out steps (d) to (f) of the protocol. In this process the individual photons and their sent and received states are identified by means of the time-slot in which they were detected and transmitted. The statistics of the rejected data for the transmitter and each respective receiver are determined, and compared with an appropriate threshold for detection of any eavesdropper.
  • the central node is in possession of n secret keys, each one shared with a specific termninal on the network. However, each terminal has no knowledge of any other key apart from its own. These keys can now be used to securely encrypt data transmissions between each terminal and the central node.
  • any encrypted data that is broadcast from the transmitter can only be read by the terminal for which it is intended.
  • the terminals can communicate securely with each other via the central node which acts as a secure interpreter.
  • the public discussion stages (steps (d) to (f) ) described above may be carried out over the same network or over a separate and independent communication channel.
  • the number chosen will vary according to the field of use. For a local installation on a single site, the network might comprise only 10 receivers or terminals. By contrast, for a public network several 10's or even a 100 or more receivers might be connected to the network and would receive quantum keys distributed from a single server.
  • the present invention may also be implemented in networks including a looped-back path from the receiver to the transmitter.
  • the transmitter may then, as part of the protocol, carry out comparisons on the states of photons as output from the transmitter and received back at the transmitter on the looped-back path.
  • the receiver may include a modulator for encoding a received photon before returning it on the looped-back path to the transmitter.
  • QUANTUM CRYPTOGRAPHY Quantum cryptography is a technique, for the distribution of key information in such a way that the security of this information can be guaranteed.
  • the technique relies on two crucial elements: the non- commutativity of quantum mechanical operators (that is , AB ⁇ BA) and a protocol designed to take advantage of this physical phenomenon.
  • AB ⁇ BA quantum mechanical operators
  • the Bennett-Brassard (BB, for convenience) quantum key-distribution technique relies on the properties of single photons.
  • One bit of information can be encoded in the linear polarisation (a logical "1" for vertical polarisation and a logical "0" for horizontal polarisation) .
  • one bit of information can be encoded in the circular polarisation (a logical "1” for right circular polarisation and a logical "0” for left circularly polarised photons) .
  • any two-state quantum mechanical system can be described by a spin algebra so that the polarisation variables can be mapped directly onto spin variables.
  • the polarisation states of the photon can, mathematically, be treated as spin variables.
  • a spin (polarisation) operator has two eigenstates "up” and "down” .
  • the spin operator in the direction characterised by ⁇ ⁇ has two eigenstates which we label
  • the spin analogues of the linear and circular polarisation operators are the spin in the z-direction and spin in the x-direction.
  • the advantage of using the spin variables is that, for may purposes, the angle ⁇ can be used to describe an intermediate spin and one can envision the arrow in Figure 1 moving on the surface of a sphere.
  • a similar picture for polarisation, whilst possible, is not as transparent.
  • the spin operators in the x and z directions do not commute. This is purely a quantum mechanical phenomenon and leads to the result that the eigenstates of the spin-z operator can be expressed as linear superpositions of the spin-x operator.
  • the uncertainty principle prevents Bob from trying to measure both spin directions at once, or at least ensures that any results of so doing will be meaningless.
  • the next point to notice is ⁇ that in order to read the data Bob must measure the spin (polarisation) of a single photon and therefore projects the photon state onto an eigenstate of his measured spin. From a physical point of view there is no difference between the action of an eavesdropper and Bob. Any eavesdropper (whom we shall call "Eve”) must perform spin (polarisation) measurements in order to access the information encoded in the photon state. Eve will also collapse the wavefunction onto an eigenstate of her chosen spin operators. Eve must then retransmit the photon onto Bob.
  • Alice and Bob now communicate over a public channel. They select a randomly-chosen, but identical, subset of their transmitted and received data and reject all those for which different spin directions were chosen. In the absence of any eavesdropper Alice and Bob should now have a string of identical bits.
  • Alice and Bob now compare their data for any deviation from this perfect agreement. If any discrepancy is discovered Alice and Bob can now conclude that there has been an attempt at eavesdropping. If their data is in agreement the bits used for the eavesdropping test are discarded and Alice and Bob now consider their remaining data. The bits which were transmitted and received in different directions are discarded as before. The remaining data, free from any interception by an eavesdropper, consists of those bits for which Alice and Bob used the same spin (polarisation) direction and Alice's data should be identical to Bob's. This data, which has not been communicated publicly and has been transmitted over a channel which is known to be eavesdropper-free by virtue of Alice's and Bob's previous comparison, is now shared secret information between Alice and Bob. This secrecy is guaranteed by virtue of the laws of quantum mechanics and the protocol which exploits this. The key cannot even in principle be deduced, except by blind guesswork, and cannot be calculated no matter how powerful the computational facilities available.
  • the above is a description of the protocol developed principally at IBM and it exploits the properties of a single quantum channel.
  • Another technique has been developed which exploits the properties of correlated quantum channels and the statistical test for the eavesdropper is based on the violation of the Bell inequalities. This system has been shown to give equivalent security to that of the BB scheme.
  • the protocol required to exploit these correlated channels is different and does not sacrifice any of the potentially useful key data in the test for the eavesdropper.
  • the present invention relates to single quantum channels and describes a method whereby eavesdropping can be detected on these channels without having to sacrifice any key data.
  • the prior art protocol for single channels rejects approximately half of the data (for alphabets of higher dimensionality this fraction is greater) .
  • the new protocol described below, can be applied to single quantum channels of dimensionality N ⁇ 2 and is a technique for using the "rejected" data to yield information about an eavesdropper.
  • the present invention is based on the realisation that the rejected data can give useful information about the eavesdropper.
  • This realisation has been facilitated by our development of a formalism which treats the quantum states as symbols of an alphabet.
  • the alphabet is taken to be a set of eigenstates of a particular operator.
  • the linear polarisation alphabet consists of two symbols
  • the spin-z operator generates an alphabet of two symbols
  • the channel transition probabilities can then be determined from the a priori probabilities and the overlap integrals between the states of the transmitter and receiver alphabets.
  • the normalized difference between the information flow rates on the interrupted and uninterrupted routes yields a parameter £ which varies between -1 and +1. This parameter determines by how much the eavesdropper disturbs the channel.
  • the BB protocol is designed to exploit the region where £ is negative so that the presence of the eavesdropper reduces the flow of information between Alice and Bob.
  • £ is negative so that the presence of the eavesdropper reduces the flow of information between Alice and Bob.
  • our analysis shows that an eavesdropper can also increase the flow of information, that is £ > 0, and it is this increase of information which can betray the presence of the eavesdropper.
  • Alice and Bob can choose alphabets such that, in the absence of an eavesdropper, there is no flow of information between them.
  • Pathway 3 is a direct link and is not eavesdropped by Eve.
  • Pathway 12 via Eve, is the path along which Alice and Bob will attempt to communicate using their quantum alphabets.
  • Alice and Bob will use the alphabets generated by the spin-x and spin-z operators.
  • Eve will be free to measure in any particular alphabet between these spins characterized by the angle ⁇ .
  • This angle is included because we shall shortly be discussing Eve's optimum strategy and this involves a measurement of the spin at an angle 7r/4, with respect to the spin-z operator ) .
  • the results of Alice transmitting in any of her possible states are summarized in the table below ( Figure 4) .
  • the other important parameter to determine is exactly how much of the data, on average, that Eve is able to determine correctly.
  • Eve will read the symbol "1" 3/4 of the time and this follows through to the other possible transmissions so that Eve's chance of reading the correct bit, per bit, is 3/4.
  • Eve escapes detection, she will still only have approximately 75% of the key correct.
  • Eve can maximise her knowledge of the correct key by measuring in the Breidbart basis ' This alphabet is generated by the spin in a direction oriented by an angle of ⁇ /4 with respect to the spin-z operator.
  • the threshold must be set as the users of the channel feel appropriate as M increases it becomes ever more difficult for Eve to intrude without triggering the alarm. Furthermore, any triggered alarm is much less likely to have been an accident (subject to appropriate thresholding) .
  • Alice and Bob communicate, possibly over a public channel (e.g. telephone) to discuss their data.
  • the consider the rejected data first and subject this to the statistical test described above. This determines whether Eve has attempted to eavesdrop in a different alphabet to that of Alice or Bob. 3. If this data is "eavesdropper-free", according to the level of confidence set by Alice and Bob, they now use part of the standard BB protocol to determine whether an eavesdropping attempt has been made in the alphabets used by Alice and Bob (the standard BB protocol can detect the presence of an eavesdropper using any alphabet, as described above. However, by consideration of the rejected data the eavesdropper cannot use an intermediate alphabet to any advantage) .
  • Alice and Bob now select that data for which Alice used spin-x or spin-z and Bob measured in a different alphabet to that of Alice. This allows the statistical test for interception in an alphabet intermediate to the x or z alphabets. On average 1/3 of the data is used for this purpose. 4. If an eavesdropper has not been detected at this stage Alice and Bob now compare the results when Alice used spin- ⁇ /4 transmissions. Again this uses 1/3 of the data, on average. A statistical test, as described above, will now determine the presence of an eavesdropper who has used the spin-x and/or spin-z alphabets to attempt to intercept the key.
  • An alternative coding scheme offering greater symmetry uses spin-z, spin-7r/3, and spin-27r/3 alphabets. In general this selection of alphabets is to be preferred as giving a greater deviation in the measured statistics in response to Eve's eavesdropping.
  • Bob measures only two alphabets
  • Bob can in fact choose to measure in either two or all three of the transmitted alphabets.
  • the analysis presented above can be trivially generalised to include this situation.
  • the channel transition probabilities, determined by the laws of quantum mechanics, in the absence of an eavesdropper, Eve, are given by the overlap integrals
  • the system mutual information, or the information flow rate between Alice and Bob, is, from standard information theory, given by
  • the protocols we have developed are not limited in applicability to PON's of the type described above, but may be used with any communication channel that is accurately modelled by the formalism we have developed for quantum alphabets. Thus we could envisage making use of single electrons as the carriers of information. Any communication for which the alphabet symbols are quantum states can be examined in the way described here and the quantum cryptographic protocols applied.

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Electromagnetism (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Optical Communication System (AREA)

Abstract

A communication system uses single-channel quantum cryptography for the secure transmission of a key. A transmitter randomly selects one of a number of encryption alphabets corresponding to different non-commutating quantum mechanical operators. The transmitter and receiver then subsequently communicate to establish which of the transmitted signals were encoded and decoded using common operators. The signals which were transmitted and received using different operators, the discarded data, are analysed and the expected and measured statistics compared to determine whether an eavesdropper has intercepted the transmission. In a preferred example, the transmitter selects from three or more different encoding alphabets comprising at least two mutually orthogonal alphabets and one other intermediate alphabet. In this case, separate statistical tests may be applied to the discarded data encoded with the orthogonal alphabets and to the discarded data encoded with the intermediate alphabet.

Description

QUANTUM CRYPTOGRAPHY USING DISCARDED DATA
BACKGROUND TO THE INVENTION
The present invention relates to a system for A communicating data using cryptographic techniques. In
5 particular, it relates to a development of the technique known as quantum cryptography.
There are many situations in which communication between two or more parties needs to be made secure so that any unauthorised party cannot gain access to the 10 transmitted data. Since in general it is not possible to ensure that the physical channel over which the communication takes place is inaccessible to unauthorised parties or "eavesdroppers", protection of sensitive communications is normally achieved by the use of 15 cryptographic techniques. This entails the encipherment of plaintext (the data) and the subsequent decipherment of the ciphertext (the encrypted data) back into plaintext. The encipherment and decipherment in general are determined by some specified algorithm using a key. The algorithm is 20 assumed to be freely available to all users of the channel whether authorised or otherwise. Accordingly the security of the transmission depends upon the key remaining secret and being unknown to any eavesdropper. In the type of system the present invention is concerned with, the key is 25 shared in common between authorised users of the channel. The operation of the system therefore depends upon being able to transmit securely a secret key to the legitimate users of the channel.
It has previously been proposed to use a technique,
30 developed at IBM and elsewhere, known as quantum cryptography, for the distribution of the key in such a way
^ that the security of the key can be guaranteed. This technique which might more appropriately be termed "quantum
; key-distribution" relies on the use of a protocol designed
35 to take account of the non-commutativity of quantum mechanical operators. This property makes it possible to detect the presence of an eavesdropper through a change in the statistics of the data reaching the receiver. The theory underlying this is discussed in further detail below.
There are currently two distinct methods of achieving key security using quantum cryptography. One scheme exploits the properties of correlated quantum channels. The other employs just a single quantum channel. It is to this latter kind of channel that the present invention relates. In general then a method of operating a communication system using single-channel quantum cryptography includes the steps of:
(a) randomly selecting at the transmitter one of a plurality of coding alphabets corresponding to different, non-commutating quantum mechanical operators and encoding a signal for transmission to the receiver using the selected operator;
(b) randomly selecting at the receiver one of the different quantum mechanical operators and using that operator in detecting the signal transmitted in step (a) ;
(c) repeating steps (a) and (b) for each of a multiplicity of subsequent signals;
(d) communicating between the transmitter and the receiver to determine for which of the transmitted signals common operators were selected by the transmitter and receiver;
(e) comparing the signals transmitted and received in steps (a) and (b) to detect any discrepancy resulting from the presence of an eavesdropper; and, (f) in the event that in step (e) no eavesdropper is detected using at least some of the data transmitted in steps (a) and (b) as a key for encryption/decryption of subsequent transmissions.
SUMMARY OF THE INVENTION According to the present invention, a method of operating a communication system using single-channel quantum cryptography is characterised by analysing data determined to have been transmitted and detected using different operators at the transmitter and receiver and comparing the expected and measured relationship between the data transmitted and received to detect whether an eavesdropper is present .
As described in further detail below, quantum cryptography involves communication between the transmitter and receiver to determine which transmitted and detected bits were transmitted and received using the same quantum operators. For example, in the Bennett-Brassard quantum key-distribution technique described in further detail below, the transmitter randomly selects between alphabets formed from different linear polarization states or different rotational polarization states. The transmitter and receiver then subsequently communicate to determine which signals were both encoded and decoded as different linear states and which were both encoded and decoded as different circular polarization states. Hitherto solely these signals have been used for the transmission of useful data and also for the detection of any eavesdropper. Those signals encoded and decoded using different operators, for example a signal encoded in different linear polarization states but detected in terms of different rotational polarization states, have conventionally been "rejected", and such data are termed herein "rejected data". The present inventor has realised that improved security can be obtained by carrying out tests on the "rejected" signals, so as to increase the chance of detecting any eavesdropper while at the same time potentially leaving the un-rejected signals free for the carrying of useful data.
The method may include the steps of both comparing the statistics of the transmitted and received rejected data to determine whether any eavesdropper has detected the communicated signal using a different quantum alphabet to those used by the transmitter and receiver; and also subsequently testing at least a sample of the other data to determine whether any eavesdropper has detected the communicated signal using a coding alphabet used by the transmitter and receiver.
Preferably however testing to detect an eavesdropper is carried out using rejected data only. In this case preferably the transmitter encodes data using a selected one of three or more different coding alphabets, the three or more coding alphabets having symbols which are eigenstates of mutually non-commuting operators, and the detector detecting signals using at least two of the alphabets. Preferably the transmitter encodes the signals using one of spin-z, spin-7r/3 and spin-27r/3 alphabets and the receiver decodes the signal using at least two of the three transmitted alphabets. In this case separate tests are preferably carried out on discarded data encoded with the z, π/3 alphabets, the z, 27r/3 alphabets and π/3, 2π/3 alphabets at the transmitter and receiver. It should be noted that, in accordance with the general theorem of K.J. Blow and S.J.D. Phoenix, J. Mod. Opt., 40 33 (1993), the receiver need only measure in two of the transmitted alphabets to achieve protection against eavesdropping. However, at least one of the users Alice and Bob need to use at least 3 alphabets for a rejected-data protocol to work.
According to a second aspect of the invention there is provided a communication system comprising a single photon source and a single photon detector arranged to be connected to a communications channel, means for encoding a single photon signal from the single photon source using non-commuting quantum mechanical operators, means for detecting using non-commuting quantum mechanical operators a single photon signal received over the communications channel, and processing means for comparing the states of single photon signals as encoded and detected, thereby detecting the presence of any eavesdropper, characterised in that the processing means include means for analysing data determined to have been encoded and decoded using different operators and comparing the expected and measured relationship between the data encoded and detected to detect any eavesdropper. BRIEF DESCRIPTION OF THE DRAWINGS
An example in accordance with the present invention and the theoretical background to the present invention will now be described in further detail with reference to the accompanying drawings, in which:
Figure 1 is a diagram illustrating the mapping of an operator onto three orthogonal spin directions; Figure 2 is a diagram illustrating the transmission paths between users of the communication system and an eavesdropper;
Figure 3 is a diagram illustrating different probability pathways for data encoded and decoded using a common operator in the presence of an eavesdropper;
Figure 4 is a diagram showing probability pathways for transmissions in a system in accordance with the present invention with an eavesdropper re-transmitting in an intermediate alphabet; Figure 5 is a block diagram showing the layout of an example of a communication system in accordance with this invention;
Figure 6 is an example of a single-photon source; Figure 7 shows a network used in implementing the invention; and
Figures 8a and 8b are examples of polarisation modulators in a transmitter and receiver respectively for use in the network of Figure 7.
Figure 5 shows a system suitable for implementing the quantum cryptography technique of the present invention. A transmitter 1 transmits encrypted data over a channel 2 to a receiver 3. The receiver and transmitter are also in communication via a second channel 4. In the present example the encrypted channel is carried optically on a passive optical fibre network. It will be understood however that the present invention is by no means limited in applicability to optical networks, but may be used with other communication channels such as, for example, radio links.
The transmitter 1 includes a single photon source 5, the output of which is sent to an encoder filter 6. The encoder filter 6 uses an electro-optic polarisation modulator to alter the states of polarization of single photons. In the present example, the modulator is a Mach- Zehnder interferometer with a phase modulator in one arm, switching at, say, 10 MHz. The photon source 5 and encoder filter 6 are controlled by a first microprocessor 7.
Figure 6 shows in further detail the photon source 5 used in this example. A laser 51 which may be, e.g. a Ti .-Sapphire at 750 nm, is used to pump a nonlinear crystal 52, e.g. KDP. The parametric downconversion effected by the crystal produces correlated twin beams of photons at 1.5 μm. The photons in one beam are detected by a photodetector 53 and this triggers a gate 54 which opens a shutter to let through a single photon.
The receiver 3 employs a complementary architecture with the incoming optical signal being received via a decoder filter 8 at a photon detector 9. The output of the photon detector 9 is fed to a second microprocessor 10 which also controls the decoder filter 8. As in the transmitter, the decoder filter may be formed from an electro-optic polarisation modulator. Data is also transmitted between the microprocessors in the transmitter and receiver via the second channel 4.
As will be described in further detail below, the encoder and decoder filters are controlled by their respective microprocessors to encode or decode photons in different linear polarization states or different rotational polarization states. Each microprocessor contains a record of which states have been encoded or measured for each bit which is transmitted. This information is exchanged via the public channel 4. Using this information the statistics of the received data are calculated and compared with the expected data. On the basis of this comparison it is determined whether there is any eavesdropper intercepting the data communicated on the encrypted channel 2. Although Figure 5 shows only a single transmitter/receiver pair, in practice the present invention may be employed in systems using multiple-access networks, for example employing ring, star or tree topologies, as described and claimed in the present applicant's co-pending European Patent application no. 93307120.1, incorporated herein by reference. Figure 7 shows a specific example of a broadcast network containing two receivers and a transmitter. The transmitter 1 consists of a gain-switched semiconductor laser 79, which may be a DFB or Fabry-Perot device, an attenuator or intensity modulator 77, and a polarisation modulator 78 and control electronics 70. The single-photon detectors in the receivers may be avalanche photodiodes (APDs) biased beyond breakdown and operating in the Geiger mode with passive quenching, as discussed in P. D. Townsend, J. G. Rarity and P. R. Tapster, Electronics Letters, 29, 634 (1993) . Silicon APDs such as the SPCM- 100-PQ (GE Canada Electro Optics) can be used in the 400- 1060 nm wavelength range, while Germanium or InGaAs devices such as the NDL5102P or NDL5500P (NEC) can be used in 1000- 1550 nm range. Although APD's are the preferred form of detector, the present invention is not limited to the use of APD's. Other detectors having appropriate sensitivity and discrimination at the single-photon level may be used. For example, the detector may use a photomultiplier tube. Each receiver 3 includes a microprocessor control unit 72, which receives the output of the APD via a discriminator/amplifier circuit 73. The control unit 72 also controls an electronic filter 74 and local oscillator 75, as well as the APD bias supply 76. The electronic filter 74 isolates the first harmonic of the frequency spectrum of the signal output by the APD in response to synchronising pulses received via the network. This generates a sinusoidal signal at the pulse frequency which locks the local oscillator 75. The output of the local oscillator 75 is received at the control unit 72 to provide a timing reference during quantum transmissions. The use of multi-photon signals on the transmission medium to calibrate the system prior to or during quantum transmission is described in further detail in our co- pending British patent application no. 9226995.0, filed 24/12/92 entitled Communications System and incorporated herein by reference. This makes it possible to compensate, e.g. for changes in fibre polarisation resulting from environmental effects.
The key distribution process is initiated by the transmitter sending a stream of timing pulses into the network. The attenuator in the transmitter is not engaged at this point, so the pulses contain many photons and are received by both terminals. The receivers set the reverse bias on their detectors to be well-below breakdown so that the internal gain is low. In this mode the APDs can detect the multi-photon timing pulses without suffering from saturation. Each APD output signal will contain a frequency component at the fundamental repetition rate of the pulsed source, and this is used to lock the local oscillator in the receiver as described above. After the synchronisation procedure the attenuator in the transmitter is engaged so that the output pulses contain on the order of 0.1 photons on average. In addition, the APDs in the receivers are biased beyond breakdown so that internal gain is high enough to achieve detection sensitivity at the single-photon level. Steps (a) to (c) of the quantum key distribution protocol are then carried out. In the current example, the system uses an encoding scheme in which polarisation states are used to establish the sequences of key bits. Figure 7 shows the details of the polarisation modulators in this example. The transmitter modulator is based on a 6-into-l optical switch that is switched randomly so that for each pulse one of the six possible polarisation states is coupled into the network. The optical switch could be based on one or more electro-optic devices (e.g. United Technology lithium niobate Y-switch "YBBM") and the 6x1 coupler could be a fused fibre device (e.g. Sifa Fibre Optics P4S13C) . The polarisation modulators in the receivers are similar in design. However, here the different polarisation channels contain fibre delays of differing lengths. This allows a single APD to be used at the output, with polarisation state identification performed by means of the time (within the laser period) at which the photo-count occurs. A similar detection scheme to this is described in A. Muller, J. Breguet and N. Gisin, Europhysics Letters 1993 (submitted) . in the steps (a) to (c) , a sufficient number of single photon pulses need to be transmitted for each receiver to establish the required number of key bits. The topology of optical fibre path from the control node to the terminals depends on the network architecture. For example, the path may split via a single 1-into-n coupler or some other combination of 1-into-m couplers, where n is the number of terminals on the network and m < n. The probability that any given photon arrives at a terminal from the central node is given by the transmission coefficient for that specific path, t=exp - (α.1 + β) , where α. is the fibre loss coefficient per unit length, 1 is the path length and β is the net coupling ratio for the path. The quantum mechanical properties of single photons ensure that a given photon will either be detected at one, and only one, of the terminals or will be lost from the system (α > 0) , and that this process occurs in a totally random and unpredictable way. Consequently, each terminal has no way of predicting whether or not a photon will arrive during a given clock period. Instead, all terminals make measurements as described in step (b) at the clock rate, and for each successful detection of a photon record the alphabet used for he measurement, the actual result of the measurement and the time-slot in which the photon arrived.
After completing the quantum transmission, the central node sequentially polls each of the terminals on the network and carries out steps (d) to (f) of the protocol. In this process the individual photons and their sent and received states are identified by means of the time-slot in which they were detected and transmitted. The statistics of the rejected data for the transmitter and each respective receiver are determined, and compared with an appropriate threshold for detection of any eavesdropper. At the end of this process the central node is in possession of n secret keys, each one shared with a specific termninal on the network. However, each terminal has no knowledge of any other key apart from its own. These keys can now be used to securely encrypt data transmissions between each terminal and the central node. Consequently, any encrypted data that is broadcast from the transmitter can only be read by the terminal for which it is intended. In addition, the terminals can communicate securely with each other via the central node which acts as a secure interpreter. The public discussion stages (steps (d) to (f) ) described above may be carried out over the same network or over a separate and independent communication channel.
Practical quantum channels, suffer from unavoidable background error rates due to detector dark counts, and environmentally-induced fluctuations in the polarisation (or phase) state in the fibre etc. In this case the public discussion phase may contain an additional stage of error correction and so-called "privacy amplification" . This both ensures that the transmitter and receiver end up with identical keys and that any key information leaked to an eavesdropper is an arbitrarily small fraction of one bit. This procedure is outlined in CH. Bennett, F. Bessette, G. Brassard, L. Salvail and J. Smolin: "Experimental Quantum Cryptography", J. Cryptology, 5, 3 (1992) . Although in the example of Figure 7 only two receivers are shown, in practice networks employing greater numbers or receivers will often be used. The number chosen will vary according to the field of use. For a local installation on a single site, the network might comprise only 10 receivers or terminals. By contrast, for a public network several 10's or even a 100 or more receivers might be connected to the network and would receive quantum keys distributed from a single server. The present invention may also be implemented in networks including a looped-back path from the receiver to the transmitter. The transmitter may then, as part of the protocol, carry out comparisons on the states of photons as output from the transmitter and received back at the transmitter on the looped-back path. The receiver may include a modulator for encoding a received photon before returning it on the looped-back path to the transmitter. Systems of this sort are disclosed and claimed in our co- pending European Patent application No. 93307121.9, incorporated herein by reference.
The discussion below sets out in further detail the theory underlying the method of the present invention and relates it to prior art quantum cryptography techniques. QUANTUM CRYPTOGRAPHY Quantum cryptography is a technique, for the distribution of key information in such a way that the security of this information can be guaranteed. The technique relies on two crucial elements: the non- commutativity of quantum mechanical operators (that is , AB ≠ BA) and a protocol designed to take advantage of this physical phenomenon. We describe below the simple system considered originally by Bennett et al.. This system relies on two alphabets with just two symbols each but the concepts can be generalized to include alphabets of arbitrary size. ]
The Bennett-Brassard (BB, for convenience) quantum key-distribution technique relies on the properties of single photons. One bit of information can be encoded in the linear polarisation (a logical "1" for vertical polarisation and a logical "0" for horizontal polarisation) . Similarly one bit of information can be encoded in the circular polarisation (a logical "1" for right circular polarisation and a logical "0" for left circularly polarised photons) . It is well-known that any two-state quantum mechanical system can be described by a spin algebra so that the polarisation variables can be mapped directly onto spin variables. The polarisation states of the photon can, mathematically, be treated as spin variables. A spin (polarisation) operator has two eigenstates "up" and "down" . Thus with reference to Figure 1, we can say that the spin operator in the direction characterised by θ , φ has two eigenstates which we label
I + >β φ for the "up" state and | - >θ φ for the "down" state. The spin analogues of the linear and circular polarisation operators are the spin in the z-direction and spin in the x-direction. The advantage of using the spin variables is that, for may purposes, the angle θ can be used to describe an intermediate spin and one can envision the arrow in Figure 1 moving on the surface of a sphere. A similar picture for polarisation, whilst possible, is not as transparent. The spin operators in the x and z directions do not commute. This is purely a quantum mechanical phenomenon and leads to the result that the eigenstates of the spin-z operator can be expressed as linear superpositions of the spin-x operator. (This is a standard quantum mechanical result described in all good textbooks of quantum mechanics) . If a photon is transmitted in the | + >2 state so that a logical "1" is sent and the receiver chooses to measure the spin-x variable the probability that the receiver reads a logical "1" also is just the modulus of the overlap squared, |x<+|+>z| • This simple result has far-reaching consequences and results in the possibility of secure key distribution. Implicit in this result is the possibility that by measuring the spin-x variable the receiver can read a logical "0" when a logical "1" was transmitted. In this discussion we shall adopt the terminology that "Alice" is the transmitter and "Bob" is the receiver. Let us now suppose that Bob, the receiver, has in fact tried to measure the spin-x operator when Alice has transmitted the bit of information encoded on the eigenstates of the spin-z operator and has read a logical "0", that is, he has measured the spin-x component and found it to be in the spin "down" eigenstate. We shall assume that Alice was in fact trying to convey a logical "1" to Bob, in which case she actually sent the state | + >z. If Bob does not communicate in some other way with Alice he has no way of knowing that his result is incorrect. As far as Bob can determine Alice transmitted the state | - >x. Bob has, therefore, irretrievably corrupted the data encoded by Alice. The uncertainty principle prevents Bob from trying to measure both spin directions at once, or at least ensures that any results of so doing will be meaningless. The next point to notice is ■ that in order to read the data Bob must measure the spin (polarisation) of a single photon and therefore projects the photon state onto an eigenstate of his measured spin. From a physical point of view there is no difference between the action of an eavesdropper and Bob. Any eavesdropper (whom we shall call "Eve") must perform spin (polarisation) measurements in order to access the information encoded in the photon state. Eve will also collapse the wavefunction onto an eigenstate of her chosen spin operators. Eve must then retransmit the photon onto Bob. The crucial point is this: if Eve has measured a different spin to that used by Alice in transmission then Eve will transmit an eigenstate of her operator (different to that of Alice) on to Bob. Bob has then only a probability less than one of reading the correct logical symbol even if he measures the same spin operator that Alice used. Now if Alice and Bob have used the same spin operator they would expect to agree on their message, that is, if Alice transmits a "1" then Bob will expect to read a "1" with unit probability. However, if Eve has attempted to intervene then she may have tried to measure in the incorrect spin direction and the subsequent wavefunction collapse onto an eigenstate of this operator will result in Alice and Bob having the same logical symbol with a probability of less than unity. In effect by measuring in the wrong direction Eve "scrambles" the data in the correct direction. It is the possibility, in quantum mechanics, of using non-commuting operators to transmit information which leads to this unavoidable disturbance by the eavesdropper. We now describe the protocol, developed by Bennett et al., which makes use of this quantum mechanical non- commutativity of the operators associated with physical observables.
1. Alice randomly selects one of the four states | ± >z and I ± >χ to transmit to Bob. She makes a record of which state she transmits. 2. Bob randomly selects which spin (polarisation) direction to measure and makes a record of the result.
3. Alice and Bob now communicate over a public channel. They select a randomly-chosen, but identical, subset of their transmitted and received data and reject all those for which different spin directions were chosen. In the absence of any eavesdropper Alice and Bob should now have a string of identical bits.
4. Alice and Bob now compare their data for any deviation from this perfect agreement. If any discrepancy is discovered Alice and Bob can now conclude that there has been an attempt at eavesdropping. If their data is in agreement the bits used for the eavesdropping test are discarded and Alice and Bob now consider their remaining data. The bits which were transmitted and received in different directions are discarded as before. The remaining data, free from any interception by an eavesdropper, consists of those bits for which Alice and Bob used the same spin (polarisation) direction and Alice's data should be identical to Bob's. This data, which has not been communicated publicly and has been transmitted over a channel which is known to be eavesdropper-free by virtue of Alice's and Bob's previous comparison, is now shared secret information between Alice and Bob. This secrecy is guaranteed by virtue of the laws of quantum mechanics and the protocol which exploits this. The key cannot even in principle be deduced, except by blind guesswork, and cannot be calculated no matter how powerful the computational facilities available.
The above is a description of the protocol developed principally at IBM and it exploits the properties of a single quantum channel. Another technique has been developed which exploits the properties of correlated quantum channels and the statistical test for the eavesdropper is based on the violation of the Bell inequalities. This system has been shown to give equivalent security to that of the BB scheme. However, the protocol required to exploit these correlated channels is different and does not sacrifice any of the potentially useful key data in the test for the eavesdropper. The present invention relates to single quantum channels and describes a method whereby eavesdropping can be detected on these channels without having to sacrifice any key data. The prior art protocol for single channels (the BB protocol) rejects approximately half of the data (for alphabets of higher dimensionality this fraction is greater) . The new protocol, described below, can be applied to single quantum channels of dimensionality N ≥ 2 and is a technique for using the "rejected" data to yield information about an eavesdropper.
The present invention is based on the realisation that the rejected data can give useful information about the eavesdropper. This realisation has been facilitated by our development of a formalism which treats the quantum states as symbols of an alphabet. The alphabet is taken to be a set of eigenstates of a particular operator. In terms of the photon polarisation variables the linear polarisation alphabet consists of two symbols | horizontal > and | vertical > . In terms of the spin variables the spin-z operator generates an alphabet of two symbols | ± >z. The channel transition probabilities can then be determined from the a priori probabilities and the overlap integrals between the states of the transmitter and receiver alphabets. The normalized difference between the information flow rates on the interrupted and uninterrupted routes yields a parameter £ which varies between -1 and +1. This parameter determines by how much the eavesdropper disturbs the channel. The BB protocol is designed to exploit the region where £ is negative so that the presence of the eavesdropper reduces the flow of information between Alice and Bob. However, our analysis shows that an eavesdropper can also increase the flow of information, that is £ > 0, and it is this increase of information which can betray the presence of the eavesdropper. In the extreme case, which we will describe later, Alice and Bob can choose alphabets such that, in the absence of an eavesdropper, there is no flow of information between them. Any attempt to eavesdrop this channel will result in the creation of an information flow between Alice and Bob which can be detected. We describe below the additional protocol necessary to exploit the positive i- region. Essentially the rejected data can be used because the eavesdropper will introduce a deviation from the expected statistics of this data. This deviation is an unavoidable consequence of the attempt to eavesdrop. Once again the laws of physics conspire to foil the hapless intruder.
The Bennet -Brassard Protocol
Much of the following discussion will relate to Figure 2 in which we schematically depict Alice and Bob connected by two communication paths. Pathway 3 is a direct link and is not eavesdropped by Eve. Pathway 12, via Eve, is the path along which Alice and Bob will attempt to communicate using their quantum alphabets. Alice and Bob will use the alphabets generated by the spin-x and spin-z operators. Eve will be free to measure in any particular alphabet between these spins characterized by the angle θ . (This angle is included because we shall shortly be discussing Eve's optimum strategy and this involves a measurement of the spin at an angle 7r/4, with respect to the spin-z operator ) . The results of Alice transmitting in any of her possible states are summarized in the table below (Figure 4) . Let us follow through some of the possible transmissions and results by way of example. Suppose that Alice's random choice has resulted in a transmission of the state I + >2 which is, of course equivalent to a logical "1". Eve attempts to determine this bit by measurement of spin in the x-direction. The rules of quantum mechanics tell us that in Eve's alphabet the transmitted state is expanded as follows
Figure imgf000019_0001
:D
Again following the rules of quantum mechanics if Eve measures the x-direction spin (polarisation) then she will find the photon in the state | + >χ with probability of 1/2 and in the state | - >χ also with a probability of 1/2. Eve has no way of knowing, at this stage, that she has measured the incorrect alphabet. Let us suppose that she reads the symbol "1" and retransmits this to Bob as the state I + >χ. We shall assume that Bob has randomly chosen to measure the spin-z variable. He will obtain the result "1" with probability of 1/2, thereby believing that the state I + >z has been transmitted. However, he will obtain the result | - >z and therefore read the symbol "0" with probability of 1/2. If Alice and Bob now communicate and discover that they have used the same alphabet they would expect that they have the same symbol, that is "1". However, Eve's intervention means that there is a finite probability, per bit, that Alice and Bob will disagree even when they choose the same alphabets. The probability pathway if Alice sends "1" in the z-direction, and Alice and Bob have rejected the data for which they used different alphabets, is shown in Figure 3. The probability that Alice and Bob agree, and therefore also the probability that Eve escapes detection per bit, is just 3/4. If Eve had not been trying to eavesdrop then Alice and Bob would agree with unit probability. A similar analysis for the other possible states that Alice could transmit yields the same error probability for Alice and Bob. Therefore, if Eve is attempting to eavesdrop using the alphabets employed by Alice and Bob she has a 3/4 chance, per bit, of escaping detection. If Alice and Bob compare N bits of data Eve's chances of escaping detection are just (3/4) , which becomes extremely small as N increases (a probability of escaping detection of approximately 0.06 if only 10 bits of data are compared - but in practice many bits would be compared and this probability of escaping detection becomes approximately 3.2x10" , that is, about 3 chances in 10 trillion of escaping detection, if 100 bits are compared) .
The other important parameter to determine is exactly how much of the data, on average, that Eve is able to determine correctly. Thus in the previous example Eve will read the symbol "1" 3/4 of the time and this follows through to the other possible transmissions so that Eve's chance of reading the correct bit, per bit, is 3/4. Thus, in the almost inconceivable event that Eve escapes detection, she will still only have approximately 75% of the key correct. Eve can maximise her knowledge of the correct key by measuring in the Breidbart basis ' This alphabet is generated by the spin in a direction oriented by an angle of π/4 with respect to the spin-z operator. Referring to the tables we find that Eve's best strategy is to measure this alphabet and retransmit symbols in this alphabet so that after calculation of the relevant probability pathways as before it is found that Eve's probability of escaping detection is still just 3/4 per bit. However, her chances of obtaining the correct bit are now increased to
—11+— I ~ 0.85
that is Eve can determine, at least in a statistical sense, approximately 85% of the key. Eve's optimum strategy, with this protocol, is to measure the alphabet associated with this Breidbart bases. The present invention, using the protocol described below is a development of the BB protocol which reduces the effectiveness of an attack in the Breidbart basis by examination of the rejected data rather than examination of a subset of useful data. Rejected Data Protocol f6]
We shall describe how the new protocol of this embodiment of the present invention can be implemented to give extra security within the N = 2 alphabet that we have already discussed above. It is important to note that although we shall employ a specific example the method is, in its broad essentials, valid for any size of alphabet. Firstly let us consider Alice's and Bob's results in the absence of Eve, the eavesdropper. This is achieved in the table of probabilities by setting θ = 0 for the spin-z transmissions of Alice and θ = ττ/2 for the spin-x transmissions. We shall now consider those results for which Alice and Bob used a different alphabet. Suppose Alice sends the state | + >z, that is, a logical "1". Bob, by assumption is measuring in the spin-x direction (that is, in the direction different to that of Eve) and he will obtain the result "1" half of the time, on average, and the result "0" half of the time, on average, only half of their data in agreement . Suppose now that Eve attempts to eavesdrop in the spin-z or spin-x directions. We shall assume that Alice sends the state | + >z as before. If Eve measures the spin-z direction she will obtain the result "1" with a probability of unity and transmit the state | + >z on to Bob. Remembering that we are only interested, at present, in Alice and Bob using different alphabets, then by assumption Bob measures the spin-x operator. He will obtain the result "1 with probability of 1/2 as before. Suppose now that Eve eavesdrops in the spin-x direction, that is, she chooses the angle 0 = π/2 in the probability table. Eve then transmits on to Bob the state | + >χ or I - >x with equal likelihood, which Bob reads without error as his measurement is aligned in this direction. Alice and Bob still disagree, on average, 1/2 of the time. Thus if Eve measures spin-x or spin-z, that is, the alphabets Alice and Bob are using, then the rejected data gives no information about Eve.
Let us now suppose, however, that Eve decides to try an attack on the channel by using some basis aligned at an angle θ . Alice transmits | + >z and Bob measures spin-x as before. Reading the probabilities off the table we find that Eve reads "1" with probability of cos 0/2 and, therefore, transmits the state j + >θ on to Bob who then reads "1" with probability 1/2 | cos0/2 + sin0/2 |2 and "0" with probability 1/2 | cos0/2 - sin0/2 |2. Similarly, if Eve reads "0" (probability sin2 0/2) and therefore transmits the state j - >θ on to Bob, then Bob reads "1" with probability 1/2 | cosø/2 - sin0/2 |2 and "0" with probability 1/2 | cos0/2 + sin0/2 |2. Doing the trigonometric manipulation we find that the probability that Bob gets a different answer to Alice (that is, Bob reads "0") given that Alice has transmitted | + >z is given by 1/2 - 1/4 sin 20. Eve, measuring at an angle 0, clearly disturbs the statistics of the rejected data. Following through the probabilities in the table we find that the probability, q, that Alice and Bob disagree on examination of the data for which they measure different alphabets is
g=- --isin2θ
(2)
Suppose that Alice and Bob compare M bit of data for which they have measured different alphabets (we have previously called this the "rejected" data, based on the BB protocol - we shall, for convenience continue with this usage, where appropriate) . They would expect M/2 bits, on average, to disagree (or equivalently to agree) . The probability of obtaining k errors is given by the k term in the binomial expansion
P(k errors) = . , , " .. , qk{l -q) "-k k (M-k) I
(3)
Using the definition of q as equation (2) above and writing σ2=fKsin2 2Θ)
(4)
we can approximate the probability of obtaining k disagreements between Alice and Bob by the gaussian distribution
P(k errors )
Figure imgf000023_0001
(5 )
This is a very good approximation for large M (it is reasonably good even for M as little as 10) . The expected distribution occurs at 0 = 0 and we find that under the same approximation the expected probability distribution for the number of disagreements or errors , labelled as PEXP (J errors ) is given by
PpyP (k errors) [k-M/2)
Figure imgf000024_0001
(6) For future notational convenience we shall denote the expected and actual probability distributions using the single argument k, that is the actual distribution becomes P (k) and the expected PEXP (k) . If Eve intrudes on the channel at some arbitrary angle (most likely to be 0 = π/4) then Alice and Bob will be able to detect this simply by counting the number of disagreements they obtain. For large M the expected and actual distributions are of the order of V~M standard deviations apart. Eve is likely to cause an abnormal number of disagreements, or agreements, which will be extremely unlikely to fall within the expected probability range. The degree of confidence can be set by Alice and Bob by setting some threshold at a specified number of standard deviations from their expected mean value (for example, for gaussian distributions about 98% of the results fall within 3 standard deviations of the mean) .
In order to see how this works in practice we shall assume an attack in an intermediate basis by Eve. Alice and Bob decide to set their threshold at some number of errors A:th. The probability, P (Eve < kth) , that Eve causes fewer errors than this threshold value is given by κth λ
P( eve<Kth) = f p(k) dk~—-~- f exp ( -w2/2 ) dw { ^ -∞
(7) where we have written the upper limit λ as
Figure imgf000025_0001
( 8 )
The probability, PEχP (<kth) / that fewer than kth errors arise from the expected distribution is given by
P ExP xp ( -w /2) dw
Figure imgf000025_0002
( 9 )
where we have written the upper limit as λEfi,= .M-2kth) /2a
(10)
Eve actually causes the number of disagreements to fall by her intervention, hence the thresholding is set as above. At M = 24, a threshold set at kth = 9 and an attack by Eve in the Breidbart basis we find that P (Eve < kth) «=• 0.9207 so that Eve is approximately 92% likely to trigger the "alarm" set by Alice and Bob. However, for this threshold, the expected distribution is approximately 11% likely to trigger the alarm. These statistics improve as M increases and change according to the level of confidence required. For example, in the above case with M = 24 the threshold can be set at kth = 7.5 in which case we have P (Eve < kth) « 0.7612, but PEXP( < -kth) «= 0.033 so that Eve is only about 76% likely to trigger the alarm. However, if the alarm is triggered then it is only about 3% likely to have been a result of the expected distribution. The threshold must be set as the users of the channel feel appropriate as M increases it becomes ever more difficult for Eve to intrude without triggering the alarm. Furthermore, any triggered alarm is much less likely to have been an accident (subject to appropriate thresholding) .
The above consideration of the rejected data can be used in conjunction with the BB protocol to generate a new modified protocol. This adapted protocol can now be described as follows:
1. Alice and Bob randomly choose between spin-x and spin- z alphabets.
2. Alice and Bob communicate, possibly over a public channel (e.g. telephone) to discuss their data. The consider the rejected data first and subject this to the statistical test described above. This determines whether Eve has attempted to eavesdrop in a different alphabet to that of Alice or Bob. 3. If this data is "eavesdropper-free", according to the level of confidence set by Alice and Bob, they now use part of the standard BB protocol to determine whether an eavesdropping attempt has been made in the alphabets used by Alice and Bob (the standard BB protocol can detect the presence of an eavesdropper using any alphabet, as described above. However, by consideration of the rejected data the eavesdropper cannot use an intermediate alphabet to any advantage) .
We now describe a new protocol for which it is not necessary to compare any of the potentially useful key data and only requires comparison of rejected data:
1. Alice randomly selects between 3 alphabets; the spin- x, the spin-z and spin-7r/4 alphabets.
2. Bob randomly chooses between spin-x and spin-z alphabets. Alice and Bob will use the same alphabets 1/3 of the time, on average.
3. Alice and Bob now select that data for which Alice used spin-x or spin-z and Bob measured in a different alphabet to that of Alice. This allows the statistical test for interception in an alphabet intermediate to the x or z alphabets. On average 1/3 of the data is used for this purpose. 4. If an eavesdropper has not been detected at this stage Alice and Bob now compare the results when Alice used spin- π/4 transmissions. Again this uses 1/3 of the data, on average. A statistical test, as described above, will now determine the presence of an eavesdropper who has used the spin-x and/or spin-z alphabets to attempt to intercept the key.
5. If no eavesdropper has been detected Bob and Alice can now assume, to within their pre-determined confidence level that no eavesdropping attempt has been made. The data for which Alice and Bob used the same alphabets should now be shared secret information and can be used as a key.
An alternative coding scheme offering greater symmetry uses spin-z, spin-7r/3, and spin-27r/3 alphabets. In general this selection of alphabets is to be preferred as giving a greater deviation in the measured statistics in response to Eve's eavesdropping. Although the above example describes a scheme whereby Bob measures only two alphabets, Bob can in fact choose to measure in either two or all three of the transmitted alphabets. The analysis presented above can be trivially generalised to include this situation.
The standard BB protocol can also be used in conjunction with this new rejected data protocol to give an even greater degree of security. Information-Theoretic Basis
Central to the generality of the technique is the demonstration that any eavesdropper unavoidably disturbs a quantum channel, irrespective of which dimensionality of alphabet is used. We shall assume that Alice and Bob are to communicate using two alphabets sourced by the operators
A and B with eigenvalues j {α.j} > and | {βk} >, respectively, and of dimensionality N. The channel transition probabilities, determined by the laws of quantum mechanics, in the absence of an eavesdropper, Eve, are given by the overlap integrals | <ai- \ βk > | which give the probability that Bob receives the symbol \ βk > given that Alice transmitted the symbol \ - > . We shall further assume, for convenience, that Alice makes an equal a priori choice of input symbols. The system mutual information, or the information flow rate between Alice and Bob, is, from standard information theory, given by
J[A, B) |<α |βJt>|2li3|<α !β |2
Figure imgf000028_0001
(11)
Clearly the channel capacity is IτiN. If A and B are conjugate then | <o.j \ βk> | = 1/N (for N = 2, the spin-z and spin-x operators are conjugate) , and we have that J (A,B) = 0. For the N = 2 case this occurs when Alice uses spin-z and Bob uses spin-x, for example, and Bob therefore reads the symbols "1" or "0" with equal likelihood. There is no correlation, therefore, between input and output symbols and no information is transmitted between Alice and Bob in this case.
Let us now suppose that an eavesdropper tries to intrude using an alphabet sourced by an operator E consisting of the symbols | {em} >. The channel transition probability between Alice and Bob is now given by
N r Jt= ∑ | <α | ε> | 2 | <εj β | 2 =l ( 12 )
The system mutual information flow rate is now given by
Figure imgf000028_0002
(13 ) where we have used the subscript E to denote the information flow rate in the presence of an eavesdropper . The crucial point to note is that, in general, <J(A,B} ≠
J" E(A,B) so that the presence of Eve changes the information flow rate on the channel. If we define the parameter £ by - JE {A, B) -J(A, B) ξ= U E mTaaX (Λ, β)
(14)
where -j"13* describes the maximum possible information flow between Alice and Bob given their initial choice of alphabets and symbols. In our case, by assumption, Jmax is simply the channel capacity and is InW. This new parameter measures the degree of disturbance introduced by the eavesdropper and varies as
Figure imgf000029_0001
(15) so that a negative value implies a reduction in the information flow rate between Alice and Bob (the regime exploited by the BB protocol) . A positive value of £ implies that the eavesdropper has caused an information flow (the regime exploited by the new protocols described above) . If £ = 0 then the presence of an eavesdropper cannot be detected. If £ ≠ 0 then an eavesdropper is always, in principle vulnerable to detection. The condition for £ = 0, that is, the eavesdropper remains undetected, is equivalent to the choice I\-k = | <ct- \ βk > | . This can only be achieved if the eavesdropper chooses the operator A every time that Alice uses this operator and also chooses the operator B every time that Alice uses this operator. If Alice chooses randomly between A and B then Eve's chances of using the same operator as Alice every time, and therefore escaping detection, are negligible.
This analysis can clearly be generalised to situations where Eve's strategy involves measurement of more than one operator [8] . Alternative Implementations
The protocols we have developed are not limited in applicability to PON's of the type described above, but may be used with any communication channel that is accurately modelled by the formalism we have developed for quantum alphabets. Thus we could envisage making use of single electrons as the carriers of information. Any communication for which the alphabet symbols are quantum states can be examined in the way described here and the quantum cryptographic protocols applied.
Also, alternative statistical tests may be used to detect the effect of Eve on the rejected data. For example, the effect on Bell's inequality may be examined. The violation of this inequality is characteristic of purely quantum channels, and the effect of Eve can be regarded as degrading the purely quantum nature of the channel between Alice and Bob, tending to restore the Bell inequality. If the encoding operators, which as above may correspond to operations on the phase or polarisation of photons, are represented by the scalar products of unit verctors a, b or c with a spin-1/2 operator σ and P (a,b) is the probability that Alice and Bob agree minus the probability that they disagree, then the Bell inequality may be expressed as B = 1 - P (b, c) - I P (a, b) - P (a, c) | ≥ 0.
If an eavesdropper is present on the channel she will tend to cause this inequality to be satisfied. If no eavesdropper is present, and Alice and Bob employ certain alphabets (preferably z, τr/3 and 27r/3 as these cause the maximal violation) then they will see a violation of this inequality and B becomes negative. Thus statistical tests can be used to set a threshold for the security in much the same way as described above.
REFERENCES
1. CH. Bennett, G. Brassard, S. Breidbart and S. Wiesner, in "Advances in Cryptology: Proceedings of Crypto '82", (Plenum, New York, 1983); CH. Bennett and G. Brassard, IBM Technical Disclosure Bulletin, 28 3153 (1985); CH. Bennett, F. Bessette, G. Brassard, L. Salvail and J. Smolin, J. Cryptology, 5 3 (1992) .
2. S. Wiesner, SIGACT News, 15 78 (1983) 3. A. K. Ekert, Phys. Rev. Lett., 67 661 (1991)
4. CH. Bennett, G. Brassard and N. D. Mermin, phys. Rev. Lett. , 68 557 (1992) .
5. Phoenix SJD, Barnett SM, Journal of Modern Optics 1993, Vol 40. No. 8. 1443-1448. 6. S.M. Barnett and S.J.D. Phoenix, Phys . Rev. A, 48 R5 (1993) .
7. K.J. Blow and S.J.D. Phoenix, J. Mod. Opt. , 40 33 (1993) .
8. S.M. Barnett, B. Huttner and S.J.D. Phoenix, J. Mod. Opt., in press.

Claims

1. A method of operating a communication system using single-channel quantum cryptography characterised by the steps of analysing rejected data determined to have been transmitted and received using different operators at the transmitter and receiver and comparing the expected and measured relationship between the data transmitted and received to detect whether an eavesdropper is present.
2. A method according to claim 1, including the steps of both comparing the statistics of the transmitted and received rejected data to determine whether any eavesdropper has detected the communicated signal using a different quantum alphabet to those used by the transmitter and receiver; and subsequently testing at least a sample of the other data to determine whether any eavesdropper has detected the communicated signal using a coding alphabet used by the transmitter and receiver.
3. A method according to claim 1, in which testing to detect an eavesdropper is carried out using rejected data only.
4. A method according to claim 1, 2 or 3, in which one of the transmitter and receiver encodes or decodes data using a selected one of three or more different coding alphabets, the three or more coding alphabets having symbols which are eigenstates of mutually non-commuting operators, and the other of the transmitter and receiver detects signals using at least two of the alphabets.
5. A method according to claim 4, in which the said one of the transmitter and receiver encodes or decodes the signals using one of spin-x, spin-z and spin-ιτ/4 alphabets and the said other of the transmitter and receiver decodes the signal using at least two of those alphabets.
6. A method according to claim 4, in which the said one of the transmitter and receiver encodes the signal using one of spin-z, spin-7r/2 and spin-2π/3 alphabets, and the said other of the receiver and transmitter decodes the signal using at least two of these alphabets.
7. A method according to claim 5 or 6, in which separate tests are carried out on rejected data encoded with the orthogonal alphabets and on rejected data encoded with an intermediate alphabet.
8. A communication system comprising a single«-photon source and a single—photon detector arranged to be connected to a communications channel, means for encoding a single photon signal from the single photon source using non-commuting quantum mechanical operators, means for detecting using non-commuting quantum mechanical operators a single photon signal received over the communications channel, and processing means for comparing the states of single photon signals as encoded and detected, thereby detecting the presence of any eavesdropper, characterised in that the processing means include means for analysing data determined to have been encoded and decoded using different operators and comparing the expected and measured relationship between the data encoded and detected to detect any eavesdropper.
9. A system according to Claim 8, in which one of the means for encoding and the means for detecting is arranged to encode or decode respectively single photon signals using spin-z, spin-7r/2 and spin-27r/3 operators, and the other of the means for encoding and the means for decoding is arranged to encode or decode using at least two of the three operators.
10. A system according to Claim 9, in which both the means for encoding and the means for decoding are arranged to encode and decode signals using selected ones of all three operators.
PCT/GB1993/002075 1992-10-07 1993-10-06 Quantum cryptography using discarded data Ceased WO1994008409A1 (en)

Priority Applications (36)

Application Number Priority Date Filing Date Title
AU51523/93A AU5152393A (en) 1992-10-07 1993-10-06 Quantum cryptography using discarded data
JP50854495A JP3734830B2 (en) 1993-09-09 1994-09-08 Key distribution method using quantum cryptography
JP50854295A JP3756948B2 (en) 1993-09-09 1994-09-08 Key distribution system and method using quantum cryptography
US08/617,848 US5757912A (en) 1993-09-09 1994-09-08 System and method for quantum cryptography
KR1019960701243A KR960705433A (en) 1993-09-09 1994-09-08 SYSTEM AND METHOD FOR KEY DISTRIBUTION USING QUANTUM CRYPTO GRAPHY
ES94925577T ES2126143T3 (en) 1993-09-09 1994-09-08 KEY DISTRIBUTION IN A MULTIPLE ACCESS NETWORK THROUGH QUANTUM CRYPTOGRAPHY.
EP94925578A EP0717896B1 (en) 1993-09-09 1994-09-08 System and method for key distribution using quantum cryptography
JP7508543A JP2951408B2 (en) 1993-09-09 1994-09-08 Quantum encryption system and method
DE69415815T DE69415815T2 (en) 1993-09-09 1994-09-08 KEY DISTRIBUTION SYSTEM AND METHOD USING QUANTUM CRYPTOGRAPHY
CA002169746A CA2169746C (en) 1993-09-09 1994-09-08 Method for key distribution using quantum cryptography
JP50854195A JP3645261B2 (en) 1993-09-09 1994-09-08 Key distribution in multiple access networks using quantum cryptography
US08/612,880 US5850441A (en) 1993-09-09 1994-09-08 System and method for key distribution using quantum cryptography
AU75441/94A AU691197B2 (en) 1993-09-09 1994-09-08 Method for key distribution using quantum cryptography
CA002169552A CA2169552C (en) 1993-09-09 1994-09-08 Key distribution in a multiple access network using quantum cryptography
DE69414864T DE69414864T2 (en) 1993-09-09 1994-09-08 KEY DISTRIBUTION IN A MULTIPLE-ACCESS NETWORK USING QUANTUM CRYPTOGRAPHY
PCT/GB1994/001952 WO1995007582A1 (en) 1993-09-09 1994-09-08 Key distribution in a multiple access network using quantum cryptography
CA002169553A CA2169553C (en) 1993-09-09 1994-09-08 System and method for key distribution using quantum cryptography
HK98109334A HK1008766A1 (en) 1993-09-09 1994-09-08 System and method for quantum cryptography
KR1019960701188A KR960705431A (en) 1993-09-09 1994-09-08 SYSTEM AND METHOD FOR QUANTUM CRYPTOGRAPHY
EP94925579A EP0717897B1 (en) 1993-09-09 1994-09-08 System and method for quantum cryptography
PCT/GB1994/001954 WO1995007584A1 (en) 1993-09-09 1994-09-08 System and method for quantum cryptography
ES94925578T ES2128579T3 (en) 1993-09-09 1994-09-08 SYSTEM AND PROCEDURE FOR THE DISTRIBUTION OF KEYS USING QUANTUM CRYPTOGRAPHY.
DE69408152T DE69408152T2 (en) 1993-09-09 1994-09-08 SYSTEM AND METHOD FOR QUANTUM CRYPTOGRAPHY
EP94925580A EP0739559B1 (en) 1993-09-09 1994-09-08 Method for key distribution using quantum cryptography
DE69432482T DE69432482T2 (en) 1993-09-09 1994-09-08 KEY DISTRIBUTION METHOD USING QUANTUM CRYPTOGRAPHY
PCT/GB1994/001953 WO1995007583A1 (en) 1993-09-09 1994-09-08 System and method for key distribution using quantum cryptography
AU75439/94A AU693109B2 (en) 1993-09-09 1994-09-08 System and method for key distribution using quantum cryptography
CA002168851A CA2168851C (en) 1993-09-09 1994-09-08 System and method for quantum cryptography
PCT/GB1994/001955 WO1995007585A1 (en) 1993-09-09 1994-09-08 Method for key distribution using quantum cryptography
ES94925579T ES2111950T3 (en) 1993-09-09 1994-09-08 SYSTEM AND METHOD FOR QUANTUM CRYPTOGRAPHY.
EP94925577A EP0717895B1 (en) 1993-09-09 1994-09-08 Key distribution in a multiple access network using quantum cryptography
AU75440/94A AU678049B2 (en) 1993-09-09 1994-09-08 System and method for quantum cryptography
AU75438/94A AU678848B2 (en) 1993-09-09 1994-09-08 Key distribution in a multiple access network using quantum cryptography
KR1019960701242A KR960705432A (en) 1993-09-09 1994-09-08 METHOD FOR KEY DISTRIBUTION USING QUANTUM CRYPTOGRAPHY
US08/612,881 US5764765A (en) 1993-09-09 1994-09-08 Method for key distribution using quantum cryptography
KR1019960701187A KR960705430A (en) 1993-09-09 1996-03-08 Communication method and communication system using quantum encryption technique (KEY DISTRIBUTION IN A MULTIPLE ACCESS NETWORK USING QUANTUM CRYPTOGRAPHY)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
EP92309126 1992-10-07
EP92309126.8 1992-10-07

Publications (1)

Publication Number Publication Date
WO1994008409A1 true WO1994008409A1 (en) 1994-04-14

Family

ID=8211508

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/GB1993/002075 Ceased WO1994008409A1 (en) 1992-10-07 1993-10-06 Quantum cryptography using discarded data

Country Status (2)

Country Link
AU (1) AU5152393A (en)
WO (1) WO1994008409A1 (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5732139A (en) * 1996-08-26 1998-03-24 Lo; Hoi-Kwong Quantum cryptographic system with reduced data loss
EP1137220A3 (en) * 2000-03-24 2002-09-25 Samsung Electronics Co., Ltd. Key agreement method in secure communication system using multiple access method.
US7305091B1 (en) * 1998-09-24 2007-12-04 Japan Science And Technology Agency Quantum cipher communication system
EP2007062A4 (en) * 2006-03-16 2017-03-22 NEC Corporation Quantum cryptography device

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
"QUANTUM PUBLIC KEY DISTRIBUTION SYSTEM", IBM TECHNICAL DISCLOSURE BULLETIN., vol. 28, no. 7, December 1985 (1985-12-01), NEW YORK US, pages 3153 - 3163 *

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5732139A (en) * 1996-08-26 1998-03-24 Lo; Hoi-Kwong Quantum cryptographic system with reduced data loss
US7305091B1 (en) * 1998-09-24 2007-12-04 Japan Science And Technology Agency Quantum cipher communication system
EP1137220A3 (en) * 2000-03-24 2002-09-25 Samsung Electronics Co., Ltd. Key agreement method in secure communication system using multiple access method.
US7349545B2 (en) 2000-03-24 2008-03-25 Samsung Electronics Co., Ltd. Key agreement method in secure communication system using multiple access method
EP2007062A4 (en) * 2006-03-16 2017-03-22 NEC Corporation Quantum cryptography device

Also Published As

Publication number Publication date
AU5152393A (en) 1994-04-26

Similar Documents

Publication Publication Date Title
CN101040483B (en) Two non-orthogonal states quantum cryptography method and apparatus with intra-and inter-qubit interference for eavesdropper detection
CA2169746C (en) Method for key distribution using quantum cryptography
US5732139A (en) Quantum cryptographic system with reduced data loss
KR100983008B1 (en) Quantum Cryptography System and Distribution Method of Quantum Cryptographic Keys
US6678379B1 (en) Quantum key distribution method and apparatus
US9692595B2 (en) Quantum key distribution
US8755525B2 (en) Quantum key distribution involving moveable key device
JP3646561B2 (en) Key distribution method using quantum cryptography
US10014934B2 (en) Apparatus and method for providing eavesdropping detection of an optical fiber communication
US20250023720A1 (en) Quantum key generation method and system
WO1994008409A1 (en) Quantum cryptography using discarded data
US20250007702A1 (en) Quantum key distribution system to overcome intercept-resend and detector-control quantum hacking
Youplao et al. A Simulation of Quantum Key Distribution Protocol with Enhancing Ability to Against PNS Attack
Luo et al. Quantum cryptography with entangled multiphotons of the same polarization
Venkatraman Methods and implementation of quantum cryptography
Lütkenhaus Quantum key distribution: how do we know it's secure?
Sen et al. Some Aspects of Quantum Cryptography and Network Security
Elsera et al. INTRODUCTORY REVIEW ARTICLE
Youplao A Simulation of Multi-Layers Quantum Key Distribution with Enhancing Ability for Against PNS Attacks
Meyers Hoi-Kwong Lo 2 and Yi Zhao 2
Hughes Quantum key distribution
Bandopadhyay et al. Study of Various Quantum State Attacks in Quantum

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AU CA JP KR US

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): AT BE CH DE DK ES FR GB GR IE IT LU MC NL PT SE

CFP Corrected version of a pamphlet front page
CR1 Correction of entry in section i
DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
121 Ep: the epo has been informed by wipo that ep was designated in this application
122 Ep: pct application non-entry in european phase
NENP Non-entry into the national phase

Ref country code: CA