|
|
Line 1: |
Line 1: |
| {{Use dmy dates|date=May 2013}}
| | Industrial Engineer Trinidad from Inuvik, enjoys ghost hunting, oil paintings and papercraft. Likes to see new cities and locales including Group of Monuments at Hampi.<br><br>Review my weblog; [https://twitter.com/AdamartOfficial 3d art style] |
| '''Quantum key distribution''' ('''QKD''') uses [[quantum mechanics]] to guarantee [[secure communication]]. It enables two parties to produce a shared [[randomness|random]] secret [[key (cryptography)|key]] known only to them, which can then be used to encrypt and decrypt [[messages]]. It is often incorrectly called [[quantum cryptography]], as it is the most well known example of the group of quantum cryptographic tasks.
| |
| | |
| An important and unique property of quantum distribution is the ability of the two communicating users to detect the presence of any third party trying to gain [[information theory|knowledge]] of the key. This results from a fundamental aspect of quantum mechanics: the process of measuring a [[Physical system|quantum system]] in general disturbs the system. A third party trying to eavesdrop on the key must in some way measure it, thus introducing detectable anomalies. By using [[quantum superposition]]s or [[quantum entanglement]] and transmitting information in [[quantum state]]s, a communication system can be implemented which detects eavesdropping. If the level of eavesdropping is below a certain threshold, a key can be produced that is guaranteed to be secure (i.e. the eavesdropper has no information about it), otherwise no secure key is possible and communication is aborted.
| |
| | |
| The security of quantum key distribution relies on the foundations of quantum mechanics, in contrast to traditional key distribution protocol which relies on the computational difficulty of [[One-way function|certain mathematical functions]], and cannot provide any indication of eavesdropping or guarantee of key security.
| |
| | |
| Quantum key distribution is only used to produce and distribute a key, not to transmit any message data. This key can then be used with any chosen [[encryption algorithm]] to encrypt (and decrypt) a message, which can then be transmitted over a standard [[communication channel]]. The algorithm most commonly associated with QKD is the [[one-time pad]], as it is [[provably secure]] when used with a secret, random key.<ref>C. E. Shannon , Bell Syst. Tech. J. 28, 656 (1949)</ref>
| |
| | |
| == Quantum key exchange ==
| |
| Quantum communication involves encoding information in quantum states, or [[qubit]]s, as opposed to classical communication's use of [[bit]]s. Usually, [[photons]] are used for these quantum states. Quantum key distribution exploits certain properties of these quantum states to ensure its security. There are several different approaches to quantum key distribution, but they can be divided into two main categories depending on which property they exploit.
| |
| | |
| ; Prepare and measure protocols : In contrast to classical physics, the act of measurement is an integral part of quantum mechanics. In general, measuring an unknown quantum state changes that state in some way. This is known as [[quantum indeterminacy]], and underlies results such as the [[Heisenberg uncertainty principle]], [[information-disturbance theorem]] and [[no cloning theorem]]. This can be exploited in order to detect any eavesdropping on communication (which necessarily involves measurement) and, more importantly, to calculate the amount of information that has been intercepted.
| |
| | |
| ; Entanglement based protocols : The quantum states of two (or more) separate objects can become linked together in such a way that they must be described by a combined quantum state, not as individual objects. This is known as [[Quantum entanglement|entanglement]] and means that, for example, performing a measurement on one object affects the other. If an entangled pair of objects is shared between two parties, anyone intercepting either object alters the overall system, revealing the presence of the third party (and the amount of information they have gained).
| |
| | |
| These two approaches can each be further divided into three families of protocols; discrete variable, continuous variable and distributed phase reference coding. Discrete variable protocols were the first to be invented, and they remain the most widely implemented. The other two families are mainly concerned with overcoming practical limitations of experiments. The two protocols described below both use discrete variable coding.
| |
| | |
| === BB84 protocol: Charles H. Bennett and Gilles Brassard (1984) ===
| |
| {{Main|BB84}}
| |
| This protocol, known as [[BB84]] after its inventors and year of publication, was originally described using [[photon polarization]] states to transmit the information. However, any two pairs of [[Conjugate variables|conjugate]] states can be used for the protocol, and many [[optical fibre]] based implementations described as BB84 use phase encoded states. The sender (traditionally referred to as [[Alice and Bob|Alice]]) and the receiver (Bob) are connected by a [[quantum communication channel]] which allows [[quantum states]] to be transmitted. In the case of photons this channel is generally either an optical fibre or simply [[free space]]. In addition they communicate via a public classical channel, for example using broadcast radio or the internet. Neither of these channels need to be secure; the protocol is designed with the assumption that an [[eavesdropper]] (referred to as Eve) can interfere in any way with both.
| |
| | |
| The security of the protocol comes from encoding the information in [[Orthogonality|non-orthogonal states]]. [[Quantum indeterminacy]] means that these states cannot in general be measured without disturbing the original state (see [[No cloning theorem]]). BB84 uses two pairs of states, with each pair [[Conjugate variables|conjugate]] to the other pair, and the two states within a pair orthogonal to each other. Pairs of orthogonal states are referred to as a [[Basis (linear algebra)|basis]]. The usual polarization state pairs used are either the [[linear polarization|rectilinear basis]] of vertical (0°) and horizontal (90°), the [[linear polarization|diagonal basis]] of 45° and 135° or the [[circular polarization|circular basis]] of left- and right-handedness. Any two of these bases are conjugate to each other, and so any two can be used in the protocol. Below the rectilinear and diagonal bases are used.
| |
| | |
| {| class="wikitable" style="float:left; text-align:center;"
| |
| |-
| |
| ! Basis
| |
| ! 0
| |
| ! 1
| |
| |-
| |
| | [[File:PlusCM128.svg|15x15px]]
| |
| | [[File:Arrow north.svg|20x20px]]
| |
| | [[File:Arrow east.svg|20x20px]]
| |
| |-
| |
| | [[File:Multiplication Sign.svg|15x15px]]
| |
| | [[File:Arrow northeast.svg|15x15px]]
| |
| | [[File:Arrow southeast.svg|15x15px]]
| |
| |}
| |
| | |
| The first step in BB84 is quantum transmission. Alice creates a random [[bit]] (0 or 1) and then randomly selects one of her two bases (rectilinear or diagonal in this case) to transmit it in. She then prepares a photon polarization state depending both on the bit value and basis, as shown in the table to the left. So for example a 0 is encoded in the rectilinear basis (+) as a vertical polarization state, and a 1 is encoded in the diagonal basis (x) as a 135° state. Alice then transmits a single photon in the state specified to Bob, using the quantum channel. This process is then repeated from the random bit stage, with Alice recording the state, basis and time of each photon sent.
| |
| | |
| According to quantum mechanics (particularly [[quantum indeterminacy]]), no possible measurement distinguishes between the 4 different polarization states, as they are not all orthogonal. The only possible measurement is between any two orthogonal states (an orthonormal basis). So, for example, measuring in the rectilinear basis gives a result of horizontal or vertical. If the photon was created as horizontal or vertical (as a rectilinear [[eigenstate]]) then this measures the correct state, but if it was created as 45° or 135° (diagonal eigenstates) then the rectilinear measurement instead returns either horizontal or vertical at random. Furthermore, after this measurement the photon is polarized in the state it was measured in (horizontal or vertical), with all information about its initial polarization lost.
| |
| | |
| As Bob does not know the basis the photons were encoded in, all he can do is to select a basis at random to measure in, either rectilinear or diagonal. He does this for each photon he receives, recording the time, measurement basis used and measurement result. After Bob has measured all the photons, he communicates with Alice over the public classical channel. Alice broadcasts the basis each photon was sent in, and Bob the basis each was measured in. They both discard photon measurements (bits) where Bob used a different basis, which is half on average, leaving half the bits as a shared key.
| |
| | |
| {| class="wikitable" style="width:75%; text-align: center; margin: 1em auto 1em auto"
| |
| |-
| |
| ! Alice's random bit
| |
| | style="width:40pt;"| 0 || style="width:40pt;"| 1 || style="width:40pt;"| 1 || style="width:40pt;"| 0 || style="width:40pt;"| 1 || style="width:40pt;"| 0 || style="width:40pt;"| 0 || style="width:40pt;"| 1
| |
| |-
| |
| ! Alice's random sending basis
| |
| | style="width:40pt;"| [[File:PlusCM128.svg|15x15px]] || style="width:40pt;"| [[File:PlusCM128.svg|15x15px]] || style="width:40pt;"| [[File:Multiplication Sign.svg|15x15px]] || style="width:40pt;"| [[File:PlusCM128.svg|15x15px]] || style="width:40pt;"| [[File:Multiplication Sign.svg|15x15px]] || style="width:40pt;"| [[File:Multiplication Sign.svg|15x15px]] || style="width:40pt;"| [[File:Multiplication Sign.svg|15x15px]] || style="width:40pt;"| [[File:PlusCM128.svg|15x15px]]
| |
| |-
| |
| ! Photon polarization Alice sends
| |
| | style="width:40pt;"| [[File:Arrow north.svg|20x20px]] || style="width:40pt;"| [[File:Arrow east.svg|20x20px]] || style="width:40pt;"| [[File:Arrow southeast.svg|15x15px]] || style="width:40pt;"| [[File:Arrow north.svg|20x20px]] || style="width:40pt;"| [[File:Arrow southeast.svg|15x15px]] || style="width:40pt;"| [[File:Arrow northeast.svg|15x15px]] || style="width:40pt;"| [[File:Arrow northeast.svg|15x15px]] || style="width:40pt;"| [[File:Arrow east.svg|20x20px]]
| |
| |-
| |
| ! Bob's random measuring basis
| |
| | style="width:40pt;"| [[File:PlusCM128.svg|15x15px]] || style="width:40pt;"| [[File:Multiplication Sign.svg|15x15px]] || style="width:40pt;"| [[File:Multiplication Sign.svg|15x15px]] || style="width:40pt;"| [[File:Multiplication Sign.svg|15x15px]] || style="width:40pt;"| [[File:PlusCM128.svg|15x15px]] || style="width:40pt;"| [[File:Multiplication Sign.svg|15x15px]] || style="width:40pt;"| [[File:PlusCM128.svg|15x15px]] || style="width:40pt;"| [[File:PlusCM128.svg|15x15px]]
| |
| |-
| |
| ! Photon polarization Bob measures
| |
| | style="width:40pt;"| [[File:Arrow north.svg|20x20px]] || style="width:40pt;"| [[File:Arrow northeast.svg|15x15px]] || style="width:40pt;"| [[File:Arrow southeast.svg|15x15px]] || style="width:40pt;"| [[File:Arrow northeast.svg|15x15px]] || style="width:40pt;"| [[File:Arrow east.svg|20x20px]] || style="width:40pt;"| [[File:Arrow northeast.svg|15x15px]] || style="width:40pt;"| [[File:Arrow east.svg|20x20px]] || style="width:40pt;"| [[File:Arrow east.svg|20x20px]]
| |
| |-
| |
| ! PUBLIC DISCUSSION OF BASIS
| |
| | colspan=8 |
| |
| | |
| |-
| |
| ! Shared secret key
| |
| | style="width:40pt;"| 0 || || style="width:40pt;"| 1 || || || style="width:40pt;"| 0 || || style="width:40pt;"| 1
| |
| |}
| |
| | |
| To check for the presence of eavesdropping Alice and Bob now compare a certain subset of their remaining bit strings. If a third party (usually referred to as Eve, for 'eavesdropper') has gained any information about the photons' polarization, this introduces errors in Bob's measurements. If more than <math>p</math> bits differ they abort the key and try again, possibly with a different quantum channel, as the security of the key cannot be guaranteed. <math>p</math> is chosen so that if the number of bits known to Eve is less than this, privacy amplification can be used to reduce Eve's knowledge of the key to an arbitrarily small amount, by reducing the length of the key.
| |
| | |
| === E91 protocol: Artur Ekert (1991) ===
| |
| | |
| The Ekert scheme uses entangled pairs of photons. These can be created by Alice, by Bob, or by some source separate from both of them, including eavesdropper Eve. The photons are distributed so that Alice and Bob each end up with one photon from each pair.
| |
| | |
| The scheme relies on two properties of entanglement. First, the entangled states are perfectly correlated in the sense that if Alice and Bob both measure whether their particles have vertical or horizontal polarizations, they always get the same answer with 100% probability. The same is true if they both measure any other pair of complementary (orthogonal) polarizations. However, the particular results are completely random; it is impossible for Alice to predict if she (and thus Bob) will get vertical polarization or horizontal polarization. Second, any attempt at eavesdropping by Eve destroys these correlations in a way that Alice and Bob can detect.
| |
| The original Ekert protocol consist of using three possible states and testing [[Bell inequality]] violation for detecting eavesdropping.
| |
| | |
| == Privacy amplification and information reconciliation ==
| |
| The quantum key distribution protocols described above provide Alice and Bob with nearly identical shared keys, and also with an estimate of the discrepancy between the keys. These differences can be caused by eavesdropping, but also by imperfections in the transmission line and detectors. As it is impossible to distinguish between these two types of errors, guaranteed security requires the assumption that all errors are due to eavesdropping. Provided the error rate between the keys is lower than a certain threshold (20% as of April 2007<ref>H. Chau, Physical Review A 66, 60302 (2002) ([http://hub.hku.hk/bitstream/123456789/43370/1/75688.pdf])</ref>), two steps can be performed to first remove the erroneous bits and then reduce Eve's knowledge of the key to an arbitrary small value. These two steps are known as '''information reconciliation''' and '''privacy amplification''' respectively, and were first described in 1992.<ref>C. H. Bennett, F. Bessette, G. Brassard, L. Salvail and J. Smolin "[http://cs.uccs.edu/~cs691/crypto/BBBSS92.pdf Experimental Quantum Cryptography]" Journal of Cryptology vol.5, no.1, 1992, pp. 3-28.</ref>
| |
| | |
| '''Information reconciliation''' is a form of error correction carried out between Alice and Bob's keys, in order to ensure both keys are identical. It is conducted over the public channel and as such it is vital to minimise the information sent about each key, as this can be read by Eve. A common protocol used for information reconciliation is the '''cascade protocol''', proposed in 1994.<ref>G. Brassard and L. Salvail "Secret key reconciliation by public discussion" Advances in Cryptology: Eurocrypt 93 Proc. pp 410-23 (1993) ([http://citeseer.ist.psu.edu/96923.html])</ref> This operates in several rounds, with both keys divided into blocks in each round and the [[parity (telecommunication)|parity]] of those blocks compared. If a difference in parity is found then a [[binary search]] is performed to find and correct the error. If an error is found in a block from a previous round that had correct parity then another error must be contained in that block; this error is found and corrected as before. This process is repeated recursively, which is the source of the cascade name. After all blocks have been compared, Alice and Bob both reorder their keys in the same random way, and a new round begins. At the end of multiple rounds Alice and Bob have identical keys with high probability, however Eve has additional information about the key from the parity information exchanged. However, from a coding theory point of view information reconciliation is essentially source coding with side information, in consequence any coding scheme that works for this problem can be used for information reconciliation. Lately turbocodes,<ref>{{cite arxiv | first1=Kim-Chi | last1=Nguyen | first2=Gilles | last2=Van Assche | first3=Nicolas J. | last3=Cerf | title=Side-Information Coding with Turbo Codes and its Application to Quantum Key Distribution | publisher=International Symposium on Information Theory and its Applications | location=Parma, Italy | date=10–13 October 2004 | eprint=cs/0406001.pdf}}</ref> LDPC codes <ref>D. Elkouss and J. Martinez-Mateo and V. Martin, Quantum Information & Computation 11, 226 (2011) ([http://www.dma.fi.upm.es/jmartinez/doc/qic-11-34_0226-0238.pdf])</ref> and polar codes <ref>P. Jouguet and S. Kunz-Jacques, Quantum Information and Computation, Vol. 14, No. 3&4, (2013) ([http://arxiv.org/pdf/1204.5882v3.pdf])</ref> have been used for this purpose improving the efficiency of Cascade.
| |
| | |
| '''Privacy Amplification''' is a method for reducing (and effectively eliminating) Eve's partial information about Alice and Bob's key. This partial information could have been gained both by eavesdropping on the quantum channel during key transmission (thus introducing detectable errors), and on the public channel during information reconciliation (where it is assumed Eve gains all possible parity information). Privacy amplification uses Alice and Bob's key to produce a new, shorter key, in such a way that Eve has only negligible information about the new key. This can be done using a [[universal hashing|universal hash function]], chosen at random from a publicly known set of such functions, which takes as its input a binary string of length equal to the key and outputs a binary string of a chosen shorter length. The amount by which this new key is shortened is calculated, based on how much information Eve could have gained about the old key (which is known due to the errors this would introduce), in order to reduce the probability of Eve having any knowledge of the new key to a very low value.
| |
| | |
| == Implementations ==
| |
| | |
| === Experimental ===
| |
| | |
| The highest bit rate system currently demonstrated exchanges secure keys at 1 Mbit/s (over 20 km of optical fibre) and 10 kbit/s (over 100 km of fibre), achieved by a collaboration between the [[University of Cambridge]] and [[Toshiba]] using the [[BB84]] protocol with decoy pulses.<ref>[http://www.opticsinfobase.org/oe/abstract.cfm?uri=oe-16-23-18790 A. R. Dixon, Z. L. Yuan, J. F. Dynes, A. W. Sharpe, and A. J. Shields. Optics Express, Vol. 16, Issue 23, pp. 18790-18979] ([http://arxiv.org/pdf/0810.1069], See also [http://spie.org/x34398.xml?ArticleID=x34398])</ref>
| |
| | |
| {{As of|2007|3}} the longest distance over which quantum key distribution has been demonstrated using optic fibre is 148.7 km, achieved by [[Los Alamos National Laboratory]]/[[NIST]] using the BB84 protocol.<ref>New Journal of Physics 8 193 (2006) ([http://www.iop.org/EJ/article/1367-2630/8/9/193/njp6_9_193.html])</ref> Significantly, this distance is long enough for almost all the spans found in today's fibre networks. The distance record for free space QKD is 144 km between two of the [[Canary Islands]], achieved by a European collaboration using entangled photons (the Ekert scheme) in 2006,<ref>R. Ursin, et al. Nature Physics 3, 481 - 486 (2007) ([http://lanl.arxiv.org/abs/quant-ph/0607182])</ref> and using [[BB84]] enhanced with decoy states<ref>H.-K. Lo, X. Ma and K. Chen: "Decoy State Quantum Key Distribution". Physical Review Letters 94, 230504 (See also [http://interquanta.biz/qic])</ref> in 2007.<ref>T. Schmitt-Manderbach, et al.: "[http://www.quantum.at/uploads/media/PRL_98__010504__2007_.pdf Experimental demonstration of free-space decoy-state quantum key distribution over 144 km]." Physical Review Letters 98.1 010504 (2007)</ref> The experiments suggest transmission to satellites is possible, due to the lower atmospheric density at higher altitudes. For example although the minimum distance from the [[International Space Station]] to the [[ESA Space Debris Telescope]] is about 400 km, the atmospheric thickness is about an order of magnitude less than in the European experiment, thus yielding less attenuation compared to this experiment.
| |
| | |
| === Commercial ===
| |
| | |
| There are currently four companies offering commercial quantum key distribution systems; [[id Quantique]] (Geneva), [http://magiqtech.com MagiQ Technologies] (New York), [http://www.quintessencelabs.com QuintessenceLabs] (Australia) and [http://www.sequrenet.com SeQureNet] (Paris). Several other companies also have active research programmes, including [[Toshiba]], [[Hewlett-Packard|HP]], [[IBM]], [[Mitsubishi]], [[NEC]] and [[Nippon Telegraph and Telephone|NTT]] (See [[#External links|External links]] for direct research links).
| |
| | |
| In 2004, the world's first bank transfer using quantum key distribution was carried in [[Vienna]], [[Austria]].<ref>[http://www.secoqc.net/downloads/pressrelease/Banktransfer_english.pdf http://www.secoqc.net/downloads/pressrelease/Banktransfer_english.pdf] ''secoqc.net''</ref> Quantum encryption technology provided by the Swiss company [[Id Quantique]] was used in the Swiss canton (state) of Geneva to transmit ballot results to the capital in the national election occurring on 21 October 2007.<ref>{{cite web|url=http://www.technewsworld.com/story/59793.html|title=Swiss Call New Vote Encryption System 'Unbreakable'|last=Jordans|first=Frank|date=12 October 2007|publisher=technewsworld.com|accessdate=8 March 2013|archiveurl=http://web.archive.org/web/20071209214958/http://www.technewsworld.com/story/59793.html |archivedate=2007-12-09}}</ref> In 2013, [[Battelle Memorial Institute]] installed a QKD system built by ID Quantique between their main campus in Columbus, Ohio and their manufacturing facility in nearby Dublin.<ref>{{cite web|url=http://tech.fortune.cnn.com/2013/10/14/quantum-key/|title=Unbreakable encryption comes to the U.S|last=Dillow|first=Clay|date=14 October 2013|publisher=fortune.cnn.com}}</ref>
| |
| | |
| === Quantum Key Distribution Networks ===
| |
| | |
| ==== DARPA ====
| |
| The [[DARPA]] [[Quantum network]],<ref>[http://www.newscientist.com/article/dn7484.html Quantum cryptography network gets wireless link - info-tech - 7 June 2005 - New Scientist<!-- Bot generated title -->]</ref> a 10-node quantum key distribution network, has been running since 2004 in Massachusetts, USA. It is being developed by [[BBN Technologies]], [[Harvard University]], [[Boston University]] and [[QinetiQ]].
| |
| | |
| ==== SECOQC ====
| |
| {{main|Secure Communication based on Quantum Cryptography}}
| |
| The world's first [[computer network]] protected by quantum key distribution was implemented in October 2008, at a scientific conference in Vienna. The name of this network is [[Secure Communication based on Quantum Cryptography|SECOQC]] ('''Se'''cure '''Co'''mmunication Based on '''Q'''uantum '''C'''ryptography) and [[EU]] funded this project. The network used 200 km of standard [[fibre optic cable]] to interconnect six locations across Vienna and the town of [[St Poelten]] located 69 km to the west.<ref>[http://news.bbc.co.uk/1/hi/sci/tech/7661311.stm 'Unbreakable' encryption unveiled]</ref>
| |
| | |
| ==== SwissQuantum ====
| |
| [[Id Quantique]] SA claimed to have successfully completed the longest running project for testing Quantum Key Distribution (QKD) in a field environment. The main goal of the SwissQuantum network,<ref>[http://www.idquantique.com/news/swissquantum-completed.html SwissQuantum Project Completes Longest-Running Testbed of Quantum Cryptography]</ref> installed in the Geneva metropolitan area in March 2009, was to validate the reliability and robustness of QKD in continuous operation over a long time period in a field environment. The quantum layer operated for nearly 2 years until the project was shut down in January 2011 shortly after a second independently successful attack against Id Quantique's already-commercialized hardware became public.<ref>{{cite journal |last1=Gerhardt |first1=Ilja |last2=Liu | first2=Qin | last3=Lamas-Linares |first3=Antia |last4=Skaar | first4=Johannes |last5=Kurtsiefer |first5=Christian |last6=Makarov |first6=Vadim |title=Full-field implementation of a perfect eavesdropper on a quantum cryptography system |year=2012|doi=10.1038/ncomms1348 |journal=Nature Communications |volume=2 |pages=349 |pmid=21673670 |issue=349 |arxiv=1011.0105}}</ref>
| |
| | |
| ==== Tokyo QKD Network ====
| |
| The Tokyo QKD Network<ref>[http://www.uqcc2010.org/highlights/index.html Tokyo QKD Network unveiled at UQCC 2010]</ref> was inaugurated on the first day of the UQCC2010 conference. The network involves an international collaboration between 7 partners; [[NEC]], [[Mitsubishi Electric]], [[Nippon Telegraph and Telephone|NTT]] and [[NICT]] from Japan, and participation from Europe by [[Toshiba]] Research Europe Ltd. (UK), [[Id Quantique]] (Switzerland) and All Vienna (Austria). "All Vienna" is represented by researchers from the [[Austrian Institute of Technology]] (AIT), the [[Institute for Quantum Optics and Quantum Information]] (IQOQI) and the [[University of Vienna]].
| |
| | |
| ==== Los Alamos National Labs ====
| |
| A hub-and-spoke network has been operated by Los Alamos National Laboratory since 2011. All messages are routed via the hub. The system equips each node in the network with quantum transmitters–i.e., lasers–but not with expensive and bulky photon detectors. Only the hub receives quantum messages. To communicate, each node sends a one-time pad to the hub, which it then uses to communicate securely over a classical link. The hub can route this message to another node using another one time pad from the second node. The entire network is secure, provided that the central hub is secure. Individual nodes require little more than a laser - prototype nodes are around the size of a box of matches.<ref>{{cite arXiv|eprint=1305.0305|last1=Hughes|first1=Richard J.|last2=Nordholt|first2=Jane E.|last3=McCabe|first3=Kevin P.|last4=Newell|first4=Raymond T.|last5=Peterson|first5=Charles G.|last6=Somma|first6=Rolando D.|title=Network-Centric Quantum Communications with Application to Critical Infrastructure Protection|class=quant-ph|year=2013}}</ref>
| |
| Ref:arxiv.org/abs/1305.0305:Network-Centric Quantum Communications with Application to
| |
| | |
| == Attacks & Security Proofs ==
| |
| | |
| ===Intercept and resend ===
| |
| The simplest type of possible attack is the intercept-resend attack, where Eve measures the quantum states (photons) sent by Alice and then sends replacement states to Bob, prepared in the state she measures. In the BB84 protocol, this produces errors in the key Alice and Bob share. As Eve has no knowledge of the basis a state sent by Alice is encoded in, she can only guess which basis to measure in, in the same way as Bob. If she chooses correctly, she measures the correct photon polarization state as sent by Alice, and resends the correct state to Bob. However, if she chooses incorrectly, the state she measures is random, and the state sent to Bob cannot be the same as the state sent by Alice. If Bob then measures this state in the same basis Alice sent, he too gets a random result—as Eve has sent him a state in the opposite basis— with a 50% chance of an erroneous result (instead of the correct result he would get without the presence of Eve). The table below shows an example of this type of attack.
| |
| | |
| {| class="wikitable" style="text-align: center; margin: 1em auto 1em auto"
| |
| |-
| |
| ! Alice's random bit
| |
| | style="width:40pt;"| 0 || style="width:40pt;"| 1 || style="width:40pt;"| 1 || style="width:40pt;"| 0 || style="width:40pt;"| 1 || style="width:40pt;"| 0 || style="width:40pt;"| 0 || style="width:40pt;"| 1
| |
| |-
| |
| ! Alice's random sending basis
| |
| | [[File:PlusCM128.svg|15x15px]] || [[File:PlusCM128.svg|15x15px]] || [[File:Multiplication Sign.svg|15x15px]] || [[File:PlusCM128.svg|15x15px]] || [[File:Multiplication Sign.svg|15x15px]] || [[File:Multiplication Sign.svg|15x15px]] || [[File:Multiplication Sign.svg|15x15px]] || [[File:PlusCM128.svg|15x15px]]
| |
| |-
| |
| ! Photon polarization Alice sends
| |
| | [[File:Arrow north.svg|20x20px]] || [[File:Arrow east.svg|20x20px]] || [[File:Arrow southeast.svg|15x15px]] || [[File:Arrow north.svg|20x20px]] || [[File:Arrow southeast.svg|15x15px]] || [[File:Arrow northeast.svg|15x15px]] || [[File:Arrow northeast.svg|15x15px]] || [[File:Arrow east.svg|20x20px]]
| |
| |-
| |
| ! Eve's random measuring basis
| |
| | [[File:PlusCM128.svg|15x15px]] || [[File:Multiplication Sign.svg|15x15px]] || [[File:PlusCM128.svg|15x15px]] || [[File:PlusCM128.svg|15x15px]] || [[File:Multiplication Sign.svg|15x15px]] || [[File:PlusCM128.svg|15x15px]] || [[File:Multiplication Sign.svg|15x15px]] || [[File:PlusCM128.svg|15x15px]]
| |
| |-
| |
| ! Polarization Eve measures and sends
| |
| | [[File:Arrow north.svg|20x20px]] || [[File:Arrow northeast.svg|15x15px]] || [[File:Arrow east.svg|20x20px]] || [[File:Arrow north.svg|20x20px]] || [[File:Arrow southeast.svg|15x15px]] || [[File:Arrow east.svg|20x20px]] || [[File:Arrow northeast.svg|15x15px]] || [[File:Arrow east.svg|20x20px]]
| |
| |-
| |
| ! Bob's random measuring basis
| |
| | [[File:PlusCM128.svg|15x15px]] || [[File:Multiplication Sign.svg|15x15px]] || [[File:Multiplication Sign.svg|15x15px]] || [[File:Multiplication Sign.svg|15x15px]] || [[File:PlusCM128.svg|15x15px]] || [[File:Multiplication Sign.svg|15x15px]] || [[File:PlusCM128.svg|15x15px]] || [[File:PlusCM128.svg|15x15px]]
| |
| |-
| |
| ! Photon polarization Bob measures
| |
| | [[File:Arrow north.svg|20x20px]] || [[File:Arrow northeast.svg|15x15px]] || [[File:Arrow northeast.svg|15x15px]] || [[File:Arrow southeast.svg|15x15px]] || [[File:Arrow east.svg|20x20px]] || [[File:Arrow northeast.svg|15x15px]] || [[File:Arrow north.svg|20x20px]] || [[File:Arrow east.svg|20x20px]]
| |
| |-
| |
| ! PUBLIC DISCUSSION OF BASIS
| |
| | colspan=8 |
| |
| |-
| |
| ! Shared secret key
| |
| | 0 || || 0 || || || 0 || || 1
| |
| |-
| |
| ! Errors in key
| |
| | {{unicode|✓}} || || {{unicode|✘}} || || || {{unicode|✓}} || || {{unicode|✓}}
| |
| |}
| |
| | |
| The probability Eve chooses the incorrect basis is 50% (assuming Alice chooses randomly), and if Bob measures this intercepted photon in the basis Alice sent he gets a random result, i.e., an incorrect result with probability of 50%. The probability an intercepted photon generates an error in the key string is then 50% × 50% = 25%. If Alice and Bob publicly compare <math>n</math> of their key bits (thus discarding them as key bits, as they are no longer secret) the probability they find disagreement and identify the presence of Eve is
| |
| | |
| <center><math>P_d = 1 - \left(\frac{3}{4}\right)^n</math></center>
| |
| | |
| So to detect an eavesdropper with probability <math>P_d = 0.999999999</math> Alice and Bob need to compare <math>n = 72</math> key bits.
| |
| | |
| === Man-in-the-middle attack ===
| |
| Quantum key distribution is vulnerable to a [[man-in-the-middle attack]] when used without authentication to the same extent as any classical protocol, since no known principle of quantum mechanics can distinguish friend from foe. As in the classical case, Alice and Bob cannot authenticate each other and establish a secure connection without some means of verifying each other's identities (such as an initial shared secret). If Alice and Bob have an initial shared secret then they can use an unconditionally secure authentication scheme (such as [[Carter-Wegman MAC|Carter-Wegman]],<ref>M. N. Wegman and J. L. Carter, "New hash functions and their use in authentication and set equality, Journal of Computer and System Sciences", 22, pp 265-279, (1981)</ref>) along with quantum key distribution to exponentially expand this key, using a small amount of the new key to authenticate the next session.<ref>Romain Alleaume, et al. "SECOQC White Paper on Quantum Key Distribution and Cryptography" arXiv:quant-ph/0701168v1 pp. 7 (2007) ([http://arxiv.org/abs/quant-ph/0701168])</ref> Several methods to create this initial shared secret have been proposed, for example using a 3rd party<ref>Z. Zhang, J. Liu, D. Wang and S. Shi "Quantum direct communication with authentication" Phys. Rev. A 75, 026301 (2007)</ref> or chaos theory.<ref>D. Huang, Z. Chen, Y. Guo and M. Lee "Quantum Secure Direct Communication Based on Chaos with Authentication", Journal of the Physical Society of Japan Vol. 76 No. 12, 124001 (2007) ([http://jpsj.ipap.jp/link?JPSJ/76/124001/])</ref> Nevertheless only "almost strongly universal" family of hash functions can be used for unconditionally secure authentication.<ref>[http://www.lysator.liu.se/~jc/mthesis/5_Unconditionally_secure_au.html 5. Unconditionally secure authentication]</ref>
| |
| | |
| === Photon number splitting attack ===
| |
| In the [[BB84]] protocol Alice sends quantum states to Bob using single photons. In practice many implementations use laser pulses attenuated to a very low level to send the quantum states. These laser pulses contain a very small number of photons, for example 0.2 photons per pulse, which are distributed according to a [[Poissonian distribution]]. This means most pulses actually contain no photons (no pulse is sent), some pulses contain 1 photon (which is desired) and a few pulses contain 2 or more photons. If the pulse contains more than one photon, then Eve can split off the extra photons and transmit the remaining single photon to Bob. This is the basis of the photon number splitting attack,<ref>G. Brassard, N. Lütkenhaus, T. Mor, and B. C. Sanders. "Limitations on practical quantum cryptography." Physical Review Letters, 85(6):1330+ (2000)</ref> where Eve stores these extra photons in a quantum memory until Bob detects the remaining single photon and Alice reveals the encoding basis. Eve can then measure her photons in the correct basis and obtain information on the key without introducing detectable errors.
| |
| | |
| Even with the possibility of a PNS attack a secure key can still be generated, as shown in the GLLP security proof,<ref name="GLLP" /> however a much higher amount of privacy amplification is needed reducing the secure key rate significantly (with PNS the rate scales as <math>t^2</math> as compared to <math>t</math> for a single photon sources, where <math>t</math> is the transmittance of the quantum channel).
| |
| | |
| There are several solutions to this problem. The most obvious is to use a true single photon
| |
| source instead of an attenuated laser. While such sources are still at a developmental stage QKD has been carried out successfully with them.<ref>P. M. Intallura, , M. B. Ward, O. Z. Karimov, Z. L. Yuan, P. See, A. J. Shields, P. Atkinson, and D. A. Ritchie, Appl. Phys. Lett. 91, 161103 (2007)</ref> However as current sources operate at a low efficiency and frequency key rates and transmission distances are limited. Another solution is to modify the BB84 protocol, as is done for example in the [[SARG04]] protocol,<ref>V. Scarani, A. Ac´ın, G. Ribordy and N. Gisin, Phys. Rev. Lett. 92, 057901 (2004)</ref> in which the secure key rate scales as <math>t^{3/2}</math>. The most promising solution is the decoy state idea,<ref>W.-Y. Hwang, Phys. Rev. Lett. 91, 057901 (2003)</ref> in which Alice randomly sends some of her laser pulses with a lower average photon number. These decoy states can be used to detect a PNS attack, as Eve has no way to tell which pulses are signal and which decoy. Using this idea the secure key rate scales as <math>t</math>, the same as for a single photon source. This idea has been implemented successfully first at University of Toronto,<ref>Y.Zhao, B. Qi, X. Ma, H.-K. Lo, and L. Qian, Phys. Rev. Lett., 96, 070502 (2006).</ref><ref>Y.Zhao, B. Qi, X. Ma, H.-K. Lo, and L. Qian, in Proc. IEEE ISIT, pp. 2094--2098 (2006).</ref> and in several follow-up QKD experiments,<ref>Z. L. Yuan, A. W. Sharpe, and A. J. Shields, Appl. Phys.
| |
| Lett. 90, 011118 (2007)</ref> allowing for high key rates secure against all known attacks.
| |
| | |
| === Denial of service ===
| |
| Because currently a dedicated fibre optic line (or line of sight in free space) is required between the two points linked by quantum key distribution, a [[denial of service attack]] can be mounted by simply cutting or blocking the line. This is one of the motivations for the development of [[quantum network|quantum key distribution networks]], which would route communication via alternate links in case of disruption.
| |
| | |
| === Security Proofs ===
| |
| If Eve is assumed to have unlimited resources, for example both classical and quantum computing power, there are many more attacks possible. BB84 has been proven secure against any attacks allowed by quantum mechanics, both for sending information using an ideal photon source which only ever emits a single photon at a time,<ref>P. W. Shor and J. Preskill, Physical Review Letters 85, 441 (2000)</ref> and also using practical photon sources which sometimes emit multiphoton pulses.<ref name="GLLP">D. Gottesman, H.-K. Lo, N. L¨utkenhaus, and J. Preskill, Quant. Inf. Comp. 4, 325 (2004)</ref> These proofs are unconditionally secure in the sense that no conditions are imposed on the resources available to the eavesdropper, however there are other conditions required:
| |
| # Eve cannot physically access Alice and Bob's encoding and decoding devices.
| |
| # The random number generators used by Alice and Bob must be trusted and truly random (for example a [[Hardware random number generator|Quantum random number generator]]).
| |
| # The classical communication channel must be authenticated using an [[Man-in-the-middle attack#Quantum cryptography|unconditionally secure authentication]] scheme.
| |
| # The message must be encrypted using [[one-time pad]] like scheme.
| |
| | |
| == Quantum Hacking ==
| |
| Hacking attacks target vulnerabilities in the operation of a QKD protocol or deficiencies in the components of the physical devices used in construction of the QKD system. If the equipment used in quantum key distribution can be tampered with, it could be made to generate keys that were not secure using a [[random number generator attack]]. Another common class of attacks is the [[Trojan horse]] attack<ref>Vakhitov, A. V. Makarov and D. R. Hjelme, J. Mod. Opt. 48, 2023 (2001)</ref> which does not require physical access to the endpoints: rather than attempt to read Alice and Bob's single photons, Eve sends a large pulse of light back to Alice in between transmitted photons. Alice's equipment reflects some of Eve's light, revealing the state of Alice's basis (e.g., a polarizer). This attack can be detected, e.g. by using a classical detector to check the non-legitimate signals (i.e. light from Eve) entering Alice's system. It is also conjectured that most hacking attacks can similarly be defeated by modifying the implementation, though there is no formal proof.
| |
| | |
| Several other attacks including faked-state attacks,<ref>V. Makarov and D. R. Hjelme, J. Mod. Opt. 52, 691. (2005)</ref> phase remapping attacks<ref>C.-H. F. Fung, B. Qi, K. Tamaki, and H.-K. Lo, Phys. Rev. A 75, 032314. (2007)</ref> and time-shift attacks.<ref>B. Qi, C.-H. F. Fung, H.-K. Lo, and X. Ma, Quant. Info. Compu. 7, 43 (2007)</ref> are now known. The time-shift attack has even been demonstrated on a commercial quantum cryptosystem.<ref>Y. Zhao, C.-H. F. Fung, B. Qi, C. Chen, and H.-K. Lo, Phys. Rev. A 78:042333 (2008)</ref> This is the first demonstration of quantum hacking against a non-homemade quantum key distribution system. Later on, the phase-remapping attack was also demonstrated on a commercial QKD system (made and sold by the Swiss company [[Id Quantique]]).<ref>F. Xu, B. Qi, and H.-K. Lo, New J. Phys. 12, 113026 (2010)</ref> It is one of the first ‘intercept-and-resend’ attacks on top of a widely used QKD implementation in commercial QKD systems. This work has been widely reported in media.<ref>[http://www.theregister.co.uk/2010/05/18/quantum_crypto_attack/ Quantum crypto boffins in successful backdoor sniff - Erroneous error-handling undermines bulletproofness] retrieved 2010-05-26</ref><ref>[http://www.nature.com/news/2010/100520/full/news.2010.256.html Quantum crack in cryptographic armour : Nature News]</ref><ref>{{cite news| url=http://www.economist.com/node/16681905 | work=The Economist | title=Light fantastic | date=26 July 2010}}</ref><ref>[http://physicsworld.com/cws/article/news/42667 Quantum cryptography system hacked - physicsworld.com]</ref>
| |
| | |
| The first attack that claimed to be able to eavesdrop the whole key <ref>L. Lydersen, C. Wiechers, C. Wittmann, D. Elser, J. Skaar and V. Makarov, Nat. Photonics 4, 686 (2010)</ref> without leaving any trace was demonstrated in 2010. It was experimentally shown that the single-photon detectors in two commercial devices could be fully remote-controlled using specially tailored bright illumination. In a spree of publications<ref>L. Lydersen, C. Wiechers, C. Wittmann, D. Elser, J. Skaar and V. Makarov, Opt. Exp. 18, 27938 (2010)</ref><ref>C. Wiechers, L. Lydersen, C.Wittmann, D. Elser, J. Skaar, Ch. Marquardt, V. Makarov and G. Leuchs, New J. Phys. 13, 013043 (2011)</ref><ref>N. Jain, C. Wittmann, L.
| |
| Lydersen, C. Wiechers, D. Elser, Ch. Marquardt, V. Makarov and G. Leuchs, Phys. Rev. Lett. 107, 110501 (2011)</ref> thereafter, the collaboration between the [[Norwegian University of Science and Technology]] in Norway and [[Max Planck Institute for the Science of Light]] in Germany, has now demonstrated several methods to successfully eavesdrop on commercial QKD systems based on weaknesses of [[Avalanche photodiodes]] (APDs) operating in gated mode. This has sparked research on new approaches to securing communications networks.<ref>{{cite journal|author= Richard Hughes and Jane Nordholt |title= Refining Quantum Cryptography |journal=Science|pages= 1584–6 |volume= 333 |date= 16 September 2011|doi= 10.1126/science.1208527|pmid= 21921186|issue= 6049|bibcode = 2011Sci...333.1584H }}</ref>
| |
| | |
| ==Counterfactual Quantum Key Distribution==
| |
| The task of distributing a secret key could be achieved even when the particle (on which the secret information, e.g. polarization, has been encoded) does not traverse through the quantum channel. A protocol developed by Tae-Gon Noh.<ref>Tae-Gon Noh, ''Counterfactual Quantum Cryptography,'' Physical Review Letters, 103, Issue 23, 230501 (2009) serves to explain how this non-intuitive or counterfactual idea actually works.</ref> Here Alice generates a photon which randomly takes either path (a) or path (b). Path (a) stays inside Alice's secure device and path (b) goes to Bob. By rejecting the photons that Bob receives and only accepting the ones he doesn't receive, Bob & Alice can set up a secure channel, i.e. Eve's attempts to read the ''counterfactual'' photons would still be detected. This protocol uses the quantum phenomenon whereby the possibility that a photon can be sent has an effect even when it isn't sent. So-called [[Interaction-free measurement]] also uses this quantum effect, as for example in the
| |
| [[Elitzur-Vaidman bomb-testing problem|bomb testing problem]], whereby you can determine which bombs are not duds without setting them off, except in a [[counterfactual definiteness|counterfactual]] sense.
| |
| | |
| == History ==
| |
| Quantum cryptography was proposed first by [[Stephen Wiesner]], then at Columbia University in New York, who, in the early 1970s, introduced the concept of quantum conjugate coding. His seminal paper titled "Conjugate Coding" was rejected by IEEE Information Theory but was eventually published in 1983 in SIGACT News (15:1 pp. 78–88, 1983). In this paper he showed how to store or transmit two messages by encoding them in two "conjugate observables", such as linear and circular polarization of light, so that either, but not both, of which may be received and decoded. He illustrated his idea with a design of unforgeable bank notes. A decade later, building upon this work, [[Charles H. Bennett (computer scientist)|Charles H. Bennett]], of the IBM [[Thomas J. Watson Research Center]], and [[Gilles Brassard]], of the Université de Montréal, proposed a method for secure communication based on Wiesner’s "conjugate observables". In 1990, independently and initially unaware of the earlier work, [[Artur Ekert]], then a Ph.D. student at [[Wolfson College, Oxford|Wolfson College, University of Oxford]], developed a different approach to quantum key distribution based on peculiar quantum correlations known as quantum entanglement.
| |
| | |
| == Future ==
| |
| {{unreferenced section|date=June 2013}}
| |
| The current commercial systems are aimed mainly at governments and corporations with high security requirements. Key distribution by courier is typically used in such cases, where traditional key distribution schemes are not believed to offer enough guarantee. This has the advantage of not being intrinsically distance limited, and despite long travel times the transfer rate can be high due to the availability of large capacity portable storage devices. The major difference of quantum key distribution is the ability to detect any interception of the key, whereas with courier the key security cannot be proven or tested. QKD (Quantum Key Distribution) systems also have the advantage of being automatic, with greater reliability and lower operating costs than a secure human courier network.
| |
| | |
| Factors preventing wide adoption of quantum key distribution outside high security areas include the cost of equipment, and the lack of a demonstrated threat to existing key exchange protocols. However, with optic fibre networks already present in many countries the infrastructure is in place for a more widespread use.
| |
| | |
| == See also ==
| |
| * [[List of quantum key distribution protocols]]
| |
| * [[Quantum Computing]]
| |
| * [[Quantum Cryptography]]
| |
| * [[Quantum Information Science]]
| |
| * [[Quantum Network]]
| |
| | |
| ==External links==
| |
| *'''General and Review'''
| |
| ** [https://uwaterloo.ca/institute-for-quantum-computing/quantum-computing-101 Quantum Computing 101]
| |
| ** [http://www.sciam.com/article.cfm?chanID=sa006&articleID=000479CD-F58C-11BE-AD0683414B7F0000 Scientific American Magazine (January 2005 Issue) Best-Kept Secrets] Non-technical article on quantum cryptography
| |
| ** [http://physicsweb.org/articles/world/20/3/4/1 Physics World Magazine (March 2007 Issue)] Non-technical article on current state and future of quantum communication
| |
| ** [http://arxiv.org/abs/0802.4155 arXiv:0802.4155 (quant-ph)] February 2008 review of Quantum Cryptography
| |
| ** [http://arxiv.org/abs/quant-ph/0702202 arXiv:quant-ph/0702202v3] March 2007 review of Quantum Cryptography
| |
| ** [http://www.secoqc.net/downloads/secoqc_crypto_wp.pdf SECOQC White Paper on Quantum Key Distribution and Cryptography] European project to create a large scale quantum cryptography network, includes discussion of current QKD approaches and comparison with classical cryptography
| |
| ** [http://obfusc.at/ed/cryptography_eng.html The future of cryptography] May 2003 Tomasz Grabowski
| |
| ** [http://qist.lanl.gov/qcrypt_map.shtml ARDA Quantum Cryptography Roadmap]
| |
| ** [http://www.quantware.ups-tlse.fr/IHP2006/ Lectures at the Institut Henri Poincaré (slides and videos)]
| |
| ** [http://www.didaktik.physik.uni-erlangen.de/quantumlab/english/index.html Interactive quantum cryptography demonstration experiment with single photons for education]
| |
| | |
| *'''More Specific Information'''
| |
| ** Description of entanglement based quantum cryptography from Artur Ekert <ref>{{cite web|last=Eker |first=Artur |url=http://pass.maths.org.uk/issue35/features/ekert/index.html |title=Cracking codes, part II | plus.maths.org |publisher=Pass.maths.org.uk |date= |accessdate=2013-12-28}}</ref>
| |
| ** Description of BB84 protocol and privacy amplification by Sharon Goldwater <ref>{{cite web|url=http://www.ai.sri.com/~goldwate/quantum.html |title=Quantum Cryptography and Privacy Amplification |publisher=Ai.sri.com |date= |accessdate=2013-12-28}}</ref>
| |
| ** Original paper on the BB84 Protocol for Quantum Cryptography <ref>[http://quantum.bbn.com/dscgi/ds.py/Get/File-18/BB84.pdf ]{{dead link|date=December 2013}}</ref>
| |
| ** Original paper on Entanglement-based quantum cryptography <ref>[http://quantum.bbn.com/dscgi/ds.py/Get/File-369/Ekert_-_QKD_Based_On_Bells_Theorem.pdf ]{{dead link|date=December 2013}}</ref>
| |
| | |
| *'''Further Information'''
| |
| ** [http://www.quantiki.org/ Quantiki.org - Quantum Information portal and wiki]
| |
| ** [http://fredhenle.net/bb84/ Interactive BB84 simulation]
| |
| ** [http://research.physics.uiuc.edu/QI/Photonics/movies/bb84.swf Flash simulation of BB84]
| |
| | |
| *'''Quantum Cryptography Research Groups'''
| |
| ** [http://www.quantenkryptographie.at/ Experimental Quantum Cryptography with Entangled Photons]
| |
| ** [http://w3.antd.nist.gov/quin.shtml NIST Quantum Information Networks]
| |
| ** [http://xqp.physik.uni-muenchen.de/ Free Space Quantum Cryptography]
| |
| ** [http://www.mpl.mpg.de/index.php?id=125&L=0#QKD Experimental Continuous Variable QKD, MPL Erlangen]
| |
| ** [http://www.fysel.ntnu.no/groups/optics/qcr/ The Quantum Hacking group]
| |
| ** [http://www.mpl.mpg.de/index.php?id=125&L=0#QC Experimental Quantum Hacking, MPL Erlangen]
| |
| | |
| *'''Companies selling quantum devices for cryptography'''
| |
| ** [http://idquantique.com id Quantique] sells Quantum Key Distribution products
| |
| ** [http://magiqtech.com MagiQ Technologies] sells quantum devices for cryptography
| |
| ** [http://www.quintessencelabs.com QuintessenceLabs] Solutions based on continuous wave lasers
| |
| ** [http://www.sequrenet.com SeQureNet] sells Quantum Key Distribution products using continuous-variables
| |
| | |
| *'''Companies with quantum cryptography research programmes'''
| |
| ** [http://www.toshiba-europe.com/research/crl/qig/quantumkeyserver.html Toshiba]
| |
| ** [http://www.hpl.hp.com/research/qip/ Hewlett Packard]
| |
| ** [http://www.almaden.ibm.com/st/quantum_information/qcrypt/ IBM]
| |
| ** [http://global.mitsubishielectric.com/bu/security/rd/rd03.html Mitsubishi]
| |
| ** [http://www.nec.co.jp/rd/Eng/Topics/index.html NEC]
| |
| ** [http://www.brl.ntt.co.jp/E/research/qo/qo.html NTT]
| |
| ** [http://www.ait.ac.at/departments/safety-security/business-units/quantum-technologies/?L=1 AIT]
| |
| | |
| ==References==
| |
| <!--This article uses the Cite.php citation mechanism. If you would like more information on how to add references to this article, please see http://meta.wikimedia.org/wiki/Cite/Cite.php -->
| |
| {{Reflist|2}}
| |
| | |
| {{quantum computing}}
| |
| | |
| {{DEFAULTSORT:Quantum Key Distribution}}
| |
| [[Category:Cryptography]]
| |
| [[Category:Quantum information science]]
| |
| [[Category:Quantum cryptography]]
| |