Results 1 
3 of
3
Cryptology Column  25 Years of Quantum Cryptography
, 1996
"... The fates of SIGACT News and Quantum Cryptography are inseparably entangled. The exact date of Stephen Wiesner's invention of "conjugate coding" is unknown but it cannot be far from April 1969, when the premier issue of SIGACT Newsor rather SICACT News as it was known at the timecame out. Muc ..."
Abstract

Cited by 6 (4 self)
 Add to MetaCart
The fates of SIGACT News and Quantum Cryptography are inseparably entangled. The exact date of Stephen Wiesner's invention of "conjugate coding" is unknown but it cannot be far from April 1969, when the premier issue of SIGACT Newsor rather SICACT News as it was known at the timecame out. Much later, it was in SIGACT News that Wiesner's paper finally appeared [74] in the wake of the first author's early collaboration with Charles H. Bennett [7]. It was also in SIGACT News that the original experimental demonstration for quantum key distribution was announced for the first time [6] and that a thorough bibliography was published [19]. Finally, it was in SIGACT News that Doug Wiedemann chose to publish his discovery when he reinvented quantum key distribution in 1987, unaware of all previous work but Wiesner's [73, 5]. Most of the first decade of the history of quant
Demonstration of active quantum key distribution network
 Optics and Photonics 06, Proc. SPIE 6305, 630506
, 2006
"... We previously demonstrated a high speed, point to point, quantum key distribution (QKD) system with polarization coding over a fiber link, in which the resulting cryptographic keys were used for onetime pad encryption of real time video signals. In this work, we extend the technology to a threenod ..."
Abstract

Cited by 2 (1 self)
 Add to MetaCart
We previously demonstrated a high speed, point to point, quantum key distribution (QKD) system with polarization coding over a fiber link, in which the resulting cryptographic keys were used for onetime pad encryption of real time video signals. In this work, we extend the technology to a threenode active QKD network one Alice and two Bobs. A QKD network allows multiple users to generate and share secure quantum keys. In comparison with a passive QKD network, nodes in an active network can actively select a destination as a communication partner and therefore, its siftedkey rate can remain at a speed almost as high as that in the pointtopoint QKD. We demonstrate our threenode QKD network in the context of a QKD secured realtime video surveillance system. In principle, the technologies for the threenode network are extendable to multinode networks easily. In this paper, we report our experiments, including the techniques for timing alignment and polarization recovery during switching, and discuss the network architecture and its expandability to multinode networks.
ACHIEVING UNCONDITIONAL SECURITY BY QUANTUM CRYPTOGRAPHY
"... Classical cryptography algorithms are based on mathematical functions. The robustness of a given cryptosystem is based essentially on the secrecy of its (private) key and the difficulty with which the inverse of its oneway function(s) can be calculated. Unfortunately, there is no mathematical proof ..."
Abstract
 Add to MetaCart
Classical cryptography algorithms are based on mathematical functions. The robustness of a given cryptosystem is based essentially on the secrecy of its (private) key and the difficulty with which the inverse of its oneway function(s) can be calculated. Unfortunately, there is no mathematical proof that will establish whether it is not possible to find the inverse of a given oneway function. Since few years ago, the progress of quantum physics allowed mastering photons which can be used for informational ends and these technological progresses can also be applied to cryptography (quantum cryptography). Quantum cryptography or Quantum Key Distribution (QKD) is a method for sharing secret keys, whose security can be formally demonstrated. It aims at exploiting the laws of quantum physics in order to carry out a cryptographic task. Its legitimate users can detect eavesdropping, regardless of the technology which the spy may have. In this study, we present quantum cryptosystems as a tool to attain the unconditional security. We also describe the well known protocols used in the field of quantum cryptography. Keywords:quantum cryptogarphy,quantum key distribtuion, uncondtional security.