Photonic quantum digital signatures operating over kilometer ranges in installed optical fiber

RJ Collins, M Fujiwara, R Amiri, T Honjo… - … and Technology II, 2016 - spiedigitallibrary.org
RJ Collins, M Fujiwara, R Amiri, T Honjo, K Shimizu, K Tamaki, M Takeoka, E Andersson
Quantum Information Science and Technology II, 2016spiedigitallibrary.org
The security of electronic communications is a topic that has gained noteworthy public
interest in recent years. As a result, there is an increasing public recognition of the existence
and importance of mathematically based approaches to digital security. Many of these
implement digital signatures to ensure that a malicious party has not tampered with the
message in transit, that a legitimate receiver can validate the identity of the signer and that
messages are transferable. The security of most digital signature schemes relies on the …
The security of electronic communications is a topic that has gained noteworthy public interest in recent years. As a result, there is an increasing public recognition of the existence and importance of mathematically based approaches to digital security. Many of these implement digital signatures to ensure that a malicious party has not tampered with the message in transit, that a legitimate receiver can validate the identity of the signer and that messages are transferable.
The security of most digital signature schemes relies on the assumed computational difficulty of solving certain mathematical problems. However, reports in the media have shown that certain implementations of such signature schemes are vulnerable to algorithmic breakthroughs and emerging quantum processing technologies. Indeed, even without quantum processors, the possibility remains that classical algorithmic breakthroughs will render these schemes insecure.
There is ongoing research into information-theoretically secure signature schemes, where the security is guaranteed against an attacker with arbitrary computational resources. One such approach is quantum digital signatures. Quantum signature schemes can be made information-theoretically secure based on the laws of quantum mechanics while comparable classical protocols require additional resources such as anonymous broadcast and/or a trusted authority.
Previously, most early demonstrations of quantum digital signatures required dedicated single-purpose hardware and operated over restricted ranges in a laboratory environment. Here, for the first time, we present a demonstration of quantum digital signatures conducted over several kilometers of installed optical fiber. The system reported here operates at a higher signature generation rate than previous fiber systems.
SPIE Digital Library