2017
DOI: 10.1038/s41467-017-01245-5
|View full text |Cite
|
Sign up to set email alerts
|

Experimental measurement-device-independent quantum digital signatures

Abstract: The development of quantum networks will be paramount towards practical and secure telecommunications. These networks will need to sign and distribute information between many parties with information-theoretic security, requiring both quantum digital signatures (QDS) and quantum key distribution (QKD). Here, we introduce and experimentally realise a quantum network architecture, where the nodes are fully connected using a minimum amount of physical links. The central node of the network can act either as a to… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
63
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 106 publications
(63 citation statements)
references
References 46 publications
0
63
0
Order By: Relevance
“…Although MDI-QKD is immune to all detector sidechannel attacks, our work shows Eve's capability of hacking the source of a QKD system and highlights that further research is needed to protect the system against source side-channel attacks. Moreover, we remark that the laser seeding attack may compromise as well the security of other quantum decoy-state based cryptographic systems beyond QKD, like, for instance, various twoparty protocols with practical signals [74], quantum digital signatures [75,76], and blind quantum computing [77,78].…”
Section: Discussionmentioning
confidence: 99%
“…Although MDI-QKD is immune to all detector sidechannel attacks, our work shows Eve's capability of hacking the source of a QKD system and highlights that further research is needed to protect the system against source side-channel attacks. Moreover, we remark that the laser seeding attack may compromise as well the security of other quantum decoy-state based cryptographic systems beyond QKD, like, for instance, various twoparty protocols with practical signals [74], quantum digital signatures [75,76], and blind quantum computing [77,78].…”
Section: Discussionmentioning
confidence: 99%
“…Here we only take a phase-coding BB84 QKD system as an example to run our model and get excellent experimental results. In principle, this model should also be applicable to any other coding scheme and QKD protocols [17][18][19][20], since the machine learning model only needs enough training data to construct out corresponding mapping relationship between "features" and "labels", and has no requirements for specific systems or protocols. Therefore, we believe that our present machine learning based operating mode could replace traditional "scanning-and-transmitting" program and play an important role in practical applications of large-scale quantum communication networks in the near future.…”
Section: Conclusion and Outlooksmentioning
confidence: 99%
“…If both of the noise factors in the two ghost images, defined as the inverse of signal-to-noise ratio, are lower than the acceptance threshold T h B accept , Bob will accept the message and forwards it to Charlie through the classical channel. The noise factor here is similar to the concept of mismatch in previous QDS [15][16][17][18][19][20][21][22][23] where Bob checks Alice's raw keys to decide whether he accepts the message or not.…”
Section: Protocol Of Multi-bit Quantum Digital Signaturementioning
confidence: 99%
“…Wallden et al furthermore presented QDS protocols [11] requiring only the same technical components as quantum key distribution (QKD), which has been greatly developed over the past two decades [12,13]. Such breakthroughs motivated several notable advances in experimental demonstrations of QDS [14], where the transmission distance has been remarkably extended by utilizing phase-encoded states [15][16][17] and polarization-encoded states [18][19][20] in recent years. Additionally, several pro- * zwei@tsinghua.edu.cn posals have been implemented for improving the security of QDS, such as measurement-device-independent (MDI) QDS [21,22], which is immune to detector side-channel attacks, and passive decoy-state QDS for circumventing the leakage of the signal and decoy information to attackers [23].…”
Section: Introductionmentioning
confidence: 99%