Abstract
The security of conventional or classical cryptography systems relies upon the supposed (but often unproven) difficulty of solving certain classes of mathematical problem. Quantum cryptography represents a new paradigm for secure communications systems since its security is based not on computational complexity, but instead on the laws of quantum physics, the same fundamental laws that govern the behaviour of the universe. For brevity, this paper concentrates solely on providing a simple overview of the practical security problems that quantum cryptography addresses and the basic concepts that underlie the technique. The accompanying talk will also cover this introductory material, but the main emphasis will be on practical applications of quantum cryptography in optical fiber systems. In particular, I will describe a number of experimental systems that have been developed and tested recently at BT Laboratories. The experimental results will be used to provides some insights about the likely performance parameters and application opportunities for this new technology.
Chapter PDF
Keywords
- Quantum Cryptography
- Electronics Letter
- Data Encryption Standard
- Optical Fiber System
- Privacy Amplification
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
C. H. Bennett, ‘Quantum information and computation’, Physics Today, October (1995), for a review of this topic.
W. K. Wootters and W. H. Zurek, ‘A single quantum cannot be cloned’, Nature, 299 802–803 (1982)
C. H. Bennett and G. Brassard, ‘Quantum cryptography: public-key distribution and coin tossing’, in Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, India, 175–179 (1984).
C. H. Bennett, F. Bessette, G. Brassard, L. Salvail and J. Smolin, ‘Experimental quantum cryptography’, Journal of Cryptology, 5 3–28 (1992).
A. K. Ekert, ‘Quantum cryptography based on Bell’s Theorem’, Physical Review Letters, 67 661–663 (1991)
P. D. Townsend, ‘Quantum cryptography on multi-user optical fiber networks’, Nature, 385, 47–49 (1997)
C. Marand and P. D. Townsend, ‘Quantum key distribution over distances as long as 30km’, Optics Letters, 20 1695–1697 (1995)
J. D. Franson and B. C. Jacobs, ‘Operational system for quantum cryptography’, Electronics Letters, 31 232–234 (1995)
R. J. Hughes, G. G. Luther, G. L. Morgan and C. Simmons, ‘Quantum cryptography over 14km of installed optical fiber’, Proc. 7th Rochester Conf. on Coherence and Quantum Optics (eds J. H. Eberly, L. Mandel and E. Wolf), 103–112 (Plenum, New York, 1996)
H. Zbinden, J. D. Gautier, N. Gisin, B. Huttner, A. Muller, and W. Tittel, ‘Interferometry with Faraday mirrors for quantum cryptography’, Electronics Letters, 33, 586–587 (1997)
G. S. Vernam, J. Amer. Inst. Electr. Engrs., 45, 109–115 (1926)
C. E. Shannon, ‘Communication theory of secrecy systems’, Bell Syst. Tech. J., 28, 656–715 (1949)
H. Beker and F. Piper, Cipher Systems: the Protection of Communications, (Northwood Publications, London, 1982). See also G. Brassard, Modern Cryptology, Lecture Notes in Computer Science, eds G. Goos and J. Hartmanis (Springer-Verlag, Berlin, 1988)
P Shor, ‘Algorithms for quantum computation: Discrete logarithm and factoring’, Proc. 35th Annual IEEE Symposium on Foundations of Computer Science (IEEE Computer Society Press, 1994), 124–134
A. K. Ekert, B. Huttner, G. M. Palma and A. Peres, ‘Eavesdropping on quantum cryptosystems’, Physical Review A 50, 1047–1056 (1994)
B. Huttner and A. K. Ekert, ‘Information gain in quantum eavesdropping’, J. Mod. Opt., 41, 2455–2466 (1994)
C. H. Bennett, G. Brassard and J.-M. Robert, ‘Privacy amplification by public discussion’, SIAM Journal on Computing, 17 210–229 (1988).
C. H. Bennett, G. Brassard, C. Crepeau and U. Maurer, ‘Generalized privacy amplification’, SIAM Journal on Computing, 17 210–229 (1988).
M. N. Wegman and J. L. Carter, ‘New hash functions and their use in authentication and set equality’, J. Computer and System Sciences, 22, 265–279 (1981)
P. D. Townsend, J. G. Rarity and P. R. Tapster, ‘Single-photon interference in a 10km long optical fiber interferometer’, Electronics Letters, 29 634–635 (1993)
P. D. Townsend, ‘Secure key distribution system based on quantum cryptography’, Electronics Letters, 30 809–810 (1994)
S. J. D. Phoenix and P. D. Townsend, ‘Quantum cryptography: how to beat the code breakers using quantum mechanics’, Contemporary Physics, 36 165–195 (1995)
P. D. Townsend, ‘Quantum cryptography on optical fiber networks’, Optical Fiber Technology, (In Press)
P. D. Townsend, ‘Simultaneous quantum cryptographic key distribution and conventional data transmission over installed fiber using wavelength division multiplexing’, Electronics Letters, 33 188–189 (1997)
P. D. Townsend, S. J. D. Phoenix, K. J. Blow and S. M. Barnett, ‘Design of quantum cryptography systems for passive optical networks’, Electronics Letters, 30 1875–1877 (1994). See also S. J. D. Phoenix, S. M. Barnett, P. D. Townsend and K. J. Blow, ‘Multi-user quantum cryptography on optical networks’, Journal of Modern Optics, 42, 1155–1163 (1995) 18–19
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 1998 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Townsend, P.D. (1998). Quantum cryptography on optical fiber networks. In: Pritchard, D., Reeve, J. (eds) Euro-Par’98 Parallel Processing. Euro-Par 1998. Lecture Notes in Computer Science, vol 1470. Springer, Berlin, Heidelberg. https://doi.org/10.1007/BFb0057837
Download citation
DOI: https://doi.org/10.1007/BFb0057837
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-64952-6
Online ISBN: 978-3-540-49920-6
eBook Packages: Springer Book Archive