skip to main content
OSTI.GOV title logo U.S. Department of Energy
Office of Scientific and Technical Information

Title: Quantum key management

Abstract

Innovations for quantum key management harness quantum communications to form a cryptography system within a public key infrastructure framework. In example implementations, the quantum key management innovations combine quantum key distribution and a quantum identification protocol with a Merkle signature scheme (using Winternitz one-time digital signatures or other one-time digital signatures, and Merkle hash trees) to constitute a cryptography system. More generally, the quantum key management innovations combine quantum key distribution and a quantum identification protocol with a hash-based signature scheme. This provides a secure way to identify, authenticate, verify, and exchange secret cryptographic keys. Features of the quantum key management innovations further include secure enrollment of users with a registration authority, as well as credential checking and revocation with a certificate authority, where the registration authority and/or certificate authority can be part of the same system as a trusted authority for quantum key distribution.

Inventors:
; ;
Publication Date:
Research Org.:
Los Alamos National Lab. (LANL), Los Alamos, NM (United States)
Sponsoring Org.:
USDOE
OSTI Identifier:
1333682
Patent Number(s):
9,509,506
Application Number:
13/599,816
Assignee:
LOS ALAMOS NATIONAL SECURITY, LLC (Los Alamos, NM) LANL
DOE Contract Number:  
AC52-06NA25396
Resource Type:
Patent
Resource Relation:
Patent File Date: 2012 Aug 30
Country of Publication:
United States
Language:
English
Subject:
97 MATHEMATICS AND COMPUTING; 99 GENERAL AND MISCELLANEOUS

Citation Formats

Hughes, Richard John, Thrasher, James Thomas, and Nordholt, Jane Elizabeth. Quantum key management. United States: N. p., 2016. Web.
Hughes, Richard John, Thrasher, James Thomas, & Nordholt, Jane Elizabeth. Quantum key management. United States.
Hughes, Richard John, Thrasher, James Thomas, and Nordholt, Jane Elizabeth. Tue . "Quantum key management". United States. https://www.osti.gov/servlets/purl/1333682.
@article{osti_1333682,
title = {Quantum key management},
author = {Hughes, Richard John and Thrasher, James Thomas and Nordholt, Jane Elizabeth},
abstractNote = {Innovations for quantum key management harness quantum communications to form a cryptography system within a public key infrastructure framework. In example implementations, the quantum key management innovations combine quantum key distribution and a quantum identification protocol with a Merkle signature scheme (using Winternitz one-time digital signatures or other one-time digital signatures, and Merkle hash trees) to constitute a cryptography system. More generally, the quantum key management innovations combine quantum key distribution and a quantum identification protocol with a hash-based signature scheme. This provides a secure way to identify, authenticate, verify, and exchange secret cryptographic keys. Features of the quantum key management innovations further include secure enrollment of users with a registration authority, as well as credential checking and revocation with a certificate authority, where the registration authority and/or certificate authority can be part of the same system as a trusted authority for quantum key distribution.},
doi = {},
journal = {},
number = ,
volume = ,
place = {United States},
year = {2016},
month = {11}
}

Patent:

Save / Share:

Works referenced in this record:

Free-space quantum-key distribution
journal, April 1998

  • Buttler, W. T.; Hughes, R. J.; Kwiat, P. G.
  • Physical Review A, Vol. 57, Issue 4, p. 2379-2382
  • DOI: 10.1103/PhysRevA.57.2379

Practical Free-Space Quantum Key Distribution over 1 km
journal, October 1998

  • Buttler, W. T.; Hughes, R. J.; Kwiat, P. G.
  • Physical Review Letters, Vol. 81, Issue 15, p. 3283-3286
  • DOI: 10.1103/PhysRevLett.81.3283

Secure Identification and QKD in the Bounded-Quantum-Storage Model
book, January 2007


Quantum secret sharing
journal, March 1999

  • Hillery, Mark; Bužek, Vladimír; Berthiaume, André
  • Physical Review A, Vol. 59, Issue 3, p. 1829-1834
  • DOI: 10.1103/PhysRevA.59.1829

Quantum Cryptography over Underground Optical Fibers
book, January 1996

  • Hughes, R. J.; Luther, G. G.; Morgan, G. L.
  • Advances in Cryptology — CRYPTO ’96, p. 329-342
  • DOI: 10.1007/3-540-68697-5_25

Secure communications using quantum cryptography
conference, July 1997

  • Hughes, Richard J.; Buttler, William T.; Kwiat, Paul G.
  • Photonic Quantum Computing Proceedings, Vol. 3076
  • DOI: 10.1117/12.277644

Custom hardware to eliminate bottlenecks in QKD throughput performance
conference, September 2007

  • Mink, Alan; Arakawa, Yasuhiko; Sasaki, Masahide
  • Quantum Communications Realized, Vol. 6780
  • DOI: 10.1117/12.733136

Present and future free-space quantum key distribution
conference, April 2002

  • Nordholt, Jane E.; Hughes, Richard J.; Morgan, George L.
  • Free-Space Laser Communication Technologies XIV, Vol. 4635
  • DOI: 10.1117/12.464085

Long-Distance Decoy-State Quantum Key Distribution in Optical Fiber
journal, January 2007

  • Rosenberg, Danna; Harrington, Jim W.; Rice, Patrick R.
  • Physical Review Letters, Vol. 98, Issue 1, Article No. 010503
  • DOI: 10.1103/PhysRevLett.98.010503

Quantum key distribution at telecom wavelengths with noise-free detectors
journal, January 2006

  • Rosenberg, Danna; Nam, Sae Woo; Hiskett, Philip A.
  • Applied Physics Letters, Vol. 88, Issue 2, Article No. 021108
  • DOI: 10.1063/1.2164307

Progress toward quantum communications networks: opportunities and challenges
conference, February 2007

  • Runser, Robert J.; Chapuran, Thomas; Toliver, Paul
  • Optoelectronic Integrated Circuits IX, Vol. 6476
  • DOI: 10.1117/12.708669

New Efficient Three-Party Quantum Key Distribution Protocols
journal, January 2009

  • Shih, Han-Cheng; Lee, Kuo-Chang; Hwang, Tzonelih
  • IEEE Journal of Selected Topics in Quantum Electronics, Vol. 15, Issue 6, p. 1602-1606
  • DOI: 10.1109/JSTQE.2009.2019617

Experimental investigation of quantum key distribution through transparent optical switch elements
journal, November 2003

  • Toliver, P.; Runser, R. J.; Chapuran, T. E.
  • IEEE Photonics Technology Letters, Vol. 15, Issue 11, p. 1669-1671
  • DOI: 10.1109/LPT.2003.818687

New hash functions and their use in authentication and set equality
journal, June 1981

  • Wegman, Mark N.; Carter, J. Lawrence
  • Journal of Computer and System Sciences, Vol. 22, Issue 3, p. 265-279
  • DOI: 10.1016/0022-0000(81)90033-7