skip to main content
OSTI.GOV title logo U.S. Department of Energy
Office of Scientific and Technical Information

Title: Demonstration of provably secure quantum key distribution (QKD)

Abstract

Optimized Quantum Key Distribution (QKD) protocols revolutionize the cyber security by leveraging the quantum phenomenon for development of unbreakable security. Configurable quantum networks are necessary for accessible quantum applications amongst multiple users. Quantum key distribution is particularly interesting because of the many ways in which the key exchange can be carried out. Keys can be exchanged by encoding the key into a weak photon source using classical methods, or the keys can be exchanged using pairs of photons entangled at the source, or the keys can even be exchanged by encoding with classical hardware at the source with an entangling measurement which occurs at the photons destination. Each type of quantum key exchange has its own requirements that must be met for point-to-point implementations which makes it exceedingly difficult to implement multi-node quantum networks. We propose a programmable network model to time encoded quantum key distribution; this version of QKD sends entangled photons to two users and the hardware is setup such that the relative time shift in the coincident photons encodes which measurement basis was used. The protocols were first simulated by modifying previous software which used the CHP quantum simulator, and then a point-to-point key exchange was setupmore » in hardware to demonstrate the time encoding aspects of the protocol.« less

Authors:
 [1]; ORCiD logo [2];  [1]; ORCiD logo [2]
  1. U.S. Army Research Laboratory, Aberdeen Proving Ground, MD
  2. ORNL
Publication Date:
Research Org.:
Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States)
Sponsoring Org.:
USDOE Office of Science (SC), Advanced Scientific Computing Research (ASCR) (SC-21)
OSTI Identifier:
1460208
DOE Contract Number:  
AC05-00OR22725
Resource Type:
Conference
Resource Relation:
Conference: Disruptive Technologies in Information Sciences - Orlando, Florida, United States of America - 4/16/2018 4:00:00 AM-4/20/2018 4:00:00 AM
Country of Publication:
United States
Language:
English

Citation Formats

Dasari, Venkat, Sadlier, Ronald J., Geerhart, Billy, and Humble, Travis S. Demonstration of provably secure quantum key distribution (QKD). United States: N. p., 2018. Web.
Dasari, Venkat, Sadlier, Ronald J., Geerhart, Billy, & Humble, Travis S. Demonstration of provably secure quantum key distribution (QKD). United States.
Dasari, Venkat, Sadlier, Ronald J., Geerhart, Billy, and Humble, Travis S. Tue . "Demonstration of provably secure quantum key distribution (QKD)". United States. https://www.osti.gov/servlets/purl/1460208.
@article{osti_1460208,
title = {Demonstration of provably secure quantum key distribution (QKD)},
author = {Dasari, Venkat and Sadlier, Ronald J. and Geerhart, Billy and Humble, Travis S.},
abstractNote = {Optimized Quantum Key Distribution (QKD) protocols revolutionize the cyber security by leveraging the quantum phenomenon for development of unbreakable security. Configurable quantum networks are necessary for accessible quantum applications amongst multiple users. Quantum key distribution is particularly interesting because of the many ways in which the key exchange can be carried out. Keys can be exchanged by encoding the key into a weak photon source using classical methods, or the keys can be exchanged using pairs of photons entangled at the source, or the keys can even be exchanged by encoding with classical hardware at the source with an entangling measurement which occurs at the photons destination. Each type of quantum key exchange has its own requirements that must be met for point-to-point implementations which makes it exceedingly difficult to implement multi-node quantum networks. We propose a programmable network model to time encoded quantum key distribution; this version of QKD sends entangled photons to two users and the hardware is setup such that the relative time shift in the coincident photons encodes which measurement basis was used. The protocols were first simulated by modifying previous software which used the CHP quantum simulator, and then a point-to-point key exchange was setup in hardware to demonstrate the time encoding aspects of the protocol.},
doi = {},
journal = {},
number = ,
volume = ,
place = {United States},
year = {2018},
month = {5}
}

Conference:
Other availability
Please see Document Availability for additional information on obtaining the full-text document. Library patrons may search WorldCat to identify libraries that hold this conference proceeding.

Save / Share: