Quantum key management
Abstract
Innovations for quantum key management harness quantum communications to form a cryptography system within a public key infrastructure framework. In example implementations, the quantum key management innovations combine quantum key distribution and a quantum identification protocol with a Merkle signature scheme (using Winternitz one-time digital signatures or other one-time digital signatures, and Merkle hash trees) to constitute a cryptography system. More generally, the quantum key management innovations combine quantum key distribution and a quantum identification protocol with a hash-based signature scheme. This provides a secure way to identify, authenticate, verify, and exchange secret cryptographic keys. Features of the quantum key management innovations further include secure enrollment of users with a registration authority, as well as credential checking and revocation with a certificate authority, where the registration authority and/or certificate authority can be part of the same system as a trusted authority for quantum key distribution.
- Inventors:
- Issue Date:
- Research Org.:
- Los Alamos National Lab. (LANL), Los Alamos, NM (United States)
- Sponsoring Org.:
- USDOE
- OSTI Identifier:
- 1333682
- Patent Number(s):
- 9509506
- Application Number:
- 13/599,816
- Assignee:
- LOS ALAMOS NATIONAL SECURITY, LLC (Los Alamos, NM)
- Patent Classifications (CPCs):
-
H - ELECTRICITY H04 - ELECTRIC COMMUNICATION TECHNIQUE H04L - TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
G - PHYSICS G06 - COMPUTING G06F - ELECTRIC DIGITAL DATA PROCESSING
- DOE Contract Number:
- AC52-06NA25396
- Resource Type:
- Patent
- Resource Relation:
- Patent File Date: 2012 Aug 30
- Country of Publication:
- United States
- Language:
- English
- Subject:
- 97 MATHEMATICS AND COMPUTING; 99 GENERAL AND MISCELLANEOUS
Citation Formats
Hughes, Richard John, Thrasher, James Thomas, and Nordholt, Jane Elizabeth. Quantum key management. United States: N. p., 2016.
Web.
Hughes, Richard John, Thrasher, James Thomas, & Nordholt, Jane Elizabeth. Quantum key management. United States.
Hughes, Richard John, Thrasher, James Thomas, and Nordholt, Jane Elizabeth. Tue .
"Quantum key management". United States. https://www.osti.gov/servlets/purl/1333682.
@article{osti_1333682,
title = {Quantum key management},
author = {Hughes, Richard John and Thrasher, James Thomas and Nordholt, Jane Elizabeth},
abstractNote = {Innovations for quantum key management harness quantum communications to form a cryptography system within a public key infrastructure framework. In example implementations, the quantum key management innovations combine quantum key distribution and a quantum identification protocol with a Merkle signature scheme (using Winternitz one-time digital signatures or other one-time digital signatures, and Merkle hash trees) to constitute a cryptography system. More generally, the quantum key management innovations combine quantum key distribution and a quantum identification protocol with a hash-based signature scheme. This provides a secure way to identify, authenticate, verify, and exchange secret cryptographic keys. Features of the quantum key management innovations further include secure enrollment of users with a registration authority, as well as credential checking and revocation with a certificate authority, where the registration authority and/or certificate authority can be part of the same system as a trusted authority for quantum key distribution.},
doi = {},
journal = {},
number = ,
volume = ,
place = {United States},
year = {2016},
month = {11}
}
Works referenced in this record:
Free-space quantum-key distribution
journal, April 1998
- Buttler, W. T.; Hughes, R. J.; Kwiat, P. G.
- Physical Review A, Vol. 57, Issue 4, p. 2379-2382
Practical Free-Space Quantum Key Distribution over 1 km
journal, October 1998
- Buttler, W. T.; Hughes, R. J.; Kwiat, P. G.
- Physical Review Letters, Vol. 81, Issue 15, p. 3283-3286
Secure Identification and QKD in the Bounded-Quantum-Storage Model
book, January 2007
- Damgård, Ivan B.; Fehr, Serge; Salvail, Louis
- Advances in Cryptology - CRYPTO 2007, p. 342-359
Quantum secret sharing
journal, March 1999
- Hillery, Mark; Bužek, Vladimír; Berthiaume, André
- Physical Review A, Vol. 59, Issue 3, p. 1829-1834
Quantum Cryptography over Underground Optical Fibers
book, January 1996
- Hughes, R. J.; Luther, G. G.; Morgan, G. L.
- Advances in Cryptology — CRYPTO ’96, p. 329-342
Secure communications using quantum cryptography
conference, July 1997
- Hughes, Richard J.; Buttler, William T.; Kwiat, Paul G.
- Photonic Quantum Computing Proceedings, Vol. 3076
Custom hardware to eliminate bottlenecks in QKD throughput performance
conference, September 2007
- Mink, Alan; Arakawa, Yasuhiko; Sasaki, Masahide
- Quantum Communications Realized, Vol. 6780
Present and future free-space quantum key distribution
conference, April 2002
- Nordholt, Jane E.; Hughes, Richard J.; Morgan, George L.
- Free-Space Laser Communication Technologies XIV, Vol. 4635
Quantum Coin-Flipping-Based Authentication
conference, June 2009
- Rass, S.; Schartner, P.; Greiler, M.
- ICC 2009 - 2009 IEEE International Conference on Communications
Long-Distance Decoy-State Quantum Key Distribution in Optical Fiber
journal, January 2007
- Rosenberg, Danna; Harrington, Jim W.; Rice, Patrick R.
- Physical Review Letters, Vol. 98, Issue 1, Article No. 010503
Quantum key distribution at telecom wavelengths with noise-free detectors
journal, January 2006
- Rosenberg, Danna; Nam, Sae Woo; Hiskett, Philip A.
- Applied Physics Letters, Vol. 88, Issue 2, Article No. 021108
Progress toward quantum communications networks: opportunities and challenges
conference, February 2007
- Runser, Robert J.; Chapuran, Thomas; Toliver, Paul
- Optoelectronic Integrated Circuits IX, Vol. 6476
New Efficient Three-Party Quantum Key Distribution Protocols
journal, January 2009
- Shih, Han-Cheng; Lee, Kuo-Chang; Hwang, Tzonelih
- IEEE Journal of Selected Topics in Quantum Electronics, Vol. 15, Issue 6, p. 1602-1606
Experimental investigation of quantum key distribution through transparent optical switch elements
journal, November 2003
- Toliver, P.; Runser, R. J.; Chapuran, T. E.
- IEEE Photonics Technology Letters, Vol. 15, Issue 11, p. 1669-1671
New hash functions and their use in authentication and set equality
journal, June 1981
- Wegman, Mark N.; Carter, J. Lawrence
- Journal of Computer and System Sciences, Vol. 22, Issue 3, p. 265-279