Quantum cryptography on multiuser optical fibre networks

To establish a secure communication channel, it is necessary to distribute between two users a key which allows safe encryption and decryption of messages. But because decryption is a simple task for any key holder, it is crucial that the key remains secret during distribution. Secrecy cannot be guaranteed if distribution occurs on the basis of classical physical mechanisms, as it is impossible to know whether the key has been intercepted during transmission. Quantum cryptography1–3 provides a fundamental solution to this problem. When quantum-mechanical processes are used to establish the key, any eavesdropping during transmission leads to an unavoidable and detectable disturbance in the received key information. Quantum cryptography has been demonstrated using standard telecommunication fibres linking single pairs of users4–8, but practical implementations will require communication networks with many users9. Here I introduce a practical scheme for multi-user quantum cryptography, and demonstrate its operation on an optical fibre network. The scheme enables a single controller on the network to establish, and regularly update, a distinct secret key with each network user. These keys can then be used to securely encrypt conventional data transmissions that are broadcast on the network.

[1]  Simon J. D. Phoenix,et al.  Secure optical communications systems using quantum cryptography , 1996, Philosophical Transactions of the Royal Society of London. Series A: Mathematical, Physical and Engineering Sciences.

[2]  Artur Ekert,et al.  Information Gain in Quantum Eavesdropping , 1994 .

[3]  David Chaum,et al.  Advances in Cryptology: Proceedings Of Crypto 83 , 2012 .

[4]  P R Tapster,et al.  Photon counting with passively quenched germanium avalanche. , 1994, Applied optics.

[5]  Ekert,et al.  Eavesdropping on quantum-cryptographical systems. , 1994, Physical review. A, Atomic, molecular, and optical physics.

[6]  N. Gisin,et al.  Underwater quantum coding , 1995, Nature.

[7]  James D. Franson,et al.  Operational system for quantum cryptography , 1995 .

[8]  Gilles Brassard,et al.  Quantum Cryptography, or Unforgeable Subway Tokens , 1982, CRYPTO.

[9]  Charles H. Bennett,et al.  Quantum cryptography using any two nonorthogonal states. , 1992, Physical review letters.

[10]  P. Townsend Secure key distribution system based on quantum cryptography , 1994 .

[11]  P. Townsend,et al.  Quantum key distribution over distances as long as 30 km. , 1995, Optics letters.

[12]  Simon J. D. Phoenix,et al.  Quantum cryptography: How to beat the code breakers using quantum mechanics , 1995 .

[13]  Ekert,et al.  Quantum cryptography based on Bell's theorem. , 1991, Physical review letters.

[14]  Ueli Maurer,et al.  Generalized privacy amplification , 1994, Proceedings of 1994 IEEE International Symposium on Information Theory.

[15]  Lütkenhaus Security against eavesdropping in quantum cryptography. , 1996, Physical review. A, Atomic, molecular, and optical physics.

[16]  Simon J. D. Phoenix,et al.  Design of quantum cryptography systems for passive optical networks , 1994 .