Skip to main content

Showing 1–7 of 7 results for author: Rarity, J

Searching in archive cs. Search in all archives.
.
  1. Unconditionally secure digital signatures implemented in an 8-user quantum network

    Authors: Yoann Pelet, Ittoop Vergheese Puthoor, Natarajan Venkatachalam, Sören Wengerowsky, Martin Lončarić, Sebastian Philipp Neumann, Bo Liu, Željko Samec, Mario Stipčević, Rupert Ursin, Erika Andersson, John G. Rarity, Djeylan Aktas, Siddarth Koduru Joshi

    Abstract: The ability to know and verifiably demonstrate the origins of messages can often be as important as encrypting the message itself. Here we present an experimental demonstration of an unconditionally secure digital signature (USS) protocol implemented for the first time, to the best of our knowledge, on a fully connected quantum network without trusted nodes. Our USS protocol is secure against forg… ▽ More

    Submitted 10 February, 2022; v1 submitted 9 February, 2022; originally announced February 2022.

    Comments: Preprint, 9 pages, 7 figures, 1 table

  2. arXiv:2011.09480  [pdf, other

    quant-ph cs.CR cs.ET

    Experimental implementation of secure anonymous protocols on an eight-user quantum network

    Authors: Zixin Huang, Siddarth Koduru Joshi, Djeylan Aktas, Cosmo Lupo, Armanda O. Quintavalle, Natarajan Venkatachalam, Sören Wengerowsky, Martin Lončarić, Sebastian Philipp Neumann, Bo Liu, Željko Samec, Laurent Kling, Mario Stipčević, Rupert Ursin, John G. Rarity

    Abstract: Anonymity in networked communication is vital for many privacy-preserving tasks. Secure key distribution alone is insufficient for high-security communications, often knowing who transmits a message to whom and when must also be kept hidden from an adversary. Here we experimentally demonstrate 5 information-theoretically secure anonymity protocols on an 8 user city-wide quantum network using polar… ▽ More

    Submitted 18 November, 2020; originally announced November 2020.

    Comments: 11 pages, 4 figures, 1 table, experimental work. ZH and SKJ contributed equally to this work and are joint first authors

  3. Learning models of quantum systems from experiments

    Authors: Antonio A. Gentile, Brian Flynn, Sebastian Knauer, Nathan Wiebe, Stefano Paesani, Christopher E. Granade, John G. Rarity, Raffaele Santagati, Anthony Laing

    Abstract: An isolated system of interacting quantum particles is described by a Hamiltonian operator. Hamiltonian models underpin the study and analysis of physical and chemical processes throughout science and industry, so it is crucial they are faithful to the system they represent. However, formulating and testing Hamiltonian models of quantum systems from experimental data is difficult because it is imp… ▽ More

    Submitted 14 February, 2020; originally announced February 2020.

    Comments: 27 pages, 8 figures

  4. The laws of physics do not prohibit counterfactual communication

    Authors: Hatim Salih, Will McCutcheon, Jonte Hance, John Rarity

    Abstract: It has been conjectured that counterfactual communication is impossible, even for post-selected quantum particles. We strongly challenge this by proposing precisely such a counterfactual scheme where -- unambiguously -- none of Alice's photons that correctly contribute to her information about Bob's message have been to Bob. We demonstrate counterfactuality experimentally by means of weak measurem… ▽ More

    Submitted 18 May, 2022; v1 submitted 4 June, 2018; originally announced June 2018.

    Comments: Published in npj Quantum Information. Matches published version. 6 pages, 5 figures

    Journal ref: npj Quantum Inf 8, 60 (2022)

  5. arXiv:1707.03331  [pdf, other

    quant-ph cs.CR

    A quantum key distribution protocol for rapid denial of service detection

    Authors: Alasdair B. Price, John G. Rarity, Chris Erven

    Abstract: We introduce a quantum key distribution protocol designed to expose fake users that connect to Alice or Bob for the purpose of monopolising the link and denying service. It inherently resists attempts to exhaust Alice and Bob's initial shared secret, and is 100% efficient, regardless of the number of qubits exchanged above the finite key limit. Additionally, secure key can be generated from two-ph… ▽ More

    Submitted 13 November, 2017; v1 submitted 11 July, 2017; originally announced July 2017.

    Comments: 13 pages, 3 figures. v2: Shifted focus of paper towards DoS and added protocol 4. v1: Accepted to QCrypt 2017

  6. First Experimental Demonstration of Secure NFV Orchestration over an SDN-Controlled Optical Network with Time-Shared Quantum Key Distribution Resources

    Authors: Alejandro Aguado, Emilio Hugues-Salas, Paul Anthony Haigh, Jaume Marhuenda, Alasdair B. Price, Philip Sibson, Jake E. Kennard, Christopher Erven, John G. Rarity, Mark G. Thompson, Andrew Lord, Reza Nejabati, Dimitra Simeonidou

    Abstract: We demonstrate, for the first time, a secure optical network architecture that combines NFV orchestration and SDN control with quantum key distribution (QKD) technology. A novel time-shared QKD network design is presented as a cost-effective solution for practical networks.

    Submitted 21 April, 2016; v1 submitted 20 April, 2016; originally announced April 2016.

    Comments: Submitted to ECOC 2016 conference

  7. arXiv:quant-ph/0701168  [pdf, ps, other

    quant-ph cs.CR cs.IT

    Using quantum key distribution for cryptographic purposes: a survey

    Authors: Romain Alléaume, Cyril Branciard, Jan Bouda, Thierry Debuisschert, Mehrdad Dianati, Nicolas Gisin, Mark Godfrey, Philippe Grangier, Thomas Langer, Norbert Lutkenhaus, Christian Monyk, Philippe Painchault, Momtchil Peev, Andreas Poppe, Thomas Pornin, John Rarity, Renato Renner, Gregoire Ribordy, Michel Riguidel, Louis Salvail, Andrew Shields, Harald Weinfurter, Anton Zeilinger

    Abstract: The appealing feature of quantum key distribution (QKD), from a cryptographic viewpoint, is the ability to prove the information-theoretic security (ITS) of the established keys. As a key establishment primitive, QKD however does not provide a standalone security service in its own: the secret keys established by QKD are in general then used by a subsequent cryptographic applications for which the… ▽ More

    Submitted 4 December, 2014; v1 submitted 23 January, 2007; originally announced January 2007.

    Comments: Revised version of the SECOQC White Paper. Published in the special issue on QKD of TCS, Theoretical Computer Science (2014), pp. 62-81

    Journal ref: Theoretical Computer Science, 560 (2014), pp. 62-81