Experimental authentication of quantum key distribution with post-quantum cryptography
Abstract Quantum key distribution (QKD) can provide information theoretically secure key exchange even in the era of quantum computers. However, QKD requires the classical channel to be authenticated, the current method for which is pre-sharing symmetric keys. For a QKD network of n users, this meth...
Guardado en:
Autores principales: | , , , , , , , , , , , |
---|---|
Formato: | article |
Lenguaje: | EN |
Publicado: |
Nature Portfolio
2021
|
Materias: | |
Acceso en línea: | https://doaj.org/article/21bd95dd2dac4e908b3d63e924c0ae0b |
Etiquetas: |
Agregar Etiqueta
Sin Etiquetas, Sea el primero en etiquetar este registro!
|
id |
oai:doaj.org-article:21bd95dd2dac4e908b3d63e924c0ae0b |
---|---|
record_format |
dspace |
spelling |
oai:doaj.org-article:21bd95dd2dac4e908b3d63e924c0ae0b2021-12-02T15:38:00ZExperimental authentication of quantum key distribution with post-quantum cryptography10.1038/s41534-021-00400-72056-6387https://doaj.org/article/21bd95dd2dac4e908b3d63e924c0ae0b2021-05-01T00:00:00Zhttps://doi.org/10.1038/s41534-021-00400-7https://doaj.org/toc/2056-6387Abstract Quantum key distribution (QKD) can provide information theoretically secure key exchange even in the era of quantum computers. However, QKD requires the classical channel to be authenticated, the current method for which is pre-sharing symmetric keys. For a QKD network of n users, this method requires $${C}_{n}^{2}=n(n-1)/2$$ C n 2 = n ( n − 1 ) / 2 pairs of symmetric keys to realize pairwise interconnection. In contrast, with the help of a mature public key infrastructure (PKI) and post-quantum cryptography (PQC) with quantum-resistant security, each user only needs to apply for one digital certificate from a certificate authority (CA) to achieve efficient and secure authentication for QKD. We need to assume only the short-term security of the PQC algorithm to achieve long-term security of the distributed keys. Here, we experimentally verified the feasibility, efficiency, and stability of the PQC algorithm in QKD authentication, and demonstrated the advantages when new users join the QKD network. Using the PQC public-key infrastructure, the nodes need to mutually trust only the CA to authenticate each other. QKD combined with PQC authentication will greatly promote and extend the application prospects of quantum-safe communication.Liu-Jun WangKai-Yi ZhangJia-Yong WangJie ChengYong-Hua YangShi-Biao TangDi YanYan-Lin TangZhen LiuYu YuQiang ZhangJian-Wei PanNature PortfolioarticlePhysicsQC1-999Electronic computers. Computer scienceQA75.5-76.95ENnpj Quantum Information, Vol 7, Iss 1, Pp 1-7 (2021) |
institution |
DOAJ |
collection |
DOAJ |
language |
EN |
topic |
Physics QC1-999 Electronic computers. Computer science QA75.5-76.95 |
spellingShingle |
Physics QC1-999 Electronic computers. Computer science QA75.5-76.95 Liu-Jun Wang Kai-Yi Zhang Jia-Yong Wang Jie Cheng Yong-Hua Yang Shi-Biao Tang Di Yan Yan-Lin Tang Zhen Liu Yu Yu Qiang Zhang Jian-Wei Pan Experimental authentication of quantum key distribution with post-quantum cryptography |
description |
Abstract Quantum key distribution (QKD) can provide information theoretically secure key exchange even in the era of quantum computers. However, QKD requires the classical channel to be authenticated, the current method for which is pre-sharing symmetric keys. For a QKD network of n users, this method requires $${C}_{n}^{2}=n(n-1)/2$$ C n 2 = n ( n − 1 ) / 2 pairs of symmetric keys to realize pairwise interconnection. In contrast, with the help of a mature public key infrastructure (PKI) and post-quantum cryptography (PQC) with quantum-resistant security, each user only needs to apply for one digital certificate from a certificate authority (CA) to achieve efficient and secure authentication for QKD. We need to assume only the short-term security of the PQC algorithm to achieve long-term security of the distributed keys. Here, we experimentally verified the feasibility, efficiency, and stability of the PQC algorithm in QKD authentication, and demonstrated the advantages when new users join the QKD network. Using the PQC public-key infrastructure, the nodes need to mutually trust only the CA to authenticate each other. QKD combined with PQC authentication will greatly promote and extend the application prospects of quantum-safe communication. |
format |
article |
author |
Liu-Jun Wang Kai-Yi Zhang Jia-Yong Wang Jie Cheng Yong-Hua Yang Shi-Biao Tang Di Yan Yan-Lin Tang Zhen Liu Yu Yu Qiang Zhang Jian-Wei Pan |
author_facet |
Liu-Jun Wang Kai-Yi Zhang Jia-Yong Wang Jie Cheng Yong-Hua Yang Shi-Biao Tang Di Yan Yan-Lin Tang Zhen Liu Yu Yu Qiang Zhang Jian-Wei Pan |
author_sort |
Liu-Jun Wang |
title |
Experimental authentication of quantum key distribution with post-quantum cryptography |
title_short |
Experimental authentication of quantum key distribution with post-quantum cryptography |
title_full |
Experimental authentication of quantum key distribution with post-quantum cryptography |
title_fullStr |
Experimental authentication of quantum key distribution with post-quantum cryptography |
title_full_unstemmed |
Experimental authentication of quantum key distribution with post-quantum cryptography |
title_sort |
experimental authentication of quantum key distribution with post-quantum cryptography |
publisher |
Nature Portfolio |
publishDate |
2021 |
url |
https://doaj.org/article/21bd95dd2dac4e908b3d63e924c0ae0b |
work_keys_str_mv |
AT liujunwang experimentalauthenticationofquantumkeydistributionwithpostquantumcryptography AT kaiyizhang experimentalauthenticationofquantumkeydistributionwithpostquantumcryptography AT jiayongwang experimentalauthenticationofquantumkeydistributionwithpostquantumcryptography AT jiecheng experimentalauthenticationofquantumkeydistributionwithpostquantumcryptography AT yonghuayang experimentalauthenticationofquantumkeydistributionwithpostquantumcryptography AT shibiaotang experimentalauthenticationofquantumkeydistributionwithpostquantumcryptography AT diyan experimentalauthenticationofquantumkeydistributionwithpostquantumcryptography AT yanlintang experimentalauthenticationofquantumkeydistributionwithpostquantumcryptography AT zhenliu experimentalauthenticationofquantumkeydistributionwithpostquantumcryptography AT yuyu experimentalauthenticationofquantumkeydistributionwithpostquantumcryptography AT qiangzhang experimentalauthenticationofquantumkeydistributionwithpostquantumcryptography AT jianweipan experimentalauthenticationofquantumkeydistributionwithpostquantumcryptography |
_version_ |
1718386159239823360 |