Experimental authentication of quantum key distribution with post-quantum cryptography

Abstract Quantum key distribution (QKD) can provide information theoretically secure key exchange even in the era of quantum computers. However, QKD requires the classical channel to be authenticated, the current method for which is pre-sharing symmetric keys. For a QKD network of n users, this meth...

Descripción completa

Guardado en:
Detalles Bibliográficos
Autores principales: Liu-Jun Wang, Kai-Yi Zhang, Jia-Yong Wang, Jie Cheng, Yong-Hua Yang, Shi-Biao Tang, Di Yan, Yan-Lin Tang, Zhen Liu, Yu Yu, Qiang Zhang, Jian-Wei Pan
Formato: article
Lenguaje:EN
Publicado: Nature Portfolio 2021
Materias:
Acceso en línea:https://doaj.org/article/21bd95dd2dac4e908b3d63e924c0ae0b
Etiquetas: Agregar Etiqueta
Sin Etiquetas, Sea el primero en etiquetar este registro!
id oai:doaj.org-article:21bd95dd2dac4e908b3d63e924c0ae0b
record_format dspace
spelling oai:doaj.org-article:21bd95dd2dac4e908b3d63e924c0ae0b2021-12-02T15:38:00ZExperimental authentication of quantum key distribution with post-quantum cryptography10.1038/s41534-021-00400-72056-6387https://doaj.org/article/21bd95dd2dac4e908b3d63e924c0ae0b2021-05-01T00:00:00Zhttps://doi.org/10.1038/s41534-021-00400-7https://doaj.org/toc/2056-6387Abstract Quantum key distribution (QKD) can provide information theoretically secure key exchange even in the era of quantum computers. However, QKD requires the classical channel to be authenticated, the current method for which is pre-sharing symmetric keys. For a QKD network of n users, this method requires $${C}_{n}^{2}=n(n-1)/2$$ C n 2 = n ( n − 1 ) / 2 pairs of symmetric keys to realize pairwise interconnection. In contrast, with the help of a mature public key infrastructure (PKI) and post-quantum cryptography (PQC) with quantum-resistant security, each user only needs to apply for one digital certificate from a certificate authority (CA) to achieve efficient and secure authentication for QKD. We need to assume only the short-term security of the PQC algorithm to achieve long-term security of the distributed keys. Here, we experimentally verified the feasibility, efficiency, and stability of the PQC algorithm in QKD authentication, and demonstrated the advantages when new users join the QKD network. Using the PQC public-key infrastructure, the nodes need to mutually trust only the CA to authenticate each other. QKD combined with PQC authentication will greatly promote and extend the application prospects of quantum-safe communication.Liu-Jun WangKai-Yi ZhangJia-Yong WangJie ChengYong-Hua YangShi-Biao TangDi YanYan-Lin TangZhen LiuYu YuQiang ZhangJian-Wei PanNature PortfolioarticlePhysicsQC1-999Electronic computers. Computer scienceQA75.5-76.95ENnpj Quantum Information, Vol 7, Iss 1, Pp 1-7 (2021)
institution DOAJ
collection DOAJ
language EN
topic Physics
QC1-999
Electronic computers. Computer science
QA75.5-76.95
spellingShingle Physics
QC1-999
Electronic computers. Computer science
QA75.5-76.95
Liu-Jun Wang
Kai-Yi Zhang
Jia-Yong Wang
Jie Cheng
Yong-Hua Yang
Shi-Biao Tang
Di Yan
Yan-Lin Tang
Zhen Liu
Yu Yu
Qiang Zhang
Jian-Wei Pan
Experimental authentication of quantum key distribution with post-quantum cryptography
description Abstract Quantum key distribution (QKD) can provide information theoretically secure key exchange even in the era of quantum computers. However, QKD requires the classical channel to be authenticated, the current method for which is pre-sharing symmetric keys. For a QKD network of n users, this method requires $${C}_{n}^{2}=n(n-1)/2$$ C n 2 = n ( n − 1 ) / 2 pairs of symmetric keys to realize pairwise interconnection. In contrast, with the help of a mature public key infrastructure (PKI) and post-quantum cryptography (PQC) with quantum-resistant security, each user only needs to apply for one digital certificate from a certificate authority (CA) to achieve efficient and secure authentication for QKD. We need to assume only the short-term security of the PQC algorithm to achieve long-term security of the distributed keys. Here, we experimentally verified the feasibility, efficiency, and stability of the PQC algorithm in QKD authentication, and demonstrated the advantages when new users join the QKD network. Using the PQC public-key infrastructure, the nodes need to mutually trust only the CA to authenticate each other. QKD combined with PQC authentication will greatly promote and extend the application prospects of quantum-safe communication.
format article
author Liu-Jun Wang
Kai-Yi Zhang
Jia-Yong Wang
Jie Cheng
Yong-Hua Yang
Shi-Biao Tang
Di Yan
Yan-Lin Tang
Zhen Liu
Yu Yu
Qiang Zhang
Jian-Wei Pan
author_facet Liu-Jun Wang
Kai-Yi Zhang
Jia-Yong Wang
Jie Cheng
Yong-Hua Yang
Shi-Biao Tang
Di Yan
Yan-Lin Tang
Zhen Liu
Yu Yu
Qiang Zhang
Jian-Wei Pan
author_sort Liu-Jun Wang
title Experimental authentication of quantum key distribution with post-quantum cryptography
title_short Experimental authentication of quantum key distribution with post-quantum cryptography
title_full Experimental authentication of quantum key distribution with post-quantum cryptography
title_fullStr Experimental authentication of quantum key distribution with post-quantum cryptography
title_full_unstemmed Experimental authentication of quantum key distribution with post-quantum cryptography
title_sort experimental authentication of quantum key distribution with post-quantum cryptography
publisher Nature Portfolio
publishDate 2021
url https://doaj.org/article/21bd95dd2dac4e908b3d63e924c0ae0b
work_keys_str_mv AT liujunwang experimentalauthenticationofquantumkeydistributionwithpostquantumcryptography
AT kaiyizhang experimentalauthenticationofquantumkeydistributionwithpostquantumcryptography
AT jiayongwang experimentalauthenticationofquantumkeydistributionwithpostquantumcryptography
AT jiecheng experimentalauthenticationofquantumkeydistributionwithpostquantumcryptography
AT yonghuayang experimentalauthenticationofquantumkeydistributionwithpostquantumcryptography
AT shibiaotang experimentalauthenticationofquantumkeydistributionwithpostquantumcryptography
AT diyan experimentalauthenticationofquantumkeydistributionwithpostquantumcryptography
AT yanlintang experimentalauthenticationofquantumkeydistributionwithpostquantumcryptography
AT zhenliu experimentalauthenticationofquantumkeydistributionwithpostquantumcryptography
AT yuyu experimentalauthenticationofquantumkeydistributionwithpostquantumcryptography
AT qiangzhang experimentalauthenticationofquantumkeydistributionwithpostquantumcryptography
AT jianweipan experimentalauthenticationofquantumkeydistributionwithpostquantumcryptography
_version_ 1718386159239823360