China's first computer network in which communications are secured with quanturn cryptography has been successfully tested in Beijing. This was announced at the press conference held by the University of Science and ...China's first computer network in which communications are secured with quanturn cryptography has been successfully tested in Beijing. This was announced at the press conference held by the University of Science and Technology of China (USTC) on 2 April in Beijing.展开更多
A quantum group signature(QGS) scheme is proposed on the basis of an improved quantum chaotic encryption algorithm using the quantum one-time pad with a chaotic operation string. It involves a small-scale quantum comp...A quantum group signature(QGS) scheme is proposed on the basis of an improved quantum chaotic encryption algorithm using the quantum one-time pad with a chaotic operation string. It involves a small-scale quantum computation network in three phases, i.e. initializing phase, signing phase and verifying phase. In the scheme, a member of the group signs the message on behalf of the group while the receiver verifies the signature's validity with the aid of the trusty group manager who plays a crucial role when a possible dispute arises. Analysis result shows that the signature can neither be forged nor disavowed by any malicious attackers.展开更多
A hierarchical metropolitan quantum cryptography network upon the inner-city commercial telecom fiber cables is reported in this paper. The seven-user network contains a four-node backbone net with one node acting as ...A hierarchical metropolitan quantum cryptography network upon the inner-city commercial telecom fiber cables is reported in this paper. The seven-user network contains a four-node backbone net with one node acting as the subnet gateway, a two-user subnet and a single-fiber access link, which is realized by the Faraday-Michelson interferometer set-ups. The techniques of the quantum router, optical switch and trusted relay are assembled here to guarantee the feasibility and expandability of the quantum cryptography network. Five nodes of the network are located in the government departments and the secure keys generated by the quantum key distribution network are utilized to encrypt the instant video, sound, text messages and confidential files transmitting between these bureaus. The whole implementation including the hierarchical quantum cryptographic communication network links and the corresponding application software shows a big step toward the practical user-oriented network with a high security level.展开更多
How many users can a quantum cryptography network support when certain services are demanded? The answer to this question depends on three factors:the speed of quantum key distribution,the organization and traffic eng...How many users can a quantum cryptography network support when certain services are demanded? The answer to this question depends on three factors:the speed of quantum key distribution,the organization and traffic engineering of the quantum cryptography network,and the engineering of services.In this article we focus on the second factor which is lacked in the literature to our knowledge but in urgent need for constructing an optimized large-scale quantum cryptography network.In order to provide an overall understanding about a quantum cryptography network,we also briefly introduce the characteristics of quantum cryptography and service engineering.展开更多
文摘China's first computer network in which communications are secured with quanturn cryptography has been successfully tested in Beijing. This was announced at the press conference held by the University of Science and Technology of China (USTC) on 2 April in Beijing.
基金Project(61379057)supported by the National Natural Science Foundation of ChinaProject supported by the Construct Program of the Key Discipline in Hunan University of Arts and Science,China+1 种基金Project(2012BS01)supported by Science Technology Research and Development Projects of Changde,ChinaProject supported by Science and the MEST2012-002521,NRF,Korea
文摘A quantum group signature(QGS) scheme is proposed on the basis of an improved quantum chaotic encryption algorithm using the quantum one-time pad with a chaotic operation string. It involves a small-scale quantum computation network in three phases, i.e. initializing phase, signing phase and verifying phase. In the scheme, a member of the group signs the message on behalf of the group while the receiver verifies the signature's validity with the aid of the trusty group manager who plays a crucial role when a possible dispute arises. Analysis result shows that the signature can neither be forged nor disavowed by any malicious attackers.
基金Supported by the Wuhu Government and China Telecommunications Corporation, Wuhu Branch, and National Basic Research Program of China (Grant No. 2006CB921900)National Natural Science Foundation of China (Grant Nos. 60537020, 60621064)Innovation Funds of Chinese Academy of Sciences
文摘A hierarchical metropolitan quantum cryptography network upon the inner-city commercial telecom fiber cables is reported in this paper. The seven-user network contains a four-node backbone net with one node acting as the subnet gateway, a two-user subnet and a single-fiber access link, which is realized by the Faraday-Michelson interferometer set-ups. The techniques of the quantum router, optical switch and trusted relay are assembled here to guarantee the feasibility and expandability of the quantum cryptography network. Five nodes of the network are located in the government departments and the secure keys generated by the quantum key distribution network are utilized to encrypt the instant video, sound, text messages and confidential files transmitting between these bureaus. The whole implementation including the hierarchical quantum cryptographic communication network links and the corresponding application software shows a big step toward the practical user-oriented network with a high security level.
基金supported by the National Natural Science Foundation of China (Grant No. 61125502)the Chinese Academy of Sciences,the National High Technology Research and Development Program of Chinathe National Fundamental Research Program (Grant No.2011CB921300)
文摘How many users can a quantum cryptography network support when certain services are demanded? The answer to this question depends on three factors:the speed of quantum key distribution,the organization and traffic engineering of the quantum cryptography network,and the engineering of services.In this article we focus on the second factor which is lacked in the literature to our knowledge but in urgent need for constructing an optimized large-scale quantum cryptography network.In order to provide an overall understanding about a quantum cryptography network,we also briefly introduce the characteristics of quantum cryptography and service engineering.