Abstract

Conventional cryptography—such as the Rivest–Shamir–Adleman public-key infrastructure—may be rendered insecure by the ever-increasing capabilities of classical computers and the emergence of quantum computers. Quantum key distribution and post-quantum cryptography are presently being pursued as solutions to the quantum threat, but they offer no protection against an adversary who has obtained decryption keys by hacking the computer where they are stored, or by bribing a code clerk who has access to them. This paper introduces a protocol, which we call quantum low probability of intercept (QLPI), that has the potential to solve the key-disclosure problem. It transmits a ciphertext in such a way that laws of physics prevent an eavesdropper’s obtaining anything but an error-ridden version of that ciphertext from an individual attack or a restricted class of collective attacks. Consequently, even were an adversary to possess the decryption key, the plain text could not be recovered from such attacks. Furthermore, QLPI is capable of gigabits per second communication rates on optical fiber over metropolitan-area distances without space-division or wavelength-division multiplexing and without the need for any new technology.

© 2019 Optical Society of America

Full Article  |  PDF Article
OSA Recommended Articles
Defense frontier analysis of quantum cryptographic systems

Boris Slutsky, Ramesh Rao, Pan-Cheng Sun, Ljubiša Tancevski, and Shaya Fainman
Appl. Opt. 37(14) 2869-2878 (1998)

Flexible quantum private queries based on quantum key distribution

Fei Gao, Bin Liu, Qiao-Yan Wen, and Hui Chen
Opt. Express 20(16) 17411-17420 (2012)

Quantum cryptography with perfect multiphoton entanglement

Yuhui Luo and Kam Tai Chan
J. Opt. Soc. Am. A 22(5) 1003-1006 (2005)

References

You do not have subscription access to this journal. Citation lists with outbound citation links are available to subscribers only. You may subscribe either as an OSA member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access OSA Member Subscription

Cited By

You do not have subscription access to this journal. Cited by links are available to subscribers only. You may subscribe either as an OSA member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access OSA Member Subscription

Figures (6)

You do not have subscription access to this journal. Figure files are available to subscribers only. You may subscribe either as an OSA member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access OSA Member Subscription

Equations (21)

You do not have subscription access to this journal. Equations are available to subscribers only. You may subscribe either as an OSA member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access OSA Member Subscription

Metrics

You do not have subscription access to this journal. Article level metrics are available to subscribers only. You may subscribe either as an OSA member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access OSA Member Subscription