280-km experimental demonstration of a quantum digital signature with one decoy state.

  title={280-km experimental demonstration of a quantum digital signature with one decoy state.},
  author={Hua-Jian Ding and Jing-Jing Chen and Liang Ji and Xingyu Zhou and Chunhui Zhang and Chun-Mei Zhang and Qin Wang},
  journal={Optics letters},
  volume={45 7},
A quantum digital signature (QDS) guarantees the unforgeability, nonrepudiation, and transferability of signature messages with information-theoretic security, and hence has attracted much attention recently. However, most previous implementations of QDS showed relatively low signature rates and/or short transmission distance. In this Letter, we report a proof-of-principle phase-encoding QDS demonstration using only one decoy state. First, such a method avoids the modulation of the vacuum state… 

Figures and Tables from this paper

Efficient quantum digital signatures without symmetrization step.
This protocol does not need the symmetrization step, and the signature rate scales linearly with the probability of detection events, and is compatible with existing quantum communication infrastructure, therefore it is anticipated that it will play a significant role in providing digital signatures with unconditional security.
Secure and practical multiparty quantum digital signatures.
The post-matching method is introduced to enhance data utilization efficiency and make it linearly scale with the probability of detection events even for five-party scenario, which paves the way for future QDS networks.
Practical quantum multiparty signatures using quantum key distribution networks
This work develops an unconditionally secure signatures (USS) scheme that guarantees authenticity and transferability of arbitrary length messages in a QKD network, and performs an optimization of the scheme parameters with respect to the secret key consumption.
Optimizing Decoy‐State Protocols for Practical Quantum Key Distribution Systems
This work compares the key‐rate performance of 38 decoy‐state protocols using the particle swarm optimization (PSO) algorithm and forms a guideline for practical QKD systems, where the optimal decoy-state protocols are found with the change of five system parameters.
Practical decoy-state quantum random number generator with weak coherent sources
Numerical simulation results show that the proposed decoy-state quantum random number generator with weak coherent sources can extract out randomness close to the asymptotic case where the fraction of single-photon pulses are exactly known.
Implementation of Machine Learning in Quantum Key Distributions
With the help of the easy-to-train classifier of RF, this work can achieve a highly efficient optimal QKD protocols selector and demonstrate that the RF classifier also excels both in preciseness and robustness with an accuracy over 98% for the testing set and an enjoyable receiver operating characteristic.
Agile and Versatile Quantum Communication: Signatures and Secrets
A demonstration of ``cryptographic agility'' in quantum communications offers a robust way to adapt security protocols in the face of a novel attack.
Quantum Digital Signatures with Random Pairing
Ji-Qian Qin, Cong Jiang, 2 Yun-Long Yu, and Xiang-Bin Wang 2, 3, 4, 5, ∗ State Key Laboratory of Low Dimensional Quantum Physics, Department of Physics, Tsinghua University, Beijing 100084, China


Experimental quantum digital signature over 102 km
This work experimentally demonstrated a recently proposed QDS protocol without assuming any secure channel, and successfully signed a one-bit message through an up to 102-km optical fiber using the decoy state modulation.
Practical quantum digital signature with a gigahertz BB84 quantum key distribution system.
This Letter provides a further step for the practical application of QDS based on a BB84 QKD system with an asymmetric Faraday-Sagnac-Michelson interferometer structure which is intrinsically stable against channel disturbance.
Proof-of-Principle Demonstration of Passive Decoy-State Quantum Digital Signatures Over 200 km
It is demonstrated that passive decoy-state quantum digital signature using parametric down-conversion sources can be used effectively for encrypted communication over a distance of 200 km, and represents a significant step on the path from the laboratory to practical applications.
Experimental demonstration of quantum digital signatures using phase-encoded coherent states of light
This work demonstrates an experimental system, which distributes quantum signatures from one sender to two receivers and enables message sending ensured against forging and repudiation, and analyzes the security of the system in some typical scenarios.
Experimental transmission of quantum digital signatures over 90  km of installed optical fiber using a differential phase shift quantum key distribution system.
This demonstration used a 90 km long differential phase shift QKD to achieve approximately one signed bit per second, an increase in the signature generation rate of several orders of magnitude over previous optical fiber demonstrations.
Experimental demonstration of quantum digital signatures over 43 dB channel loss using differential phase shift quantum key distribution
The experimental transmission of quantum digital signatures over channel losses of up to 42.8 ± 1.2 dB in a link comprised of 90 km of installed fiber with additional optical attenuation introduced to simulate longer distances is reported.
Experimental measurement-device-independent quantum digital signatures
A reconfigurable quantum network where the central node can switch between trusted and untrusted operation, and devised an efficient protocol to distil multiple signatures from the same block of data, thus reducing the statistical fluctuations in the sample and greatly enhancing the final QDS rate in the finite-size scenario.
Decoy state quantum key distribution.
The method is to use decoy states to detect eavesdropping attacks and has the best of both worlds--enjoying unconditional security guaranteed by the fundamental laws of physics and yet dramatically surpassing some of the best experimental performances reported in the literature.
Realization of quantum digital signatures without the requirement of quantum memory.
This work presents the first realization of a scheme that does not need quantum memory and which also uses only standard linear optical components and photodetectors, and significantly advances quantum digital signatures as a quantum technology with potential for real applications.
Finite-key analysis for measurement-device-independent quantum key distribution.
This work provides a rigorous security proof against general attacks in the finite-key regime by applying large deviation theory, specifically the Chernoff bound, to perform parameter estimation and demonstrates the feasibility of long-distance implementations of measurement-device-independent quantum key distribution within a reasonable time frame of signal transmission.