Cargando…

Experimental quantum secure network with digital signatures and encryption

Cryptography promises four information security objectives, namely, confidentiality, integrity, authenticity and non-repudiation, to support trillions of transactions annually in the digital economy. Efficient digital signatures, ensuring integrity, authenticity and non-repudiation of data with info...

Descripción completa

Detalles Bibliográficos
Autores principales: Yin, Hua-Lei, Fu, Yao, Li, Chen-Long, Weng, Chen-Xun, Li, Bing-Hong, Gu, Jie, Lu, Yu-Shuo, Huang, Shan, Chen, Zeng-Bing
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Oxford University Press 2022
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10165682/
https://www.ncbi.nlm.nih.gov/pubmed/37168101
http://dx.doi.org/10.1093/nsr/nwac228
_version_ 1785038305395474432
author Yin, Hua-Lei
Fu, Yao
Li, Chen-Long
Weng, Chen-Xun
Li, Bing-Hong
Gu, Jie
Lu, Yu-Shuo
Huang, Shan
Chen, Zeng-Bing
author_facet Yin, Hua-Lei
Fu, Yao
Li, Chen-Long
Weng, Chen-Xun
Li, Bing-Hong
Gu, Jie
Lu, Yu-Shuo
Huang, Shan
Chen, Zeng-Bing
author_sort Yin, Hua-Lei
collection PubMed
description Cryptography promises four information security objectives, namely, confidentiality, integrity, authenticity and non-repudiation, to support trillions of transactions annually in the digital economy. Efficient digital signatures, ensuring integrity, authenticity and non-repudiation of data with information-theoretical security are highly urgent and intractable open problems in cryptography. Here, we propose a high-efficiency quantum digital signature (QDS) protocol using asymmetric quantum keys acquired via secret sharing, one-time universal(2) hashing and a one-time pad. We just need to use a 384-bit key to sign documents of lengths up to 2(64) with a security bound of 10(−19). If a one-megabit document is signed, the signature efficiency is improved by more than 10(8) times compared with previous QDS protocols. Furthermore, we build the first all-in-one quantum secure network integrating information-theoretically secure communication, digital signatures, secret sharing and conference key agreement and experimentally demonstrate this signature efficiency advantage. Our work completes the cryptography toolbox of the four information security objectives.
format Online
Article
Text
id pubmed-10165682
institution National Center for Biotechnology Information
language English
publishDate 2022
publisher Oxford University Press
record_format MEDLINE/PubMed
spelling pubmed-101656822023-05-09 Experimental quantum secure network with digital signatures and encryption Yin, Hua-Lei Fu, Yao Li, Chen-Long Weng, Chen-Xun Li, Bing-Hong Gu, Jie Lu, Yu-Shuo Huang, Shan Chen, Zeng-Bing Natl Sci Rev Research Article Cryptography promises four information security objectives, namely, confidentiality, integrity, authenticity and non-repudiation, to support trillions of transactions annually in the digital economy. Efficient digital signatures, ensuring integrity, authenticity and non-repudiation of data with information-theoretical security are highly urgent and intractable open problems in cryptography. Here, we propose a high-efficiency quantum digital signature (QDS) protocol using asymmetric quantum keys acquired via secret sharing, one-time universal(2) hashing and a one-time pad. We just need to use a 384-bit key to sign documents of lengths up to 2(64) with a security bound of 10(−19). If a one-megabit document is signed, the signature efficiency is improved by more than 10(8) times compared with previous QDS protocols. Furthermore, we build the first all-in-one quantum secure network integrating information-theoretically secure communication, digital signatures, secret sharing and conference key agreement and experimentally demonstrate this signature efficiency advantage. Our work completes the cryptography toolbox of the four information security objectives. Oxford University Press 2022-10-22 /pmc/articles/PMC10165682/ /pubmed/37168101 http://dx.doi.org/10.1093/nsr/nwac228 Text en © The Author(s) 2022. Published by Oxford University Press on behalf of China Science Publishing & Media Ltd. https://creativecommons.org/licenses/by/4.0/This is an Open Access article distributed under the terms of the Creative Commons Attribution License (https://creativecommons.org/licenses/by/4.0/), which permits unrestricted reuse, distribution, and reproduction in any medium, provided the original work is properly cited.
spellingShingle Research Article
Yin, Hua-Lei
Fu, Yao
Li, Chen-Long
Weng, Chen-Xun
Li, Bing-Hong
Gu, Jie
Lu, Yu-Shuo
Huang, Shan
Chen, Zeng-Bing
Experimental quantum secure network with digital signatures and encryption
title Experimental quantum secure network with digital signatures and encryption
title_full Experimental quantum secure network with digital signatures and encryption
title_fullStr Experimental quantum secure network with digital signatures and encryption
title_full_unstemmed Experimental quantum secure network with digital signatures and encryption
title_short Experimental quantum secure network with digital signatures and encryption
title_sort experimental quantum secure network with digital signatures and encryption
topic Research Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10165682/
https://www.ncbi.nlm.nih.gov/pubmed/37168101
http://dx.doi.org/10.1093/nsr/nwac228
work_keys_str_mv AT yinhualei experimentalquantumsecurenetworkwithdigitalsignaturesandencryption
AT fuyao experimentalquantumsecurenetworkwithdigitalsignaturesandencryption
AT lichenlong experimentalquantumsecurenetworkwithdigitalsignaturesandencryption
AT wengchenxun experimentalquantumsecurenetworkwithdigitalsignaturesandencryption
AT libinghong experimentalquantumsecurenetworkwithdigitalsignaturesandencryption
AT gujie experimentalquantumsecurenetworkwithdigitalsignaturesandencryption
AT luyushuo experimentalquantumsecurenetworkwithdigitalsignaturesandencryption
AT huangshan experimentalquantumsecurenetworkwithdigitalsignaturesandencryption
AT chenzengbing experimentalquantumsecurenetworkwithdigitalsignaturesandencryption