Patent classifications
H04L9/0855
QUANTUM KEY DISTRIBUTION METHOD, DEVICE, AND SYSTEM
Provided are a quantum key distribution method, device, and system. The quantum key distribution system may include: a (1-1)th quantum key distribution device (QKD1-1); a (2-1)th quantum key distribution device (QKD2-1) connected to the QKD1-1 by a first quantum channel (CH1); a (3-1)th quantum key distribution device (QKD3-1) connected to a (1-2)th quantum key distribution device (QKD1-2) by a second quantum channel (CH2); a first quantum node control device (QNC1) for controlling the operation of the QKD1-1 and the QKD1-2; a second quantum node control device (QNC2) for controlling the operation of the QKD2-1; and a third quantum node control device (QNC3) for controlling the operation of the QKD3-1, wherein: in the QNC1, the first quantum key passes through a plurality of paths including a first path (P1) for connecting the QNC1 and the QNC3, so as to bypass the CH1, thereby being transmitted to the QNC2; and in the P1, the key is encoded with a third quantum key shared between the QKD1-2 and the QKD3-1, and is transmitted.
Quantum enabled hybrid fiber cable loop
Aspects of the subject disclosure may include, for example, determining that quantum entanglement be established between first and second nodes of a service provider network including a software defined network (SDN) that facilitates delivery of a service to a subscriber and identifying a path between the first node and the second node based on pre-provisioned information supplied by the SDN. A path length of the path is estimated based on the pre-provisioned information supplied by the SDN, and a repeater node is selected responsive to the path length exceeding a threshold, wherein the path includes a first segment having a segment length that does not exceed the threshold. A quantum entanglement state is shared between the first and second nodes based on transportation of a first photon of a first entangled pair of photons via the first segment. Other embodiments are disclosed.
EAVESDROPPER DETECTION APPARATUS AND OPERATING METHOD THEREOF
The present disclosure relates to an eavesdropper detection apparatus and an operating method thereof, capable of effectively detecting an eavesdropper existing between a transmitter and a receiver in bit transmission by a quantum key distribution scheme.
System and Method for Proactively Buffering Quantum Key Distribution (QKD) Key Material
A system and method are provided for proactively buffering quantum key distribution (QKD) key material. The method includes monitoring key generation rates and surpluses at QKD devices at each node of a QKD link in a QKD network, retrieving surplus key material from the QKD devices at one or both nodes of the QKD link, and buffering the surplus key material in a local storage at one or both nodes in the QKD link. The surplus key material can be used to offset overhead introduced in securely relaying keys between non-adjacent demand pairs in the QKD network. The surplus key material can also be used to offset future transient decreases in key generation rates.
Communication systems and methods
A communication system is provided that includes a first quantum key distribution device and a communication device. The first quantum key distribution device is configured to be coupled to a second quantum key distribution device over a quantum channel and to generate a quantum key based on a quantum state transmitted along the quantum channel. The communication device is communicatively connected to the first quantum key distribution device within a network. The communication device is configured to receive the quantum key from the first quantum key distribution device and transmit the quantum key to an end device in the network via a classical link to enable the end device to use the quantum key for encrypting and/or decrypting messages communicated through the network.
Quantum computing-threat-resistant method and system for use on cryptography key exchanging processes
A quantum computing-threat-resistant system for cryptography key exchange comprises a linear-space computing module, a manifold computing module, and a Banach-space computing module. The system implements the technologies of homotopy morphing and key cloaking for facilitating the key-exchanging processes to perform quantum computing-threat-resistant operations in a mathematics space which is different from the spaces that generic quantum attacks work on, and then retrieve the original key in a Hilbert space after the processes of key exchange. The system not only avoids quantum attacks on key-exchanging processes, but also avoids the defects of current PQC solutions, the vulnerability of the main streamed symmetric & asymmetric encryption systems, and the limitation of quantum key operation in a Hilbert space. Both legacy key solution and quantum key solution are provided and implemented without requiring expensive devices.
Quantum key distribution network security survivability
Quantum key distribution network security survivability can be provided by receiving, at a software defined networking controller operating in a control layer of a network, a recommendation from a global analytics service operating in an application layer of the network, the recommendation for replacing a failed communication link in a quantum key distribution layer of the network, the failed communication link being detected by a quantum edge computing device operating in the quantum key distribution layer. The software defined networking controller can generate a command to cause a quantum key distribution resource to perform an action to mitigate impact from the failed communication link. The command can be sent to the quantum key distribution resource and the quantum key distribution resource can perform the action to mitigate the impact from the failed communication link.
SYSTEMS AND METHODS FOR QUANTUM ENTANGLEMENT RANDOM NUMBER GENERATION
Systems, apparatuses, methods, and computer program products are disclosed for quantum entanglement random number generation (QERNG). An example method for QERNG includes, among other operations, receiving a quantum computing (QC) detection alert control signal, a leakage alert control signal, or a tampering alert control signal; and in response to receipt of the QC detection alert control signal, the leakage alert control signal, or the tampering alert control signal, and within a defined duration of time corresponding to an associated QC threat, measuring at least a subset of a first set of entangled quantum particles, wherein one or more quantum particles in the first set of quantum particles is entangled with a respective quantum particle in a second set of quantum particles associated with a second computing system.
Quantum channel routing utilizing a quantum channel measurement service
Quantum channel routing utilizing a quantum channel measurement service is disclosed. A quantum channel router that is communicatively coupled to a plurality of quantum channels receives a message from a sender that is directed to a receiver. Each quantum channel is configured to convey a quantum message from a sender to a receiver. The quantum channel router identifies a quantum channel to which the receiver listens. The quantum channel router determines a message size of the message. It is determined that transmission of the message would exceed a maximum channel capacity of the quantum channel at a current point in time, and in response, the quantum channel router does not transmit the first message onto the first quantum channel at the current point in time.
QUANTUM CONTROLLER FAST PATH INTERFACE
Techniques regarding routing qubit data are provided. For example, one or more embodiments described herein can comprise a computer-implemented method for training a quantum controller fast path interface that can control the qubit data routing. The computer-implemented method can comprise training, by a system operatively coupled to a processor, the quantum controller fast path interface for routing qubit data bits between a quantum controller and conditional engine by adjusting a delay value such that a mesochronous clock domain is characterized by a direct register-to-register transfer pattern.