Patent classifications
H04L9/0858
QUANTUM AUTHENTICATION FOR WIRELESS USER EQUIPMENT (UE)
A wireless communication network performs quantum authentication for a wireless User Equipment (UE). In the wireless communication network, quantum circuitry selects polarization states for qubits, generates and transfers the qubits, exchanges cryptography information with edge quantum circuitry, generates cryptography keys based on polarization states and cryptography information, and transfers the cryptography keys to network authentication circuitry. The edge quantum circuitry receives and process the qubits, determines the polarization states for the qubits, exchanges the cryptography information with the network quantum circuitry, generates the cryptography keys based on the polarization states and cryptography information, and transfers the cryptography keys to the wireless UE. The wireless UE generates authentication data based on the cryptography keys and wirelessly transfers the authentication data for delivery to the network authentication circuitry. The network authentication circuitry receives the cryptography keys and the authentication data and responsively authenticates the wireless UE.
Stateless system to protect data
A method including determining, by a processor, an assigned key pair associated with a user device, the assigned key pair including an assigned public key and an assigned private key; authenticating, by the processor, received biometric information; selectively transmitting, by the processor to a trusted device based at least in part on a result of authenticating the received biometric information, an encryption request to encrypt the assigned private key; and encrypting, by the processor based at least in part on selectively transmitting the encryption request, content based at least in part on utilizing the assigned public key is disclosed. Various other aspects are contemplated.
Universal quantum computer, communication, QKD security and quantum networks using OAM Qu-dits with digital light processing
A quantum computing system comprises an input port for receiving a modulated data stream comprising a plurality of bits. Orbital angular momentum processing circuitry receives the modulated data stream and applying at least one of at least three orbital angular momentum function modes to each of the plurality of bits of the modulated data stream to generate a qudit. The qudit comprises a quantum unit of information having any of d states where d has a value of at least 3. Each of the at least three orbital angular momentum function modes comprise separate orbital angular momentum states that are orthogonal to each other. A MicroElectroMechanical system (MEMS) circuitry associated with the orbital angular momentum processing circuitry generates a hologram for applying the at least one of the at least three orbital angular momentum function modes to each of the plurality of bits of the modulated data stream to generate the qudit. At least one quantum gate receives each of the qudits via at least one gate input and generates a quantum circuit output via at least one gate output responsive thereto. An output port for outputs the generated quantum circuit output.
Approximate hash verification of unused blockchain output
An example operation may include one or more of receiving a location of an output stored on a data structure of a blockchain, where the location comprises a path of hashes generated by a reduced-step hash instead of a full-step hash of the blockchain, performing an approximate hash verification on the path of hashes based on the reduced-step hash values to verify whether the output is unused, and in response to a determination that the output is unused as a result of the approximate hash verification, approving a use of the output by a client associated with the output.
Secret superposition protocols for quantum computation
Methods, systems and apparatus, including computer programs encoded on computer storage medium, for implementation of secret superposition protocols. In one aspect a method includes, performing, by a sender party, quantum operations on one or more qubits, comprising preparing, according to a predetermined secret superposition protocol, one or more qubits in respective uniform superposition quantum states; transmitting, by the sender party, to a recipient party, and through a secure channel, data indicating use of the predetermined secret superposition protocol; and transmitting, by the sender party and to the recipient party, one or more of the qubits, wherein the recipient party performs one or more measurements on the qubits to verify use of the predetermined secret superposition protocol.
Detection and Remediation of Unauthorized Relocation of Storage Media
An apparatus includes a cryptographic key for encrypting content to be written to a storage media. The apparatus includes a control circuit configured to determine that the storage media has been physically moved, and, based on the determination that the storage media has been physically moved, erase the storage media by deleting the cryptographic key.
Space-and-wave-division de-multiplexing of a quantum key distribution and classical channels into a single receiving optical fiber
A space and wave division multiplexing and demultiplexing system and method for quantum key distribution (QKD) using free space laser communications. The system operates to transmit a quantum channel, including a key of QKD, included in a combined laser transmission with a classical channel, including an encrypted message of QKD. The laser transmission can be transmitted through free space to a lens, wherein it is diffracted into two separate diffraction patterns and captured by a double clad optical receiver fiber having an inner core and a concentric outer core. The diffraction pattern of the classical channel is captured by the outer core, while the diffraction pattern of the quantum channel is captured by the inner core, thus allowing separate treatment of each channel.
Transmitting device, receiving device, quantum key distribution method, and quantum key distribution program for quantum key distribution system
A quantum key distribution device is provided with an encoding unit which encodes an optical pulse train; an intensity modulating unit which subjects the encoded optical pulse train to N (where N is an integer at least equal to 3) types of intensity modulation having mutually different intensities, with different timings; and a first key distillation processing unit which generates an encryption key on the basis of a data sequence obtained by removing data obtained from an optical pulse having a specific modulation pattern from a data sequence used by the encoding unit and the intensity modulating unit.
COMPUTER-READABLE RECORDING MEDIUM STORING GENERATION PROGRAM, GENERATION METHOD, AND INFORMATION PROCESSING APPARATUS
A non-transitory computer-readable recording medium stores a generation program for causing a computer to execute processing including: acquiring a converted character string from a character string to be processed in predetermined processing that includes hashing the character string to be processed; generating a figure that corresponds to the character string to be processed by representing an order of characters and a value of a character in the converted character string as an angle and a size in polar coordinates; and outputting the figure.
DELAYED QUANTUM KEY-DISTRIBUTION
A node may receive, from a quantum key-distribution (QKD) device, a first message that includes an identifier associated with a key. The node may send, to another node, a second message that includes the identifier and a request to perform at least one task. A node may receive, from the other node, a third message that includes information associated with performance of the at least one task by the other node and information indicating a time of performance. The node may receive, from the QKD device, a fourth message that includes the key and information indicating a time window associated with the quantum key; wherein the fourth message is received after expiration of the time window. The node may process, based on the fourth message, the third message to determine whether the third message is valid and thereby cause one or more actions to be performed.