H04L9/0858

ADIABATIC COUPLING PHASE MODULATION MODULE, DEVICE AND QUANTUM KEY DISTRIBUTION SYSTEM

An adiabatic coupling phase modulation module has an optical substrate, an asymmetric adiabatic coupling polarization beam splitter and two electro-optical phase modulators. The asymmetric adiabatic coupling polarization beam splitter performs band spatial filtering on a quantum light source signal to output a light source signal of a specific wavelength band, and performs polarization spatial filtering on the light source signal of specific wavelength band to output a first orthogonal polarization direction light source signal of the specific wavelength band and a second orthogonal polarization direction light source signal of the specific wavelength band. The two electro-optical phase modulators respectively perform phase coding processes on the first orthogonal polarization direction light source signal and the second orthogonal polarization direction light source signal.

QUANTUM KEY DISTRIBUTION SYSTEM AND METHOD FOR SECURELY DISTRIBUTING QUANTUM KEYS IN A NETWORK

A system and method for securely distributing quantum keys in a network are disclosed. The method includes receiving request for generating pair of quantum keys between source quantum node and target quantum node. Further, the method includes generating first pair of quantum keys based on the request. The method includes transmitting the first pair of quantum keys to the intermediate quantum node using a first quantum link. The method further includes generating intermediate pair of quantum key based on events detected at the intermediate quantum node. The method further includes interleaving the intermediate pair of quantum key with the first pair of quantum keys. Also, the method includes generating a second pair of quantum keys comprising interleaved intermediate pair of quantum key and first pair of quantum keys. Further, the method includes encoding and transmitting the second pair of quantum keys to target quantum node using second quantum link.

System and method for transmitting time information and quantum states on an optical medium

A method for transmitting time information and quantum states on an optical medium is disclosed. The method includes transmitting information comprising a timing information and quantum states over a single wavelength on an optical medium. The method also includes receiving each transmitted information sequentially in the corresponding plurality of time slots at a receiver. The method also includes comparing each timing information received in the corresponding plurality of timeslots with timing information of a preceding hold over time slot of the plurality of time slots. The method also includes determining a time drift encountered at the receiver based on a compared result. The method also includes synchronising phase and frequency of the plurality of transmitted packets of the information based on minimization of determined time drift.

LOW FOOTPRINT HARDWARE ARCHITECTURE FOR KYBER-KEM
20220353066 · 2022-11-03 · ·

A computer processing hardware architecture system for the Kyber lattice-based cryptosystem which is created with high resource reuse in the compression and decompression module, the operation unit, the binomial samplers, and the operation ordering.

QUANTUM CRYPTOGRAPHY COMMUNICATION SYSTEM, QUANTUM CRYPTOGRAPHY COMMUNICATION DEVICE, KEY MANAGEMENT DEVICE, AND COMPUTER PROGRAM PRODUCT

According to an embodiment, a quantum cryptography communication system includes a quantum cryptography communication device and a key management device. The quantum cryptography communication system includes a generated information supply unit, a reception unit, a determination unit, and a global key supply unit. The generated information supply unit is configured to supply generated information generated by quantum key distribution processing, to the key management device. The reception unit is configured to receive the generated information from the quantum cryptography communication device. The determination unit is configured to determine a ratio at which the generated information is used for a global key random number for each encrypted data communication destination. The global key supply unit is configured to supply a global key generated from the global key random number to an application connected to the key management device.

System and method for quantum-safe authentication, encryption, and decryption of information

Aspects and embodiments of the present invention relate to a method and system for generating a private cryptographic key for use in a secure cryptogram for transmission between a first entity and a second entity. The method may comprise: selecting a random vector defined in an n-dimensional vector space shared between the first entity and the second entity, the vector comprising one or more component coordinates defined in the n-dimensional vector space, each component coordinate being associated with one or more bits; determining the one or more bits associated with each component coordinate comprised in the random vector, and generating the private key in dependence on the one or more bits associated with each component coordinate comprised in the random vector.

METHODS FOR SECURE DATA STORAGE
20230118320 · 2023-04-20 ·

A method includes receiving, from a server, a plurality of data packets at a wireless client device; identifying, by the wireless client device, receive times for the plurality of data packets; identifying, by the wireless client device, a first subset of the plurality of data packets having shorter delay times than a second subset of the plurality of data packets having higher delay times based on the received times; and mixing, by the wireless client device, a subset of the first plurality of data packets to generate an encryption key.

SECRET SUPERPOSITION PROTOCOLS FOR QUANTUM COMPUTATION
20230067766 · 2023-03-02 ·

Methods, systems and apparatus, including computer programs encoded on computer storage medium, for implementation of secret superposition protocols. In one aspect a method includes, performing, by a sender party, quantum operations on one or more qubits, comprising preparing, according to a predetermined secret superposition protocol, one or more qubits in respective uniform superposition quantum states; transmitting, by the sender party, to a recipient party, and through a secure channel, data indicating use of the predetermined secret superposition protocol; and transmitting, by the sender party and to the recipient party, one or more of the qubits, wherein the recipient party performs one or more measurements on the qubits to verify use of the predetermined secret superposition protocol.

Quantum Key Distribution Protocol with Weak Measurements

A quantum key distribution (QKD) receiver is provided for communicating with a transmitter that produces a plurality of entangled photon qubit pairs to send one qubit from each pair randomly alternating between basis states. The receiver includes a first polarized beam splitter, an orthogonal pair of photon detectors, a weak measurement apparatus, a broadcaster, an error rate estimator, and a post-processor. The first splitter receives the one qubit for passage or reflection. The photon detector pair measures the one qubit from passage or reflection. The apparatus performs a weak measurement on the one qubit and includes an impedance device to induce time delay, a pair of mirrors flanking the impedance device, and second and third polarized beam splitters for alternatively passing the one qubit to each other and to the pair of mirrors. The broadcaster for sending weak measurement results from the detectors to the transmitter. The error rate estimator determines whether the weak measurement satisfies a bit error threshold. The post-processor corrects the weak measurement from one of the basis states in response to a shared random key from the transmitter.

Low footprint hardware architecture for Kyber-KEM
11632242 · 2023-04-18 · ·

A computer processing hardware architecture system for the Kyber lattice-based cryptosystem which is created with high resource reuse in the compression and decompression module, the operation unit, the binomial samplers, and the operation ordering, wherein the architecture system includes an internal controller operably configured to independently accelerate a plurality of cryptographic Kyber algorithms at all NIST-recommended post-quantum cryptography security levels and is operably coupled to a singular module operably configured to perform compression and decompression as specified in Kyber, perform arithmetic operations utilized in the plurality of cryptographic Kyber algorithms, and reuse hardware resources for all the arithmetic operations utilized in the plurality of cryptographic Kyber algorithms.