Patent classifications
H04L9/0858
Hybrid quantum key distribution link for an optical transceiver
Embodiments are disclosed for a quantum key distribution enabled intra-datacenter network. An example system includes a first vertical cavity surface emitting laser (VCSEL), a second VCSEL and a network interface controller. The first VCSEL is configured to emit a first optical signal associated with data. The second VCSEL is configured to emit a second optical signal associated with quantum key distribution (QKD). Furthermore, the network interface controller is configured to manage transmission of the first optical signal associated with the first VCSEL and the second optical signal associated with the second VCSEL via an optical communication channel coupled to a network interface module.
Communication apparatus and communication system
A communication apparatus includes a reference signal generating section, a transmitting section, a propagation estimating section, a first data acquiring section, and a decoding section. The reference signal generating section generates a first reference signal to enable a communicating party to estimate a propagation environment. The transmitting section transmits the first reference signal. The propagation estimating section estimates a first propagation estimation value of the propagation environment using a second reference signal transmitted from the communicating party. The first data acquiring section generates first data using the first propagation estimation value. The decoding section decodes a transmission signal encoded using a second propagation estimation value that is estimated by the communicating party using the first reference signal, to obtain second data using the first data.
QUANTUM ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING IN A NEXT GENERATION MOBILE NETWORK
Aspects of the subject disclosure may include, for example, a method of receiving, by a quantum processing system including a hybrid quantum-classical processor, qubits from one or more quantum communication channels by the quantum processor or hybrid quantum-classical processor, wherein each quantum processor or hybrid quantum-classical processor is physically distinct, and wherein the one or more quantum communications channels utilize quantum channel coding and quantum error detection; performing, by the quantum processing system, quantum logic operations on the qubits; and utilizing a plurality of end-to-end quantum and hybrid quantum-classical networked application resources to implement quantum artificial intelligence (QAI) and/or quantum machine learning (QML) services. Other embodiments are disclosed.
Tamper detection in a quantum communications system
A tamper detecting component for a quantum communication system is a trusted node, configurable as a first endpoint trusted node, a middle-trusted node and a second endpoint trusted node. The trusted node has a tamper detection module and a secure memory. The tamper detection module deletes critical system parameters responsive to detecting physical tampering. The trusted node, as the first endpoint trusted node, exchanges a quantum key, encrypts data and transmits encrypted data. The trusted node as the middle-trusted node exchanges a quantum key, exchanges another quantum key, decrypts and re-encrypts data and transmits encrypted data. The trusted node as the second endpoint trusted node exchanges a quantum key, and decrypts data.
Quantum authentication in wireless communication networks
A wireless communication network performs quantum authentication for a wireless User Equipment (UE). In the wireless communication network, network quantum circuitry generates and transfers qubits. UE quantum circuitry receives and processes the qubits and determines polarization states for the qubits. The UE quantum circuitry exchanges cryptography information with the network quantum circuitry and generates cryptography keys based on polarization states and cryptography information. The UE quantum circuitry transfers the cryptography keys to UE network circuitry. The network quantum circuitry exchanges the cryptography information with the UE quantum circuitry. The network quantum circuitry generates the cryptography keys based on the polarization states and the cryptography information and transfers the cryptography keys to network authentication circuitry. The UE network circuitry processes the cryptography keys to generate authentication data and wirelessly transfers to the network authentication circuitry. The network authentication circuitry receives the cryptography keys and the authentication data and authenticates the UE.
CREDENTIAL MANAGEMENT IN DISTRIBUTED COMPUTING SYSTEM
A computing node in a distributed information security system, wherein the computing node is adapted to communicate with a subset of clients of the distributed information security system, wherein the computing node provides at least one cryptographic service for the clients of the subset, wherein the computing node is provisioned with a plurality of keys for use by said at least one cryptographic service, wherein the computing node is adapted to associate a key from the plurality of keys to a service request for a client according to a deterministic process based on one or more data associated with the client. A distributed information security system comprising a plurality of such nodes is also described, together with a method of providing a cryptographic service at such a computing node.
ENCRYPTION KEY REMOVAL TOOL
Systems and methods are described for removing unused encryption key files from a computing device. In an example, a key removal tool can identify three sets of keys to preserve. For the first set, the key removal tool can append a device identifier to known key names and add the resulting key file names to a whitelist. For the second set, the key removal tool can identify keys associated with certificates on the computing device and add their corresponding file names to the whitelist. The third set can correspond to keys created after a cutoff timestamp. The key removal tool can delete all key files with key file names not on the whitelist that were created before the cutoff timestamp.
METHOD AND SYSTEM FOR CREATING A QUANTUM SECURED ENCRYPTION KEY
A method includes a preparation step and a key agreement step. In the preparation step, a first quantum key distribution (QKD) device at a first location and a second QKD device at a second location distant from the first location together create a quantum secured key according to a QKD protocol, and a first encryption device at the first location and a second encryption device at the second location together create a symmetrically encrypted channel between the first location and the second location using the quantum secured key. In the key agreement step, a first key agreement device at the first location and a second key agreement device at the second location together create an encryption key via the symmetrically encrypted channel.
Quantum resistant blockchain with multi-dimensional quantum key distribution
A system for generating a blockchain including an input for receiving a plurality of groups of data. Blockchain processing circuitry generates the blockchain for the plurality of groups of data. The blockchain processing circuitry generates the blockchain by performing a first hash using the first group of data and a first nonce as an input to a hash function to generate a first digital signature for a first block, wherein the hash function uses encryption based on quantum key distribution and orbital angular momentum. The blockchain processing circuitry establishes the first block of the blockchain using the first group of data, the first nonce and the first digital signature. The blockchain processing circuitry performs a second hash using the second group of data, a second nonce and the first digital signature as an input to the hash function to generate a second digital signature for the second block, wherein the hash function uses encryption based on the quantum key distribution and the orbital angular momentum. The circuitry establishes the second block of the blockchain using the second group of data, the second nonce, the first digital signature and the second digital signature.
QUANTUM COMMUNICATIONS SYSTEM USING PULSE DIVIDER AND ASSOCIATED METHODS
A quantum communications system may include a transmitter node, a receiver node, and a quantum communications channel coupling the transmitter node and receiver node. The transmitter node may include a pulse transmitter and pulse divider downstream therefrom. The receiver node may include a pulse recombiner and a pulse receiver downstream therefrom.