Nothing Special   »   [go: up one dir, main page]

Skip to main content
Log in

White-light interferometric method for secure key distribution

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

Abstract

A protocol for secure key distribution using classical light is proposed. The method relies on white-light interferometric measurements by one of the communicating parties and the random choice of delays by the other party. In this way, securely shared random keys are created, thereby enabling secure data transmission. In contrast to quantum key distribution, only classical waves are used. Single photons (and the practical problems associated with them) are avoided. The security of the method cannot be proven at the moment but different attacks are described and briefly analyzed.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Shannon CE (1949) Communication theory of secrecy systems. Bell Syst Tech J 28(4):656

    MathSciNet  MATH  Google Scholar 

  2. Delfs H, Knebl H (2007) Introduction to cryptography: principles and applications. Springer, Berlin

    MATH  Google Scholar 

  3. Mermin ND (2007) Quantum computer science. Cambridge University Press, Cambridge

    MATH  Google Scholar 

  4. Haist T, Osten W (2009) Proposal for secure key distribution using classical optics. Lect Notes Comput Sci 5882:99–101

    Article  Google Scholar 

  5. Bennett CH (1992) Quantum cryptography using any two nonorthogonal states. Phys Rev Lett 21:3121–3124

    Article  Google Scholar 

  6. Ekert AK, Huttner B, Palma GM, Peres A (1994) Eavesdropping on quantum-cryptographical system. Phys Rev A 50:1047–1055

    Article  Google Scholar 

  7. Huttner B, Imoto N, Gisin N, Mor T (1995) Quantum cryptography with coherent states. Phys Rev A 51:1863–1869

    Article  Google Scholar 

  8. Hirano T, Yamanaka H, Asikaga M, Konishi T, Namiki R (2003) Quantum cryptography using pulsed homodyne detection. Phys Rev A 68:042331

    Article  Google Scholar 

  9. Maurer EM, Wolf S (1999) Unconditionally secure key agreement and the intrinsic conditional information. IEEE Trans Inf Theory 45:499–514

    Article  MathSciNet  MATH  Google Scholar 

  10. Yuen HP, Kim AM (1998) Classical noise-based cryptography similar to two-state quantum cryptography. Phys Lett A 241:135–138

    Article  Google Scholar 

  11. Liu S, Van Tilborg HCA, Van Dijk M (2003) A practical protocol for advantage distillation and information reconciliation. Design Codes Cryptogr 30:39–62

    Article  MATH  Google Scholar 

  12. Watanabe Y (2007) Privacy amplification for quantum key distribution. J Phys A 40:F99–104

    Article  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Tobias Haist.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Haist, T., Osten, W. White-light interferometric method for secure key distribution. J Supercomput 62, 656–662 (2012). https://doi.org/10.1007/s11227-010-0488-x

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11227-010-0488-x

Keywords

Navigation