摘要:
Secret random data is distributed to a plurality of devices to provision them with new one-time pad data for use in interacting with apparatus holding the same one-time pad data. This distribution is effected by provisioning a first device with a block of secret random data that is, or will become, available to the apparatus. Part of the secret random data is then distributed from the first device to one or more other devices in a hierarchical distribution pattern headed by the first device. Each device, other than those at the bottom of the distribution hierarchy, retains part of the secret random data it receives and passes on the remainder. Each device uses that part of the secret random data it has retained to provide the device with new one-time pad data. A method is also provided for tracking service usage based on the. distributed one-time pad data.
摘要:
A device stores one-time pad data for use in carrying out various tasks. In order to preserve the ability to carry out important tasks that require the use of one-time data, use of the one-time pad data held by the device is controlled such that an amount of this one-time pad data is only usable by a predetermined set of important tasks comprising at least a replenishment task for replenishing the device with one-time pad data.
摘要:
A method and system are provided for evidencing to a first entity, such as a visa-checking authority, that a second entity, such as a traveller, possesses a particular attribute, such as right of entry to a specific country. The method involves a preliminary phase of verifying that the second entity has the attribute of interest; associating that attribute with a first one-time pad held by the first entity; and arranging for the second entity to possess a second one-time pad that is at least a subset of the first one-time pad. Thereafter, when the second entity wishes to prove to the first entity that it has the attribute of interest, it passes evidence data derived from the second one-time pad to the first entity. The first entity can then check for the presence, in the first one-time pad, of data matching, or usable to produce, the evidence data.
摘要:
A system is disclosed in which a plurality of devices are arranged to use one-time pad data to interact with apparatus holding the same one-time pad data. Each of the devices and the apparatus has its own one-time pad and the pads are all provisioned with the same new one-time pad data. Upon any one of the devices wishing to effect an interaction with the apparatus using one-time pad data, an alignment operation is carried out between a set of entities comprising at least the apparatus and the device wishing to carry out the interaction. The alignment operation serves to reduce the level of the one-time pad of at least the device wishing to carry out the interaction, to the level of the lowest one-time pad of the set of entities involved in the alignment operation.
摘要:
First data is encrypted by a first party using an encryption key string formed using at least a hash value of the first data, this hash value being either in clear or in an encrypted form enabling its recovery in clear by a trusted party. The encrypted first data and the encryption key string are made available to a second party which forwards the encryption key string to the trusted party. The trusted party carries out at least one check on the basis of data contained in the encryption key string and, if the checks are satisfactory, provides a decryption key to the second party. Where the encryption key string comprises the hash value of the first data in encrypted form, the trusted party will typically decrypt the hash value and pass it to the second party to enable the latter to check the integrity of the first data.
摘要:
When sending personal data to a recipient, the data owner encrypts the data using both a public data item provided by a trusted party and an encryption key string formed using at least policy data indicative of conditions to be satisfied before access is given to the personal data. The encryption key string is typically also provided to the recipient along with the encrypted personal data. To decrypt the personal data, the recipient sends the encryption key string to the trusted party with a request for the decryption key. The trusted party determines the required decryption key using the encryption key string and private data used in deriving its public data, and provides it to the requesting recipient. However, the decryption key is either not determined or not made available until the trusted party is satisfied that the associated policy conditions have been met by the recipient.
摘要:
First data to be sent by a first party to a second party is encrypted using an encryption key string formed using at least a hash value generated using second data and a secret, shared with a trusted party, that serves as identification of the first party. The second data comprises, for example, one or more conditions that serve as identifiers of the second party, and a hash-value element generated by hashing the first data. The encrypted first data and the encryption key string is made available to the second party which forwards the encryption key string to the trusted party with a request for the corresponding decryption key. The trusted party carries out at least one check on the basis of data contained in the encryption key string and, if this at least one check is satisfactory, provides a decryption key to the second party.
摘要:
A method is provided of creating an end-to-end entanglement (87) between qubits in first and second end nodes (81, 82) of a chain of optically-coupled nodes whose intermediate nodes (80) are quantum repeaters. Local entanglements (85) are created on an on-going basis between qubits in neighboring pairs in the chain through interaction of the qubits with light fields transmitted between the nodes. The quantum repeaters (80) are cyclically operated with their top-level operating cycles being synchronized. Once every top-level operating cycle, each repeater (80) initiates a merging of two entanglements involving respective repeater qubits that are at least expected to be entangled with qubits in nodes disposed in opposite directions along the chain from the repeater. A quantum repeater (80) adapted for implementing this method is also provided.
摘要:
A QKD transmission apparatus comprises a GPS receiver module operable to receive a GPS signal, and a processor operable to use the GPS signal to derive a clock signal for transmission of a QKD signal.
摘要:
A method is provided of creating an end-to-end entanglement (87) between qubits in first and second end nodes (81, 82) of a chain of optically-coupled nodes whose intermediate nodes (80) are quantum repeaters. Local entanglements (85) are created on an on-going basis between qubits in neighbouring pairs in the chain through interaction of the qubits with light fields transmitted between the nodes. The quantum repeaters (80) are cyclically operated with their top-level operating cycles being synchronized. Once every top-level operating cycle, each repeater (80) initiates a merging of two entanglements involving respective repeater qubits that are at least expected to be entangled with qubits in nodes disposed in opposite directions along the chain from the repeater. A quantum repeater (80) adapted for implementing this method is also provided.