Patents Assigned to evolutionQ
-
Patent number: 11930101Abstract: A system and method are provided for mitigating key-exhaustion attacks in a key exchange protocol. The method includes computationally confirming an exchange of key bits has provided fresh shared key material before information theoretically confirming the exchange of key bits has provided fresh shared key material, while maintaining synchronization between messaging parties. In one implementation, maintaining synchronization includes updating keys in between each post-processing message session and managing a local state of each messaging party in the key exchange protocol prior to sending a next post-processing message. In another implementation, maintaining synchronization includes hiding a message containing the information theoretic authenticator by executing a decoy authentication process, prior to using an information theoretical key.Type: GrantFiled: March 25, 2021Date of Patent: March 12, 2024Assignee: evolutionQ Inc.Inventors: Sebastian Reynaldo Verschoor, Michele Mosca, Thomas Parry, James Godfrey
-
Patent number: 11652620Abstract: A system and method are provided for proactively buffering quantum key distribution (QKD) key material. The method includes monitoring key generation rates and surpluses at QKD devices at each node of a QKD link in a QKD network, retrieving surplus key material from the QKD devices at one or both nodes of the QKD link, and buffering the surplus key material in a local storage at one or both nodes in the QKD link. The surplus key material can be used to offset overhead introduced in securely relaying keys between non-adjacent demand pairs in the QKD network. The surplus key material can also be used to offset future transient decreases in key generation rates.Type: GrantFiled: March 15, 2021Date of Patent: May 16, 2023Assignee: evolutionQ Inc.Inventors: Thomas Owen Parry, James Andrew Godfrey, Norbert Lütkenhaus
-
Patent number: 11652619Abstract: A system and method are described for proactively performing key swaps among nodes in a quantum key distribution (QKD) network. The method includes determining a routing solution for nodes in the QKD network; making the routing solution available to the nodes in the QKD network; and initiating key swaps among the nodes in the QKD network according to the routing solution, prior to key requests being made within the QKD network. The method can also include continuously performing key swaps among the nodes in the QKD network according to the routing solution; detecting a change in capacity and/or a change in demand on one or more links within the QKD network; determining a new routing solution based on the detected change; and continuously preforming subsequent key swaps according to the new routing solution.Type: GrantFiled: March 15, 2021Date of Patent: May 16, 2023Assignee: evolutionQ Inc.Inventors: Thomas Owen Parry, James Andrew Godfrey, Marco Piani, Norbert Lütkenhaus
-
Publication number: 20220294617Abstract: A system and method are provided for proactively buffering quantum key distribution (QKD) key material. The method includes monitoring key generation rates and surpluses at QKD devices at each node of a QKD link in a QKD network, retrieving surplus key material from the QKD devices at one or both nodes of the QKD link, and buffering the surplus key material in a local storage at one or both nodes in the QKD link. The surplus key material can be used to offset overhead introduced in securely relaying keys between non-adjacent demand pairs in the QKD network. The surplus key material can also be used to offset future transient decreases in key generation rates.Type: ApplicationFiled: March 15, 2021Publication date: September 15, 2022Applicant: evolutionQInventors: Thomas Owen PARRY, James Andrew GODFREY, Norbert LÜTKENHAUS
-
Publication number: 20220294616Abstract: A system and method are described for proactively performing key swaps among nodes in a quantum key distribution (QKD) network. The method includes determining a routing solution for nodes in the QKD network; making the routing solution available to the nodes in the QKD network; and initiating key swaps among the nodes in the QKD network according to the routing solution, prior to key requests being made within the QKD network. The method can also include continuously performing key swaps among the nodes in the QKD network according to the routing solution; detecting a change in capacity and/or a change in demand on one or more links within the QKD network; determining a new routing solution based on the detected change; and continuously preforming subsequent key swaps according to the new routing solution.Type: ApplicationFiled: March 15, 2021Publication date: September 15, 2022Applicant: evolutionQInventors: Thomas Owen PARRY, James Andrew GODFREY, Marco PIANI, Norbert LÜTKENHAUS
-
Publication number: 20220166606Abstract: A system and method are provided for mitigating key-exhaustion attacks in a key exchange protocol. The method includes computationally confirming an exchange of key bits has provided fresh shared key material before information theoretically confirming the exchange of key bits has provided fresh shared key material, while maintaining synchronization between messaging parties. In one implementation, maintaining synchronization includes updating keys in between each post-processing message session and managing a local state of each messaging party in the key exchange protocol prior to sending a next post-processing message. In another implementation, maintaining synchronization includes hiding a message containing the information theoretic authenticator by executing a decoy authentication process, prior to using an information theoretical key.Type: ApplicationFiled: March 25, 2021Publication date: May 26, 2022Applicant: evolutionQInventors: Sebastian Reynaldo VERSCHOOR, Michele MOSCA, Thomas PARRY, James GODFREY
-
Publication number: 20210351917Abstract: Quantum Key Exchange (QKE, also known as Quantum Key Distribution or QKD) allows communicating parties to securely establish cryptographic keys. It is a well-established fact that all QKE protocols require that the parties have access to an authentic channel. Without this authenticated link, QKE is vulnerable to man-in-the-middle attacks. Overlooking this fact results in exaggerated claims and/or false expectations about the potential impact of QKE. In this paper we present a systematic comparison of QKE with traditional key establishment protocols in realistic secure communication systems.Type: ApplicationFiled: March 25, 2021Publication date: November 11, 2021Applicant: evolutionQInventors: Sebastian Reynaldo VERSCHOOR, Michele MOSCA, Thomas PARRY, James GODFREY