Cryptography – Key management – Key distribution
Reexamination Certificate
2008-01-29
2008-01-29
Sheikh, Ayaz (Department: 2131)
Cryptography
Key management
Key distribution
C380S239000, C380S255000, C370S390000, C370S400000, C713S192000
Reexamination Certificate
active
07324647
ABSTRACT:
Methods and systems are disclosed in which information is securely transmitted in a network comprising untrusted network devices. Setup messages are sent to a networking device, and based on the setup messages, light directing devices are configured to direct light along a path from an origin endpoint to a terminal endpoint, thus providing a path through the network. Through the path, a stream of light information is sent using a plurality of light pulses to carry out quantum-cryptographic key distribution.
REFERENCES:
patent: 4445116 (1984-04-01), Grow
patent: 4649233 (1987-03-01), Bass et al.
patent: 4770535 (1988-09-01), Kim et al.
patent: 5058973 (1991-10-01), Refregier et al.
patent: 5157461 (1992-10-01), Page
patent: 5243649 (1993-09-01), Franson
patent: 5307410 (1994-04-01), Bennett
patent: 5311572 (1994-05-01), Friedes et al.
patent: 5325397 (1994-06-01), Scholz et al.
patent: 5339182 (1994-08-01), Kimble et al.
patent: 5400325 (1995-03-01), Chatwani et al.
patent: 5414771 (1995-05-01), Fawcett, Jr.
patent: 5469432 (1995-11-01), Gat
patent: 5502766 (1996-03-01), Boebert et al.
patent: 5515438 (1996-05-01), Bennett et al.
patent: 5535195 (1996-07-01), Lee
patent: 5602916 (1997-02-01), Grube et al.
patent: 5675648 (1997-10-01), Townsend
patent: 5710773 (1998-01-01), Shiga
patent: 5720608 (1998-02-01), Aoki et al.
patent: 5729608 (1998-03-01), Janson et al.
patent: 5732139 (1998-03-01), Lo et al.
patent: 5757912 (1998-05-01), Blow
patent: 5764765 (1998-06-01), Phoenix et al.
patent: 5764767 (1998-06-01), Beimel et al.
patent: 5768378 (1998-06-01), Townsend et al.
patent: 5768391 (1998-06-01), Ichikawa
patent: 5805801 (1998-09-01), Holloway et al.
patent: 5850441 (1998-12-01), Townsend et al.
patent: 5911018 (1999-06-01), Bischel et al.
patent: 5953421 (1999-09-01), Townsend
patent: 5960131 (1999-09-01), Fouquet et al.
patent: 5960133 (1999-09-01), Tomlinson
patent: 5966224 (1999-10-01), Hughes et al.
patent: 6005993 (1999-12-01), MacDonald
patent: 6028935 (2000-02-01), Rarity et al.
patent: 6052465 (2000-04-01), Gotoh et al.
patent: 6097696 (2000-08-01), Doverspike
patent: 6122252 (2000-09-01), Aimoto et al.
patent: 6130780 (2000-10-01), Joannopoulos et al.
patent: 6145024 (2000-11-01), Maezawa et al.
patent: 6151586 (2000-11-01), Brown
patent: 6154586 (2000-11-01), MacDonald et al.
patent: 6160627 (2000-12-01), Ahn et al.
patent: 6160651 (2000-12-01), Chang et al.
patent: 6188768 (2001-02-01), Bethune et al.
patent: 6208935 (2001-03-01), Yamada et al.
patent: 6233075 (2001-05-01), Chang et al.
patent: 6233393 (2001-05-01), Yanagihara et al.
patent: 6289104 (2001-09-01), Patterson et al.
patent: 6341127 (2002-01-01), Katsube et al.
patent: 6378072 (2002-04-01), Collins et al.
patent: 6463060 (2002-10-01), Sato et al.
patent: 6507012 (2003-01-01), Medard et al.
patent: 6519062 (2003-02-01), Yoo
patent: 6522749 (2003-02-01), Wang
patent: 6529498 (2003-03-01), Cheng
patent: 6532543 (2003-03-01), Smith et al.
patent: 6538990 (2003-03-01), Prorock
patent: 6539410 (2003-03-01), Klass
patent: 6556544 (2003-04-01), Lee
patent: 6560707 (2003-05-01), Curtis et al.
patent: 6563796 (2003-05-01), Saito
patent: 6594055 (2003-07-01), Snawerdt
patent: 6605822 (2003-08-01), Blais et al.
patent: 6646727 (2003-11-01), Saleh et al.
patent: 6647010 (2003-11-01), Ford et al.
patent: 6650805 (2003-11-01), Chen et al.
patent: 6654346 (2003-11-01), Mahalingaiah et al.
patent: 6661806 (2003-12-01), Eriksson et al.
patent: 6678379 (2004-01-01), Mayers et al.
patent: 6684335 (2004-01-01), Epstein et al.
patent: 6720589 (2004-04-01), Shields
patent: 6721269 (2004-04-01), Cao et al.
patent: 6728281 (2004-04-01), Santori et al.
patent: 6748434 (2004-06-01), Kavanagh
patent: 6754214 (2004-06-01), Mahalingaiah
patent: 6778557 (2004-08-01), Yuki et al.
patent: 6799270 (2004-09-01), Bull et al.
patent: 6801626 (2004-10-01), Nambu
patent: 6836463 (2004-12-01), Garcia-Luna-Aceves et al.
patent: 6862564 (2005-03-01), Shue et al.
patent: 6873797 (2005-03-01), Chang et al.
patent: 6882431 (2005-04-01), Teich et al.
patent: 6895091 (2005-05-01), Elliott et al.
patent: 6895092 (2005-05-01), Tomita
patent: 6897434 (2005-05-01), Kumar et al.
patent: 6934472 (2005-08-01), Chang et al.
patent: 6986056 (2006-01-01), Dultz et al.
patent: 7028059 (2006-04-01), Williams
patent: 7035411 (2006-04-01), Azuma et al.
patent: 2001/0038695 (2001-11-01), Kim
patent: 2002/0015573 (2002-02-01), Ishibashi
patent: 2002/0021467 (2002-02-01), Ofek et al.
patent: 2002/0025041 (2002-02-01), Tomita
patent: 2002/0097874 (2002-07-01), Foden et al.
patent: 2002/0110245 (2002-08-01), Gruia
patent: 2002/0141019 (2002-10-01), Chang et al.
patent: 2003/0002074 (2003-01-01), Nambu et al.
patent: 2003/0002670 (2003-01-01), Wang
patent: 2003/0002674 (2003-01-01), Nambu et al.
patent: 2003/0059157 (2003-03-01), DeCusalis et al.
patent: 2003/0137944 (2003-07-01), Medvinsky
patent: 2003/0180042 (2003-09-01), Nelles et al.
patent: 2003/0215088 (2003-11-01), Bao
patent: 2003/0231771 (2003-12-01), Gisin et al.
patent: 2004/0005056 (2004-01-01), Nishioka et al.
patent: 2004/0008843 (2004-01-01), Van Enk
patent: 2004/0019676 (2004-01-01), Iwatsuki et al.
patent: 2004/0109564 (2004-06-01), Cerf et al.
patent: 2004/0136321 (2004-07-01), Ren et al.
patent: 2004/0165884 (2004-08-01), Al-Chalabi
patent: 2004/0190725 (2004-09-01), Yuan et al.
patent: 2005/0036624 (2005-02-01), Kent et al.
patent: 2005/0094818 (2005-05-01), Inoue et al.
patent: 2006/0252381 (2006-11-01), Sasaoka et al.
patent: WO 96/07951 (1996-03-01), None
patent: WO 9607951 (1996-03-01), None
Zhang, Xian-Mo and Zhen, Yuliang. “Cryptographically Functions”. Sep. 1997. IEEE Transactions on Information Theory, vol. 43, No. 5, pp. 1740-1747. Found on the World Wide Web at: http://ieeexplore.ieee.or/iel3/18/13537/00623184.pdf?tp =& arnumber=623184&insnumber=13537.
Bennett, Charles ZH. and Brassard, Gilles. “Experimental quantum cryptography: the dawn of a new era for quantum cryptography: the experimental prototype is working”. Oct. 1989. ACM SIGACT News. vol. 20, issue 4, pp. 78-82. Found on the World Wide Web at: http://doi.acm.org/10.1145/74074.74087.
Bennett, C.H., et al., “Experimental Quantum Cryptography.” J. Cryptology, 5:3-28 (1992).
Bennett, C.H., “Quantum Cryptography Using Any Two Nonorthogonal States,” Physical Review Letters, 68(21):3121-3124 (1992).
Butler, W.T., et al. “Free space quantum-key distribution.” Physical Review A, 57(4):2379-2382 (Apr. 1998).
Jacobs, B.C., et al., “Quantum cryptography in free space,” Optics Letters 21(22):1854-1856 (Nov. 1996).
Bethune, D.S., et al., An Autocompensating Fiber-Optic Quantum Cryptography System Based on Polarization Splitting of Light, IEEE Journal of Quantum Electronics, 36(3):340-347 (2000).
Bennett, C.H. Quantum Cryptography Using Any Two Nonorthogonal States. Physical Review Letters. 68:21, 3121-24 (1992).
Buttler, W.T. et al. Free-space quantum-key distribution. Physical Review A. 57:4, 2379-82 (Apr. 1998).
Jacobs, B.C. et al. Quantum cryptography in free space. Optics Letters. 21:22, 1854-56 (Nov. 1996).
Cabello, A., “Multiparty key distribution and secret sharing based on entanglement swapping.” pp. 1-8 (Sep. 7, 2000).
Crepeau, C., et al., “Secure Multi-party Quantum Computation,” ACM, pp. 1-10 (20001).
Gottesman, D., et al. “Secure quantum key distribution using squeezed states,” pp. 1-19 (Sep. 25, 2000).
Xiao, L., et al., “Efficient Multi-Party Quantum Secret Sharing Schemes,” pp. 1-7 (May 28, 2004).
Violations of a New Inequality for Classical Fields; Fransom, J.D.; Johns Hopkins University; NTIS-NASA Publication; Goddard Space Flight Center; Workshop on Squeezed States and Uncertainty Relations, Feb. 1991, pp. 23-32.
Imamoglu, A., et al., “Turnstile Device for Heralded Single Photons: Coulomb Blockade of Electron and Hole Tunneling in Quantum Confined p-i-n Heterojunctions,” Physical Review Letters, 72(2):210-213 (1994).
“Quantum key distribution: Real-time c
Avery Jeremiah
BBN Technologies Corp.
Ropes & Gray LLP
Sheikh Ayaz
LandOfFree
Quantum cryptographic key distribution networks with... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Quantum cryptographic key distribution networks with..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Quantum cryptographic key distribution networks with... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-2747884