ترغب بنشر مسار تعليمي؟ اضغط هنا

Multiple-Access Quantum Key Distribution Networks

69   0   0.0 ( 0 )
 نشر من قبل Mohsen Razavi
 تاريخ النشر 2011
  مجال البحث فيزياء
والبحث باللغة English
 تأليف Mohsen Razavi




اسأل ChatGPT حول البحث

This paper addresses multi-user quantum key distribution networks, in which any two users can mutually exchange a secret key without trusting any other nodes. The same network also supports conventional classical communications by assigning two different wavelength bands to quantum and classical signals. Time and code division multiple access (CDMA) techniques, within a passive star network, are considered. In the case of CDMA, it turns out that the optimal performance is achieved at a unity code weight. A listen-before-send protocol is then proposed to improve secret key generation rates in this case. Finally, a hybrid setup with wavelength routers and passive optical networks, which can support a large number of users, is considered and analyzed.

قيم البحث

اقرأ أيضاً

71 - Gang Chen , Le Wang , Wei Li 2019
We propose a multiple pulses phase-matching quantum key distribution protocol (MPPM-QKD) to exceed the linear key rate bound and to achieve higher error tolerance. In our protocol, Alice and Bob generate at first their own train pulses (each train sh ould contain L pulses) as well as random bit sequences, and also encode each pulse of their trains with a randomized phase and a modulation phase. As the next step, both encoded trains are simultaneously sent to Charlie, who performs an interference detection and may be also an eavesdropper. After a successful detection is announced by Charlie, Alice and Bob open the randomized phase of each pulse and keep only communications when the summation of the difference randomized phases at two success detections time-stamps for Alice and Bob are equal to 0 or pi. Thereafter, Alice and Bob compute the sifted key with the time-stamps. The above procedure is repeated until both Alice and Bob achieve sufficiently long sifted keys. We can also show that the secret key rate of the proposed QKD protocol can beat the rate-loss limit of so far known QKD protocols when the transmission distance is greater than 250 km. Moreover, the proposed protocol has a higher error tolerance, approximately 24%, when the transmission distance is 50 km and L = 128. The secret key rate and the transmission distance of our protocol are superior to that of the round-robin differential-phase-shift quantum key distribution protocol [6], and also of the measurement-device-independent quantum key distribution protocol [4], and the secret key rate performance is better in both cases than that of phase-matching quantum key distribution when bit train length is greater than 32.
Quantum key distribution (QKD) which enables the secure distribution of symmetric keys between two legitimate parties is of great importance in future network security. Access network that connects multiple end-users with one network backbone can be combined with QKD to build security for end-users in a scalable and cost-effective way. Though previous QKD access networks are all implemented in the upstream direction, in this paper, we prove that downstream access network can also be constructed by using continuous-variable (CV) QKD. The security of the CV-QKD downstream access network is analyzed in detail, where we show the security analysis is secure against other parties in the network. The security analysis we proved corresponds to the downstream access network where only passive beamsplitter is sufficient to distribute the quantum signals and no other active controls are demanded. Moreover, standard CV-QKD systems can be directly fitted in the downstream access network, which makes it more applicable for practical implementations. Numerous simulation results are provided to demonstrate the performance of the CV-QKD downstream access network, where up to 64 end-users are shown to be feasible to access the network. Our work provides the security analysis framework for realizing QKD in the downstream access network which will boost the diversity for constructing practical QKD networks.
Integrated photonics has the advantages of miniaturization, low cost, and CMOS compatibility, and it provides a stable, highly integrated, and practical platform for quantum key distribution (QKD). While photonic integration of optical components has greatly reduced the overall cost of QKD systems, single-photon detectors (SPDs) have become the most expensive part of a practical QKD system. In order to circumvent this obstacle and make full use of SPDs, we have designed and fabricated a QKD receiver chip for multiple users. Our chip is based on a time-division multiplexing technique and makes use of a single set of SPDs to support up to four users QKD. Our proof-of-principle chip-based QKD system is capable of producing an average secret key rate of 13.68 kbps for four users with a quantum bit error rate (QBER) as low as 0.51% over a simulated distance of 20 km in fiber. Our result clearly demonstrates the feasibility of multiplexing SPDs for setting QKD channels with different users using photonic integrated chip and may find applications in the commercialization of quantum communication technology.
Digital signatures are widely used for providing security of communications. At the same time, the security of currently deployed digital signature protocols is based on unproven computational assumptions. An efficient way to ensure an unconditional (information-theoretic) security of communication is to use quantum key distribution (QKD), whose security is based on laws of quantum mechanics. In this work, we develop an unconditionally secure signatures (USS) scheme that guarantees authenticity and transferability of arbitrary length messages in a QKD network. In the proposed setup, the QKD network consists of two subnetworks: (i) the internal network that includes the signer and with limitation on the number of malicious nodes, and (ii) the external one that has no assumptions on the number of malicious nodes. A price of the absence of the trust assumption in the external subnetwork is a necessity of the assistance from internal subnetwork recipients for the verification of message-signature pairs by external subnetwork recipients. We provide a comprehensive security analysis of the developed scheme, perform an optimization of the scheme parameters with respect to the secret key consumption, and demonstrate that the developed scheme is compatible with the capabilities of currently available QKD devices.
A Quantum Key Distribution (QKD) network is an infrastructure capable of performing long-distance and high-rate secret key agreement with information-theoretic security. In this paper we study security properties of QKD networks based on trusted repe ater nodes. Such networks can already be deployed, based on current technology. We present an example of a trusted repeater QKD network, developed within the SECOQC project. The main focus is put on the study of secure key agreement over a trusted repeater QKD network, when some nodes are corrupted. We propose an original method, able to ensure the authenticity and privacy of the generated secret keys.
التعليقات
جاري جلب التعليقات جاري جلب التعليقات
سجل دخول لتتمكن من متابعة معايير البحث التي قمت باختيارها
mircosoft-partner

هل ترغب بارسال اشعارات عن اخر التحديثات في شمرا-اكاديميا