Scalable authentication and optimal flooding in a quantum network
- URL: http://arxiv.org/abs/2101.12225v2
- Date: Wed, 21 Jun 2023 13:55:50 GMT
- Title: Scalable authentication and optimal flooding in a quantum network
- Authors: Naomi R. Solomons, Alasdair I. Fletcher, Djeylan Aktas, Natarajan
Venkatachalam, S\"oren Wengerowsky, Martin Lon\v{c}ari\'c, Sebastian P.
Neumann, Bo Liu, \v{Z}eljko Samec, Mario Stip\v{c}evi\'c, Rupert Ursin,
Stefano Pirandola, John G. Rarity, Siddarth Koduru Joshi
- Abstract summary: We consider two related protocols, their experimental demonstrations on an 8-user quantum network test-bed.
First, an authentication transfer protocol to manage a fundamental limitation of quantum communication.
Second, when end users quantify their trust in intermediary nodes, our flooding protocol can be used to improve both end-to-end communication speeds and increase security against malicious nodes.
- Score: 2.604279577944016
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: The global interest in quantum networks stems from the security guaranteed by
the laws of physics. Deploying quantum networks means facing the challenges of
scaling up the physical hardware and, more importantly, of scaling up all other
network layers and optimally utilising network resources. Here we consider two
related protocols, their experimental demonstrations on an 8-user quantum
network test-bed, and discuss their usefulness with the aid of example use
cases. First, an authentication transfer protocol to manage a fundamental
limitation of quantum communication -- the need for a pre-shared key between
every pair of users linked together on the quantum network. By temporarily
trusting some intermediary nodes for a short period of time (<35 min in our
network), we can generate and distribute these initial authentication keys with
a very high level of security. Second, when end users quantify their trust in
intermediary nodes, our flooding protocol can be used to improve both
end-to-end communication speeds and increase security against malicious nodes.
Related papers
- Experimental Quantum Byzantine Agreement on a Three-User Quantum Network with Integrated Photonics [13.10577231578478]
Building quantum communication networks in a scalable and cost-effective way is essential for their widespread adoption.
Here, we establish a polarization entanglement-based fully connected network, which features an ultrabright integrated Bragg reflection waveguide quantum source.
We provide the first experimental implementation of source-independent quantum digital signatures using imperfect keys circumventing the necessity for private amplification.
arXiv Detail & Related papers (2024-03-18T03:29:18Z) - High-Rate 16-node quantum access network based on passive optical
network [14.923361967583348]
In most built quantum secure networks, point-to-multipoint (PTMP) topology is one of the most popular schemes.
Here, we report an experimental demonstration of a high-rate 16-nodes quantum access network based on passive optical network.
arXiv Detail & Related papers (2024-03-05T01:44:13Z) - Guarantees on the structure of experimental quantum networks [105.13377158844727]
Quantum networks connect and supply a large number of nodes with multi-party quantum resources for secure communication, networked quantum computing and distributed sensing.
As these networks grow in size, certification tools will be required to answer questions regarding their properties.
We demonstrate a general method to guarantee that certain correlations cannot be generated in a given quantum network.
arXiv Detail & Related papers (2024-03-04T19:00:00Z) - Continuous-variable quantum passive optical network [0.0]
We propose continuous-variable quantum passive-optical-network (CV-QPON) protocols, enabling deterministic and simultaneous secret key generation among all network users.
We show two protocols with different trust levels assigned to the network users and experimentally demonstrate key generation in a quantum access network with 8 users.
arXiv Detail & Related papers (2024-02-25T09:56:56Z) - Experimental upstream transmission of continuous variable quantum key
distribution access network [14.46130021829951]
Continuous-variable quantum key distribution can be implemented using only low-cost and off-the-shelf components.
We demonstrate the first upstream transmission quantum access networks using continuous-variable quantum key distribution.
arXiv Detail & Related papers (2023-05-03T08:27:02Z) - Establishing shared secret keys on quantum line networks: protocol and
security [0.0]
We show the security of multi-user key establishment on a single line of quantum communication.
We consider a quantum communication architecture where qubit generation and measurement happen at the two ends of the line.
arXiv Detail & Related papers (2023-04-04T15:35:23Z) - Conference key agreement in a quantum network [67.410870290301]
Quantum conference key agreement (QCKA) allows multiple users to establish a secure key from a shared multi-partite entangled state.
In a quantum network, this protocol can be efficiently implemented using a single copy of a N-qubit Greenberger-Horne-Zeilinger (GHZ) state to distil a secure N-user conference key bit.
arXiv Detail & Related papers (2022-07-04T18:00:07Z) - An Evolutionary Pathway for the Quantum Internet Relying on Secure
Classical Repeaters [64.48099252278821]
We conceive quantum networks using secure classical repeaters combined with the quantum secure direct communication principle.
In these networks, the ciphertext gleaned from a quantum-resistant algorithm is transmitted using QSDC along the nodes.
We have presented the first experimental demonstration of a secure classical repeater based hybrid quantum network.
arXiv Detail & Related papers (2022-02-08T03:24:06Z) - The Computational and Latency Advantage of Quantum Communication
Networks [70.01340727637825]
This article summarises the current status of classical communication networks.
It identifies some critical open research challenges that can only be solved by leveraging quantum technologies.
arXiv Detail & Related papers (2021-06-07T06:31:02Z) - Single-Shot Secure Quantum Network Coding for General Multiple Unicast
Network with Free One-Way Public Communication [56.678354403278206]
We propose a canonical method to derive a secure quantum network code over a multiple unicast quantum network.
Our code correctly transmits quantum states when there is no attack.
It also guarantees the secrecy of the transmitted quantum state even with the existence of an attack.
arXiv Detail & Related papers (2020-03-30T09:25:13Z) - Experimental quantum conference key agreement [55.41644538483948]
Quantum networks will provide multi-node entanglement over long distances to enable secure communication on a global scale.
Here we demonstrate quantum conference key agreement, a quantum communication protocol that exploits multi-partite entanglement.
We distribute four-photon Greenberger-Horne-Zeilinger (GHZ) states generated by high-brightness, telecom photon-pair sources across up to 50 km of fibre.
arXiv Detail & Related papers (2020-02-04T19:00:31Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.