Realizing downstream access network using continuous-variable quantum
key distribution
- URL: http://arxiv.org/abs/2107.01800v1
- Date: Mon, 5 Jul 2021 05:36:07 GMT
- Title: Realizing downstream access network using continuous-variable quantum
key distribution
- Authors: Yundi Huang, Tao Shen, Xiangyu Wang, Ziyang Chen, Bingjie Xu, Song Yu
and Hong Guo
- Abstract summary: Quantum key distribution (QKD) enables the secure distribution of symmetric keys between two legitimate parties.
Access network that connects multiple end-users with one network backbone can be combined with QKD to build security for end-users.
In this paper, we prove that downstream access network can also be constructed by using continuous-variable (CV) QKD.
- Score: 15.570105300801247
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Quantum key distribution (QKD) which enables the secure distribution of
symmetric keys between two legitimate parties is of great importance in future
network security. Access network that connects multiple end-users with one
network backbone can be combined with QKD to build security for end-users in a
scalable and cost-effective way. Though previous QKD access networks are all
implemented in the upstream direction, in this paper, we prove that downstream
access network can also be constructed by using continuous-variable (CV) QKD.
The security of the CV-QKD downstream access network is analyzed in detail,
where we show the security analysis is secure against other parties in the
network. The security analysis we proved corresponds to the downstream access
network where only passive beamsplitter is sufficient to distribute the quantum
signals and no other active controls are demanded. Moreover, standard CV-QKD
systems can be directly fitted in the downstream access network, which makes it
more applicable for practical implementations. Numerous simulation results are
provided to demonstrate the performance of the CV-QKD downstream access
network, where up to 64 end-users are shown to be feasible to access the
network. Our work provides the security analysis framework for realizing QKD in
the downstream access network which will boost the diversity for constructing
practical QKD networks.
Related papers
- Practical hybrid PQC-QKD protocols with enhanced security and performance [44.8840598334124]
We develop hybrid protocols by which QKD and PQC inter-operate within a joint quantum-classical network.
In particular, we consider different hybrid designs that may offer enhanced speed and/or security over the individual performance of either approach.
arXiv Detail & Related papers (2024-11-02T00:02:01Z) - Towards efficient and secure quantum-classical communication networks [47.27205216718476]
There are two primary approaches to achieving quantum-resistant security: quantum key distribution (QKD) and post-quantum cryptography (PQC)
We introduce the pros and cons of these protocols and explore how they can be combined to achieve a higher level of security and/or improved performance in key distribution.
We hope our discussion inspires further research into the design of hybrid cryptographic protocols for quantum-classical communication networks.
arXiv Detail & Related papers (2024-11-01T23:36:19Z) - Quantum-Secured Data Centre Interconnect in a field environment [38.4938584033229]
Quantum key distribution (QKD) is an established quantum technology at a high readiness level.
In this article, we present the successful implementation of a QKD field trial within a commercial data centre environment.
The achieved average secret key rate of 2.392 kbps and an average quantum bit error rate of less than 2% demonstrate the commercial feasibility of QKD in real-world scenarios.
arXiv Detail & Related papers (2024-10-14T08:05:25Z) - Quantum Key Distribution Networks -- Key Management: A Survey [1.3611372330340248]
Quantum Key Distribution (QKD) is a promising technology that provides an Information-Theoretically Secure (ITS) solution to the secret-key agreement problem between two remote parties.
QKD networks based on trusted repeaters are built to provide service to a larger number of parties at arbitrary distances.
arXiv Detail & Related papers (2024-08-08T16:42:45Z) - The Road to Near-Capacity CV-QKD Reconciliation: An FEC-Agnostic Design [53.67135680812675]
A new codeword-based QKD reconciliation scheme is proposed.
Both the authenticated classical channel (ClC) and the quantum channel (QuC) are protected by separate forward error correction (FEC) coding schemes.
The proposed system makes QKD reconciliation compatible with a wide range of FEC schemes.
arXiv Detail & Related papers (2024-03-24T14:47:08Z) - The Evolution of Quantum Secure Direct Communication: On the Road to the
Qinternet [49.8449750761258]
Quantum secure direct communication (QSDC) is provably secure and overcomes the threat of quantum computing.
We will detail the associated point-to-point communication protocols and show how information is protected and transmitted.
arXiv Detail & Related papers (2023-11-23T12:40:47Z) - Practical quantum secure direct communication with squeezed states [55.41644538483948]
We report the first table-top experimental demonstration of a CV-QSDC system and assess its security.
This realization paves the way into future threat-less quantum metropolitan networks, compatible with coexisting advanced wavelength division multiplexing (WDM) systems.
arXiv Detail & Related papers (2023-06-25T19:23:42Z) - An Efficient Routing Protocol for Quantum Key Distribution Networks [9.203625000707856]
Quantum key distribution (QKD) can provide point-to-point information-theoretic secure key services for two connected users.
QOLSR considerably improves quantum key utilization in QKD networks through link-state awareness and path optimization.
arXiv Detail & Related papers (2022-04-29T07:37:45Z) - An Information-theoretical Secured Byzantine-fault Tolerance Consensus
in Quantum Key Distribution Network [13.007691543559666]
Quantum key distribution (QKD) networks are expected to provide information-theoretical secured (ITS) communication over long distances.
We propose an ITS Byzantine-fault tolerance (BFT) QKD network scheme to achieve end-to-end key distribution based on point-to-point QKD links.
We theoretically analyze proposed ITSBFT-QKD network scheme from four aspects: QKD key distribution security, temporary signature security, consensus security, and leader election fairness.
arXiv Detail & Related papers (2022-04-21T01:04:39Z) - Feasibility Study for CubeSat Based Trusted Node Configuration Global
QKD Network [0.0]
Quantum key distribution (QKD) is the most used protocol in the context of quantum cryptography.
This paper summarizes technical challenges and possible solutions to enable a global QKD network using CubeSats.
arXiv Detail & Related papers (2021-02-26T15:13:31Z) - Open-destination measurement-device-independent quantum key distribution
network [10.480419551094071]
Quantum key distribution (QKD) networks hold promise for sharing secure randomness over multi-partities.
Here, we propose an open-destination measurement-device-independent QKD network.
The scheme enjoys security against untrusted relays and all detector side-channel attacks.
arXiv Detail & Related papers (2020-09-28T16:05:32Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.