Quantum Key Distribution Method in Quantum Networks

被引:0
作者
Ali, Sellami [1 ]
机构
[1] Shaqra Univ, Fac Comp Sci & Informat Technol, Shaqra, Saudi Arabia
来源
NONLINEAR OPTICS QUANTUM OPTICS-CONCEPTS IN MODERN OPTICS | 2018年 / 49卷 / 1-2期
关键词
Quantum Key Distribution; Quantum cryptography; optical communication; Quantum Network;
D O I
暂无
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
A quantum key distribution (QKD) method has been presented for obtaining the cryptographic key to encode the information communicated between the legitimate parties. It is used to demonstrate and secure the quantum networks. It is utilize to share the secured keys between a plurality of transmitters and a plurality of receivers. It is a QKD system that generates the first signals with different phases or polarization and the second signals with different frequencies and delay time. The transmitter sends the two signals to share the key with receiver. The key is formed by the states of the first and second signals. The method leads to increase the length of the shared key. The first signal is generated in different phases or polarization to protect the transmission channel and to be the reference time for second signal. Secure keys generated by the QKD network are managed in the key management layer by key management agents (KMAs), and used to encrypt the data and send it to receivers. The proposed schemes aimed to provide a secure end to end communication.
引用
收藏
页码:115 / 126
页数:12
相关论文
共 35 条
[1]  
Ali Sellami, 2013, WULFENIA J, V20
[2]  
Bennett CH, 1984, P IEEE INT C COMP SY, P175, DOI DOI 10.1016/J.TCS.2014.05.025
[3]   Photon-number-resolving decoy-state quantum key distribution [J].
Cai, QY ;
Tan, YG .
PHYSICAL REVIEW A, 2006, 73 (03)
[4]   Metropolitan all-pass and inter-city quantum communication network [J].
Chen, Teng-Yun ;
Wang, Jian ;
Liang, Hao ;
Liu, Wei-Yue ;
Liu, Yang ;
Jiang, Xiao ;
Wang, Yuan ;
Wan, Xu ;
Cai, Wen-Qi ;
Ju, Lei ;
Chen, Luo-Kan ;
Wang, Liu-Jun ;
Gao, Yuan ;
Chen, Kai ;
Peng, Cheng-Zhi ;
Chen, Zeng-Bing ;
Pan, Jian-Wei .
OPTICS EXPRESS, 2010, 18 (26) :27217-27225
[5]   Field test of a practical secure communication network with decoy-state quantum cryptography [J].
Chen, Teng-Yun ;
Liang, Hao ;
Liu, Yang ;
Cai, Wen-Qi ;
Ju, Lei ;
Liu, Wei-Yue ;
Wang, Jian ;
Yin, Hao ;
Chen, Kai ;
Chen, Zeng-Bing ;
Peng, Cheng-Zhi ;
Pan, Jian-Wei .
OPTICS EXPRESS, 2009, 17 (08) :6540-6549
[6]   QUANTUM CRYPTOGRAPHY BASED ON BELL THEOREM [J].
EKERT, AK .
PHYSICAL REVIEW LETTERS, 1991, 67 (06) :661-663
[7]   Current status of the DARPA quantum network [J].
Elliott, C ;
Colvin, A ;
Pearson, D ;
Pikalo, O ;
Schlafer, J ;
Yeh, H .
QUANTUM INFORMATION AND COMPUTATION III, 2005, 5815 :138-149
[8]   A quantum access network [J].
Froehlich, Bernd ;
Dynes, James F. ;
Lucamarini, Marco ;
Sharpe, Andrew W. ;
Yuan, Zhiliang ;
Shields, Andrew J. .
NATURE, 2013, 501 (7465) :69-+
[9]  
Gottesman D, 2004, QUANTUM INF COMPUT, V4, P325
[10]   Decoy state quantum key distribution with a photon number resolved heralded single photon source [J].
Horikiri, T ;
Kobayashi, T .
PHYSICAL REVIEW A, 2006, 73 (03)