Loop-Back Quantum Key Distribution (QKD) for Secure and Scalable Multi-Node Quantum Networks

被引:0
作者
Lizama-Perez, Luis Adrian [1 ]
Lopez-Romero, J. M. [2 ]
机构
[1] Univ Tecn Federico Santa Maria, Dept Elect, Av Vicuna Mackenna 3939, Santiago 8940897, Chile
[2] Cinvestav Queretaro, Libramiento Norponiente 2000, Santiago De Queretaro 76230, Queretaro, Mexico
来源
SYMMETRY-BASEL | 2025年 / 17卷 / 04期
关键词
quantum key distribution; BB84; polarization without measurement; ring topology; multiuser quantum key distribution; CRYPTOGRAPHY;
D O I
10.3390/sym17040521
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Quantum key distribution (QKD) is a cornerstone of secure communication in the quantum era, yet most existing protocols are designed for point-to-point transmission, limiting their scalability in networked environments. In this work, we introduce Loop-Back QKD, a novel QKD protocol that supports both two-party linear configurations and scalable multiuser ring topologies. By leveraging a structured turn-based mechanism and bidirectional pulse propagation, the protocol enables efficient key distribution while reducing the quantum bit error rate (QBER) through a multi-pulse approach. Unlike trusted-node QKD networks, Loop-Back QKD eliminates intermediate-node vulnerabilities, as secret keys are never processed by intermediate nodes. Furthermore, unlike Measurement-Device-Independent (MDI-QKD) and Twin-Field QKD (TF-QKD), which require complex entanglement-based setups, Loop-Back QKD relies solely on direct polarization transformations, reducing vulnerability to side-channel attacks and practical implementation challenges. Additionally, our analysis indicates that multi-pulse Loop-Back QKD can tolerate higher QBER thresholds. However, this increased robustness comes at the cost of a lower key rate efficiency compared to standard QKD schemes. This design choice enhances its robustness against real-world adversarial threats, making it a strong candidate for secure multiuser communication in local and metropolitan-scale quantum networks.
引用
收藏
页数:20
相关论文
共 28 条
[1]   Quantum Key Distribution in the Presence of the Intercept-Resend with Faked States Attack [J].
Adrian Lizama-Perez, Luis ;
Mauricio Lopez, Jose ;
De Carlos Lopez, Eduardo .
ENTROPY, 2017, 19 (01)
[2]   A Comparison of Several Implementations of B92 Quantum Key Distribution Protocol [J].
Anghel, Caralin ;
Istrate, Adrian ;
Vlase, Mihai .
2022 26TH INTERNATIONAL CONFERENCE ON SYSTEM THEORY, CONTROL AND COMPUTING (ICSTCC), 2022, :374-379
[3]   QUANTUM CRYPTOGRAPHY USING ANY 2 NONORTHOGONAL STATES [J].
BENNETT, CH .
PHYSICAL REVIEW LETTERS, 1992, 68 (21) :3121-3124
[4]   Quantum cryptography: Public key distribution and coin tossing [J].
Bennett, Charles H. ;
Brassard, Gilles .
THEORETICAL COMPUTER SCIENCE, 2014, 560 :7-11
[5]   Optimal eavesdropping in quantum cryptography with six states [J].
Bruss, D .
PHYSICAL REVIEW LETTERS, 1998, 81 (14) :3018-3021
[6]  
De Santis G, 2024, Arxiv, DOI arXiv:2406.08562
[7]   Current status of the DARPA quantum network [J].
Elliott, C ;
Colvin, A ;
Pearson, D ;
Pikalo, O ;
Schlafer, J ;
Yeh, H .
QUANTUM INFORMATION AND COMPUTATION III, 2005, 5815 :138-149
[8]   Performance of two quantum-key-distribution protocols [J].
Fung, CHF ;
Tamaki, K ;
Lo, HK .
PHYSICAL REVIEW A, 2006, 73 (01)
[9]   Full-field implementation of a perfect eavesdropper on a quantum cryptography system [J].
Gerhardt, Ilja ;
Liu, Qin ;
Lamas-Linares, Anta ;
Skaar, Johannes ;
Kurtsiefer, Christian ;
Makarov, Vadim .
NATURE COMMUNICATIONS, 2011, 2
[10]   Proof of security of quantum key distribution with two-way classical communications [J].
Gottesman, D ;
Lo, HK .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2003, 49 (02) :457-475