Quantum cryptography and combined schemes of quantum cryptography communication networks

被引:9
作者
Bykovsky, A. Yu. [1 ]
Kompanets, I. N. [1 ]
机构
[1] Russian Acad Sci, PN Lebedev Phys Inst, Leninsky Prosp 53, Moscow 119991, Russia
关键词
quantum key distribution; optical communication; photonic network; network-centric system; fibre-optic communication line; secure encoding; multi-valued (or multiple-valued) logic protected encoding; multi-agent network management system; EXPOSED-KEY WEAKNESS; FIELD-TEST; ALPHA-ETA; SECURITY; FIBER; PROTOCOL; Y-00; ENCRYPTION; ATTACKS; SYSTEMS;
D O I
10.1070/QEL16732
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
We discuss cryptographic data protection network schemes combining the approaches of quantum cryptography with advanced computer information processing methods. The use of the latter is due to the presence of a number of unsolved problems in the existing quantum key distribution systems and is also associated with projects for the development of network-centric quantum communications and photonic networks, which involves the employment of multi-agent control models. Developments based on the Y-00 protocol with data encoding by the quantum noise of a transmitting laser are considered, and achievements in the field of quantum-optical random number generators are presented. The latter can be also used to design secure multi-valued logic encoding schemes that are promising for increasing the dimension of the key space in the 'one-time pad' method, for solving the tasks of position-dependent cryptography and for implementing multi-agent models.
引用
收藏
页码:777 / 801
页数:25
相关论文
共 183 条
[1]   Device-independent security of quantum cryptography against collective attacks [J].
Acin, Antonio ;
Brunner, Nicolas ;
Gisin, Nicolas ;
Massar, Serge ;
Pironio, Stefano ;
Scarani, Valerio .
PHYSICAL REVIEW LETTERS, 2007, 98 (23)
[2]   Roadmap of optical communications [J].
Agrell, Erik ;
Karlsson, Magnus ;
Chraplyvy, A. R. ;
Richardson, David J. ;
Krummrich, Peter M. ;
Winzer, Peter ;
Roberts, Kim ;
Fischer, Johannes Karl ;
Savory, Seb J. ;
Eggleton, Benjamin J. ;
Secondini, Marco ;
Kschischang, Frank R. ;
Lord, Andrew ;
Prat, Josep ;
Tomkos, Ioannis ;
Bowers, John E. ;
Srinivasan, Sudha ;
Brandt-Pearce, Maite ;
Gisin, Nicolas .
JOURNAL OF OPTICS, 2016, 18 (06)
[3]   Exposed-key weakness of αη [J].
Ahn, Charlene ;
Birnbaum, Kevin .
PHYSICS LETTERS A, 2007, 370 (02) :131-135
[4]   Reply to: "Comment on: 'Exposed-key weakness of αη' [Phys. Lett. A 370 (2007) 131]" [Phys. Lett. A 372 (2008) 7091] [J].
Ahn, Charlene ;
Birnbaum, Kevin .
PHYSICS LETTERS A, 2008, 372 (47) :7097-7099
[5]  
Al'bov A. S, 2016, KVANTOVAYA KRIPTOGRA
[6]   Using quantum key distribution for cryptographic purposes: A survey [J].
Alleaume, R. ;
Branciard, C. ;
Bouda, J. ;
Debuisschert, T. ;
Dianati, M. ;
Gisin, N. ;
Godfrey, M. ;
Grangier, P. ;
Laenger, T. ;
Luetkenhaus, N. ;
Monyk, C. ;
Painchault, P. ;
Peev, M. ;
Poppe, A. ;
Pornin, T. ;
Rarity, J. ;
Renner, R. ;
Ribordy, G. ;
Riguidel, M. ;
Salvail, L. ;
Shields, A. ;
Weinfurter, H. ;
Zeilinger, A. .
THEORETICAL COMPUTER SCIENCE, 2014, 560 :62-81
[7]  
[Anonymous], 1985, IBM Technical Disclosure Bulletin, V28, P3153
[8]  
[Anonymous], 1995, Artificial Intelligence
[9]  
[Anonymous], 1998, P US NAVAL I
[10]  
[Anonymous], 2006, QUANTUM COMPUTATION