Quantum Key Distribution Networks: Challenges and Future Research Issues in Security

被引:25
作者
Tsai, Chia-Wei [1 ]
Yang, Chun-Wei [2 ]
Lin, Jason [3 ]
Chang, Yao-Chung [1 ]
Chang, Ruay-Shiung [4 ]
机构
[1] Natl Taitung Univ, Dept Comp Sci & Informat Engn, 369 Univ Rd, Taitung 95092, Taiwan
[2] China Med Univ, Coll Humanities & Sci, Master Program Digital Hlth Innovat, 100,Sect 1,Jingmao Rd, Taichung 406040, Taiwan
[3] Natl Chung Hsing Univ, Dept Comp Sci & Engn, 145 Xingda Rd, Taichung 40227, Taiwan
[4] Natl Taipei Univ Business, Dept Inst Informat & Decis Sci, 321,Sect 1,Jinan Rd, Taipei 100025, Taiwan
来源
APPLIED SCIENCES-BASEL | 2021年 / 11卷 / 09期
关键词
quantum key distribution; quantum key distribution network; unconditional security; CRYPTOGRAPHY; FIELD; ENTANGLEMENT; PROOF;
D O I
10.3390/app11093767
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
A quantum key distribution (QKD) network is proposed to allow QKD protocols to be the infrastructure of the Internet for distributing unconditional security keys instead of existing public-key cryptography based on computationally complex mathematical problems. Numerous countries and research institutes have invested enormous resources to execute correlation studies on QKD networks. Thus, in this study, we surveyed existing QKD network studies and practical field experiments to summarize the research results (e.g., type and architecture of QKD networks, key generating rate, maximum communication distance, and routing protocol). Furthermore, we highlight the three challenges and future research issues in the security of QKD networks and then provide some feasible resolution strategies for these challenges.
引用
收藏
页数:15
相关论文
共 74 条
[1]   Using quantum key distribution for cryptographic purposes: A survey [J].
Alleaume, R. ;
Branciard, C. ;
Bouda, J. ;
Debuisschert, T. ;
Dianati, M. ;
Gisin, N. ;
Godfrey, M. ;
Grangier, P. ;
Laenger, T. ;
Luetkenhaus, N. ;
Monyk, C. ;
Painchault, P. ;
Peev, M. ;
Poppe, A. ;
Pornin, T. ;
Rarity, J. ;
Renner, R. ;
Ribordy, G. ;
Riguidel, M. ;
Salvail, L. ;
Shields, A. ;
Weinfurter, H. ;
Zeilinger, A. .
THEORETICAL COMPUTER SCIENCE, 2014, 560 :62-81
[2]  
[Anonymous], 2020, ARXIV200512404
[3]  
[Anonymous], 2017, Chinadaily
[4]  
[Anonymous], 2017, Phys.org
[5]  
[Anonymous], 2328 RFC, DOI [10.17487/RFC2328, DOI 10.17487/RFC2328]
[6]   Quantum secret sharing based on reusable Greenberger-Horne-Zeilinger states as secure carriers [J].
Bagherinezhad, S ;
Karimipour, V .
PHYSICAL REVIEW A, 2003, 67 (04) :4
[7]   QUANTUM CRYPTOGRAPHY WITHOUT BELL THEOREM [J].
BENNETT, CH ;
BRASSARD, G ;
MERMIN, ND .
PHYSICAL REVIEW LETTERS, 1992, 68 (05) :557-559
[8]   Quantum cryptography: Public key distribution and coin tossing [J].
Bennett, Charles H. ;
Brassard, Gilles .
THEORETICAL COMPUTER SCIENCE, 2014, 560 :7-11
[9]   Experimental quantum teleportation [J].
Bouwmeester, D ;
Pan, JW ;
Mattle, K ;
Eibl, M ;
Weinfurter, H ;
Zeilinger, A .
NATURE, 1997, 390 (6660) :575-579
[10]   Semiquantum key distribution [J].
Boyer, Michel ;
Gelles, Ran ;
Kenigsberg, Dan ;
Mor, Tal .
PHYSICAL REVIEW A, 2009, 79 (03)