Architecture and protocols of the future European quantum key distribution network

被引:69
作者
Dianati, Mehrdad [1 ]
Alleaume, Romain [1 ]
Gagnaire, Maurice [1 ]
Shen, Xuemin [2 ]
机构
[1] CNRS, GET ENST, Network & Comp Sci Dept, UMR 5141, F-75634 Paris 13, France
[2] Univ Waterloo, Dept Elect & Comp Engn, Waterloo, ON N2L 3G1, Canada
关键词
network security; quantum key distribution;
D O I
10.1002/sec.13
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A point-to-point quantum key distribution (QKD) system takes advantage of the laws of quantum physics to establish secret keys between two communicating parties. Compared to the classical methods, such as public-key infrastructures, QKD offers unconditional security, which makes it attractive for very high security applications. However, this unprecedent level of security is mitigated by the inherent constraints of quantum communications, such as the limited rates and ranges of an individual point-to-point QKD link. A QKD network, which can be built by combining multiple point-to-point QKD devices, can alleviate the constraints and enable point-to-multi-point key distribution based on QKD technology. The European project, secure communication based on quantum cryptography (SeCoQC) aims at deploying a prototype QKD network, which will be demonstrated in September 2008, by developing the architecture and the protocols, as well as the specific hardware for long-range QKD networks. This paper discusses the important aspects of the architecture and the network layer protocols of the SeCoQC QKD network. Copyright (C) 2008 John Wiley & Sons, Ltd.
引用
收藏
页码:57 / 74
页数:18
相关论文
共 19 条
[1]  
[Anonymous], SECOQC WHITE PAPER Q
[2]  
BECHMANNPASQUIN.H, 2005, DQIT03 SEC
[3]  
Bennett C. H., 1984, P IEEE INT C COMP SY, DOI DOI 10.1016/J.TCS.2014.05.025
[4]   Quantum cryptographic network based on quantum memories [J].
Biham, E ;
Huttner, B ;
Mor, T .
PHYSICAL REVIEW A, 1996, 54 (04) :2651-2658
[5]  
COLLINS D, 2003, QUANTUM RELAYS LONG
[6]   NEW DIRECTIONS IN CRYPTOGRAPHY [J].
DIFFIE, W ;
HELLMAN, ME .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1976, 22 (06) :644-654
[7]  
Dür W, 1999, PHYS REV A, V59, P169, DOI 10.1103/PhysRevA.59.169
[8]   Quantum cryptography [J].
Dusek, Miloslav ;
Luetkenhaus, Norbert ;
Hendrych, Martin .
PROGRESS IN OPTICS, VOL 49, 2006, 49 :381-454
[9]   QUANTUM CRYPTOGRAPHY BASED ON BELL THEOREM [J].
EKERT, AK .
PHYSICAL REVIEW LETTERS, 1991, 67 (06) :661-663
[10]  
MAURHART O, 2006, SECOQC DELIVERABLE