Performance analysis of different multi-user optical passive networks for quantum cryptography applications

被引:1
作者
Curtacci, P. [1 ]
Garzia, F. [1 ]
Cusani, R. [1 ]
Baccarelli, E. [1 ]
机构
[1] Univ Roma La Sapienza, Dipartimento INFOCOM, I-00184 Rome, Italy
来源
PHOTON MANAGEMENT II | 2006年 / 6187卷
关键词
quantum cryptography; QKD; sifted key rate; QBER; b92; EPR; SSP;
D O I
10.1117/12.662139
中图分类号
O43 [光学];
学科分类号
070207 ; 0803 ;
摘要
The performance of four passive optical network topologies in implementing multi-user quantum key distribution is compared, using 3 protocols proposed by quantum cryptography (B92, EPR, SSP). The networks considered are the passive-star network, the optical-ring network based on the Sagnac interferometer, the wavelength-routed network, and the wavelength-addressed bus network. An analysis of the quantum bit-error rate and sifted key rate for each of these topologies is used to determine their suitability for providing quantum key distribution-service to networks of various sizes. The efficiency of the three considered protocols is also determinated.
引用
收藏
页码:U320 / U331
页数:12
相关论文
共 25 条
[1]  
BECHMANNPASQUIN.H, 1998, QUANTPH9807041
[2]  
Bell JS., 1964, PHYS PHYS FIZIKA, V1, P195, DOI [10.1103/Physics-PhysiqueFizika.1.195, 10.1103/PhysicsPhysiqueFizika.1.195, DOI 10.1103/PHYSICSPHYSIQUEFIZIKA.1.195]
[3]  
Bennett C. H., 1992, Journal of Cryptology, V5, P3, DOI 10.1007/BF00191318
[4]   QUANTUM CRYPTOGRAPHY USING ANY 2 NONORTHOGONAL STATES [J].
BENNETT, CH .
PHYSICAL REVIEW LETTERS, 1992, 68 (21) :3121-3124
[5]  
BENNETT CH, 1984, IEEE C COMP SYST SIG, P42330
[6]   Autocompensating quantum cryptography [J].
Bethune, DS ;
Risk, WP .
NEW JOURNAL OF PHYSICS, 2002, 4 :42.1-42.15
[7]   Optimal eavesdropping in quantum cryptography with six states [J].
Bruss, D .
PHYSICAL REVIEW LETTERS, 1998, 81 (14) :3018-3021
[8]  
BRUSS D, 1999, QUANTPH9901061
[9]   Can quantum-mechanical description of physical reality be considered complete? [J].
Einstein, A ;
Podolsky, B ;
Rosen, N .
PHYSICAL REVIEW, 1935, 47 (10) :0777-0780
[10]   QUANTUM CRYPTOGRAPHY BASED ON BELL THEOREM [J].
EKERT, AK .
PHYSICAL REVIEW LETTERS, 1991, 67 (06) :661-663