Resilient Quantum Key Distribution (QKD)-Integrated Optical Networks With Secret-Key Recovery Strategy
نویسندگان
چکیده
منابع مشابه
Quantum Key Distribution - QKD
This paper provides an overview of quantum key distribution targeted towards the computer science community. A brief description of the relevant principles from quantum mechanics is provided before surveying the most prominent quantum key distribution protocols present in the literature. In particular this paper describes the BB84 protocol and its many variants as well as Eckert's approach thro...
متن کاملQuantum Flows for Secret Key Distribution
In practice, the security of a Quantum Key Distribution (QKD) system relies not only on quantum mechanical principles, but it also significantly relies on the physical implementation of the protocol. Nowadays, technological detector loopholes of QKD systems have been demonstrated, and some successful attacks that exploit vulnerabilities of the Avalanche Photo Diodes (APD’s) have been performed....
متن کاملSecurity analysis of quantum key distribution on passive optical networks.
Needs for providing security to end users have brought installation of quantum key distribution (QKD) in one-to-many access networks such as passive optical networks. In the networks, a presence of optical power splitters makes issues for secure key rate more important. However, researches for QKD in access networks have mainly focused on implementation issues rather than protocol development f...
متن کاملIterative Secret Key Rate Adapting with Error Minimization for Continuous-Variable Quantum Key Distribution
We define an iterative error-minimizing secret key adapting method for multicarrier CVQKD. A multicarrier CVQKD protocol uses Gaussian subcarrier quantum continuous variables (CVs) for the transmission. The proposed method allows for the parties to reach a given target secret key rate with minimized error rate through the Gaussian subchannels by a sub-channel adaption procedure. The adaption al...
متن کاملMobile Secret Key Distribution with Network Coding
We consider the problem of secret key distribution in a sensor network with multiple scattered sensor nodes and a mobile device that can be used to bootstrap the network. Our main contribution is a practical scheme that relies on network coding to provide a robust and low-complexity solution for sharing secret keys among sensor nodes. In spite of its role as a key enabler for this approach, the...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Access
سال: 2019
ISSN: 2169-3536
DOI: 10.1109/access.2019.2915378