Skip to main content

Towards the World-Wide Quantum Network

  • Conference paper
Information Security Practice and Experience (ISPEC 2008)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 4991))

Abstract

QKD networks are of much interest due to their capacity of providing extremely high security keys to network participants. Most QKD network studies so far focus on trusted models where all the network nodes are assumed to be perfectly secured. This restricts QKD networks to be small. In this paper, we first develop a novel model dedicated to large-scale QKD networks, some of whose nodes could be eavesdropped secretely. Then, we investigate the key transmission problem in the new model by an approach based on percolation theory and stochastic routing. Analyses show that under computable conditions large-scale QKD networks could protect secret keys with an extremely high probability. Simulations validate our results.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Bennett, C., Brassard, G.: Quantum cryptography: Public key distribution and coin tossing. In: Proc. of IEEE Int. Conf. on Computers, Systems, and Signal Processing, Bangalore, India, pp. 175–179 (December 1984)

    Google Scholar 

  2. Mayer, D.: Unconditional security in quantum cryptography. Journal of the ACM 48, 351–406 (2001)

    Article  MathSciNet  Google Scholar 

  3. Lo, H.K.: A simple proof of the unconditional security of quantum key distribution. Journal of Physics A 34, 6957–6967 (2001)

    Article  MATH  MathSciNet  Google Scholar 

  4. Chau, H.: Practical scheme to share a secret key through an up to 27.6% bit error rate quantum channel. Phys. Rev. A 66, 060302 (2002)

    Article  Google Scholar 

  5. Elliott, C., Pearson, D., Troxel, G.: Quantum cryptography in practice. In: Proc. of the Conf. on Applications, Technologies, Architectures, and Protocols for Computer Communications, Karlsruhe, Germany, pp. 227–238 (August 2003)

    Google Scholar 

  6. Elliott, C., Colvin, A., Pearson, D., Pikalo, O., Schlafer, J., Yeh, H.: Current status of the DARPA quantum network (March 2005), http://arxiv.org/abs/quant-ph/0503058v2

  7. Bellot, P., Gallion, P., Guilley, S., Danger, J.L.: The hqnet project (2006), http://hqnet.enst.fr

  8. Qing, X., e Silva, M.B.C., Danger, J., Guilley, S., Gallion, P., Bellot, P., Mendieta, F.: Towards Quantum key distribution System using Homodyne Detection with Differential Time-multiplexed Reference. In: Proc. of the 5th Int. Conf. on Computer Sciences, Research Innovation and Vision for the Futur, Hanoi, Vietnam, pp. 158–165 (March 2007)

    Google Scholar 

  9. Kimura, T., Nambu, Y., Hatanaka, T., Tomita, A., Kosaka, H., Nakamura, K.: Single-photon interference over 150-km transmission using silica-based integrated-optic interferometers for quantum cryptography criterion. Japanese Journal of Applied Physics 43, L1217–L1219 (2004)

    Google Scholar 

  10. Elliott, C.: Building the quantum network. New Journal of Physics 4, 46.1–46.12 (2002)

    Google Scholar 

  11. Alléaume, R., Roueff, F., Maurhart, O., Luthenhaus, N.: Architecture, Security and Topology of a global Quantum key distribution Network. In: IEEE/LEOS Summer Topical Meeting on Quantum Communications in Telecom Networks, Quebec (July 2006)

    Google Scholar 

  12. Alléaume, R., et al.: Secoqc white paper on quantum key distribution and cryptography (January 2007), http://arxiv.org/abs/quant-ph/0701168

  13. Grimmett, G.: Percolation, 2nd edn. Springer, Heidelberg (1999)

    MATH  Google Scholar 

  14. Hughes, B.D.: Random walks and random environments, vol. 1. Oxford University Press, Oxford (1995)

    MATH  Google Scholar 

  15. Hughes, B.D.: Random walks and random environments, vol. 2. Oxford University Press, Oxford (1995)

    MATH  Google Scholar 

  16. Bohacek, S., Hespanha, J.P., Lee, J., Lim, C., Obraczka, K.: Game theoretic stochastic routing for fault tolerance and security on computer networks. IEEE Transactions on Parallel and Distributed Systems 18, 1227–1240 (2007)

    Article  Google Scholar 

  17. Hespanha, J., Bohacek, S.: Preminilary results in routing games. In: American Control Conference, Arlington, Virginia, USA, vol. 3, pp. 1904–1909 (June 2001)

    Google Scholar 

  18. Bohacek, S., Hespanha, J.P., Obraczka, K., Lee, J., Lim, C.: Enhancing security via stochastic routing. In: Proc. 11th Int. Conf. on Computer Communication and Networks, Miami, Florida, USA, pp. 58–62 (October 2002)

    Google Scholar 

  19. Le, Q.C., Bellot, P., Demaille, A.: Stochastic Routing in Large Grid Shaped Quantum Networks. In: Proc. of the 5th Int. Conf. on Computer Sciences, Research Innovation and Vision for the Futur, Hanoi, Vietnam, pp. 166–174 (March 2007)

    Google Scholar 

  20. Le, Q.C., Bellot, P., Demaille, A.: On the security of Quantum Networks: A proposal framework ans its capacity. In: Proc. of the Int. Conf. on New Technologies, Mobility, and Security, Paris, France, pp. 385–396 (May 2007)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Liqun Chen Yi Mu Willy Susilo

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Le, QC., Bellot, P., Demaille, A. (2008). Towards the World-Wide Quantum Network. In: Chen, L., Mu, Y., Susilo, W. (eds) Information Security Practice and Experience. ISPEC 2008. Lecture Notes in Computer Science, vol 4991. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-79104-1_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-79104-1_16

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-79103-4

  • Online ISBN: 978-3-540-79104-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics