CN111431703B - Hybrid QKD network system based on QKD protocol classification - Google Patents

Hybrid QKD network system based on QKD protocol classification Download PDF

Info

Publication number
CN111431703B
CN111431703B CN202010136664.6A CN202010136664A CN111431703B CN 111431703 B CN111431703 B CN 111431703B CN 202010136664 A CN202010136664 A CN 202010136664A CN 111431703 B CN111431703 B CN 111431703B
Authority
CN
China
Prior art keywords
qkd
node
csc
network system
hybrid
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010136664.6A
Other languages
Chinese (zh)
Other versions
CN111431703A (en
Inventor
李琼
王亚星
韩琦
刘兆庆
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Harbin Institute of Technology
Original Assignee
Harbin Institute of Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Harbin Institute of Technology filed Critical Harbin Institute of Technology
Priority to CN202010136664.6A priority Critical patent/CN111431703B/en
Publication of CN111431703A publication Critical patent/CN111431703A/en
Application granted granted Critical
Publication of CN111431703B publication Critical patent/CN111431703B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0852Quantum cryptography
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B10/00Transmission systems employing electromagnetic waves other than radio-waves, e.g. infrared, visible or ultraviolet light, or employing corpuscular radiation, e.g. quantum communication
    • H04B10/25Arrangements specific to fibre transmission
    • H04B10/2575Radio-over-fibre, e.g. radio frequency signal modulated onto an optical carrier
    • H04B10/25752Optical arrangements for wireless networks
    • H04B10/25753Distribution optical network, e.g. between a base station and a plurality of remote units
    • H04B10/25754Star network topology
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0863Generation of secret information including derivation or calculation of cryptographic keys or passwords involving passwords or one-time passwords

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • Electromagnetism (AREA)
  • Theoretical Computer Science (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Small-Scale Networks (AREA)

Abstract

A hybrid QKD network system based on QKD protocol classification solves the problem that the existing QKD network system is limited by existing optical fiber facilities, and belongs to the field of secret communication. The hybrid QKD network system of the invention comprises C2C-QKD equipment and CSC-QKD equipment; the C2C-QKD equipment realizes quantum key distribution for two communication parties only by one optical fiber connection, and the CSC-QKD equipment realizes quantum key distribution for two communication parties by connecting the two communication parties with an untrusted third party by one optical fiber; all the C2C-QKD devices and the CSC-QKD devices are independent of each other and can be combined freely. The invention divides the QKD protocol into two categories of C2C-QKD protocol directly connected by one optical fiber and CSC-QKD protocol connected by two optical fibers. According to the classification mechanism, a logic topology capable of describing the whole network key supply capability is provided, and a corresponding logic topology generation method is provided. The work has important theoretical and practical value for expanding the service range of the QKD equipment.

Description

Hybrid QKD network system based on QKD protocol classification
Technical Field
The invention relates to a classification mechanism of a quantum key distribution protocol based on optical fiber dependency, provides a hybrid network logical topology generation method for describing the whole network key supply capacity based on the classification mechanism, and belongs to the field of secret communication.
Background
Quantum Key Distribution (QKD) can achieve theoretically unconditionally secure consistent key distribution between two communication parties using Quantum mechanics principles, and has received great attention in resisting Quantum computer attacks. The BB84-QKD protocol with the key carrier being a single photon is the first QKD protocol to prove theoretically secure. Subsequently, protocols such as E91-QKD and CV-QKD in which key carriers are continuous optical pulses are sequentially appeared, which are limited by the difficulty of preparing and detecting single photons. Meanwhile, in consideration of the potential safety hazard problem caused by the non-ideal physical device, protocols such as decoy-QKD, MDI-QKD, CV-MDI-QKD and TF-QKD are proposed in sequence.
At present, the QKD technology is gradually developed and matured and enters a practical stage. There is also much research effort to build QKD networks based on QKD technology to provide key services to multiple users. However, these studies were all networked for a single class of QKD devices. Due to different advantages and disadvantages of different QKD protocols, for example, BB84-QKD devices are simple to implement and have high key rate, but the required single-photon detector devices are expensive. The CV-QKD device does not require a single-photon detector, has lower cost than the former, but has lower key code rate than the former. In addition, when the first two types of devices are networked, all nodes in the whole network are required to be trusted relays, which brings high trust control cost. The devices such as MDI-QKD and TF-QKD can depend on the untrusted relay for networking, the reliability control cost is low, but each set of device needs to depend on two optical fibers, and the encoding rate is lower than that of the former two devices. The high key supply capability and the low construction cost are two most important performance indexes when the QKD equipment is effectively used for constructing the QKD network.
Disclosure of Invention
The invention provides a hybrid QKD network system based on QKD protocol classification, aiming at the problem that the existing QKD network system is limited by the existing optical fiber facilities.
The invention discloses a QKD protocol classification-based hybrid QKD network system, which comprises C2C-QKD equipment and CSC-QKD equipment;
the C2C-QKD equipment realizes quantum key distribution for two communication parties only by connecting one optical fiber, and the CSC-QKD equipment realizes quantum key distribution for two communication parties by connecting one optical fiber with an untrusted third party; all the C2C-QKD devices and the CSC-QKD devices are independent of each other and can be combined freely.
Preferably, the hybrid QKD network system includes multiple sets of C2C-QKD devices;
multiple sets of C2C-QKD devices form a mesh topology. The two communication parties which are not directly connected realize secret communication through the forwarding of each node on a communication path, and each node is used as an end user and a switching device.
Preferably, the hybrid QKD network system includes multiple sets of CSC-QKD devices;
the multiple sets of CSC-QKD equipment form a star-shaped topological structure, an untrusted third party is used as a server, and other communication parties are used as terminal users, so that quantum key distribution among all communication parties is realized.
Preferably, the method for converting the physical topology of the hybrid QKD network system into the logical topology includes:
obtaining a physical topology G = (V, E) of the hybrid QKD network system, wherein V is a node set, and E is a set of undirected edges;
for any two nodes V in V 1 ,v 2 ,v 1 ∈V,v 2 ∈V,v 1 ≠v 2 If there is an edge (v) 1 ,v 2 ) E, the edge is directly used as a part of the logic topology;
for any two nodes V in V 1 ,v 2 ,v 1 ∈V,v 2 ∈V,v 1 ≠v 2 If one node V exists, V belongs to V, V is not equal to V 1 ≠v 2 So that node v 1 And v 2 Can be connected by a node v, then it constitutes a three-node logical edge (v) 1 ,v 2 V), delete node v, generate connected node v 1 And v 2 A non-directional edge as part of the logical topology;
for any two nodes V in V 1 ,v 2 ,v 1 ∈V,v 2 ∈V,v 1 ≠v 2 If the node V and the node V' exist, V belongs to V, V is not equal to V 1 ≠v 2 ,v′∈V,v′≠v≠v 1 ≠v 2 Make node v 1 And v 2 Can be respectively connected by a node v and a node v' to form two three-node logic edges (v) 1 ,v 2 V) and (v) 1 ,v 2 V '), prune nodes v and v', representing the two edges as a connecting node v 1 And v 2 A parallel edge is generated as part of the logical topology.
Representing the logical topology of the conversion by G ' = (V ', E '), then:
v' = V- { V | V plays only a CSC-server role },
E′=E+{(v 1 ,v 2 ,v)|v 1 ∈V,v 2 ∈V,v∈V,v≠v 1 ≠v 2 ,(v 1 ,v)∈E,(v,v 2 )∈E};
where CSC-server represents an untrusted third party of the C2C-QKD device.
The invention has the advantages that the invention provides a classification mechanism for dividing the QKD protocol into a C2C-QKD protocol directly connected with an optical fiber and a CSC-QKD protocol connected with two optical fibers according to different optical fiber dependencies, and analyzes the key generation rate limitation of the two QKD protocols respectively. Further, according to the classification mechanism, a logic topology capable of describing the whole network key supply capability is provided, and a corresponding logic topology generation method is provided. The work has important theoretical and practical value for expanding the service range of the QKD equipment.
Drawings
FIG. 1 is a schematic diagram of the C2C-QKD protocol of the present invention;
FIG. 2 is a schematic diagram of the CSC-QKD protocol of the present invention;
FIG. 3 is a schematic diagram of the physical topology of the hybrid QKD network system of the present invention;
fig. 4 is a schematic diagram of the logic topology of fig. 3.
Detailed Description
The key distribution processes of different QKD protocols are basically consistent, and mainly comprise quantum state preparation, transmission, detection and data post-processing. Wherein, the post-processed information transmission can be fused with the secret information transmission of the optical network and completed by a classical channel. While the quantum state transport portion needs to rely on separate quantum channels. Obviously, adding a new optical fiber as a quantum channel on all links where QKD devices need to be deployed is too much a retrofit to the existing network environment to be accomplished. Therefore, researchers have proposed technologies such as wavelength division multiplexing and orthogonal frequency division multiplexing in order to realize the multiplexing of the quantum channel required by quantum state transmission and the original classical channel required by encrypted information transmission and post-processing information transmission on the original optical fiber, so as to achieve the purpose of providing a security key only by adding the QKD optical device required at a node. For this reason, QKD device placement must be performed on existing optical fibers, which is accompanied by the problem of dependence of QKD device placement on existing optical fibers.
The primary function of a QKD device is to provide a quantum key, and thus, the key generation rate is its most important metric. In order to guarantee the quantum characteristics of the key carrier in the key distribution process, the key carrier of a single photon or continuous light pulse cannot be amplified in the transmission process. The resulting key generation rate is particularly limited by the loss of the carrier signal in the quantum channel. Since the quantum channel is subject to existing fiber optic infrastructure, the key generation rate of the QKD device will also be subject to existing fiber optic infrastructure.
According to the difference of the optical fiber dependency, the QKD protocol is divided into two types of classification mechanisms of a C2C-QKD protocol and a CSC-QKD protocol in the embodiment, the hybrid QKD network system of the embodiment comprises C2C-QKD equipment and CSC-QKD equipment, and the embodiment is described by combining the figure 1 and the figure 2;
the C2C-QKD protocol refers to a type of protocol which only needs to connect two communication parties through one optical fiber in the key distribution process, the formed C2C-QKD equipment is shown in figure 1, and BB84-QKD, decoy-QKD, E91-QKD and other protocols are similar. The CSC-QKD protocol needs to be participated by an untrusted third party, both communication parties are connected with the untrusted third party through an optical fiber, and the formed CSC-QKD equipment is shown in figure 2, and protocols such as MDI-QKD, CV-MDI-QKD and TF-QKD are similar.
All QKD devices are independent of each other and can be combined as desired.
The embodiment analyzes the limitation of the key generation rate of the hybrid QKD network system:
the main function of a QKD device is to provide secure keys, and therefore, the key generation rate is its most important performance indicator. The key rate limitations of the two types of QKD protocols differ due to differences in fiber dependencies. Due to quantum stateThe information can not be amplified in the transmission process, and the key generation rate of a set of C2C-QKD equipment is recorded as R 1 It decreases sharply as the length of the channel connecting the communication terminals Alice and Bob increases. For convenience of description, the two communication parties are referred to as C2C-clients in this embodiment.
Unlike C2C-QKD, CSC-QKD has a key generation rate denoted as R 2 And the distance between the communication terminal Alice and the third party Charlie and the distance between the communication terminal Bob and the third party Charlie are limited at the same time. Since quantum state information cannot be amplified during transmission, the key generation rate decreases sharply as the length of the two channels increases. For convenience of description, the two communication parties are called the CSC-client and the untrusted third party is called the CSC-server.
Due to the point-to-point characteristic of C2C-QKD, in a preferred embodiment, the present embodiment includes multiple sets of C2C-QKD devices, and after the multiple sets of C2C-QKD devices are networked, a mesh topology is formed, and two communication parties that are not directly connected to each other can implement secure communication through forwarding at various points on a communication path. To this end, each node in the network needs to act both as an end user and as a switching device. For convenience of illustration, this embodiment will be collectively referred to as a C2C-client.
In a preferred embodiment, the embodiment comprises a plurality of sets of CSC-QKD devices, and as the key distribution process of the CSC-QKD devices needs to depend on the CSC-server, when the CSC-QKD devices are used, the CSC-server can be used as a server, and other CSC-clients can be used as clients to form a star-shaped topology structure, so that key distribution among all the CSC-clients is realized. In particular, key distribution between each pair of CSC-clients requires a set of CSC-QKD devices that are proprietary to them.
The hybrid QKD network system of the embodiment has the C2C-QKD equipment and the CSC-QKD equipment at the same time, and each node in the hybrid network can play multiple roles of the C2C-client, the CSC-client and the CSC-server, so that the calculation of the key supply capacity of the whole network becomes very complex. In order to uniformly calculate the key supply capability of the hybrid network, the embodiment converts the physical topology into the logical topology, and each edge in the topology has the independent key generation capability.
Since each set of QKD devices has its own independent quantum channel and key distribution process, the overall key generation capability of the network can be viewed as an accumulation of the key generation capabilities of each set of devices, ignoring classical channel bandwidth limitations. A set of C2C-QKD devices must be deployed on an existing optical fiber, whose key generation capabilities can manifest themselves as key generation capabilities on that side. The overall key generation capability brought by all C2C-QKD devices of the whole network may be represented as the cumulative sum of the key generation capabilities on the corresponding edges. For example, when 5 sets of C2C-QKD devices are arranged on one edge, the overall key generation capability brought by these 5 sets of devices appears as a cumulative sum on that edge.
However, a set of CSC-QKD devices must rely on two optical fibers to exist, with and without a single intersection point. Obviously, the two fibers can be represented by 3 nodes, where the nodes at both ends play the role of CSC-client and the intersection point plays the role of CSC-server. The main function of the set of CSC-QKD devices is to generate and distribute consistent keys for both CSC-clients. Furthermore, selecting different CSC-servers results in different fibers between the two CSC-clients, which are limited in the rate of key generation, leading to different key generation capabilities. For this reason, we need to introduce the concept of logical edge to represent the structure formed by these three nodes. The logical topology formed by the edges is described below using a mathematical language.
For a given network physical topology G = (V, E), where V is the set of nodes and E is the set of undirected edges. For any two nodes V in V 1 ,v 2 (v 1 ∈V,v 2 ∈V,v 1 ≠v 2 ) If there is an edge (v) 1 ,v 2 ) E, the key generation capability on the edge depends on the C2C-QKD devices disposed on the edge. If a node V exists (V is equal to V, V is not equal to V) 1 ≠v 2 ) Make node v 1 And v 2 Can be connected through the node, i.e. (v) 1 ,v)∈E,(v,v 2 ) E, then it constitutes a logical edge of three nodes (v) 1 ,v 2 ,v)。In the logical topology, we delete node v and represent this logical edge as connecting node v 1 And v 2 One of which has no directional edge. The key generation capability on the edge depends on the CSC-QKD devices disposed on the edge. In particular, if there is another node V ' (V '. Epsilon.V, V '. Noteq.v.noteq.v. 1 ≠v 2 ) Make node v 1 And v 2 Can be connected through the node, i.e. (v) 1 ,v′)∈E,(v′,v 2 ) E, then it constitutes a logical edge of three nodes (v) 1 ,v 2 V'). Due to the edge and the edge (v) 1 ,v 2 And v) the calculation results of the key generation rates are different according to different optical fibers. We delete nodes v and v' in the logical topology, and represent these two edges as connecting node v 1 And v 2 Such that parallel edges appear in the logical topology. Thus, the resulting logical topology is a kind of multi-graph. If the generated logical topology is represented by G ' = (V ', E '), then:
v' = V- { V | V play only the CSC-server role },
E′=E+{(v 1 ,v 2 ,v)|v 1 ∈V,v 2 ∈V,v∈V,v≠v 1 ≠v 2 ,(v 1 ,v)∈E,(v,v 2 )∈E}
according to the above logical topology generation method, the present embodiment converts the hybrid physical topology shown in fig. 3 into the logical topology shown in fig. 4. Obviously, as can be seen from fig. 3 and 4, the nodes CSC-server1, CSC-server2, CSC-server3 and CSC-server4 are deleted because they only play the role of CSC-server and no key is generated at the node. The CSC-client1, the CSC-client2 and the CSC-client3 form a fully-connected network through the connection of the CSC-server1, wherein a parallel edge is formed by the connection between the CSC-client1 and the CSC-client2 through the two servers of the CSC-server1 and the CSC-server 2. Meanwhile, the CSC-client4, the CSC-client5, the CSC-client6 and the CSC-client7 form a fully-connected network through the connection of the CSC-server3, and the CSC-client8, the CSC-client9 and the CSC-client10 form a fully-connected network through the connection of the CSC-server 4.
Although the invention herein has been described with reference to particular embodiments, it is to be understood that these embodiments are merely illustrative of the principles and applications of the present invention. It is therefore to be understood that numerous modifications may be made to the illustrative embodiments and that other arrangements may be devised without departing from the spirit and scope of the present invention as defined by the appended claims. It should be understood that features described in different dependent claims and herein may be combined in ways different from those described in the original claims. It is also to be understood that features described in connection with individual embodiments may be used in other described embodiments.

Claims (3)

1. A hybrid QKD network system based on QKD protocol classification, comprising C2C-QKD devices and CSC-QKD devices;
the C2C-QKD equipment realizes quantum key distribution for two communication parties only by connecting one optical fiber, and the CSC-QKD equipment realizes quantum key distribution for two communication parties by connecting one optical fiber with an untrusted third party; all the C2C-QKD equipment and the CSC-QKD equipment are mutually independent and can be combined randomly;
the method for converting the physical topology of the hybrid QKD network system into the logical topology comprises the following steps:
obtaining a physical topology G = (V, E) of the hybrid QKD network system, wherein V is a node set, and E is a set of undirected edges;
for any two nodes V in V 1 ,v 2 ,v 1 ∈V,v 2 ∈V,v 1 ≠v 2 If there is an edge (v) 1 ,v 2 ) E, the edge is directly used as a part of the logic topology;
for any two nodes V in V 1 ,v 2 ,v 1 ∈V,v 2 ∈V,v 1 ≠v 2 If one node V exists, V belongs to V, V is not equal to V 1 ≠v 2 Make node v 1 And v 2 Can be connected by a node v, then it forms a three-node logical edge (v) 1 ,v 2 V), delete the node v, generate the connection node v 1 And v 2 One strip is notAn edge, as part of a logical topology;
for any two nodes V in V 1 ,v 2 ,v 1 ∈V,v 2 ∈V,v 1 ≠v 2 If the node V and the node V', V belongs to V, and V is not equal to V 1 ≠v 2 ,v′∈V,v′≠v≠v 1 ≠v 2 Make node v 1 And v 2 Can be respectively connected by a node v and a node v' to form two three-node logic edges (v) 1 ,v 2 V) and (v) 1 ,v 2 V '), prune nodes v and v', representing the two edges as a connecting node v 1 And v 2 Generating a parallel edge as part of the logic topology;
representing the logical topology of the conversion by G ' = (V ', E '), then:
v' = V- { V | V plays only a CSC-server role },
E′=E+{(v 1 ,v 2 ,v)|v 1 ∈V,v 2 ∈V,v∈V,v≠v 1 ≠v 2 ,(v 1 ,v)∈E,(v,v 2 )∈E};
wherein CSC-server represents an untrusted third party of the C2C-QKD device.
2. A QKD protocol classification-based hybrid QKD network system according to claim 1, comprising multiple sets of C2C-QKD devices;
multiple sets of C2C-QKD equipment form a mesh topology structure, two communication parties which are not directly connected realize secret communication through the forwarding of each node on a communication path, and each node is used as an end user and a switching device.
3. A QKD protocol classification-based hybrid QKD network system according to claim 1, comprising multiple sets of CSC-QKD devices;
the multiple sets of CSC-QKD devices form a star-shaped topological structure, an untrusted third party is used as a server, and other communication parties are used as terminal users, so that quantum key distribution among all communication parties is realized.
CN202010136664.6A 2020-03-02 2020-03-02 Hybrid QKD network system based on QKD protocol classification Active CN111431703B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010136664.6A CN111431703B (en) 2020-03-02 2020-03-02 Hybrid QKD network system based on QKD protocol classification

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010136664.6A CN111431703B (en) 2020-03-02 2020-03-02 Hybrid QKD network system based on QKD protocol classification

Publications (2)

Publication Number Publication Date
CN111431703A CN111431703A (en) 2020-07-17
CN111431703B true CN111431703B (en) 2022-10-25

Family

ID=71547370

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010136664.6A Active CN111431703B (en) 2020-03-02 2020-03-02 Hybrid QKD network system based on QKD protocol classification

Country Status (1)

Country Link
CN (1) CN111431703B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114465718B (en) * 2022-01-07 2023-11-03 南京邮电大学 Multi-protocol translation method and related equipment for quantum key distribution service

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7068790B1 (en) * 2001-08-31 2006-06-27 Bbn Technologies Corp. Systems and methods for path set-up in a quantum key distribution network
CN103501221A (en) * 2013-09-29 2014-01-08 哈尔滨工业大学 Evaluating method of error code negotiation algorithm for quantum communication
CN104935428A (en) * 2015-06-02 2015-09-23 华南师范大学 Multiuser QKD network system based on M-Z interferometer, and secret key distribution method thereof
CN105406962A (en) * 2015-09-30 2016-03-16 华南师范大学 Multi-user orbital angular momentum wavelength division multiplexing QKD (quantum key distribution) network system and key distribution method thereof
KR20160050999A (en) * 2014-10-31 2016-05-11 에스케이텔레콤 주식회사 Method for Optimizing Network Topology for Constructing Quantum Key Distribution Networks
CN108462573A (en) * 2018-02-09 2018-08-28 中国电子科技集团公司第三十研究所 A kind of flexible quantum safety moving communication means
CN109067518A (en) * 2018-06-28 2018-12-21 南京邮电大学 A kind of quantum network system and method based on plug and play MDI-QKD

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8457316B2 (en) * 2008-01-15 2013-06-04 At&T Intellectual Property Ii, L.P. Architecture for reconfigurable quantum key distribution networks based on entangled photons by wavelength division multiplexing

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7068790B1 (en) * 2001-08-31 2006-06-27 Bbn Technologies Corp. Systems and methods for path set-up in a quantum key distribution network
CN103501221A (en) * 2013-09-29 2014-01-08 哈尔滨工业大学 Evaluating method of error code negotiation algorithm for quantum communication
KR20160050999A (en) * 2014-10-31 2016-05-11 에스케이텔레콤 주식회사 Method for Optimizing Network Topology for Constructing Quantum Key Distribution Networks
CN104935428A (en) * 2015-06-02 2015-09-23 华南师范大学 Multiuser QKD network system based on M-Z interferometer, and secret key distribution method thereof
CN105406962A (en) * 2015-09-30 2016-03-16 华南师范大学 Multi-user orbital angular momentum wavelength division multiplexing QKD (quantum key distribution) network system and key distribution method thereof
CN108462573A (en) * 2018-02-09 2018-08-28 中国电子科技集团公司第三十研究所 A kind of flexible quantum safety moving communication means
CN109067518A (en) * 2018-06-28 2018-12-21 南京邮电大学 A kind of quantum network system and method based on plug and play MDI-QKD

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
"Measurement-device-independent quantum key distribution over a 404 km optical fiber";Measurement-device-independent quantum key distribution over a 4;《PHYSICAL REVIEW LETTERS》;20161102;全文 *
光纤量子密钥分配技术在电网中的应用前景;张睿汭;《电力***通信》;20121010(第10期);全文 *

Also Published As

Publication number Publication date
CN111431703A (en) 2020-07-17

Similar Documents

Publication Publication Date Title
Yin et al. Experimental quantum secure network with digital signatures and encryption
Bacco et al. Boosting the secret key rate in a shared quantum and classical fibre communication system
Yuan et al. 10-Mb/s quantum key distribution
US7113598B2 (en) Methods and systems for high-data-rate quantum cryptography
Stucki et al. Long-term performance of the SwissQuantum quantum key distribution network in a field environment
Zhong et al. Photon-efficient quantum key distribution using time–energy entanglement with high-dimensional encoding
Peev et al. The SECOQC quantum key distribution network in Vienna
Cao et al. KaaS: Key as a service over quantum key distribution integrated optical networks
Hughes et al. Network-centric quantum communications with application to critical infrastructure protection
US8964989B2 (en) Method for adding nodes to a quantum key distribution system
Brito et al. Statistical properties of the quantum internet
Yang et al. Member expansion in quantum (t, n) threshold secret sharing schemes
Li et al. Building a large-scale and wide-area quantum internet based on an OSI-alike model
Song et al. Recent development in quantum communication
Guerrini et al. Secure key throughput of intermittent trusted-relay QKD protocols
Dianati et al. Architecture of the Secoqc quantum key distribution network
Zhang et al. Fragmentation-aware entanglement routing for quantum networks
CN111431703B (en) Hybrid QKD network system based on QKD protocol classification
Dhara et al. Subexponential rate versus distance with time-multiplexed quantum repeaters
Burr et al. Evaluating different topologies for multi-photon quantum key distribution
Wang et al. Modeling and simulation of practical quantum secure communication network
CN109818814B (en) Quantum secret communication network simulation system
Qin et al. Quantum secure direct communication based on single particles
Semenenko et al. Entanglement generation in a quantum network with finite quantum memory lifetime
CN111404677B (en) Analysis method of hybrid QKD network system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant