CN111431703B - Hybrid QKD network system based on QKD protocol classification - Google Patents
Hybrid QKD network system based on QKD protocol classification Download PDFInfo
- Publication number
- CN111431703B CN111431703B CN202010136664.6A CN202010136664A CN111431703B CN 111431703 B CN111431703 B CN 111431703B CN 202010136664 A CN202010136664 A CN 202010136664A CN 111431703 B CN111431703 B CN 111431703B
- Authority
- CN
- China
- Prior art keywords
- qkd
- node
- csc
- network system
- hybrid
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0852—Quantum cryptography
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B10/00—Transmission systems employing electromagnetic waves other than radio-waves, e.g. infrared, visible or ultraviolet light, or employing corpuscular radiation, e.g. quantum communication
- H04B10/25—Arrangements specific to fibre transmission
- H04B10/2575—Radio-over-fibre, e.g. radio frequency signal modulated onto an optical carrier
- H04B10/25752—Optical arrangements for wireless networks
- H04B10/25753—Distribution optical network, e.g. between a base station and a plurality of remote units
- H04B10/25754—Star network topology
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0863—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving passwords or one-time passwords
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- Electromagnetism (AREA)
- Theoretical Computer Science (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Small-Scale Networks (AREA)
Abstract
A hybrid QKD network system based on QKD protocol classification solves the problem that the existing QKD network system is limited by existing optical fiber facilities, and belongs to the field of secret communication. The hybrid QKD network system of the invention comprises C2C-QKD equipment and CSC-QKD equipment; the C2C-QKD equipment realizes quantum key distribution for two communication parties only by one optical fiber connection, and the CSC-QKD equipment realizes quantum key distribution for two communication parties by connecting the two communication parties with an untrusted third party by one optical fiber; all the C2C-QKD devices and the CSC-QKD devices are independent of each other and can be combined freely. The invention divides the QKD protocol into two categories of C2C-QKD protocol directly connected by one optical fiber and CSC-QKD protocol connected by two optical fibers. According to the classification mechanism, a logic topology capable of describing the whole network key supply capability is provided, and a corresponding logic topology generation method is provided. The work has important theoretical and practical value for expanding the service range of the QKD equipment.
Description
Technical Field
The invention relates to a classification mechanism of a quantum key distribution protocol based on optical fiber dependency, provides a hybrid network logical topology generation method for describing the whole network key supply capacity based on the classification mechanism, and belongs to the field of secret communication.
Background
Quantum Key Distribution (QKD) can achieve theoretically unconditionally secure consistent key distribution between two communication parties using Quantum mechanics principles, and has received great attention in resisting Quantum computer attacks. The BB84-QKD protocol with the key carrier being a single photon is the first QKD protocol to prove theoretically secure. Subsequently, protocols such as E91-QKD and CV-QKD in which key carriers are continuous optical pulses are sequentially appeared, which are limited by the difficulty of preparing and detecting single photons. Meanwhile, in consideration of the potential safety hazard problem caused by the non-ideal physical device, protocols such as decoy-QKD, MDI-QKD, CV-MDI-QKD and TF-QKD are proposed in sequence.
At present, the QKD technology is gradually developed and matured and enters a practical stage. There is also much research effort to build QKD networks based on QKD technology to provide key services to multiple users. However, these studies were all networked for a single class of QKD devices. Due to different advantages and disadvantages of different QKD protocols, for example, BB84-QKD devices are simple to implement and have high key rate, but the required single-photon detector devices are expensive. The CV-QKD device does not require a single-photon detector, has lower cost than the former, but has lower key code rate than the former. In addition, when the first two types of devices are networked, all nodes in the whole network are required to be trusted relays, which brings high trust control cost. The devices such as MDI-QKD and TF-QKD can depend on the untrusted relay for networking, the reliability control cost is low, but each set of device needs to depend on two optical fibers, and the encoding rate is lower than that of the former two devices. The high key supply capability and the low construction cost are two most important performance indexes when the QKD equipment is effectively used for constructing the QKD network.
Disclosure of Invention
The invention provides a hybrid QKD network system based on QKD protocol classification, aiming at the problem that the existing QKD network system is limited by the existing optical fiber facilities.
The invention discloses a QKD protocol classification-based hybrid QKD network system, which comprises C2C-QKD equipment and CSC-QKD equipment;
the C2C-QKD equipment realizes quantum key distribution for two communication parties only by connecting one optical fiber, and the CSC-QKD equipment realizes quantum key distribution for two communication parties by connecting one optical fiber with an untrusted third party; all the C2C-QKD devices and the CSC-QKD devices are independent of each other and can be combined freely.
Preferably, the hybrid QKD network system includes multiple sets of C2C-QKD devices;
multiple sets of C2C-QKD devices form a mesh topology. The two communication parties which are not directly connected realize secret communication through the forwarding of each node on a communication path, and each node is used as an end user and a switching device.
Preferably, the hybrid QKD network system includes multiple sets of CSC-QKD devices;
the multiple sets of CSC-QKD equipment form a star-shaped topological structure, an untrusted third party is used as a server, and other communication parties are used as terminal users, so that quantum key distribution among all communication parties is realized.
Preferably, the method for converting the physical topology of the hybrid QKD network system into the logical topology includes:
obtaining a physical topology G = (V, E) of the hybrid QKD network system, wherein V is a node set, and E is a set of undirected edges;
for any two nodes V in V 1 ,v 2 ,v 1 ∈V,v 2 ∈V,v 1 ≠v 2 If there is an edge (v) 1 ,v 2 ) E, the edge is directly used as a part of the logic topology;
for any two nodes V in V 1 ,v 2 ,v 1 ∈V,v 2 ∈V,v 1 ≠v 2 If one node V exists, V belongs to V, V is not equal to V 1 ≠v 2 So that node v 1 And v 2 Can be connected by a node v, then it constitutes a three-node logical edge (v) 1 ,v 2 V), delete node v, generate connected node v 1 And v 2 A non-directional edge as part of the logical topology;
for any two nodes V in V 1 ,v 2 ,v 1 ∈V,v 2 ∈V,v 1 ≠v 2 If the node V and the node V' exist, V belongs to V, V is not equal to V 1 ≠v 2 ,v′∈V,v′≠v≠v 1 ≠v 2 Make node v 1 And v 2 Can be respectively connected by a node v and a node v' to form two three-node logic edges (v) 1 ,v 2 V) and (v) 1 ,v 2 V '), prune nodes v and v', representing the two edges as a connecting node v 1 And v 2 A parallel edge is generated as part of the logical topology.
Representing the logical topology of the conversion by G ' = (V ', E '), then:
v' = V- { V | V plays only a CSC-server role },
E′=E+{(v 1 ,v 2 ,v)|v 1 ∈V,v 2 ∈V,v∈V,v≠v 1 ≠v 2 ,(v 1 ,v)∈E,(v,v 2 )∈E};
where CSC-server represents an untrusted third party of the C2C-QKD device.
The invention has the advantages that the invention provides a classification mechanism for dividing the QKD protocol into a C2C-QKD protocol directly connected with an optical fiber and a CSC-QKD protocol connected with two optical fibers according to different optical fiber dependencies, and analyzes the key generation rate limitation of the two QKD protocols respectively. Further, according to the classification mechanism, a logic topology capable of describing the whole network key supply capability is provided, and a corresponding logic topology generation method is provided. The work has important theoretical and practical value for expanding the service range of the QKD equipment.
Drawings
FIG. 1 is a schematic diagram of the C2C-QKD protocol of the present invention;
FIG. 2 is a schematic diagram of the CSC-QKD protocol of the present invention;
FIG. 3 is a schematic diagram of the physical topology of the hybrid QKD network system of the present invention;
fig. 4 is a schematic diagram of the logic topology of fig. 3.
Detailed Description
The key distribution processes of different QKD protocols are basically consistent, and mainly comprise quantum state preparation, transmission, detection and data post-processing. Wherein, the post-processed information transmission can be fused with the secret information transmission of the optical network and completed by a classical channel. While the quantum state transport portion needs to rely on separate quantum channels. Obviously, adding a new optical fiber as a quantum channel on all links where QKD devices need to be deployed is too much a retrofit to the existing network environment to be accomplished. Therefore, researchers have proposed technologies such as wavelength division multiplexing and orthogonal frequency division multiplexing in order to realize the multiplexing of the quantum channel required by quantum state transmission and the original classical channel required by encrypted information transmission and post-processing information transmission on the original optical fiber, so as to achieve the purpose of providing a security key only by adding the QKD optical device required at a node. For this reason, QKD device placement must be performed on existing optical fibers, which is accompanied by the problem of dependence of QKD device placement on existing optical fibers.
The primary function of a QKD device is to provide a quantum key, and thus, the key generation rate is its most important metric. In order to guarantee the quantum characteristics of the key carrier in the key distribution process, the key carrier of a single photon or continuous light pulse cannot be amplified in the transmission process. The resulting key generation rate is particularly limited by the loss of the carrier signal in the quantum channel. Since the quantum channel is subject to existing fiber optic infrastructure, the key generation rate of the QKD device will also be subject to existing fiber optic infrastructure.
According to the difference of the optical fiber dependency, the QKD protocol is divided into two types of classification mechanisms of a C2C-QKD protocol and a CSC-QKD protocol in the embodiment, the hybrid QKD network system of the embodiment comprises C2C-QKD equipment and CSC-QKD equipment, and the embodiment is described by combining the figure 1 and the figure 2;
the C2C-QKD protocol refers to a type of protocol which only needs to connect two communication parties through one optical fiber in the key distribution process, the formed C2C-QKD equipment is shown in figure 1, and BB84-QKD, decoy-QKD, E91-QKD and other protocols are similar. The CSC-QKD protocol needs to be participated by an untrusted third party, both communication parties are connected with the untrusted third party through an optical fiber, and the formed CSC-QKD equipment is shown in figure 2, and protocols such as MDI-QKD, CV-MDI-QKD and TF-QKD are similar.
All QKD devices are independent of each other and can be combined as desired.
The embodiment analyzes the limitation of the key generation rate of the hybrid QKD network system:
the main function of a QKD device is to provide secure keys, and therefore, the key generation rate is its most important performance indicator. The key rate limitations of the two types of QKD protocols differ due to differences in fiber dependencies. Due to quantum stateThe information can not be amplified in the transmission process, and the key generation rate of a set of C2C-QKD equipment is recorded as R 1 It decreases sharply as the length of the channel connecting the communication terminals Alice and Bob increases. For convenience of description, the two communication parties are referred to as C2C-clients in this embodiment.
Unlike C2C-QKD, CSC-QKD has a key generation rate denoted as R 2 And the distance between the communication terminal Alice and the third party Charlie and the distance between the communication terminal Bob and the third party Charlie are limited at the same time. Since quantum state information cannot be amplified during transmission, the key generation rate decreases sharply as the length of the two channels increases. For convenience of description, the two communication parties are called the CSC-client and the untrusted third party is called the CSC-server.
Due to the point-to-point characteristic of C2C-QKD, in a preferred embodiment, the present embodiment includes multiple sets of C2C-QKD devices, and after the multiple sets of C2C-QKD devices are networked, a mesh topology is formed, and two communication parties that are not directly connected to each other can implement secure communication through forwarding at various points on a communication path. To this end, each node in the network needs to act both as an end user and as a switching device. For convenience of illustration, this embodiment will be collectively referred to as a C2C-client.
In a preferred embodiment, the embodiment comprises a plurality of sets of CSC-QKD devices, and as the key distribution process of the CSC-QKD devices needs to depend on the CSC-server, when the CSC-QKD devices are used, the CSC-server can be used as a server, and other CSC-clients can be used as clients to form a star-shaped topology structure, so that key distribution among all the CSC-clients is realized. In particular, key distribution between each pair of CSC-clients requires a set of CSC-QKD devices that are proprietary to them.
The hybrid QKD network system of the embodiment has the C2C-QKD equipment and the CSC-QKD equipment at the same time, and each node in the hybrid network can play multiple roles of the C2C-client, the CSC-client and the CSC-server, so that the calculation of the key supply capacity of the whole network becomes very complex. In order to uniformly calculate the key supply capability of the hybrid network, the embodiment converts the physical topology into the logical topology, and each edge in the topology has the independent key generation capability.
Since each set of QKD devices has its own independent quantum channel and key distribution process, the overall key generation capability of the network can be viewed as an accumulation of the key generation capabilities of each set of devices, ignoring classical channel bandwidth limitations. A set of C2C-QKD devices must be deployed on an existing optical fiber, whose key generation capabilities can manifest themselves as key generation capabilities on that side. The overall key generation capability brought by all C2C-QKD devices of the whole network may be represented as the cumulative sum of the key generation capabilities on the corresponding edges. For example, when 5 sets of C2C-QKD devices are arranged on one edge, the overall key generation capability brought by these 5 sets of devices appears as a cumulative sum on that edge.
However, a set of CSC-QKD devices must rely on two optical fibers to exist, with and without a single intersection point. Obviously, the two fibers can be represented by 3 nodes, where the nodes at both ends play the role of CSC-client and the intersection point plays the role of CSC-server. The main function of the set of CSC-QKD devices is to generate and distribute consistent keys for both CSC-clients. Furthermore, selecting different CSC-servers results in different fibers between the two CSC-clients, which are limited in the rate of key generation, leading to different key generation capabilities. For this reason, we need to introduce the concept of logical edge to represent the structure formed by these three nodes. The logical topology formed by the edges is described below using a mathematical language.
For a given network physical topology G = (V, E), where V is the set of nodes and E is the set of undirected edges. For any two nodes V in V 1 ,v 2 (v 1 ∈V,v 2 ∈V,v 1 ≠v 2 ) If there is an edge (v) 1 ,v 2 ) E, the key generation capability on the edge depends on the C2C-QKD devices disposed on the edge. If a node V exists (V is equal to V, V is not equal to V) 1 ≠v 2 ) Make node v 1 And v 2 Can be connected through the node, i.e. (v) 1 ,v)∈E,(v,v 2 ) E, then it constitutes a logical edge of three nodes (v) 1 ,v 2 ,v)。In the logical topology, we delete node v and represent this logical edge as connecting node v 1 And v 2 One of which has no directional edge. The key generation capability on the edge depends on the CSC-QKD devices disposed on the edge. In particular, if there is another node V ' (V '. Epsilon.V, V '. Noteq.v.noteq.v. 1 ≠v 2 ) Make node v 1 And v 2 Can be connected through the node, i.e. (v) 1 ,v′)∈E,(v′,v 2 ) E, then it constitutes a logical edge of three nodes (v) 1 ,v 2 V'). Due to the edge and the edge (v) 1 ,v 2 And v) the calculation results of the key generation rates are different according to different optical fibers. We delete nodes v and v' in the logical topology, and represent these two edges as connecting node v 1 And v 2 Such that parallel edges appear in the logical topology. Thus, the resulting logical topology is a kind of multi-graph. If the generated logical topology is represented by G ' = (V ', E '), then:
v' = V- { V | V play only the CSC-server role },
E′=E+{(v 1 ,v 2 ,v)|v 1 ∈V,v 2 ∈V,v∈V,v≠v 1 ≠v 2 ,(v 1 ,v)∈E,(v,v 2 )∈E}
according to the above logical topology generation method, the present embodiment converts the hybrid physical topology shown in fig. 3 into the logical topology shown in fig. 4. Obviously, as can be seen from fig. 3 and 4, the nodes CSC-server1, CSC-server2, CSC-server3 and CSC-server4 are deleted because they only play the role of CSC-server and no key is generated at the node. The CSC-client1, the CSC-client2 and the CSC-client3 form a fully-connected network through the connection of the CSC-server1, wherein a parallel edge is formed by the connection between the CSC-client1 and the CSC-client2 through the two servers of the CSC-server1 and the CSC-server 2. Meanwhile, the CSC-client4, the CSC-client5, the CSC-client6 and the CSC-client7 form a fully-connected network through the connection of the CSC-server3, and the CSC-client8, the CSC-client9 and the CSC-client10 form a fully-connected network through the connection of the CSC-server 4.
Although the invention herein has been described with reference to particular embodiments, it is to be understood that these embodiments are merely illustrative of the principles and applications of the present invention. It is therefore to be understood that numerous modifications may be made to the illustrative embodiments and that other arrangements may be devised without departing from the spirit and scope of the present invention as defined by the appended claims. It should be understood that features described in different dependent claims and herein may be combined in ways different from those described in the original claims. It is also to be understood that features described in connection with individual embodiments may be used in other described embodiments.
Claims (3)
1. A hybrid QKD network system based on QKD protocol classification, comprising C2C-QKD devices and CSC-QKD devices;
the C2C-QKD equipment realizes quantum key distribution for two communication parties only by connecting one optical fiber, and the CSC-QKD equipment realizes quantum key distribution for two communication parties by connecting one optical fiber with an untrusted third party; all the C2C-QKD equipment and the CSC-QKD equipment are mutually independent and can be combined randomly;
the method for converting the physical topology of the hybrid QKD network system into the logical topology comprises the following steps:
obtaining a physical topology G = (V, E) of the hybrid QKD network system, wherein V is a node set, and E is a set of undirected edges;
for any two nodes V in V 1 ,v 2 ,v 1 ∈V,v 2 ∈V,v 1 ≠v 2 If there is an edge (v) 1 ,v 2 ) E, the edge is directly used as a part of the logic topology;
for any two nodes V in V 1 ,v 2 ,v 1 ∈V,v 2 ∈V,v 1 ≠v 2 If one node V exists, V belongs to V, V is not equal to V 1 ≠v 2 Make node v 1 And v 2 Can be connected by a node v, then it forms a three-node logical edge (v) 1 ,v 2 V), delete the node v, generate the connection node v 1 And v 2 One strip is notAn edge, as part of a logical topology;
for any two nodes V in V 1 ,v 2 ,v 1 ∈V,v 2 ∈V,v 1 ≠v 2 If the node V and the node V', V belongs to V, and V is not equal to V 1 ≠v 2 ,v′∈V,v′≠v≠v 1 ≠v 2 Make node v 1 And v 2 Can be respectively connected by a node v and a node v' to form two three-node logic edges (v) 1 ,v 2 V) and (v) 1 ,v 2 V '), prune nodes v and v', representing the two edges as a connecting node v 1 And v 2 Generating a parallel edge as part of the logic topology;
representing the logical topology of the conversion by G ' = (V ', E '), then:
v' = V- { V | V plays only a CSC-server role },
E′=E+{(v 1 ,v 2 ,v)|v 1 ∈V,v 2 ∈V,v∈V,v≠v 1 ≠v 2 ,(v 1 ,v)∈E,(v,v 2 )∈E};
wherein CSC-server represents an untrusted third party of the C2C-QKD device.
2. A QKD protocol classification-based hybrid QKD network system according to claim 1, comprising multiple sets of C2C-QKD devices;
multiple sets of C2C-QKD equipment form a mesh topology structure, two communication parties which are not directly connected realize secret communication through the forwarding of each node on a communication path, and each node is used as an end user and a switching device.
3. A QKD protocol classification-based hybrid QKD network system according to claim 1, comprising multiple sets of CSC-QKD devices;
the multiple sets of CSC-QKD devices form a star-shaped topological structure, an untrusted third party is used as a server, and other communication parties are used as terminal users, so that quantum key distribution among all communication parties is realized.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010136664.6A CN111431703B (en) | 2020-03-02 | 2020-03-02 | Hybrid QKD network system based on QKD protocol classification |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010136664.6A CN111431703B (en) | 2020-03-02 | 2020-03-02 | Hybrid QKD network system based on QKD protocol classification |
Publications (2)
Publication Number | Publication Date |
---|---|
CN111431703A CN111431703A (en) | 2020-07-17 |
CN111431703B true CN111431703B (en) | 2022-10-25 |
Family
ID=71547370
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010136664.6A Active CN111431703B (en) | 2020-03-02 | 2020-03-02 | Hybrid QKD network system based on QKD protocol classification |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111431703B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114465718B (en) * | 2022-01-07 | 2023-11-03 | 南京邮电大学 | Multi-protocol translation method and related equipment for quantum key distribution service |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7068790B1 (en) * | 2001-08-31 | 2006-06-27 | Bbn Technologies Corp. | Systems and methods for path set-up in a quantum key distribution network |
CN103501221A (en) * | 2013-09-29 | 2014-01-08 | 哈尔滨工业大学 | Evaluating method of error code negotiation algorithm for quantum communication |
CN104935428A (en) * | 2015-06-02 | 2015-09-23 | 华南师范大学 | Multiuser QKD network system based on M-Z interferometer, and secret key distribution method thereof |
CN105406962A (en) * | 2015-09-30 | 2016-03-16 | 华南师范大学 | Multi-user orbital angular momentum wavelength division multiplexing QKD (quantum key distribution) network system and key distribution method thereof |
KR20160050999A (en) * | 2014-10-31 | 2016-05-11 | 에스케이텔레콤 주식회사 | Method for Optimizing Network Topology for Constructing Quantum Key Distribution Networks |
CN108462573A (en) * | 2018-02-09 | 2018-08-28 | 中国电子科技集团公司第三十研究所 | A kind of flexible quantum safety moving communication means |
CN109067518A (en) * | 2018-06-28 | 2018-12-21 | 南京邮电大学 | A kind of quantum network system and method based on plug and play MDI-QKD |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8457316B2 (en) * | 2008-01-15 | 2013-06-04 | At&T Intellectual Property Ii, L.P. | Architecture for reconfigurable quantum key distribution networks based on entangled photons by wavelength division multiplexing |
-
2020
- 2020-03-02 CN CN202010136664.6A patent/CN111431703B/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7068790B1 (en) * | 2001-08-31 | 2006-06-27 | Bbn Technologies Corp. | Systems and methods for path set-up in a quantum key distribution network |
CN103501221A (en) * | 2013-09-29 | 2014-01-08 | 哈尔滨工业大学 | Evaluating method of error code negotiation algorithm for quantum communication |
KR20160050999A (en) * | 2014-10-31 | 2016-05-11 | 에스케이텔레콤 주식회사 | Method for Optimizing Network Topology for Constructing Quantum Key Distribution Networks |
CN104935428A (en) * | 2015-06-02 | 2015-09-23 | 华南师范大学 | Multiuser QKD network system based on M-Z interferometer, and secret key distribution method thereof |
CN105406962A (en) * | 2015-09-30 | 2016-03-16 | 华南师范大学 | Multi-user orbital angular momentum wavelength division multiplexing QKD (quantum key distribution) network system and key distribution method thereof |
CN108462573A (en) * | 2018-02-09 | 2018-08-28 | 中国电子科技集团公司第三十研究所 | A kind of flexible quantum safety moving communication means |
CN109067518A (en) * | 2018-06-28 | 2018-12-21 | 南京邮电大学 | A kind of quantum network system and method based on plug and play MDI-QKD |
Non-Patent Citations (2)
Title |
---|
"Measurement-device-independent quantum key distribution over a 404 km optical fiber";Measurement-device-independent quantum key distribution over a 4;《PHYSICAL REVIEW LETTERS》;20161102;全文 * |
光纤量子密钥分配技术在电网中的应用前景;张睿汭;《电力***通信》;20121010(第10期);全文 * |
Also Published As
Publication number | Publication date |
---|---|
CN111431703A (en) | 2020-07-17 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Yin et al. | Experimental quantum secure network with digital signatures and encryption | |
Bacco et al. | Boosting the secret key rate in a shared quantum and classical fibre communication system | |
Yuan et al. | 10-Mb/s quantum key distribution | |
US7113598B2 (en) | Methods and systems for high-data-rate quantum cryptography | |
Stucki et al. | Long-term performance of the SwissQuantum quantum key distribution network in a field environment | |
Zhong et al. | Photon-efficient quantum key distribution using time–energy entanglement with high-dimensional encoding | |
Peev et al. | The SECOQC quantum key distribution network in Vienna | |
Cao et al. | KaaS: Key as a service over quantum key distribution integrated optical networks | |
Hughes et al. | Network-centric quantum communications with application to critical infrastructure protection | |
US8964989B2 (en) | Method for adding nodes to a quantum key distribution system | |
Brito et al. | Statistical properties of the quantum internet | |
Yang et al. | Member expansion in quantum (t, n) threshold secret sharing schemes | |
Li et al. | Building a large-scale and wide-area quantum internet based on an OSI-alike model | |
Song et al. | Recent development in quantum communication | |
Guerrini et al. | Secure key throughput of intermittent trusted-relay QKD protocols | |
Dianati et al. | Architecture of the Secoqc quantum key distribution network | |
Zhang et al. | Fragmentation-aware entanglement routing for quantum networks | |
CN111431703B (en) | Hybrid QKD network system based on QKD protocol classification | |
Dhara et al. | Subexponential rate versus distance with time-multiplexed quantum repeaters | |
Burr et al. | Evaluating different topologies for multi-photon quantum key distribution | |
Wang et al. | Modeling and simulation of practical quantum secure communication network | |
CN109818814B (en) | Quantum secret communication network simulation system | |
Qin et al. | Quantum secure direct communication based on single particles | |
Semenenko et al. | Entanglement generation in a quantum network with finite quantum memory lifetime | |
CN111404677B (en) | Analysis method of hybrid QKD network system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |