7 research outputs found
A verifiable quantum key agreement protocol based on six-qubit cluster states
Quantum key agreement requires all participants to recover the shared key
together, so it is crucial to resist the participant attack. In this paper, we
propose a verifiable multi-party quantum key agreement protocol based on the
six-qubit cluster states. A verifiable distributor who preserves some
subsequences of the six-qubit cluster states is introduced into this protocol,
thus the participants can not obtain the shared key in advance. Besides, the
correctness and simultaneity of the shared key are guaranteed by the trusted
design combiner and homomorphic hash function. Furthermore, the security
analysis shows that the new protocol can resist the external and internal
attacks.Comment: 9 pages, 2 figure
Topological optimization of hybrid quantum key distribution networks
With the growing complexity of quantum key distribution (QKD) network
structures, aforehand topology design is of great significance to support a
large-number of nodes over a large-spatial area. However, the exclusivity of
quantum channels, the limitation of key generation capabilities, the variety of
QKD protocols and the necessity of untrusted-relay selection, make the optimal
topology design a very complicated task. In this research, a hybrid QKD network
is studied for the first time from the perspective of topology, by analyzing
the topological differences of various QKD protocols. In addition, to make full
use of hybrid networking, an analytical model for optimal topology calculation
is proposed, to reach the goal of best secure communication service by
optimizing the deployment of various QKD devices and the selection of
untrusted-relays under a given cost limit. Plentiful simulation results show
that hybrid networking and untrusted-relay selection can bring great
performance advantages, and then the universality and effectiveness of the
proposed analytical model are verified.Comment: 12 pages, 4 figure
Design and implementation of silicon single-photon avalanche photodiode modeling tool for QKD systems
Single-photon detection concept is the most crucial factor that determines the performance of quantum key distribution (QKD) systems. In this paper, a simulator with time domain visualizers and configurable parameters using continuous time simulation approach is presented for modeling and investigating the performance of single-photon detectors operating in Gieger mode at the wavelength of 830 nm. The widely used C30921S silicon avalanche photodiode was modeled in terms of avalanche pulse, the effect of experiment conditions such as excess voltage, temperature and average photon number on the photon detection efficiency, dark count rate and afterpulse probability. This work shows a general repeatable modeling process for significant performance evaluation. The most remarkable result emerged from the simulated data generated and detected by commercial devices is that the modeling process provides guidance for single-photon detectors design and characterization. The validation and testing results of the single-photon avalanche detectors (SPAD) simulator showed acceptable results with the theoretical and experimental results reported in related references and the device's data sheets
Implementation of quantum key distribution network simulation module in the network simulator NS-3
As the research in quantum key distribution (QKD) technology grows larger and becomes more complex, the need for highly accurate and scalable simulation technologies becomes important to assess the practical feasibility and foresee difficulties in the practical implementation of theoretical achievements. Due to the specificity of the QKD link which requires optical and Internet connection between the network nodes, to deploy a complete testbed containing multiple network hosts and links to validate and verify a certain network algorithm or protocol would be very costly. Network simulators in these circumstances save vast amounts of money and time in accomplishing such a task. The simulation environment offers the creation of complex network topologies, a high degree of control and repeatable experiments, which in turn allows researchers to conduct experiments and confirm their results. In this paper, we described the design of the QKD network simulation module which was developed in the network simulator of version 3 (NS-3). The module supports simulation of the QKD network in an overlay mode or in a single TCP/IP mode. Therefore, it can be used to simulate other network technologies regardless of QKD.Web of Science1610art. no. UNSP 25