91 research outputs found

    Secure Optical Networks Based on Quantum Key Distribution and Weakly Trusted Repeaters

    Get PDF
    In this paper we explore how recent technologies can improve the security of optical networks. In particular, we study how to use quantum key distribution (QKD) in common optical network infrastructures and propose a method to overcome its distance limitations. QKD is the first technology offering information theoretic secret-key distribution that relies only on the fundamental principles of quantum physics. Point-to-point QKD devices have reached a mature industrial state; however, these devices are severely limited in distance, since signals at the quantum level (e.g. single photons) are highly affected by the losses in the communication channel and intermediate devices. To overcome this limitation, intermediate nodes (i.e. repeaters) are used. Both, quantum-regime and trusted, classical, repeaters have been proposed in the QKD literature, but only the latter can be implemented in practice. As a novelty, we propose here a new QKD network model based on the use of not fully trusted intermediate nodes, referred as weakly trusted repeaters. This approach forces the attacker to simultaneously break several paths to get access to the exchanged key, thus improving significantly the security of the network. We formalize the model using network codes and provide real scenarios that allow users to exchange secure keys over metropolitan optical networks using only passive components. Moreover, the theoretical framework allows to extend these scenarios not only to accommodate more complex trust constraints, but also to consider robustness and resiliency constraints on the network.Comment: 11 pages, 13 figure

    Networks based on QKD and weakly trusted repeaters

    Full text link
    We study how to use quantum key distribution (QKD) in common optical network infrastructures and propose a method to overcome its distance limitations. QKD is the first technology offering information theoretic secret-key distribution that relies only on the fundamental principles of quantum physics. Point-to-point QKD devices have reached a mature industrial state; however, these devices are severely limited in distance, since signals at the quantum level (e.g. single photons) are highly affected by the losses in the communication channel and intermediate devices. To overcome this limitation, intermediate nodes (i.e. repeaters) are used. Both, quantum-regime and trusted, classical, repeaters have been proposed in the QKD literature, but only the latter can be implemented in practice. As a novelty, we propose here a new QKD network model based on the use of not fully trusted intermediate nodes, referred as weakly trusted repeaters. This approach forces the attacker to simultaneously break several paths to get access to the exchanged key, thus improving significantly the security of the network. We formalize the model using network codes and provide real scenarios that allow users to exchange secure keys over metropolitan optical networks using only passive components

    Quantum Key Distribution (QKD) over Software-Defined Optical Networks

    Get PDF
    Optical network security is attracting increasing research interest. Currently, software-defined optical network (SDON) has been proposed to increase network intelligence (e.g., flexibility and programmability) which is gradually moving toward industrialization. However, a variety of new threats are emerging in SDONs. Data encryption is an effective way to secure communications in SDONs. However, classical key distribution methods based on the mathematical complexity will suffer from increasing computational power and attack algorithms in the near future. Noticeably, quantum key distribution (QKD) is now being considered as a secure mechanism to provision information-theoretically secure secret keys for data encryption, which is a potential technique to protect communications from security attacks in SDONs. This chapter introduces the basic principles and enabling technologies of QKD. Based on the QKD enabling technologies, an architecture of QKD over SDONs is presented. Resource allocation problem is elaborated in detail and is classified into wavelength allocation, time-slot allocation, and secret key allocation problems in QKD over SDONs. Some open issues and challenges such as survivability, cost optimization, and key on demand (KoD) for QKD over SDONs are discussed

    Quantum Key Distribution

    Get PDF
    This chapter describes the application of lasers, specifically diode lasers, in the area of quantum key distribution (QKD). First, we motivate the distribution of cryptographic keys based on quantum physical properties of light, give a brief introduction to QKD assuming the reader has no or very little knowledge about cryptography, and briefly present the state-of-the-art of QKD. In the second half of the chapter we describe, as an example of a real-world QKD system, the system deployed between the University of Calgary and SAIT Polytechnic. We conclude the chapter with a brief discussion of quantum networks and future steps.Comment: 20 pages, 12 figure

    Quantum Internet

    Get PDF
    During my TFG, I investigated the current state of quantum technologies, with a focus on quantum communications and the Quantum Internet. The initial phase includes analyzing the fundamental characteristics of quantum communications, which involves the use of qubits. I mentioned the most advanced deployments of quantum networks to date (QKD networks and entanglement networks). My final study case was based on exploring the potencial of entanglement to improve classical communication capacity. The advantages of Entanglement-Assisted (EA) capacity become evident. Unfortunately, these advantages are significantly reduced when considering an imperfect entanglement distribution. My case study aimed to determine specific ranges and conditions for beneficial classical capacity.Durant el meu TFG, vaig investigar sobre l'estat actual de les tecnologies quàntiques, especialmente en les comunicacions quàntiques i la Internet quàntica. La fase inicial inclou l'anàlisi de les característiques fonamentals de les comunicacions quàntiques, que implica l'ús de qubits. He esmentat els desplegaments més avançats de xarxes quàntiques fins ara (les xarxes QKD i les xarxes d'entrellaçament). El meu cas d'estudi final es va basar en explorar el potencial de l'entrellaçament per millorar la capacitat de comunicació clàssica. Els avantatges de la capacitat assistida per entrellaçament (EA) son evidents. Malauradament, aquests avantatges es redueixen significativament quan es considera una distribució d'entrellaçament imperfecta. El meu estudi de cas tenia com a objectiu determinar els rangs i condicions específics para una capacitat clàssica beneficios

    a European community view

    Get PDF
    Within the last two decades, quantum technologies (QT) have made tremendous progress, moving from Nobel Prize award-winning experiments on quantum physics (1997: Chu, Cohen-Tanoudji, Phillips; 2001: Cornell, Ketterle, Wieman; 2005: Hall, Hänsch-, Glauber; 2012: Haroche, Wineland) into a cross-disciplinary field of applied research. Technologies are being developed now that explicitly address individual quantum states and make use of the 'strange' quantum properties, such as superposition and entanglement. The field comprises four domains: quantum communication, where individual or entangled photons are used to transmit data in a provably secure way; quantum simulation, where well-controlled quantum systems are used to reproduce the behaviour of other, less accessible quantum systems; quantum computation, which employs quantum effects to dramatically speed up certain calculations, such as number factoring; and quantum sensing and metrology, where the high sensitivity of coherent quantum systems to external perturbations is exploited to enhance the performance of measurements of physical quantities. In Europe, the QT community has profited from several EC funded coordination projects, which, among other things, have coordinated the creation of a 150-page QT Roadmap (http://qurope.eu/h2020/qtflagship/roadmap2016). This article presents an updated summary of this roadmap

    How to Achieve End-to-end Key Distribution for QKD Networks in the Presence of Untrusted Nodes

    Full text link
    Quantum key distribution (QKD) networks are expected to enable information-theoretical secure (ITS) communication over a large-scale network. Most researches on relay-based QKD network assume that all relays are completely trustworthy, but the assumption is unrealistic in a complex network. The current study only analyzes the case of passive attacks by untrusted relays (e.g. eavesdropping). However, active attacks by untrusted relays (e.g. spoofing or interfering with the cooperation between honest nodes) are more serious threats and should not be ignored. Taking both passive and active attacks into account, we propose the ITSBFT-QKD networks to defend against untrusted nodes and achieve end-to-end key distribution. In end-to-end key distribution, multiple participating nodes are required to establish trust relationships and cooperate with each other. To prevent attackers from breaking trust relationship and gaining an unreasonable advantage, we incorporate a byzantine consensus scheme to establish and transmit trust relationships in a global QKD network perspective. Moreover, since the security of traditional consensus schemes is lower than the security requirement of QKD networks, we devise a byzantine fault tolerance (BFT) signature scheme to ensure the information-theoretic security of consensus. It provides a new way to construct signature schemes with point-to-point QKD keys in the presence of untrusted relays or nodes. The security of our scheme is analyzed thoroughly from multiple aspects. Our scheme can accommodate up to MIN(C1,N13) MIN\left( C-1,\lfloor \frac{N-1}{3} \rfloor \right) untrusted nodes, where CC is the node connectivity of the network and NN is the number of nodes in the network. Our scheme provides the highest level of security in currently relay-based QKD networks and will significantly promote the application of QKD networks.Comment: 13 pages,7 figure

    Design and Analysis of Secure Quantum Network System with Trusted Repeaters

    Get PDF
    Quantum key distribution (QKD) has received great attention towards future secure communication systems. Since the laws of the quantum mechanics make sure the security and it cannot be cracked by using any mathematical method, there is a great deal of research work in this area which achieves groundbreaking progress. However, some obvious issues are still the obstacle of the daily use of QKD, such as the distance of communications. Using trusted repeaters is a promising approach to extend the range of QKD. This paper proposes a possible QKD system with current network structures and comes up with a novel method of using trusted repeaters to satisfy the requirement of secure QKD network
    corecore