Trusted Node QKD at an Electrical Utility
نویسندگان
چکیده
منابع مشابه
How Can Quasi-trusted Nodes Help to Securely Relay QKD Keys?
We propose a new definition for quasi-trusted relays. Our quasi-trusted relays are defined as follows: (1) being honest enough to correctly follow a given multi-party finitetime communication protocol; (2) however, being under the monitoring of eavesdroppers. From the new definition, we first develop a simple 3-party quasi-trusted model called Quantum Quasi-Trusted Bridge (QQTB) model. In this ...
متن کاملGHz QKD at telecom wavelengths using up-conversion detectors
We have developed a hybrid single photon detection scheme for telecom wavelengths based on nonlinear sum-frequency generation and silicon single-photon avalanche diodes (SPADs). The SPAD devices employed have been designed to have very narrow temporal response, i.e. low jitter, which we can exploit for increasing the allowable bit rate for quantum key distribution. The wavelength conversion is ...
متن کاملQkd Quantum Channel Authentication
Several simple yet secure protocols to authenticate the quantum channel of various QKD schemes, by coupling the photon sender's knowledge of a shared secret and the QBER Bob observes, are presented. It is shown that Alice can encrypt certain portions of the information needed for the QKD protocols, using a sequence whose security is based on computational-complexity, without compromising all of...
متن کاملLDPC for QKD Reconciliation
—We present the Low Density Parity Check (LDPC) forward error correction algorithm adapted for the Quantum Key Distribution (QKD) protocol in a form readily applied by developers. A sparse parity check matrix is required for the LDPC algorithm and we suggest using some that have been defined by the IEEE and ETSI standards organizations for use in various communication protocols. We evaluate the...
متن کاملOn QKD Industrialization
During the 25 years of existence of the first protocol for Quantum Key Distribution, much has been said and expected of what came to be termed as Quantum Cryptography. After all this time, much progress has been done but also the reality check and analysis that naturally comes with maturity is underway. A new panorama is emerging, and the way in which the challenges imposed by market requiremen...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Access
سال: 2021
ISSN: 2169-3536
DOI: 10.1109/access.2021.3070222