Security analysis of quantum key distribution on passive optical networks.
نویسندگان
چکیده
Needs for providing security to end users have brought installation of quantum key distribution (QKD) in one-to-many access networks such as passive optical networks. In the networks, a presence of optical power splitters makes issues for secure key rate more important. However, researches for QKD in access networks have mainly focused on implementation issues rather than protocol development for key rate enhancement. Since secure key rate is theoretically limited by a protocol, researches without protocol development cannot overcome the limit of secure key rate given by a protocol. This brings need of researches for protocol development. In this paper, we provide a new approach which provides secure key rate enhancement over the conventional protocol. Specifically, we propose the secure key rate formula in a passive optical network by extending the secure key rate formula based on the decoy-state BB84 protocol. For a passive optical network, we provide a way that incorporates cooperation across end users. Then, we show that the way can mitigate a photon number splitting (PNS) attack which is crucial in an well known decoy BB84 protocol. Especially, the proposed scheme enables multi-photon states to serve as secure keys unlike the conventional decoy BB84 protocol. Numerical simulations demonstrate that our proposed scheme outperforms the decoy BB84 protocol in secure key rate.
منابع مشابه
Secure Long-Distance Quantum Communication over Optical Fiber Quantum Channels
In today's communication networks, the widespread use of optical fiber and passive optical elements allows to use quantum key distribution (QKD) in the current standard optical network infrastructure. In the past few years, quantum key distribution schemes have attracted much study. The security of modern cryptographic methods, like asymmetric cryptography, relies heavily on the problem of fact...
متن کاملInformation geometric security analysis of differential phase-shift quantum key distribution protocol
This paper analyzes the information-theoretical security of the Differential Phase Shift (DPS) Quantum Key Distribution (QKD) protocol, using efficient computational information geometric algorithms. The DPS QKD protocol was introduced for practical reasons, since the earlier QKD schemes were too complicated to implement in practice. The DPS QKD protocol can be an integrated part of current net...
متن کاملQuantum cryptography for multi - user passive optical networks
Quantum cryptography has been shown to be an effective technique for the secure distribution of cryptographic keys on point-to-point communication links. Here, we describe adaptations of the existing quantum cryptography protocols and equipment configurations that allow secure key distribution to be performed on a variety of multiuser passive optical network (PON) architectures. These adaptatio...
متن کاملSecurity analysis of an untrusted source for quantum key distribution: passive approach
We present a passive approach to the security analysis of quantum key distribution (QKD) with an untrusted source. A complete proof of its unconditional security is also presented. This scheme has significant advantages in real-life implementations as it does not require fast optical switching or a quantum random number generator. The essential idea is to use a beam splitter to split each input...
متن کاملComparison of 4 Multi-User Passive Network Topologies for 3 Different Quantum Key Distribution
The purpose of this paper is to compare the performance of four passive optical network topologies in implementing multi-user quantum key distribution, using 3 protocols proposed by quantum cryptography (B92, EPR, and SSP). The considered networks are the passive-star network, the optical-ring network based on the Signac interferometer, the wavelength-routed network, and the wavelength-addresse...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Optics express
دوره 25 10 شماره
صفحات -
تاریخ انتشار 2017