Security analysis of quantum key distribution on passive optical networks.

نویسندگان

  • Kyongchun Lim
  • Heasin Ko
  • Changho Suh
  • June-Koo Kevin Rhee
چکیده

Needs for providing security to end users have brought installation of quantum key distribution (QKD) in one-to-many access networks such as passive optical networks. In the networks, a presence of optical power splitters makes issues for secure key rate more important. However, researches for QKD in access networks have mainly focused on implementation issues rather than protocol development for key rate enhancement. Since secure key rate is theoretically limited by a protocol, researches without protocol development cannot overcome the limit of secure key rate given by a protocol. This brings need of researches for protocol development. In this paper, we provide a new approach which provides secure key rate enhancement over the conventional protocol. Specifically, we propose the secure key rate formula in a passive optical network by extending the secure key rate formula based on the decoy-state BB84 protocol. For a passive optical network, we provide a way that incorporates cooperation across end users. Then, we show that the way can mitigate a photon number splitting (PNS) attack which is crucial in an well known decoy BB84 protocol. Especially, the proposed scheme enables multi-photon states to serve as secure keys unlike the conventional decoy BB84 protocol. Numerical simulations demonstrate that our proposed scheme outperforms the decoy BB84 protocol in secure key rate.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secure Long-Distance Quantum Communication over Optical Fiber Quantum Channels

In today's communication networks, the widespread use of optical fiber and passive optical elements allows to use quantum key distribution (QKD) in the current standard optical network infrastructure. In the past few years, quantum key distribution schemes have attracted much study. The security of modern cryptographic methods, like asymmetric cryptography, relies heavily on the problem of fact...

متن کامل

Information geometric security analysis of differential phase-shift quantum key distribution protocol

This paper analyzes the information-theoretical security of the Differential Phase Shift (DPS) Quantum Key Distribution (QKD) protocol, using efficient computational information geometric algorithms. The DPS QKD protocol was introduced for practical reasons, since the earlier QKD schemes were too complicated to implement in practice. The DPS QKD protocol can be an integrated part of current net...

متن کامل

Quantum cryptography for multi - user passive optical networks

Quantum cryptography has been shown to be an effective technique for the secure distribution of cryptographic keys on point-to-point communication links. Here, we describe adaptations of the existing quantum cryptography protocols and equipment configurations that allow secure key distribution to be performed on a variety of multiuser passive optical network (PON) architectures. These adaptatio...

متن کامل

Security analysis of an untrusted source for quantum key distribution: passive approach

We present a passive approach to the security analysis of quantum key distribution (QKD) with an untrusted source. A complete proof of its unconditional security is also presented. This scheme has significant advantages in real-life implementations as it does not require fast optical switching or a quantum random number generator. The essential idea is to use a beam splitter to split each input...

متن کامل

Comparison of 4 Multi-User Passive Network Topologies for 3 Different Quantum Key Distribution

The purpose of this paper is to compare the performance of four passive optical network topologies in implementing multi-user quantum key distribution, using 3 protocols proposed by quantum cryptography (B92, EPR, and SSP). The considered networks are the passive-star network, the optical-ring network based on the Signac interferometer, the wavelength-routed network, and the wavelength-addresse...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Optics express

دوره 25 10  شماره 

صفحات  -

تاریخ انتشار 2017