Computer Science ›› 2018, Vol. 45 ›› Issue (6A): 356-363.

• Information Security • Previous Articles     Next Articles

Research on Key Technologies of Quantum Channel Management in QKD Network

ZHENG Yi-neng   

  1. School of Electronic Information and Communications,Huazhong University of Science and Technology,Wuhan 430074,China
  • Online:2018-06-20 Published:2018-08-03

Abstract: With the development of the Internet,the information dissemination is increasing and the information security is more and more important.As some information requires higher security,researches on information encryption me-thods are of great significance.Quantum key distribution (QKD) technology is based on the no-cloning theorem,which states that it is impossible to create an identical copy of an arbitrary unknown quantum state.That is why QKD is unconditionally secure and it enables keys distribution to be safe.However,the current QKD network is small in size and cannot meet the needs of large-scale network.At the same time,the routing techniques on the classical networks can not apply to the QKD network.Finding out feasible quantum paths becomes a problem to be solved.In view of the above issues,a QKD network model which can meet the large-scale QKD communication was put forward according to optical switch,and its network structure and signaling systems were designed.Based on this,the pilot signal protocol and the quantum channel management mechanism were proposed.The results show that the model works well.

Key words: Quantum channel management, Quantum communication, Quantum key distribution network

CLC Number: 

  • TP393
[1]王剑,王振国.量子密码协议理论研究[M].长沙:国防科技大学出版社,2011:79-100.
[2]ID-Quantique(Geneva,Switzerland)[OL].http://www.idqu-antique.com.
[3]万骏.浅谈量子通信理论及其应用[J].科技传播,2018(6):1674-6708.
[4]BENNET C H,BRASSARD G.Quantum cryptography:Public key distribution andcointossing[C]∥IEEE International Conference on Computers Systems and Signal Processing Bangalore.1984:175-179.
[5]BECHMANN-PASQUINUCCI H,PERES A.Quantum cryp- tography with 3-state systems[J].Physical Review Letters,2000,85(15):3313-3316.
[6]BRUSS D.Optimal eavesdropping in quantum cryptography with six states[J].Physical Review Letters,1998,81(14):3018-3021.
[7]BIHAM E,HUNTTER B,MOR T.Quantum cryptographic network based on quantum memories[J].Physical Review A,1996,54(4):2651.
[8]TOWNSEND P.Quantum cryptography on optical fibernet- works in European 98 Parallel Processing[J].Springer,1998,1470:35-46.
[9]TOWNSEND P.Quantum cryptography on multiuser optical fiber network[J].Nature,1997,385(6611):47-49.
[10]LONGDELL,FRAVEL J J,SELLARS E,et al.Stopped light with storage times Greater than one second using electrom agentically induced transparency in a solid[J].Physical Review Letters,2005,95:63-601.
[11]CHEN Z,BCHE N,ZHAO B.Experimental demonstration of a BDCZ quantum repeater node[J].Nature,2008,454(28):1098-1101.
[12]YUAN Z S,CHEN Y A.Fault-tolerent quantum repeater with atomic ensembles and linear optical[J].Physical Review A,2007,76(2):22-29.
[13]CLAUSEN C,USMANI I,BUSSIERES F.Quatum storage of photonic entanglement in a crystal[J].Nature,2011,469:508-511.
[14]TOLIVER P,CHAPURAN T E,RUNSEP R J,et al.Experimental investigation of quantum key distribution through transparent optical switch elements[J].IEEE Photonics Technology Letters,2003,15(11):1669-1671.
[15]BEIGE A,ENGLERT B G,KURTSIEFER C,et al.Secure communication with single-photon two-qubit states[J].Physical Review A,2002,35(28):407-413.
[16]CAI Q Y.The “Ping-Pong” protocol can be attacked without eavesdropping[J].Physical Review Letters,2003,91(10):109801.
[17]CAI Q Y,LI B W.Deterministic secure communication without using entanglement[J].China Physical Letters,2004,21(4):601-603.
[18]MAN Z X,ZHANG Z J,LI Y.Deterministic secure direct communication by using swapping quantum entanglement and local unitary operations[J].China Physical Letters,2005,22(1):18-21.
[19]WANG J,ZHANG Q,TANG C J.Multiparty controlled quantum secure direct communication using Greenberger-Horne-Zeilinger state[J].Optics Communications,2006,266(2):732-737.
[1] ZHANG Liang-liang, ZHANG Yi-wei, LIANG Jie, SUN Rui-yi and WANG Xin-an. Information Security in New Quantum Technology Age [J]. Computer Science, 2017, 44(7): 1-7.
[2] LIU Ji (State Key Laboratory for Novel Software Technology, Department of Computer Science and Technology, Nanjing University, Nanjing 210093). [J]. Computer Science, 2007, 34(1): 203-207.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!