Networks based on QKD and weakly trusted repeaters

Elkouss Coronas, David and Martínez Mateo, Jesús and Ciurana Aguilar, Alex and Martín Ayuso, Vicente (2013). Networks based on QKD and weakly trusted repeaters. In: "3rd International Conference on Quantum Cryptography", 05-09 Aug 2013, Waterloo, Canadá. p. 1.


Title: Networks based on QKD and weakly trusted repeaters
  • Elkouss Coronas, David
  • Martínez Mateo, Jesús
  • Ciurana Aguilar, Alex
  • Martín Ayuso, Vicente
Item Type: Presentation at Congress or Conference (Other)
Event Title: 3rd International Conference on Quantum Cryptography
Event Dates: 05-09 Aug 2013
Event Location: Waterloo, Canadá
Date: 2013
Faculty: Facultad de Informática (UPM)
Department: Lenguajes y Sistemas Informáticos e Ingeniería del Software
Creative Commons Licenses: Recognition - No derivative works - Non commercial

Full text

PDF - Requires a PDF viewer, such as GSview, Xpdf or Adobe Acrobat Reader
Download (148kB) | Preview

Alternative locations

Official URL:


We study how to use quantum key distribution (QKD) in common optical network infrastructures and propose a method to overcome its distance limitations. QKD is the first technology offering information theoretic secret-key distribution that relies only on the fundamental principles of quantum physics. Point-to-point QKD devices have reached a mature industrial state; however, these devices are severely limited in distance, since signals at the quantum level (e.g. single photons) are highly affected by the losses in the communication channel and intermediate devices. To overcome this limitation, intermediate nodes (i.e. repeaters) are used. Both, quantum-regime and trusted, classical, repeaters have been proposed in the QKD literature, but only the latter can be implemented in practice. As a novelty, we propose here a new QKD network model based on the use of not fully trusted intermediate nodes, referred as weakly trusted repeaters. This approach forces the attacker to simultaneously break several paths to get access to the exchanged key, thus improving significantly the security of the network. We formalize the model using network codes and provide real scenarios that allow users to exchange secure keys over metropolitan optical networks using only passive components.

More information

Item ID: 37663
DC Identifier:
OAI Identifier:
Deposited by: Memoria Investigacion
Deposited on: 11 Feb 2016 12:23
Last Modified: 11 Feb 2016 12:23
  • Open Access
  • Open Access
  • Sherpa-Romeo
    Check whether the anglo-saxon journal in which you have published an article allows you to also publish it under open access.
  • Dulcinea
    Check whether the spanish journal in which you have published an article allows you to also publish it under open access.
  • Recolecta
  • e-ciencia
  • Observatorio I+D+i UPM
  • OpenCourseWare UPM