Networks based on QKD and weakly trusted repeaters

Elkouss Coronas, David; Martínez Mateo, Jesús; Ciurana Aguilar, Alex y Martín Ayuso, Vicente (2013). Networks based on QKD and weakly trusted repeaters. En: "3rd International Conference on Quantum Cryptography", 05-09 Aug 2013, Waterloo, Canadá. p. 1.

Descripción

Título: Networks based on QKD and weakly trusted repeaters
Autor/es:
  • Elkouss Coronas, David
  • Martínez Mateo, Jesús
  • Ciurana Aguilar, Alex
  • Martín Ayuso, Vicente
Tipo de Documento: Ponencia en Congreso o Jornada (Otro)
Título del Evento: 3rd International Conference on Quantum Cryptography
Fechas del Evento: 05-09 Aug 2013
Lugar del Evento: Waterloo, Canadá
Fecha: 2013
Materias:
Escuela: Facultad de Informática (UPM) [antigua denominación]
Departamento: Lenguajes y Sistemas Informáticos e Ingeniería del Software
Licencias Creative Commons: Reconocimiento - Sin obra derivada - No comercial

Texto completo

[img]
Vista Previa
PDF (Document Portable Format) - Se necesita un visor de ficheros PDF, como GSview, Xpdf o Adobe Acrobat Reader
Descargar (148kB) | Vista Previa

Resumen

We study how to use quantum key distribution (QKD) in common optical network infrastructures and propose a method to overcome its distance limitations. QKD is the first technology offering information theoretic secret-key distribution that relies only on the fundamental principles of quantum physics. Point-to-point QKD devices have reached a mature industrial state; however, these devices are severely limited in distance, since signals at the quantum level (e.g. single photons) are highly affected by the losses in the communication channel and intermediate devices. To overcome this limitation, intermediate nodes (i.e. repeaters) are used. Both, quantum-regime and trusted, classical, repeaters have been proposed in the QKD literature, but only the latter can be implemented in practice. As a novelty, we propose here a new QKD network model based on the use of not fully trusted intermediate nodes, referred as weakly trusted repeaters. This approach forces the attacker to simultaneously break several paths to get access to the exchanged key, thus improving significantly the security of the network. We formalize the model using network codes and provide real scenarios that allow users to exchange secure keys over metropolitan optical networks using only passive components.

Más información

ID de Registro: 37663
Identificador DC: http://oa.upm.es/37663/
Identificador OAI: oai:oa.upm.es:37663
URL Oficial: http://2013.qcrypt.net/posters/
Depositado por: Memoria Investigacion
Depositado el: 11 Feb 2016 12:23
Ultima Modificación: 11 Feb 2016 12:23
  • Open Access
  • Open Access
  • Sherpa-Romeo
    Compruebe si la revista anglosajona en la que ha publicado un artículo permite también su publicación en abierto.
  • Dulcinea
    Compruebe si la revista española en la que ha publicado un artículo permite también su publicación en abierto.
  • Recolecta
  • e-ciencia
  • Observatorio I+D+i UPM
  • OpenCourseWare UPM