Topological optimization of hybrid quantum key distribution networks

03/31/2020
by   Ya-Xing Wang, et al.
0

With the rapid development of quantum key distribution (QKD) technology, more various types of QKD protocols are being proposed. Considering the variety of QKD protocols, the exclusivity of quantum channels, the limitation of key generation capability, and the necessity of credibility control, it is a crucial task to explore the cost-effective construction of hybrid QKD networks. In this paper, a hybrid QKD network composed of multiple types of QKD protocols based on trusted-relays is considered from the perspective of topology, and then an analytical model for optimizing the deployment of QKD devices and trusted-relays is proposed to provide secure communication services for a large scale and a wide range of users at the minimum cost. The effectiveness and universality of this proposed analytical model are verified by plentiful simulation results.

READ FULL TEXT
research
09/05/2019

Analytical Model and Topology Evaluation of Quantum Secure Communication Network

Due to the intrinsic point-to-point feature of quantum key distribution ...
research
04/24/2019

Modeling and Simulation of Practical Quantum Secure Communication Network

As the Quantum Key Distribution (QKD) technology supporting the pointto-...
research
06/24/2019

ZomeFab: Cost-effective Hybrid Fabrication with Zometools

In recent years, personalized fabrication has received considerable atte...
research
07/28/2020

Enhanced Quantum Key Distribution using Hybrid Channels and Natural Random Numbers

Since the introduction of quantum computation by Richard Feynman in 1982...
research
12/28/2020

A Guide to Global Quantum Key Distribution Networks

We describe systems and methods for the deployment of global quantum key...
research
10/07/2020

Privacy and Data Balkanization: Circumventing the Barriers

The rapid growth in digital data forms the basis for a wide range of new...
research
03/27/2020

Asymptotically Secure Network Code for Active Attacks and its Application to Network Quantum Key Distribution

When there exists a malicious attacker in the network, we need to be car...

Please sign up or login with your details

Forgot password? Click here to reset