Quantum key distribution for security guarantees over quantum-repeater-based QoS-driven 3D satellite networks

Author(s):  
Ping Wang ◽  
Xi Zhang ◽  
Genshe Chen ◽  
Khanh Pham ◽  
Erik Blasch
2014 ◽  
Author(s):  
Ping Wang ◽  
Xi Zhang ◽  
Genshe Chen ◽  
Khanh Pham ◽  
Erik Blasch

2020 ◽  
Vol 2 (1) ◽  
pp. 114-125 ◽  
Author(s):  
Federico Pederzolli ◽  
Francescomaria Faticanti ◽  
Domenico Siracusa

We describe two mixed-integer linear programming formulations, one a faster version of a previous proposal, the other a slower but better performing new model, for the design of Quantum Key Distribution (QKD) sub-networks dimensioned to secure existing core fiber plants. We exploit existing technologies, including non-quantum repeater nodes and multiple disjoint QKD paths to overcome reach limitations while maintaining security guarantees. We examine the models’ performance using simulations on both synthetic and real topologies, quantifying their time and resulting QKD network cost compared to our previous proposal.


2019 ◽  
Vol 9 (1) ◽  
Author(s):  
Hua-Lei Yin ◽  
Zeng-Bing Chen

AbstractLong-distance quantum key distribution (QKD) has long time seriously relied on trusted relay or quantum repeater, which either has security threat or is far from practical implementation. Recently, a solution called twin-field (TF) QKD and its variants have been proposed to overcome this challenge. However, most security proofs are complicated, a majority of which could only ensure security against collective attacks. Until now, the full and simple security proof can only be provided with asymptotic resource assumption. Here, we provide a composable finite-key analysis for coherent-state-based TF-QKD with rigorous security proof against general attacks. Furthermore, we develop the optimal statistical fluctuation analysis method to significantly improve secret key rate in high-loss regime. The results show that coherent-state-based TF-QKD is practical and feasible, with the potential to apply over nearly one thousand kilometers.


IEEE Access ◽  
2020 ◽  
Vol 8 ◽  
pp. 16087-16098 ◽  
Author(s):  
Donghai Huang ◽  
Yongli Zhao ◽  
Tiancheng Yang ◽  
Sabidur Rahman ◽  
Xiaosong Yu ◽  
...  

Quantum ◽  
2021 ◽  
Vol 5 ◽  
pp. 444
Author(s):  
Pavel Sekatski ◽  
Jean-Daniel Bancal ◽  
Xavier Valcarce ◽  
Ernest Y.-Z. Tan ◽  
Renato Renner ◽  
...  

Device-independent quantum key distribution aims at providing security guarantees even when using largely uncharacterised devices. In the simplest scenario, these guarantees are derived from the CHSH score, which is a simple linear combination of four correlation functions. We here derive a security proof from a generalisation of the CHSH score, which effectively takes into account the individual values of two correlation functions. We show that this additional information, which is anyway available in practice, allows one to get higher key rates than with the CHSH score. We discuss the potential advantage of this technique for realistic photonic implementations of device-independent quantum key distribution.


2020 ◽  
Author(s):  
Vimal Gaur ◽  
Devika Mehra ◽  
Anchit Aggarwal ◽  
Raveena Kumari ◽  
Srishti Rawat

Sign in / Sign up

Export Citation Format

Share Document