Quantum key distribution: a networking perspective
The convergence of quantum cryptography with applications used in everyday life is a topic
drawing attention from the industrial and academic worlds. The development of quantum …
drawing attention from the industrial and academic worlds. The development of quantum …
Game theory meets network security: A tutorial
The increasingly pervasive connectivity of today's information systems brings up new
challenges to security. Traditional security has accomplished a long way toward protecting …
challenges to security. Traditional security has accomplished a long way toward protecting …
Analysis of the public channel of quantum key distribution link
Quantum key distribution (QKD) relies on the laws of physics to establish a symmetric binary
key between remote parties. A QKD link involves the realization of a quantum channel for …
key between remote parties. A QKD link involves the realization of a quantum channel for …
Switching in quantum networks: an optimization investigation
V Karavias, A Lord, MC Payne - Journal of Optical Communications …, 2024 - opg.optica.org
Quantum key distribution (QKD) promises information theoretic security. However, the
distances over which complete security can be achieved are fundamentally limited in the …
distances over which complete security can be achieved are fundamentally limited in the …
Quantum network security dependent on the connection density between trusted nodes
A Gaidash, G Miroshnichenko… - Journal of Optical …, 2022 - opg.optica.org
Besides true quantum repeaters, a trusted node paradigm seems to be inevitable for
practical implementations (at least in the short term), and one should consider configurations …
practical implementations (at least in the short term), and one should consider configurations …
[PDF][PDF] Complexity of Network Design for Private Communication and the P-vs-NP question
S Rass - International Journal of Advanced Computer Science …, 2014 - Citeseer
We investigate infeasibility issues arising along network design for information-theoretically
secure cryptography. In particular, we consider the problem of communication in perfect …
secure cryptography. In particular, we consider the problem of communication in perfect …
[PDF][PDF] On the transmission capacity of quantum networks
We provide various results about the transmission capacity of quantum networks. Our
primary focus is on algorithmic methods to efficiently compute upper-bounds to the traffic that …
primary focus is on algorithmic methods to efficiently compute upper-bounds to the traffic that …
From Point-to-Point to End-to-End Security in Quantum Key Distribution Networks
Because quantum key distribution is a technology for establishing keys for symmetric
encryption (preferably one-time pads, but more practically keys for AES or other …
encryption (preferably one-time pads, but more practically keys for AES or other …
局部纠缠交换对量子随机网络鲁棒性的影响
张万航, 马雷 - 量子电子学报, 2015 - lk.hfcas.ac.cn
利用纠缠渗流的方法, 在量子随机网络中任意两个节点间建立远距离纠缠态,
同时还进行了局部纠缠交换的操作. 通过此操作改变了网络中局部节点间的连接情况 …
同时还进行了局部纠缠交换的操作. 通过此操作改变了网络中局部节点间的连接情况 …
[PDF][PDF] Information-theoretic security as an optimization problem
S Rass - Journal of Next Generation Information Technology …, 2011 - academia.edu
Quantum key distribution is renowned for information-theoretic security on point-to-point
connections, while it is by itself not directly capable of end-to-end security. Multipath …
connections, while it is by itself not directly capable of end-to-end security. Multipath …