[Infowarrior] - Paper: Quantum Crypto Network

Richard Forno rforno at infowarrior.org
Sat Jul 4 14:32:28 UTC 2009


Received 25 March 2009
Published 2 July 2009

Abstract. In this paper, we present the quantum key distribution (QKD)  
network designed and implemented by the European project SEcure  
COmmunication based on Quantum Cryptography (SECOQC) (2004–2008),  
unifying the efforts of 41 research and industrial organizations. The  
paper summarizes the SECOQC approach to QKD networks with a focus on  
the trusted repeater paradigm. It discusses the architecture and  
functionality of the SECOQC trusted repeater prototype, which has been  
put into operation in Vienna in 2008 and publicly demonstrated in the  
framework of a SECOQC QKD conference held from October 8 to 10, 2008.  
The demonstration involved one-time pad encrypted telephone  
communication, a secure (AES encryption protected) video-conference  
with all deployed nodes and a number of rerouting experiments,  
highlighting basic mechanisms of the SECOQC network functionality.
The paper gives an overview of the eight point-to-point network links  
in the prototype and their underlying technology: three plug and play  
systems by id Quantique, a one way weak pulse system from Toshiba  
Research in the UK, a coherent one-way system by GAP Optique with the  
participation of id Quantique and the AIT Austrian Institute of  
Technology (formerly ARCNote21 ), an entangled photons system by the  
University of Vienna and the AIT, a continuous-variables system by  
Centre National de la Recherche Scientifique (CNRS) and THALES  
Research and Technology with the participation of Université Libre de  
Bruxelles, and a free space link by the Ludwig Maximillians University  
in Munich connecting two nodes situated in adjacent buildings (line of  
sight 80 m). The average link length is between 20 and 30 km, the  
longest link being 83 km.

The paper presents the architecture and functionality of the principal  
networking agent—the SECOQC node module, which enables the authentic  
classical communication required for key distillation, manages the  
generated key material, determines a communication path between any  
destinations in the network, and realizes end-to-end secure transport  
of key material between these destinations.

The paper also illustrates the operation of the network in a number of  
typical exploitation regimes and gives an initial estimate of the  
network transmission capacity, defined as the maximum amount of key  
that can be exchanged, or alternatively the amount of information that  
can be transmitted with information theoretic security, between two  
arbitrary nodes.

< - >

http://www.iop.org/EJ/article/1367-2630/11/7/075001/njp9_7_075001.html


More information about the Infowarrior mailing list