4.7 Article

The Evolution of Quantum Key Distribution Networks: On the Road to the Qinternet

Journal

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS
Volume 24, Issue 2, Pages 839-894

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/COMST.2022.3144219

Keywords

Security; Cryptography; Quantum computing; Elliptic curve cryptography; Protocols; Internet; Quantum key distribution; Quantum key distribution networks; quantum cryptography; quantum communication; security; communication networks; next generation networking

Funding

  1. National Natural Science Foundation of China [62150032]
  2. National Key Research and Development Program of China [2020YFE0200600]
  3. Funds for Creative Research Groups of China [62021005]
  4. China Association for Science and Technology
  5. Open Fund of State Key Laboratory of Advanced Optical Communication Systems and Networks (Shanghai Jiao Tong University) [2022GZKF006]
  6. Open Fund of IPOC (BUPT)
  7. Natural Science Research StartUp Foundation of Recruiting Talents of Nanjing University of Posts and Telecommunications [NY221114]
  8. Engineering and Physical Sciences Research Council [EP/L018659/1, EP/P034284/1, EP/P003990/1]
  9. European Research Council [789028]

Ask authors/readers for more resources

Quantum key distribution (QKD) is a symmetric secret key negotiation protocol that ensures information-theoretic security. With the development of QKD networks, they have been applied in various fields and successfully implemented in practice. QKD networks consist of multiple nodes connected by optical fiber or free space links, enabling the distribution of secret keys to multiple users.
Quantum key distribution (QKD) constitutes a symmetric secret key negotiation protocol capable of maintaining information-theoretic security. Given the recent advances in QKD networks, they have evolved from academic research to some preliminary applications. A QKD network consists of two or more QKD nodes interconnected by optical fiber or free space links. The secret keys are negotiated between any pair of QKD nodes, and then they can be delivered to multiple users in various areas for ensuring long-term protection and forward secrecy. We commence by introducing the QKD basics, followed by reviewing the development of QKD networks and their implementation in practice. Subsequently, we describe the general QKD network architecture, its elements, as well as its interfaces and protocols. Next, we provide an in-depth overview of the associated physical layer and network layer solutions, followed by the standardization efforts as well as the application scenarios associated with QKD networks. Finally, we discuss the potential future research directions and provide design guidelines for QKD networks.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available