4.6 Article

Scalable Authentication and Optimal Flooding in a Quantum Network

Journal

PRX QUANTUM
Volume 3, Issue 2, Pages -

Publisher

AMER PHYSICAL SOC
DOI: 10.1103/PRXQuantum.3.020311

Keywords

-

Funding

  1. United Kingdom Research and Innovation's (UKRI) Engineering and Physical Science Research Council (EPSRC) Quantum Communications Hub [EP/M013472/1, EP/T001011/1, EP/N015126/1]
  2. Ministry of Science and Education (MSE) of Croatia [KK.01.1.1.01.0001]
  3. Austrian Research Promotion Agency (FFG) [ASAP12-85, 854022]
  4. European Union [820466]
  5. EPSRC through the Quantum Engineering Centre for Doctoral Training [EP/SO23607/1]
  6. EPSRC [EP/R513386/1]

Ask authors/readers for more resources

The global interest in quantum networks is driven by the security provided by the laws of physics. Deploying quantum networks faces challenges in scaling the physical hardware and optimizing the network layers. This article discusses the usefulness of authentication-transfer and flooding protocols through experimental demonstrations on an eight-user quantum network test bed.
The global interest in quantum networks stems from the security guaranteed by the laws of physics. The deployment of quantum networks means facing the challenges of scaling up the physical hardware and, more importantly, of scaling up all other network layers and optimally utilizing network resources. Here, we consider two related protocols and their experimental demonstrations on an eight-user quantum network test bed, and discuss their usefulness with the aid of example use cases. First, we consider an authentication-transfer protocol to manage a fundamental limitation of quantum communication-the need for a preshared key between every pair of users linked together on the quantum network. By temporarily trusting some intermediary nodes for a short period of time (< 35 min in our network), we can generate and distribute these initial authentication keys with a very high level of security. Second, when end users quantify their trust in intermediary nodes, our flooding protocol can be used to improve both end-to-end communication speeds and increase security against malicious nodes.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.6
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available