4.7 Article

The Evolution of Quantum Key Distribution Networks: On the Road to the Qinternet

期刊

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS
卷 24, 期 2, 页码 839-894

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/COMST.2022.3144219

关键词

Security; Cryptography; Quantum computing; Elliptic curve cryptography; Protocols; Internet; Quantum key distribution; Quantum key distribution networks; quantum cryptography; quantum communication; security; communication networks; next generation networking

资金

  1. National Natural Science Foundation of China [62150032]
  2. National Key Research and Development Program of China [2020YFE0200600]
  3. Funds for Creative Research Groups of China [62021005]
  4. China Association for Science and Technology
  5. Open Fund of State Key Laboratory of Advanced Optical Communication Systems and Networks (Shanghai Jiao Tong University) [2022GZKF006]
  6. Open Fund of IPOC (BUPT)
  7. Natural Science Research StartUp Foundation of Recruiting Talents of Nanjing University of Posts and Telecommunications [NY221114]
  8. Engineering and Physical Sciences Research Council [EP/L018659/1, EP/P034284/1, EP/P003990/1]
  9. European Research Council [789028]

向作者/读者索取更多资源

Quantum key distribution (QKD) is a symmetric secret key negotiation protocol that ensures information-theoretic security. With the development of QKD networks, they have been applied in various fields and successfully implemented in practice. QKD networks consist of multiple nodes connected by optical fiber or free space links, enabling the distribution of secret keys to multiple users.
Quantum key distribution (QKD) constitutes a symmetric secret key negotiation protocol capable of maintaining information-theoretic security. Given the recent advances in QKD networks, they have evolved from academic research to some preliminary applications. A QKD network consists of two or more QKD nodes interconnected by optical fiber or free space links. The secret keys are negotiated between any pair of QKD nodes, and then they can be delivered to multiple users in various areas for ensuring long-term protection and forward secrecy. We commence by introducing the QKD basics, followed by reviewing the development of QKD networks and their implementation in practice. Subsequently, we describe the general QKD network architecture, its elements, as well as its interfaces and protocols. Next, we provide an in-depth overview of the associated physical layer and network layer solutions, followed by the standardization efforts as well as the application scenarios associated with QKD networks. Finally, we discuss the potential future research directions and provide design guidelines for QKD networks.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据