TY - JOUR
T1 - Scalable Authentication and Optimal Flooding in a Quantum Network
AU - Solomons, Naomi R
N1 - Funding Information:
The research leading to this work has received funding from United Kingdom Research and Innovation’s (UKRI) Engineering and Physical Science Research Council (EPSRC) Quantum Communications Hub (Grants No. EP/M013472/1 and No. EP/T001011/1) and equipment procured by the Quantum Photonic Integrated Circuits (QuPIC) project (EP/N015126/1). We also acknowledge the Ministry of Science and Education (MSE) of Croatia, Contract No. KK.01.1.1.01.0001. We acknowledge financial support from the Austrian Research Promotion Agency (FFG) ASAP12-85 project and the SatNetQ 854022 project. S.P. acknowledges support from the European Union via “Continuous Variable Quantum Communications” (CiViQ, Grant Agreement No. 820466). N.R.S. was funded by the EPSRC through the Quantum Engineering Centre for Doctoral Training, EP/SO23607/1. A.F. was funded by the EPSRC via a Doctoral Training Partnership, EP/R513386/1. We would like to thank Thomas Scheidl for help with the software used to run the original experiment and Mohsen Razavi and Guillermo Currás Lorenzo for their help in proving the security of the implementation of the original network experiment.
Publisher Copyright:
© 2022 authors. Published by the American Physical Society.
PY - 2022/4/18
Y1 - 2022/4/18
N2 - The global interest in quantum networks stems from the security guaranteed by the laws of physics. The deployment of quantum networks means facing the challenges of scaling up the physical hardware and, more importantly, of scaling up all other network layers and optimally utilizing network resources. Here, we consider two related protocols and their experimental demonstrations on an eight-user quantum network test bed, and discuss their usefulness with the aid of example use cases. First, we consider an authentication-transfer protocol to manage a fundamental limitation of quantum communication—the need for a preshared key between every pair of users linked together on the quantum network. By temporarily trusting some intermediary nodes for a short period of time ( <35 min in our network), we can generate and distribute these initial authentication keys with a very high level of security. Second, when end users quantify their trust in intermediary nodes, our flooding protocol can be used to improve both end-to-end communication speeds and increase security against malicious nodes.
AB - The global interest in quantum networks stems from the security guaranteed by the laws of physics. The deployment of quantum networks means facing the challenges of scaling up the physical hardware and, more importantly, of scaling up all other network layers and optimally utilizing network resources. Here, we consider two related protocols and their experimental demonstrations on an eight-user quantum network test bed, and discuss their usefulness with the aid of example use cases. First, we consider an authentication-transfer protocol to manage a fundamental limitation of quantum communication—the need for a preshared key between every pair of users linked together on the quantum network. By temporarily trusting some intermediary nodes for a short period of time ( <35 min in our network), we can generate and distribute these initial authentication keys with a very high level of security. Second, when end users quantify their trust in intermediary nodes, our flooding protocol can be used to improve both end-to-end communication speeds and increase security against malicious nodes.
U2 - 10.1103/PRXQuantum.3.020311
DO - 10.1103/PRXQuantum.3.020311
M3 - Article (Academic Journal)
SN - 2691-3399
VL - 3
JO - PRX Quantum
JF - PRX Quantum
IS - 2
M1 - 020311
ER -