Skip to main content

QSIP: A Quantum Key Distribution Signaling Protocol

  • Conference paper
  • First Online:
Book cover Multimedia Communications, Services and Security (MCSS 2017)

Abstract

The rapid development of quantum equipment has led to increased interest in the application of Quantum Key Distribution (QKD) in everyday life. One of the questions is the establishment of a QKD session, namely the procedure for negotiating session parameters that is solved using a signaling protocol. In this paper, we analyze the existing signaling protocols and their limited application in a QKD network. We present a new QKD signaling protocol (QSIP) that aims to establish a session, modify the parameters of the established session and tear down the session. Additionally, QSIP is expanded to carry values that can be used to calculate average delay and perceive the state of the public channel of QKD link.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Maurer, U.M.: Secret key agreement by public discussion from common information. IEEE Trans. Inf. Theor. 39(3), 733–742 (1993)

    Article  MATH  MathSciNet  Google Scholar 

  2. Shor, P.W.: Algorithms for quantum computation: discrete logarithms and factoring. In: Proceedings of 35th Annual Symposium on Foundations of Computer Science, IEEE Computational Society Press, pp. 124–134 (1994)

    Google Scholar 

  3. Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. In: Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, vol. 175, New York (1984)

    Google Scholar 

  4. Wegman, M.N., Carter, J.L.: New hash functions and their use in authentication and set equality. J. Comput. Syst. Sci. 22(3), 265–279 (1981)

    Article  MATH  MathSciNet  Google Scholar 

  5. Mayers, D.: Unconditional security in quantum cryptography. J. ACM 48(3), 351–406 (2001)

    Article  MATH  MathSciNet  Google Scholar 

  6. Shor, P.W., Preskill, J.: Simple proof of security of the BB84 quantum key distribution protocol. Phys. Rev. Lett. 85(2), 441–444 (2000)

    Article  Google Scholar 

  7. Yin, J., Cao, Y., Li, Y.H., Liao, S.K., Zhang, L., Ren, J.G., Al, W.Q.C., Liu, W.Y., Bo Li, H.D., Li, G.B., Lu, Q.M., Gong, Y.H., Xu, Y., Li, S.L., Li, F.Z., Yin, Y.Y., Jiang, Z.Q., Li, M., Jia, J.J., Ge Ren, D.H., Zhou, Y.L., Zhang, X.X., Wang, N., Chang, X., Zhu, Z.C., Liu, N.L., Chen, Y.A., Lu, C.Y., Shu, R., Peng, C.Z., Wang, J.Y., Pan, J.W.: Satellite-based entanglement distribution over 1200 kilometers. Science 356(6343), 1140–1144 (2017)

    Article  Google Scholar 

  8. Wang, S., Chen, W., Yin, Z.Q., Li, H.W., He, D.Y., Li, Y.H., Zhou, Z., Song, X.T., Li, F.Y., Wang, D., Chen, H., Han, Y.G., Huang, J.Z., Guo, J.F., Hao, P.L., Li, M., Zhang, C.M., Liu, D., Liang, W.Y., Miao, C.H., Wu, P., Guo, G.C., Han, Z.F.: Field and long-term demonstration of a wide area quantum key distribution network. Opt. Express 22(18), 21739–21756 (2014)

    Article  Google Scholar 

  9. Sasaki, M., Fujiwara, M., Ishizuka, H., Klaus, W., Wakui, K., Takeoka, M., Miki, S.: Field test of quantum key distribution in the Tokyo QKD network. Opt. Express 19, 10387–10409 (2011)

    Article  Google Scholar 

  10. Xu, F.X., Chen, W., Wang, S., Yin, Z.Q., Zhang, Y., Liu, Y., Zhou, Z., Zhao, Y.B., Li, H.W., Liu, D., Han, Z.F., Guo, G.C.: Field experiment on a robust hierarchical metropolitan quantum cryptography network. Chin. Sci. Bull. 54(17), 2991–2997 (2009)

    Article  Google Scholar 

  11. Elliott, C., Yeh, H.: DARPA Quantum Network Testbed. Technical Report, BBN Technologies Cambridge, New York, USA, BBN Technologies Cambridge, New York, USA, July 2007

    Google Scholar 

  12. Alleaume, R., Bouda, J., Branciard, C., Debuisschert, T., Dianati, M., Gisin, N., Godfrey, M., Grangier, P., Langer, T., Leverrier, A., Lutkenhaus, N., Painchault, P., Peev, M., Poppe, A., Pornin, T., Rarity, J., Renner, R., Ribordy, G., Riguidel, M., Salvail, L., Shields, A., Weinfurter, H., Zeilinger, A.: SECOQC white paper on quantum key distribution and cryptography. arXiv preprint quant-ph/0701168 28 (2007)

    Google Scholar 

  13. Alleaume, R., Branciard, C., Bouda, J., Debuisschert, T., Dianati, M., Gisin, N., Godfrey, M., Grangier, P., Länger, T., Lütkenhaus, N., Monyk, C., Painchault, P., Peev, M., Poppe, A., Pornin, T., Rarity, J., Renner, R., Ribordy, G., Riguidel, M., Salvail, L., Shields, A., Weinfurter, H., Zeilinger, A.: Using quantum key distribution for cryptographic purposes: a survey. Theor. Comput. Sci. 560(P1), 62–81 (2014)

    Article  MATH  MathSciNet  Google Scholar 

  14. Salvail, L., Peev, M., Diamanti, E., Alléaume, R., Lütkenhaus, N., Länger, T.: Security of trusted repeater quantum key distribution networks. J. Comput. Secur. 18(1), 61–87 (2010)

    Article  Google Scholar 

  15. Mehic, M., Niemiec, M., Voznak, M.: Calculation of the key length for quantum key distribution. Elektronika ir Elektrotechnika 21(6), 81–85 (2015)

    Article  Google Scholar 

  16. Mehic, M., Komosny, D., Mauhart, O., Voznak, M., Rozhon, J.: Impact of packet size variation in overlay quantum key distribution network. In: 2016 XI International Symposium on Telecommunications (BIHTEL), Sarajevo, Bosnia and Herzegovina. IEEE pp. 1–6, October 2016

    Google Scholar 

  17. Kollmitzer, C., Pivk, M.: Applied Quantum Cryptography. LNP, vol. 797. Springer Science & Business Media, Hiedelberg (2010)

    MATH  Google Scholar 

  18. Peev, M., Pacher, C., Alléaume, R., Barreiro, C., Bouda, J., Boxleitner, W., Debuisschert, T., Diamanti, E., Dianati, M., Dynes, J.F., Fasel, S., Fossier, S., Fürst, M., Gautier, J.D., Gay, O., Gisin, N., Grangier, P., Happe, A., Hasani, Y., Hentschel, M., Hübel, H., Humer, G., Länger, T., Legré, M., Lieger, R., Lodewyck, J., Lorünser, T., Lütkenhaus, N., Marhold, A., Matyus, T., Maurhart, O., Monat, L., Nauerth, S., Page, J.B., Poppe, A., Querasser, E., Ribordy, G., Robyr, S., Salvail, L., Sharpe, A.W., Shields, A.J., Stucki, D., Suda, M., Tamas, C., Themel, T., Thew, R.T., Thoma, Y., Treiber, A., Trinkler, P., Tualle-Brouri, R., Vannel, F., Walenta, N., Weier, H., Weinfurter, H., Wimberger, I., Yuan, Z.L., Zbinden, H., Zeilinger, A.: The SECOQC quantum key distribution network in Vienna. New J. Phys. 11(7), 075001 (2009)

    Article  Google Scholar 

  19. Zhang, L., Deering, S., Estrin, D.: RSVP: A new resource reservation protocol. Network 7(5), 8–18 (1993)

    Google Scholar 

  20. Sun, J.Y., Lang, J., Miao, C., Yang, N., Wang, S.: A digital watermarking algorithm based on hyperchaos and discrete fractional fourier transform. In: 2012 5th International Congress on Image and Signal Processing, pp. 552–556. IEEE, October 2012

    Google Scholar 

  21. Cheng, X., Sun, Y., Ji, Y.: A QoS-supported scheme for quantum key distribution. In: 2011 International Conference on Advanced Intelligence and Awareness Internet (AIAI 2011), Number 2009, pp. 220–224. IET (2011)

    Google Scholar 

  22. Mehic, M., Maurhart, O., Rass, S., Komosny, D., Rezac, F., Voznak, M.: Analysis of the public channel of quantum key distribution link. IEEE J. Quantum Electron. 53(5), 1–8 (2017)

    Article  Google Scholar 

  23. Dianati, M., Alleaume, R., Gagnaire, M., Shen, X.S.: Architecture and protocols of the future European quantum key distribution network. Secur. Commun. Netw. 1(1), 57–74 (2008)

    Article  Google Scholar 

  24. Hannes, T., Richard, G.: RSVP Security Properties. Technical report, RFC 4230

    Google Scholar 

  25. Chen, S., Nahrstedt, K.: An overview of quality-of-service routing for the next generation high-speed networks problems and solutions. IEEE Netw. 12(6), 64–79 (1998)

    Article  Google Scholar 

  26. Sarkar, K., Basavaraju, T., Puttamadappa, C.: Ad Hoc Mobile Wireless Networks. CRC Press, Boca Raton (2008)

    Google Scholar 

  27. Lee, S.B., Ahn, G.S., Campbell, A.: Improving UDP and TCP performance in mobile ad hoc networks with INSIGNIA. IEEE Commun. Mag. 39(6), 156–165 (2001)

    Article  Google Scholar 

  28. Kui, W., Janelle, H.: Qos support in mobile and ad-hoc networks. Crossing Boundaries GSA J. Univ. Alberta 1(1), 106 (1992)

    Google Scholar 

  29. Chlamtac, I., Conti, M., Liu, J.J.N.: Mobile ad hoc networking: imperatives and challenges. Ad Hoc Netw. 1, 13–64 (2003)

    Article  Google Scholar 

  30. Seah, W., Lo, A., Chua, K.: A flexible quality of service model for mobile ad-hoc networks. In: 2000 IEEE 51st Vehicular Technology Conference Proceedings VTC2000-Spring, (Cat. No.00CH37026), vol. 1, pp. 445–449. IEEE (2000)

    Google Scholar 

  31. Bennett, C., Bessette, F., Brassard, G., Salvail, L., Smolin, J.: Experimental quantum cryptography. J. Cryptol. 5(1), 3–28 (1992)

    Article  MATH  Google Scholar 

  32. Mehic, M., Partila, P., Tovarek, J., Voznak, M.: Calculation of key reduction for B92 QKD protocol. In: Donkor, E., Pirich, A.R., Hayduk, M., eds.: SPIE Sensing Technology + Applications, p. 95001J. International Society for Optics and Photonics, May 2015

    Google Scholar 

  33. Elliott, C.: Building the quantum network. New J. Phys. 4, 346 (2002)

    Article  Google Scholar 

  34. Marhoefer, M., Wimberger, I., Poppe, A.: Applicability of quantum cryptography for securing mobile communication networks. In: Emerging Trends in Information and Communication Security, Long-Term and Dynamical Aspects of Information Security, pp. 97–111 (2007)

    Google Scholar 

  35. Konig, S., Rass, S.: On the transmission capacity of quantum networks. Int. J. Adv. Comput. Sci. Appl. 2(11), 9–16 (2011)

    Google Scholar 

  36. Franklin, M., Wright, R.N.: Secure communication in minimal connectivity models. J. Cryptol. 13(1), 9–30 (2000)

    Article  MATH  MathSciNet  Google Scholar 

  37. Desmedt, Y., Wang, Y.: Perfectly secure message transmission revisited. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 502–517. Springer, Heidelberg (2002). doi:10.1007/3-540-46035-7_33

    Chapter  Google Scholar 

  38. Couto, D.S.J.D., Aguayo, D., Bicket, J., Morris, R.: A high-throughput path metric for multi-hop wireless routing. Wirel. Netw. 11(4), 419–434 (2005)

    Article  Google Scholar 

  39. Javaid, N., Bibi, A., Djouani, K.: Interference and bandwidth adjusted ETX in wireless multi-hop networks. In: 2010 IEEE Globecom Workshops, pp. 1638–1643. IEEE, December 2010

    Google Scholar 

  40. Ashraf, U., Abdellatif, S., Juanole, G.: An Interference and link-quality aware routing metric for wireless mesh networks. In: 2008 IEEE 68th Vehicular Technology Conference, pp. 1–5. IEEE, September 2008

    Google Scholar 

  41. Mehic, M., Fazio, P., Voznak, M., Partila, P., Komosny, D., Tovarek, J., Chmelikova, Z.: On using multiple routing metrics with destination sequenced distance vector protocol for MultiHop wireless ad hoc networks, 98480F. International Society for Optics and Photonics, May 2016

    Google Scholar 

  42. Länger, T., Lenhart, G.: Standardization of quantum key distribution and the ETSI standardization initiative ISG-QKD. New J. Phys. 11(5), 055051 (2009)

    Article  Google Scholar 

  43. Lenhart, G.: QKD standardization at ETSI. In: Qcw 2010, vol. 57, pp. 50–57 (2012)

    Google Scholar 

  44. Maurhart, O., Pacher, C., Happe, A., Lor, T., Tamas, C., Poppe, A., Peev, M.: New release of an open source QKD software : design and implementation of new algorithms, modularization and integration with IPSec. In: Qcrypt 2013 (2013)

    Google Scholar 

  45. Mehic, M., Maurhart, O., Rass, S., Voznak, M.: Implementation of quantum key distribution network simulation module in the network simulator NS-3. Quantum Inf. Process. 16(10), 253 (2017)

    Article  MathSciNet  Google Scholar 

Download references

Acknowledgments

The research received a financial support from the SGS grant No. SP2017/174, VSB - Technical University of Ostrava, Czech Republic.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Miralem Mehic .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Mehic, M., Maric, A., Voznak, M. (2017). QSIP: A Quantum Key Distribution Signaling Protocol. In: Dziech, A., Czyżewski, A. (eds) Multimedia Communications, Services and Security. MCSS 2017. Communications in Computer and Information Science, vol 785. Springer, Cham. https://doi.org/10.1007/978-3-319-69911-0_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-69911-0_11

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-69910-3

  • Online ISBN: 978-3-319-69911-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics