Skip to main content
Log in

Building a Quantum Network: How to Optimize Security and Expenses

  • Published:
Journal of Network and Systems Management Aims and scope Submit manuscript

Abstract

Quantum key distribution (QKD) is regarded as a key-technology for the upcoming decades. Its practicability has been demonstrated through various experimental implementations. Wide-area QKD networks are a natural next step and should inherit the selling point of provable security. However, most research in QKD focuses on point-to-point connections, leaving end-to-end security to the trustworthiness of intermediate repeater nodes, thus defeating any formal proof of security: why bother outwitting QKD, if the repeater node is an easy prey, and an equally valuable target? We discuss methods of designing QKD networks with provable end-to-end security at provably optimized efforts. We formulate two optimization problems, along with investigations of computational difficulty: First, what is the minimal cost for a desired security? Second, how much security is achievable under given (budget-)constraints? Both problems permit applications of commercial optimization software, so allow taking a step towards an economic implementation of a globally spanning QKD network.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2

Similar content being viewed by others

References

  1. Poppe, A., Peev, M., Maurhart, O.: Outline of the SECOQC Quantum-Key-Distribution network in Vienna. Int. J. Quant. Inf. 6(No. 2), 209–218 (2008)

    Article  Google Scholar 

  2. Shor, P., Preskill, J.: Simple proof of security of the BB84 quantum key distribution protocol. Phys. Rev. Lett. 85, 441–444 (2000)

    Article  Google Scholar 

  3. Alléaume, R., Bouda, J., Branciard, C., Debuisschert, T., Dianati, M., Gisin, N., Godfrey, M., Grangier, P., Länger, T., Leverrier, A., Lütkenhaus, N., Painchault, P., Peev, M., Poppe, A., Pornin, T., Rarity, J., Renner, R., Ribordy, G., Riguidel, M., Salvail, L., Shields, A., Weinfurter, H., Zeilinger, A.: SECOQC white paper on quantum key distribution and cryptography, SECOQC Website. http://www.secoqc.net/downloads/secoqc_crypto_wp.pdf. Accessed 03 Feb 2010

  4. Lo, H.-K., Chau, H.F.: Unconditional security of quantum key distribution over arbitrarily long distances. Science 283, 2050–2056 (1999)

    Article  Google Scholar 

  5. Schmitt-Manderbach, T., Weier, H., Fürst, M., Ursin, R., Tiefenbacher, F., Scheidl, T., Perdigues, J., Sodnik, Z., Kurtsiefer, C., Rarity, J., Zeilinger, A., Weinfurter, H.: Experimental demonstration of free-space decoy-state quantum key distribution over 144 km. Phys. Rev. Lett. 98(1), 010504 (2007)

    Article  Google Scholar 

  6. Rarity, J., Tapster, P., Gorman, P., Knight, P.: Ground to satellite secure key exchange using quantum cryptography. New J. Phys. 4, 82.1–82.21 (2002)

    Article  Google Scholar 

  7. SECOQC—development of a global network for secure communication based on quantum cryptography. http://www.secoqc.net/. Accessed 03 Feb 2010

  8. Wang, Y., Desmedt, Y.: Perfectly secure message transmission revisited. IEEE Trans. Inf. Theory 54(6), 2582–2595 (2008)

    Article  MathSciNet  Google Scholar 

  9. Ashwin Kumar, M., Goundan, P. R., Srinathan, K., Pandu Rangan, C.: On perfectly secure communication over arbitrary networks. In: PODC ‘02: Proceedings of the 21st Annual Symposium on Principles of Distributed Computing, pp. 193–202. ACM, New York (2002)

  10. Shamir, A.: How to share a secret. Commun. ACM 22(11), 612–613 (1979)

    Article  MATH  MathSciNet  Google Scholar 

  11. Shannon, C.: Communication theory of secrecy systems. Bell Syst. Technical. J. 28, 656–715 (1949)

    MATH  MathSciNet  Google Scholar 

  12. Rass, S., Schartner, P.: Game-theoretic security analysis of quantum networks. In: Proceedings of the 3rd International Conference on Quantum, Nano- and Micro Technologies, pp. 20–25. IEEE Computer Society Press (2009)

  13. Shahriari, H. R., Sadoddin, R., Jalili, R., Zakeri, R., Omidian, A. R.: Information and communications security. In: Network Vulnerability Analysis through Vulnerability Take-Grant Model (VTG), pp. 256–268. Springer, Berlin (2005)

  14. Combinatorial analysis utilizing logical dependencies residing on networks (CAULDRON). http://ait.gmu.edu/~csis/. Accessed 04 Feb 2010

  15. Houmb, S. H., Franqueira, V. N. L.: Estimating ToE risk level using CVSS. In: Proceedings of the International Conference on Availability, Reliability and Security, pp. 718–725. IEEE Computer Society Press (2009)

  16. Innerhofer-Oberperfler, F., Breu, R.: An empirically derived loss taxonomy based on publicly known security incidents. In: Proceedings of the International Conference on Availability, Reliability and Security, pp 66–73. IEEE Computer Society Press (2009)

  17. Rass, S.: On Information-Theoretic Security: Contemporary Problems and Solutions. PhD thesis, Klagenfurt University, Institute of Applied Informatics (2009)

  18. Rass, S., Schartner, P.: Security in quantum networks as an optimization problem. In: Proceedings of the International Conference on Availability, Reliability and Security, pp. 493–498. IEEE Computer Society Press (2009)

  19. Thomas, L.C.: Games, Theory and Applications. Ellis Horwood Ltd, Chichester (1986)

    Google Scholar 

  20. Ilog, Inc. Solver CPLEX. http://www.ilog.com/products/cplex/. Accessed 04 Feb 2010

  21. Chartrand, G., Zhang, P.: Introduction to Graph Theory. McGraw-Hill, Boston (2005)

    MATH  Google Scholar 

Download references

Acknowledgments

We thank the anonymous reviewers for valuable comments. The clarity, readability and overall contribution of the paper could be greatly improved by implementing their suggestions.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Stefan Rass.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Rass, S., Wiegele, A. & Schartner, P. Building a Quantum Network: How to Optimize Security and Expenses. J Netw Syst Manage 18, 283–299 (2010). https://doi.org/10.1007/s10922-010-9162-0

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10922-010-9162-0

Keywords

Navigation