Abstract
Quantum key distribution (QKD) is regarded as a key-technology for the upcoming decades. Its practicability has been demonstrated through various experimental implementations. Wide-area QKD networks are a natural next step and should inherit the selling point of provable security. However, most research in QKD focuses on point-to-point connections, leaving end-to-end security to the trustworthiness of intermediate repeater nodes, thus defeating any formal proof of security: why bother outwitting QKD, if the repeater node is an easy prey, and an equally valuable target? We discuss methods of designing QKD networks with provable end-to-end security at provably optimized efforts. We formulate two optimization problems, along with investigations of computational difficulty: First, what is the minimal cost for a desired security? Second, how much security is achievable under given (budget-)constraints? Both problems permit applications of commercial optimization software, so allow taking a step towards an economic implementation of a globally spanning QKD network.
Similar content being viewed by others
References
Poppe, A., Peev, M., Maurhart, O.: Outline of the SECOQC Quantum-Key-Distribution network in Vienna. Int. J. Quant. Inf. 6(No. 2), 209–218 (2008)
Shor, P., Preskill, J.: Simple proof of security of the BB84 quantum key distribution protocol. Phys. Rev. Lett. 85, 441–444 (2000)
Alléaume, R., Bouda, J., Branciard, C., Debuisschert, T., Dianati, M., Gisin, N., Godfrey, M., Grangier, P., Länger, T., Leverrier, A., Lütkenhaus, N., Painchault, P., Peev, M., Poppe, A., Pornin, T., Rarity, J., Renner, R., Ribordy, G., Riguidel, M., Salvail, L., Shields, A., Weinfurter, H., Zeilinger, A.: SECOQC white paper on quantum key distribution and cryptography, SECOQC Website. http://www.secoqc.net/downloads/secoqc_crypto_wp.pdf. Accessed 03 Feb 2010
Lo, H.-K., Chau, H.F.: Unconditional security of quantum key distribution over arbitrarily long distances. Science 283, 2050–2056 (1999)
Schmitt-Manderbach, T., Weier, H., Fürst, M., Ursin, R., Tiefenbacher, F., Scheidl, T., Perdigues, J., Sodnik, Z., Kurtsiefer, C., Rarity, J., Zeilinger, A., Weinfurter, H.: Experimental demonstration of free-space decoy-state quantum key distribution over 144 km. Phys. Rev. Lett. 98(1), 010504 (2007)
Rarity, J., Tapster, P., Gorman, P., Knight, P.: Ground to satellite secure key exchange using quantum cryptography. New J. Phys. 4, 82.1–82.21 (2002)
SECOQC—development of a global network for secure communication based on quantum cryptography. http://www.secoqc.net/. Accessed 03 Feb 2010
Wang, Y., Desmedt, Y.: Perfectly secure message transmission revisited. IEEE Trans. Inf. Theory 54(6), 2582–2595 (2008)
Ashwin Kumar, M., Goundan, P. R., Srinathan, K., Pandu Rangan, C.: On perfectly secure communication over arbitrary networks. In: PODC ‘02: Proceedings of the 21st Annual Symposium on Principles of Distributed Computing, pp. 193–202. ACM, New York (2002)
Shamir, A.: How to share a secret. Commun. ACM 22(11), 612–613 (1979)
Shannon, C.: Communication theory of secrecy systems. Bell Syst. Technical. J. 28, 656–715 (1949)
Rass, S., Schartner, P.: Game-theoretic security analysis of quantum networks. In: Proceedings of the 3rd International Conference on Quantum, Nano- and Micro Technologies, pp. 20–25. IEEE Computer Society Press (2009)
Shahriari, H. R., Sadoddin, R., Jalili, R., Zakeri, R., Omidian, A. R.: Information and communications security. In: Network Vulnerability Analysis through Vulnerability Take-Grant Model (VTG), pp. 256–268. Springer, Berlin (2005)
Combinatorial analysis utilizing logical dependencies residing on networks (CAULDRON). http://ait.gmu.edu/~csis/. Accessed 04 Feb 2010
Houmb, S. H., Franqueira, V. N. L.: Estimating ToE risk level using CVSS. In: Proceedings of the International Conference on Availability, Reliability and Security, pp. 718–725. IEEE Computer Society Press (2009)
Innerhofer-Oberperfler, F., Breu, R.: An empirically derived loss taxonomy based on publicly known security incidents. In: Proceedings of the International Conference on Availability, Reliability and Security, pp 66–73. IEEE Computer Society Press (2009)
Rass, S.: On Information-Theoretic Security: Contemporary Problems and Solutions. PhD thesis, Klagenfurt University, Institute of Applied Informatics (2009)
Rass, S., Schartner, P.: Security in quantum networks as an optimization problem. In: Proceedings of the International Conference on Availability, Reliability and Security, pp. 493–498. IEEE Computer Society Press (2009)
Thomas, L.C.: Games, Theory and Applications. Ellis Horwood Ltd, Chichester (1986)
Ilog, Inc. Solver CPLEX. http://www.ilog.com/products/cplex/. Accessed 04 Feb 2010
Chartrand, G., Zhang, P.: Introduction to Graph Theory. McGraw-Hill, Boston (2005)
Acknowledgments
We thank the anonymous reviewers for valuable comments. The clarity, readability and overall contribution of the paper could be greatly improved by implementing their suggestions.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Rass, S., Wiegele, A. & Schartner, P. Building a Quantum Network: How to Optimize Security and Expenses. J Netw Syst Manage 18, 283–299 (2010). https://doi.org/10.1007/s10922-010-9162-0
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10922-010-9162-0