A Proposed Architecture for Key Management Schema in Centralized Quantum Network

A Proposed Architecture for Key Management Schema in Centralized Quantum Network

Ahmed Farouk (Zewail City of Science and Technology, Egypt & Mansoura University, Egypt), Mohamed Elhoseny (Mansoura University, Egypt & Scientific Research Group in Egypt (SRGE), Egypt), Josep Batle (Universitat de les Illes Balears, Spain), Mosayeb Naseri (Islamic Azad University, Kermanshah, Iran) and Aboul Ella Hassanien (Cairo University, Egypt & Scientific Research Group in Egypt (SRGE), Egypt)
Copyright: © 2017 |Pages: 25
DOI: 10.4018/978-1-5225-2229-4.ch044
OnDemand PDF Download:
List Price: $37.50
10% Discount:-$3.75


Most existing realizations of quantum key distribution (QKD) are point-to-point systems with one source transferring to only one destination. Growth of these single-receiver systems has now achieved a reasonably sophisticated point. However, many communication systems operate in a point-to-multi-point (Multicast) configuration rather than in point-to-point mode, so it is crucial to demonstrate compatibility with this type of network in order to maximize the application range for QKD. Therefore, this chapter proposed architecture for implementing a multicast quantum key distribution Schema. The proposed architecture is designed as a Multicast Centralized Key Management Scheme Using Quantum Key Distribution and Classical Symmetric Encryption. In this architecture, a secured key generation and distribution solution has been proposed for a single host sending to two or more (N) receivers using centralized Quantum Multicast Key Distribution Centre and classical symmetric encryption.
Chapter Preview


The quantum computers are dissimilar from classical computers depending on transistors. While a classical computer involves data to be converted into bits (0 or 1), the quantum computer involves quantum bits (qubits) can be in superposition state. The superposition state means that the quantum state can be 0, 1 or in both states at the same time. Quantum computers share hypothetical relationships with non-deterministic and probabilistic computers (Nielsen& Chuang, 2000). By way of 2015, the improvement and growth of a real quantum computer is still in early stages but many poetical and theoretical experimentations were implemented by many research groups (Metwaly et al., 2014).

Quantum bit can take the properties of 0 and 1 simultaneously at any one moment (Barenco et al., 1995). A quantum bit, or qubit for short, is a 2wir dimensional Hilbert space 978-1-5225-2229-4.ch044.m01. An orthonormal basis of 978-1-5225-2229-4.ch044.m02 is specified by {978-1-5225-2229-4.ch044.m03,978-1-5225-2229-4.ch044.m04}. The state of the qubit is an associated unit length vector in 978-1-5225-2229-4.ch044.m05. If a state is equal to a basis vector then we say it is a pure state. If a state is any other linear combination of the basis vectors, we say it is a mixed state, or that the state is a superposition of 978-1-5225-2229-4.ch044.m06 and 978-1-5225-2229-4.ch044.m07 (Barenco et al., 1995).

The quantum bit can be measured in the traditional basis where it is equal to the probability of effect for 978-1-5225-2229-4.ch044.m08 in 978-1-5225-2229-4.ch044.m09 direction and the probability of effect for 978-1-5225-2229-4.ch044.m10 in 978-1-5225-2229-4.ch044.m11 direction where α and β must be constrained by Eq. (1) and Figure 1 (Zeng, 2006; Zeng, 2010).

Figure 1.

Classical and quantum bits


Quantum computers can manipulate quantum information where the quantum state can be transformed from a pure or mixed state to another pure or mixed state correspondingly. The transformation can be achieved by applying a unitary linear operation 978-1-5225-2229-4.ch044.m13, where 978-1-5225-2229-4.ch044.m14= 978-1-5225-2229-4.ch044.m15 = I if the quantum state is a single qubit. If we have a pure quantum state 978-1-5225-2229-4.ch044.m16 can be transformed into another pure state 978-1-5225-2229-4.ch044.m17, as well if we have a mixed quantum state978-1-5225-2229-4.ch044.m18 can be transformed into another mixed state 978-1-5225-2229-4.ch044.m19 (Sharbaf, 2009; Stinson, 1995). The unitary transformation operations are defined by (Eq. (2)). 978-1-5225-2229-4.ch044.m20 can be used instead of 978-1-5225-2229-4.ch044.m21 respectively. They’re used to transform 978-1-5225-2229-4.ch044.m22 state at sender(s) side into unreadable form according to the generated original classical message before transmitting it to the receiver.

Complete Chapter List

Search this Book: