Reference Hub3
Quantum Key Distribution Networks

Quantum Key Distribution Networks

Sufyan T. Faraj Al-Janabi
ISBN13: 9781466658080|ISBN10: 1466658088|EISBN13: 9781466658097
DOI: 10.4018/978-1-4666-5808-0.ch003
Cite Chapter Cite Chapter

MLA

Al-Janabi, Sufyan T. Faraj. "Quantum Key Distribution Networks." Multidisciplinary Perspectives in Cryptology and Information Security, edited by Sattar B. Sadkhan Al Maliky and Nidaa A. Abbas, IGI Global, 2014, pp. 61-96. https://doi.org/10.4018/978-1-4666-5808-0.ch003

APA

Al-Janabi, S. T. (2014). Quantum Key Distribution Networks. In S. Sadkhan Al Maliky & N. Abbas (Eds.), Multidisciplinary Perspectives in Cryptology and Information Security (pp. 61-96). IGI Global. https://doi.org/10.4018/978-1-4666-5808-0.ch003

Chicago

Al-Janabi, Sufyan T. Faraj. "Quantum Key Distribution Networks." In Multidisciplinary Perspectives in Cryptology and Information Security, edited by Sattar B. Sadkhan Al Maliky and Nidaa A. Abbas, 61-96. Hershey, PA: IGI Global, 2014. https://doi.org/10.4018/978-1-4666-5808-0.ch003

Export Reference

Mendeley
Favorite

Abstract

The aim of this chapter is to emphasize the multidisciplinary nature of the research in the field of Quantum Key Distribution Networks (QKDNs). Such networks consist of a number of nodes that can perform security protocols protected by some basic laws of physics. The operation of QKDNs mainly requires the integration of Quantum Key Distribution (QKD) protocols with the already-existing network security infrastructures. The authors report on the current state-of-the-art in the field and give some recommendations for future research. As computer simulation can be very useful in dealing with advanced technology subjects like QKDNs, they outline a simple and efficient modeling and simulation approach for various QKDN configurations. Then, the issue of unconditionally secure authentication of the public channel in QKD is considered. This issue is of crucial importance from both theoretical and practical sides. In this context, the proposed hybrid authentication strategy is reviewed and an authenticated version of the Bennett-Brassard-84 (BB84) QKD protocol based on this strategy is described. Next, a novel extension of the SSL protocol for QKDN settings, which the authors call Quantum SSL (QSSL), is explained. Finally, the chapter is concluded.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.