Nalazite se na CroRIS probnoj okolini. Ovdje evidentirani podaci neće biti pohranjeni u Informacijskom sustavu znanosti RH. Ako je ovo greška, CroRIS produkcijskoj okolini moguće je pristupi putem poveznice www.croris.hr
izvor podataka: crosbi

Scalable Authentication and Optimal Flooding in a Quantum Network (CROSBI ID 308669)

Prilog u časopisu | izvorni znanstveni rad | međunarodna recenzija

Naomi R. Solomons ; Alasdair I. Fletcher ; Djeylan Aktas ; Natarajan Venkatachalam ; Sören Wengerowsky ; Martin Lončarić ; Sebastian P. Neumann ; Bo Liu ; Željko Samec ; Mario Stipčević et al. Scalable Authentication and Optimal Flooding in a Quantum Network // PRX quantum, 3 (2022), 020311, 18. doi: 10.1103/PRXQuantum.3.020311

Podaci o odgovornosti

Naomi R. Solomons ; Alasdair I. Fletcher ; Djeylan Aktas ; Natarajan Venkatachalam ; Sören Wengerowsky ; Martin Lončarić ; Sebastian P. Neumann ; Bo Liu ; Željko Samec ; Mario Stipčević ; Rupert Ursin ; Stefano Pirandola ; John G. Rarity ; Siddarth Koduru Joshi

engleski

Scalable Authentication and Optimal Flooding in a Quantum Network

The global interest in quantum networks stems from the security guaranteed by the laws of physics. The deployment of quantum networks means facing the challenges of scaling up the physical hardware and, more importantly, of scaling up all other network layers and optimally utilizing network resources. Here, we consider two related protocols and their experimental demonstrations on an eight-user quantum network test bed, and discuss their usefulness with the aid of example use cases. First, we consider an authentication-transfer protocol to manage a fundamental limitation of quantum communication—the need for a preshared key between every pair of users linked together on the quantum network. By temporarily trusting some intermediary nodes for a short period of time (<35 min in our network), we can generate and distribute these initial authentication keys with a very high level of security. Second, when end users quantify their trust in intermediary nodes, our flooding protocol can be used to improve both end-to-end communication speeds and increase security against malicious nodes.

Quantum information ; Quantum optics ; Quantum cryptography ; Information theoy and computation

nije evidentirano

nije evidentirano

nije evidentirano

nije evidentirano

nije evidentirano

nije evidentirano

Podaci o izdanju

3

2022.

020311

18

objavljeno

2691-3399

10.1103/PRXQuantum.3.020311

Povezanost rada

Fizika

Poveznice
Indeksiranost