z-logo
open-access-imgOpen Access
Security analysis of quantum key distribution on passive optical networks
Author(s) -
Kyongchun Lim,
Hyunseok Ko,
Changho Suh,
June-Koo Kevin Rhee
Publication year - 2017
Publication title -
optics express
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 1.394
H-Index - 271
ISSN - 1094-4087
DOI - 10.1364/oe.25.011894
Subject(s) - quantum key distribution , bb84 , computer science , key (lock) , protocol (science) , computer network , quantum cryptography , key generation , computer security , encryption , photon , physics , quantum , optics , quantum information , alternative medicine , pathology , quantum mechanics , medicine
Needs for providing security to end users have brought installation of quantum key distribution (QKD) in one-to-many access networks such as passive optical networks. In the networks, a presence of optical power splitters makes issues for secure key rate more important. However, researches for QKD in access networks have mainly focused on implementation issues rather than protocol development for key rate enhancement. Since secure key rate is theoretically limited by a protocol, researches without protocol development cannot overcome the limit of secure key rate given by a protocol. This brings need of researches for protocol development. In this paper, we provide a new approach which provides secure key rate enhancement over the conventional protocol. Specifically, we propose the secure key rate formula in a passive optical network by extending the secure key rate formula based on the decoy-state BB84 protocol. For a passive optical network, we provide a way that incorporates cooperation across end users. Then, we show that the way can mitigate a photon number splitting (PNS) attack which is crucial in an well known decoy BB84 protocol. Especially, the proposed scheme enables multi-photon states to serve as secure keys unlike the conventional decoy BB84 protocol. Numerical simulations demonstrate that our proposed scheme outperforms the decoy BB84 protocol in secure key rate.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here