Difference between revisions of "Publications/le-quoc.07.ntms"

From LRDE

Line 33: Line 33:
 
show that under some assumptions, one could prevent
 
show that under some assumptions, one could prevent
 
eavesdroppers from sniffing the secrets with an arbitrarily
 
eavesdroppers from sniffing the secrets with an arbitrarily
large probability.<nowiki>}</nowiki>,
+
large probability.<nowiki>}</nowiki>
lrdekeywords = <nowiki>{</nowiki>Software engineering<nowiki>}</nowiki>
 
 
<nowiki>}</nowiki>
 
<nowiki>}</nowiki>
   

Revision as of 18:22, 4 November 2013

Abstract

In large Quantum Key Distribution (QKD)-based networksintermediate nodes are necessary because of the short length of QKD links. They have tendency to be used more than classical networks. A realistic assumption is that there are eavesdropping operations in these nodes without knowledge of legitimate network participants. We develop a QKD-based network framework. We present a percolation-based approach to discuss about conditions of extremely high secret key transmission. We propose also an adaptive stochastic routing algorithm that helps on protecting keys from reasonable eavesdroppers in a dense QKD network. We show that under some assumptions, one could prevent eavesdroppers from sniffing the secrets with an arbitrarily large probability.


Bibtex (lrde.bib)

@InProceedings{	  le-quoc.07.ntms,
  author	= {Cuong Le Quoc and Patrick Bellot and Akim Demaille},
  title		= {On the security of quantum networks: a proposal framework
		  and its capacity},
  booktitle	= {Proceedings of the 2007 International Conference on New
		  Technologies, Mobility and Security (NTMS'07)},
  year		= 2007,
  address	= {Paris, France},
  month		= may,
  abstract	= {In large Quantum Key Distribution (QKD)-based networks,
		  intermediate nodes are necessary because of the short
		  length of QKD links. They have tendency to be used more
		  than classical networks. A realistic assumption is that
		  there are eavesdropping operations in these nodes without
		  knowledge of legitimate network participants. We develop a
		  QKD-based network framework. We present a percolation-based
		  approach to discuss about conditions of extremely high
		  secret key transmission. We propose also an adaptive
		  stochastic routing algorithm that helps on protecting keys
		  from reasonable eavesdroppers in a dense QKD network. We
		  show that under some assumptions, one could prevent
		  eavesdroppers from sniffing the secrets with an arbitrarily
		  large probability.}
}