{"title":"Key generation and distribution schemes classification for quantum key distribution networks of arbitrary topology","authors":"A. Zhilyaev","doi":"10.21293/1818-0442-2021-24-4-33-39","DOIUrl":null,"url":null,"abstract":"Quantum keys created during the quantum key distribution protocol have absolute secrecy due to physical laws and are not susceptible to breaking even with the unlimited computing power of the attacker. However, quantum key distribution systems have a range limit. Quantum key distribution networks based on trusted intermediate nodes are built to overcome the problem of the maximum range. This paper examines the connection of backbone networks with networks of arbitrary topology, introduces criteria for the classification of key generation and distribution schemes, and classifies some schemes according to the criteria introduced.","PeriodicalId":273068,"journal":{"name":"Proceedings of Tomsk State University of Control Systems and Radioelectronics","volume":"200 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of Tomsk State University of Control Systems and Radioelectronics","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.21293/1818-0442-2021-24-4-33-39","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Quantum keys created during the quantum key distribution protocol have absolute secrecy due to physical laws and are not susceptible to breaking even with the unlimited computing power of the attacker. However, quantum key distribution systems have a range limit. Quantum key distribution networks based on trusted intermediate nodes are built to overcome the problem of the maximum range. This paper examines the connection of backbone networks with networks of arbitrary topology, introduces criteria for the classification of key generation and distribution schemes, and classifies some schemes according to the criteria introduced.