{"title":"QKD中继模型的一种新方案","authors":"Cuong Le Quoc, P. Bellot","doi":"10.1109/ICCCN.2008.ECP.92","DOIUrl":null,"url":null,"abstract":"We investigate a quasi-trusted QKD relaying model. This is a three-party communication model. Two nodes Alice and Bob want to establish a secret key. However, the distance between them exceeds the limited range of QKD. Carol is a intermediate node that could share QKD links with Alice and Bob. Carol is assumed to be quasi-trusted: she correctly follows the given three-party protocol. However, she may be eavesdropped by the malicious person Eve. We propose two single-photon based protocols that allow Alice, Carol and Bob to achieve the goal. As a result, these protocols could be applied to securely extend up to two times the limited range of QKD without invoking entangled photons.","PeriodicalId":314071,"journal":{"name":"2008 Proceedings of 17th International Conference on Computer Communications and Networks","volume":"33 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"A New Proposal for QKD Relaying Models\",\"authors\":\"Cuong Le Quoc, P. Bellot\",\"doi\":\"10.1109/ICCCN.2008.ECP.92\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"We investigate a quasi-trusted QKD relaying model. This is a three-party communication model. Two nodes Alice and Bob want to establish a secret key. However, the distance between them exceeds the limited range of QKD. Carol is a intermediate node that could share QKD links with Alice and Bob. Carol is assumed to be quasi-trusted: she correctly follows the given three-party protocol. However, she may be eavesdropped by the malicious person Eve. We propose two single-photon based protocols that allow Alice, Carol and Bob to achieve the goal. As a result, these protocols could be applied to securely extend up to two times the limited range of QKD without invoking entangled photons.\",\"PeriodicalId\":314071,\"journal\":{\"name\":\"2008 Proceedings of 17th International Conference on Computer Communications and Networks\",\"volume\":\"33 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2008-11-17\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2008 Proceedings of 17th International Conference on Computer Communications and Networks\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCCN.2008.ECP.92\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 Proceedings of 17th International Conference on Computer Communications and Networks","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCCN.2008.ECP.92","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
We investigate a quasi-trusted QKD relaying model. This is a three-party communication model. Two nodes Alice and Bob want to establish a secret key. However, the distance between them exceeds the limited range of QKD. Carol is a intermediate node that could share QKD links with Alice and Bob. Carol is assumed to be quasi-trusted: she correctly follows the given three-party protocol. However, she may be eavesdropped by the malicious person Eve. We propose two single-photon based protocols that allow Alice, Carol and Bob to achieve the goal. As a result, these protocols could be applied to securely extend up to two times the limited range of QKD without invoking entangled photons.