{"title":"任意拓扑量子密钥分配网络的密钥生成和分发方案分类","authors":"A. Zhilyaev","doi":"10.21293/1818-0442-2021-24-4-33-39","DOIUrl":null,"url":null,"abstract":"Quantum keys created during the quantum key distribution protocol have absolute secrecy due to physical laws and are not susceptible to breaking even with the unlimited computing power of the attacker. However, quantum key distribution systems have a range limit. Quantum key distribution networks based on trusted intermediate nodes are built to overcome the problem of the maximum range. This paper examines the connection of backbone networks with networks of arbitrary topology, introduces criteria for the classification of key generation and distribution schemes, and classifies some schemes according to the criteria introduced.","PeriodicalId":273068,"journal":{"name":"Proceedings of Tomsk State University of Control Systems and Radioelectronics","volume":"200 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Key generation and distribution schemes classification for quantum key distribution networks of arbitrary topology\",\"authors\":\"A. Zhilyaev\",\"doi\":\"10.21293/1818-0442-2021-24-4-33-39\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Quantum keys created during the quantum key distribution protocol have absolute secrecy due to physical laws and are not susceptible to breaking even with the unlimited computing power of the attacker. However, quantum key distribution systems have a range limit. Quantum key distribution networks based on trusted intermediate nodes are built to overcome the problem of the maximum range. This paper examines the connection of backbone networks with networks of arbitrary topology, introduces criteria for the classification of key generation and distribution schemes, and classifies some schemes according to the criteria introduced.\",\"PeriodicalId\":273068,\"journal\":{\"name\":\"Proceedings of Tomsk State University of Control Systems and Radioelectronics\",\"volume\":\"200 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1900-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of Tomsk State University of Control Systems and Radioelectronics\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.21293/1818-0442-2021-24-4-33-39\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of Tomsk State University of Control Systems and Radioelectronics","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.21293/1818-0442-2021-24-4-33-39","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Key generation and distribution schemes classification for quantum key distribution networks of arbitrary topology
Quantum keys created during the quantum key distribution protocol have absolute secrecy due to physical laws and are not susceptible to breaking even with the unlimited computing power of the attacker. However, quantum key distribution systems have a range limit. Quantum key distribution networks based on trusted intermediate nodes are built to overcome the problem of the maximum range. This paper examines the connection of backbone networks with networks of arbitrary topology, introduces criteria for the classification of key generation and distribution schemes, and classifies some schemes according to the criteria introduced.