Affiliation:
1. Department of Science and Technology, Faculty of Science and Technology, University of Tamanghasset, Tamanghasset, Algeria
2. Materials and Energy Research Laboratory University of Tamanghasset, Tamanghasset, Algeria
Abstract
The Quantum Key Distribution (QKD) network approach has emerged as a promising solution and has garnered significant interest across various domains. QKD networks can be broadly categorized into two main types: those based on measurement-device-dependent (MDD) protocols and those based on measurement-device-independent (MDI) protocols. A novel network scheme is proposed combining these two protocols to guarantee end-to-end secure communication. It comprises two interconnected networks — the first uses a measurement-device-dependent protocol to connect routers with nearby nodes, while the second employs a measurement-device-independent protocol to interconnect the routers. In the first network, the process begins with Alice (Router) generating two types of weak quantum signals — the first has intensity, frequency and polarization or phase randomly varied, while the second with different delay times. Alice randomly transmits either signal states carrying information or decoy states with varying properties to the receivers (Bobs) over the quantum channels. She also sends a synchronization signal along with the quantum signals. At the receiver end, the synchronization pulse timestamps the incoming quantum signals. Each Bob then randomly shifts the frequencies of the received signals and measures their phase/polarization of the first signal and measures the delay times of the second signal. The secret key is derived by combining the frequency, the delay time and the phase/polarization information of the quantum signals, resulting in longer key lengths. Encoding information across multiple degrees of freedom enables extended key generation for secure communication. However, between the routers, MDI-QKD protocols are used to securely share the keys. This hybrid approach aims to ensure secure end-to-end communication across the network.
Publisher
World Scientific Pub Co Pte Ltd