Next Article in Journal
Fuzzy Evaluation of Crowd Safety Based on Pedestrians’ Number and Distribution Entropy
Next Article in Special Issue
Surface-Codes-Based Quantum Communication Networks
Previous Article in Journal
Enhancing Edge Attack Strategy via an OWA Operator-Based Ensemble Design in Real-World Networks
Previous Article in Special Issue
Improving Underwater Continuous-Variable Measurement-Device-Independent Quantum Key Distribution via Zero-Photon Catalysis
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Perspective

On Global Quantum Communication Networking

by
Ivan B. Djordjevic
Department of Electrical and Computer Engineering, University of Arizona, Tucson, AZ 85721, USA
Entropy 2020, 22(8), 831; https://doi.org/10.3390/e22080831
Submission received: 29 June 2020 / Revised: 25 July 2020 / Accepted: 28 July 2020 / Published: 29 July 2020

Abstract

:
Research in quantum communications networks (QCNs), where multiple users desire to generate or transmit common quantum-secured information, is still in its beginning stage. To solve for the problems of both discrete variable- and continuous variable-quantum key distribution (QKD) schemes in a simultaneous manner as well as to enable the next generation of quantum communication networking, in this Special Issue paper we describe a scenario where disconnected terrestrial QCNs are coupled through low Earth orbit (LEO) satellite quantum network forming heterogeneous satellite–terrestrial QCN. The proposed heterogeneous QCN is based on the cluster state approach and can be used for numerous applications, including: (i) to teleport arbitrary quantum states between any two nodes in the QCN; (ii) to enable the next generation of cyber security systems; (iii) to enable distributed quantum computing; and (iv) to enable the next generation of quantum sensing networks. The proposed QCNs will be robust against various channel impairments over heterogeneous links. Moreover, the proposed QCNs will provide an unprecedented security level for 5G+/6G wireless networks, Internet of Things (IoT), optical networks, and autonomous vehicles, to mention a few.

Graphical Abstract

1. Introduction

Quantum communication (QuCom) employs quantum information theory concepts, in particular the no-cloning theorem and the theorem of indistinguishability of arbitrary quantum states, to implement the distribution of keys with verifiable security, commonly referred to as quantum key distribution (QKD), where security is guaranteed by the fundamental laws of physics as opposed to unproven mathematical assumptions employed in computational security-based cryptography [1,2,3]. Despite the appealing features of QuComs, there are some fundamental and technical challenges that need to be addressed prior to its widespread application. For instance, both the rate and distance of QuCom are fundamentally limited by channel loss, which is specified by the rate-loss tradeoff. To overcome the rate-distance limit of discrete variable (DV)-QKD protocols, two predominant approaches have been pursued recently: (i) the development of quantum relays and (ii) the employment of trusted relays. Quantum relays require the use of long-duration quantum memories and high-fidelity entanglement distillation [4], which are not yet widely available. On the other hand, the trusted-relay methodology assumes that the relay between two users can be trusted [5]; unfortunately, this assumption is difficult to verify in practice. The measurement device independent (MDI)-QKD approach [6] was able to close the detection loopholes; however, its secret-key rate (SKR) is still bounded by O(T)-dependence (with T standing for transmissivity). Recently, twin-field (TF) QKD has been proposed to overcome the rate-distance limit [7], whose SKR scales with the square-root of transmittance, which represents a promising approach to extend the transmission distance. Another key limitation of DV-QKD is the deadtime of single-photon detectors (SPDs), which limits the baud rate and consequently the SKRs. To solve for this problem, a continuous variable (CV)-QKD can be used instead [1,8,9,10], which employs homodyne/heterodyne detection instead and thus does not exhibit the SPDS’ deadtime limitation problem. In particular, the discrete modulation (DM)-based CV-QKD protocols offer much better reconciliation efficiency compared to that of Gaussian modulation (GM)-based CV-QKD protocols. Unfortunately, the security proofs of DM-based CV-QKD schemes for collective and coherent attacks are still incomplete. To overcome key challenges for DV-QKD, such as low SKR values and limited distance, as well as for DM-based CV-QKD, such as incompleteness of security proofs, the following approaches have been proposed in our recent papers: (1) discretized GM (DGM)-CV-QKD [11], (2) optimized CV-QKD [12], and (3) hybrid DV-CV QKD [13]. An alternative approach to QKD is post-quantum cryptography (PQC) [14]. PQC is typically referred to by various cryptographic algorithms that are thought to be secure against any quantum computer-based attack. Unfortunately, PQC is also based on unproven assumptions and some of the PQC algorithms will be broken in the future by developing more sophisticated quantum algorithms.
Modern classical communication networks consist of multiple nodes connected by various types of channels, including free-space optical (FSO) links, optical fibers, ground–satellite links, wireless RF, and coaxial cables. Such a heterogeneous architecture would be equally important for QCNs, as quantum nodes may access a QCN via different kinds of channels. Indeed, quantum communications have been individually validated in free-space, optical fibers, and between a satellite and a ground station, but a combined heterogeneous QCN employing multiple types of channels remains elusive. Unlike in the point-to-point communication case, the fundamental quantum communication rate limits are not well known. Several QKD testbeds have been reported so far, including the DARPA QKD network [15], Tokyo QKD network [16], and secure communication based on quantum cryptography (SECOQC) network [17]. The QKD can also be used to establish QKD-based campus-to-campus virtual private networks employing the IPsec protocol [18] as well as to establish the network setup for using transport-layer security (TLS) based on QKD [19]. However, all of these networks employ the dark fiber infrastructure. Quantum communication over satellite links has already been demonstrated; see for example [20,21].
In this Special Issue paper, we propose to implement the multipartite QCN by employing the cluster state-based concept [22]. The proposed quantum network can be used to: (i) perform distributed quantum computing, (ii) teleport quantum states between any two nodes in the network, and (iii) enable the next generation of cyber security systems. The cluster states can be described by using the stabilizer formalism and as such they can easily be certified by simple syndrome measurements. In this formalism, the cluster states can be interpreted as codewords of a corresponding quantum error correction code, while corresponding errors can be corrected for by simple syndrome decoding, among others. By performing simple Y and Z measurements on properly selected nodes we can straightforwardly establish the Einstein–Podolsky–Rosen (EPR) pair between any two nodes in the network. Moreover, multiple EPR pairs can be established simultaneously. We further propose a cluster state-based quantum network of satellites that enables global coverage. The quantum satellite network would be composed of quantum subnetworks comprised of low Earth orbit (LEO) satellites. Some of these LEO satellite-based quantum subnetworks can be connected to a subnetwork of medium Earth orbit (MEO)/ geostationary orbit (GEO) satellites. The LEO satellites should be used to interconnect terrestrial cluster state-based quantum networks. This quantum global network can also be used to distribute the entangled states for quantum sensing applications and to enable distributed quantum computing on a global scale. SDN concepts should be used to reconfigure the proposed QCN.
The paper is organized as follows. In Section 2, we describe the proposed cluster states-based QCN concept. In Section 3, we describe potential approaches to extend the transmission distance between QCN nodes. In Section 4, we describe the QCN that is currently under development at the University of Arizona. Finally, in Section 5, we provide some relevant concluding remarks.

2. Proposed Cluster States-Based Quantum Communications Networks

To enable the next generation of quantum communication networking, we envision a scenario in which disconnected terrestrial cluster states-based QCNs are coupled through the LEO satellite (cluster state) quantum network, thus providing global coverage. The proposed quantum network will be highly robust against turbulence encountered by FSO links, as the envisioned quantum satellite network will communicate to ground nodes only through the LEO satellite-to-ground links, exhibiting a vertical downlink profile through vacuum followed by a turbulence layer with strength that is altitude-dependent.
The cluster states belong to the class of the graph states, which also include Bell states, Greenberger–Horne–Zeilinger (GHZ) states, W-states, and various entangled states used in quantum error correction [22]. When the cluster C is defined as a connected subset on a d-dimensional lattice, it obeys the set of eigenvalue equations S a | ϕ C = | ϕ C ,   S a = X a b N ( a ) Z b , where Sa are stabilizer operators with N(a) denoting the neighborhood of aC. To create a 2-D cluster state, the approach proposed by Gilbert et al. [23] is applicable; it employs linear states, generated by spontaneous parametric down conversion (SPDC), local unitaries, and type I fusion to create the desired 2-D cluster state. The type I fusion is illustrated in Figure 1, based on [23]. The vertical photon is reflected by the polarization beam splitter (PBS), while the horizontal photon is transmitted through the PBS. Given the probabilistic nature of the PBS, with the photons present at both the left and right input ports, there are four possible outcomes, each occurring with probability 0.25. Two outcomes correspond to the desired fusion operators, and the success probability of the fusion is 0.5. When a single photon is detected by the detector, a successful fusion is declared. The procedure to create the T-shape cluster state is described in Figure 2. To create the box-cluster state, we start with a four-qubit linear cluster state, re-label the qubits 2 and 3, and apply the Hadamard gates to qubits 2 and 3, which effectively establish the bond between qubits 1 and 4. Namely, relabeling the qubits is equivalent to the SWAP gate action. To create the box-on-chain cluster state, we start with a longer linear chain of qubits and apply the same approach as in a box-state creation. Two T-shape cluster states can be fused together to get the H-shape cluster state, etc.
Once the 2-D cluster state of nodes is created, we can use properly selected Y and Z measurements to create the EPR pair between any two arbitrary nodes in the quantum network. As a reminder, the role of the Z measurement is to remove the particular node (qubit) from the cluster, whereas the role of Y measurement is to remove a given node and link neighboring nodes. As an illustration, the 2-D cluster state with nine nodes is shown in Figure 3. Let us assume that we are interested in establishing EPR pairs between nodes 3 and 7 as well as nodes 1 and 9. We first perform Y measurements in the following order: Y8, Y5, and Y6 to get the intermediate stage. We then perform Z-measurement on node 2 and Y measurement on node 4 to get the two desired EPR pairs. Given that the 2-D cluster state is universal, it is possible to use the same network architecture for both QCN and distributed quantum computing. We also imagine the scenario in which each node is equipped with multiple qubits, wherein several layers of 2-D cluster states are active at the same time, which will allow us to simultaneously perform QCN and distributed quantum computing. Moreover, when several 2-D cluster states are run in parallel on the same set of network nodes, we will be able to reconfigure the QCN as needed. This can be done with the help of the SDN concept. The SDN has been introduced to separate the control plane and data plane, manage network services through the abstraction of higher-level functionality, and implement new applications and algorithms efficiently. It has already been studied to enable the coexistence of classical and quantum communication channels. Our SDN-based QCN architecture is composed of three layers, namely an application layer, a control layer, and a QCN layer. Users send their requests from the application layer with the help of the northbound interface to the SDN controller. The SDN controller allocates the QCN resources with the help of its global map through the southbound interface. The QCN layer would be composed of dense wavelength-division multiplexing (DWDM) FSO/single-mode fiber (SMF)/few-mode fiber (FMF) links and QCN nodes. Any two nodes in the QCN can communicate through either through a dedicated SMF/FSO/FMF link or through a wavelength channel. The SDN control should also determine sequence of measurements to be performed in order to establish desired EPR pairs. To deal with time-varying channel conditions over heterogeneous links, we should adapt the system configuration based on both application requirement and link condition.

3. Extending the Distance between Nodes in QCN

The DV-QKD can be used to build QKD networks, as discussed in the introduction. Unfortunately, the DV-QKD is affected by the deadtime of SPDs. Moreover, even if Eve cannot get the key because DV-QKD is used, she can prevent parties from creating secure keys, which is similar to the Denial of Service (DoS) attack. Further, since SKRs for DV-QKD are low, the quantum key pool, storing the secure keys, will often be empty, hampering the operation of QKD networks. To solve for this problem we propose to use the hybrid QKD-PQC protocols, in which QKD is used for raw key transmission and PQC in information reconciliation to reduce the leakage during the error reconciliation stage, which is illustrated in Figure 4. As mentioned in the introduction, the PQC is typically referred to in various cryptographic algorithms that are thought to be secure against any quantum computer-based attack. Unfortunately, the PQC is also based on unproven assumptions and some of the QPC algorithms might be broken in the future by developing advanced quantum algorithms. For this reason we propose to use the PQC algorithms only in the information reconciliation phase so as to limit the leakage due to transmission of parity bits over an authenticated classical channel (in conventional QKD). The quantum algorithms to be developed (not yet known), which will be capable of breaking the PQC algorithms, will have certain complexity expressed in terms of the number of operations L. By ensuring that the number of parity bits N–K is shorter than the number of secure PQC bits log2L, the proposed cryptographic scheme will be secure. Evidently, the proposed cryptographic scheme exploits the complexity of corresponding quantum algorithms used to break the PQC protocols. Given that the McEliece cryptosystem based on quasi cyclic (QC)-low-density parity-check (LDPC) coding is straightforward to implement as shown in [24], whereas the corresponding LDPC encoders and decoders have been already implemented in field-programmable gate array (FPGA) [25], it represents an excellent candidate to be used for the transmission of parity bits in the TF-QKD scheme. As an illustration, the secret fraction that can be achieved with the BB84 protocol is lower bounded by [1]:
r = q ( Z ) [ 1 h 2 ( e ( X ) ) ] q ( Z ) f e h 2 ( e ( Z ) ) ,
where q ( Z ) denotes the probability of declaring a successful result when Alice sent a single-photon and Bob detected it in the Z-basis, fe denotes the error correction inefficiency (fe ≥ 1), e(X) [e(Z)] denotes the QBER in the X-basis (Z-basis), and h2(x) is the binary entropy function h 2 ( x ) = x log 2 ( x ) ( 1 x ) log 2 ( 1 x ) . The second term q(Z)h2[e(X)] denotes the amount of information Eve was able to learn during the raw key transmission, and this information can be removed from the final key during the privacy amplification phase. The third term q(Z)fe h2[e(Z)] represents the amount of information revealed during the error correction stage. By sending the parity bits over the PQC channel this term can be effectively eliminated and the SKR can be increased.
By using this approach, as illustrated in Figure 5, the transmission distance between two nodes in QCN can be significantly extended. Here we provide comparisons of the joint TF-QKD-McEliece encryption scheme against the phase-matching (PM) TF-QKD protocol introduced in [26], the MDI-QKD protocol [6], and the decoy-state-based BB84 protocol [27]. The system parameters are selected as follows: the detector efficiency ηd = 0.25, reconciliation inefficiency fe = 1.15, the dark count rate pd = 8 × 10−8, the misalignment error ed = 1.5%, and the number of phase slices for PM TF-QKD is set to M = 16. Regarding the transmission medium, it is assumed that recently reported ultra-low-loss fiber of attenuation 0.1419 dB/km (at 1560 nm) is employed [28]. In the same Figure, the Pirandola–Laurenza–Ottaviani–Banchi (PLOB) bound on a linear key rate is provided as well. Both PM TF-QKD and joint TF-QKD-McEliece encryption schemes outperform the decoy-state BB84 protocol for distances larger than 162 km, while simultaneously outperforming the MDI-QKD protocol for all distances, and exceed the PLOB bound at a distance of 322 km. The PM TF-QKD protocol can achieve the maximum distance of 623 km. The proposed joint TF-QKD-McEliece encryption scheme is able to achieve the distance of even 1127 km, thus significantly outperforming all other schemes. Even though the operating wavelength was 1560 nm, other suitable wavelengths such as 2 μm and 3.9 μm can be used as well.
Now, by connecting the base stations to the nodes in the proposed QCNs, we can provide the unconditional security to the 5G+/6G wireless networks. By organizing the base stations in a quantum optical mesh network and employing the proposed hybrid QKD-PQC concept we can provide unconditional security to a large number of users. The Internet of Things (IoT) architecture will comprise widely distributed nodes connected via different types of channels to enable new functionalities in communication, sensing, and computing. Communication security in such a giant network is of paramount importance. Our proposed QCNs will underpin the unconditional physical-layer security of the IoT given that it will allow any two arbitrary nodes to securely transmit data at a high rate via an optical link. Critically, the security of such a network will not rest upon the trusted-node assumption, and a compromised node will not affect the security of other nodes. As such, the proposed QCNs will lead to a substantially stronger security level for the IoT. To enable security for future 6G wireless networks at a reasonable cost, the proposed joint satellite–terrestrial QCN can be based on the Cubesat satellites.
For satellite-to-satellite quantum communications, in addition to the proposed hybrid QKD-PQC concept, it also possible to employ our recent restricted eavesdropping concept [29], which offers a significant increase in SKRs. This concept was presented in the ICTON 2020 paper [30]. Alternatively, the hybrid QKD can also be applied [13].

4. QCN under Development

The terrestrial QCN to be developed at the University of Arizona is shown in Figure 6; it will exploit the existing NSF MRI INQUIRE quantum network, representing the quantum hub (QuHub) to share entangled photons and SPDs among different labs across the campus. The outdoor FSO bidirectional link, connecting the Electrical and Computer Engineering and Optical Sciences buildings, has already been established, with the FSO transceiver shown in Figure 7. We will also create the mesh network as well as the hybrid network composed of mesh, optical star, and ring network segments. The deployed heterogeneous QCNs will allow us to test novel quantum-networking theories and develop experimental tools for counteracting various channel impairments. To deal with atmospheric turbulence effects, the adaptive optics (AO) subsystem, composed of a wavefront sensor (WFS) and deformable mirror will be used. The AO will be combined with adaptive LDPC coding.
To provide global coverage, we envision a scenario in which disconnected terrestrial QCNs, such as the one shown in Figure 6, are coupled through the LEO satellite quantum network. We have recently shown that a Bessel–Gaussian (BG) beam, carrying an orbital angular momentum mode, exhibits better tolerance to atmospheric turbulence effects compared to Gaussian beams for distances up to a few kilometers [31]. However, for LEO satellite-to-ground QuCom links, BG beams diffract much faster than Gaussian beams for such long-distance applications. Hence, we need to use pure Bessel beams to overcome this problem, as we have shown in our recent paper [32]. To enable robustness against turbulence encountered by FSO links, the envisioned quantum satellite QCN should communicate to ground nodes only through the LEO satellite-to-ground links, exhibiting a vertical downlink profile through vacuum followed by a turbulence layer with altitude-dependent strength. In principle. MEO/GEO satellite QCNs can be created above LEO QCNs to provide the planetary coverage.

5. Concluding Remarks

To enable the next generation of quantum-enabled cyber security systems, we proposed a quantum network of satellites that will provide the global coverage. The quantum satellite network will be composed of quantum subnetworks comprised of LEO satellites. Some of these LEO satellite-based quantum subnetworks will be connected to a subnetwork of MEO satellites. The MEO satellite subnetworks will then be interconnected to the global network of GEO satellites. The LEO/MEO satellites will also be used to interconnect terrestrial quantum networks. Each quantum communication subnetwork will be based on the cluster state concept. This quantum global network will allow us to establish EPR pairs between any two nodes in the global network. It can also be used to distribute the entangled states for quantum-sensing applications and to enable distributed quantum computing on a global scale.

Funding

This research received no external funding.

Conflicts of Interest

The author declares no conflict of interest.

References

  1. Djordjevic, I.B. Physical-Layer Security and Quantum Key Distribution; Springer Nature Switzerland: Cham, Switzerland, 2019. [Google Scholar]
  2. Pljonkin, A.P. Features of the Photon Pulse Detection Algorithm in the Quantum Key Distribution System. In Proceedings of the 2017 International Conference on Cryptography, Security and Privacy (ICCSP ’17), Wuhan, China, 17–19 March 2017; Association for Computing Machinery: New York, NY, USA, 2017; pp. 81–84. [Google Scholar] [CrossRef] [Green Version]
  3. Pljonkin, A.P. Vulnerability of the synchronization process in the quantum key distribution system. Int. J. Cloud Appl. Comput. 2019, 9, 4. [Google Scholar] [CrossRef] [Green Version]
  4. Duan, L.-M.; Lukin, M.; Cirac, J.I.; Zoller, P. Long-distance quantum communication with atomic ensembles and linear optics. Nature 2001, 414, 413–418. [Google Scholar] [CrossRef] [Green Version]
  5. Qiu, J. Quantum communications leap out of the lab. Nature 2014, 508, 441–442. [Google Scholar] [CrossRef] [Green Version]
  6. Lo, H.-K.; Curty, M.; Qi, B. Measurement-device-independent quantum key distribution. Phys. Rev. Lett. 2012, 108, 130503. [Google Scholar] [CrossRef] [Green Version]
  7. Lucamarini, M.; Yuan, Z.L.; Dynes, J.F.; Shields, A.J. Overcoming the rate–distance limit of quantum key distribution without quantum repeaters. Nature 2018, 557, 400–403. [Google Scholar] [CrossRef]
  8. Fossier, S.; Diamanti, E.; Debuisschert, T.; Tualle-Brouri, R.; Grangier, P. Improvement of continuous-variable quantum key distribution systems by using optical preamplifiers. J. Phys. B 2009, 42, 114014. [Google Scholar] [CrossRef] [Green Version]
  9. Qu, Z.; Djordjevic, I.B. Four-dimensionally multiplexed eight-state continuous-variable quantum key distribution over turbulent channels. IEEE Photonics J. 2017, 9, 7600408. [Google Scholar] [CrossRef]
  10. Ralph, T.C. Continuous variable quantum cryptography. Phys. Rev. A 1999, 61, 010303. [Google Scholar] [CrossRef] [Green Version]
  11. Djordjevic, I.B. On the Discretized Gaussian Modulation (DGM)-based Continuous Variable-QKD. IEEE Access 2019, 7, 65342–65346. [Google Scholar] [CrossRef]
  12. Djordjevic, I.B. Optimized-Eight-State CV-QKD Protocol Outperforming Gaussian Modulation Based Protocols. IEEE Photonics J. 2019, 11, 4500610. [Google Scholar] [CrossRef]
  13. Djordjevic, I.B. Hybrid QKD Protocol Outperforming both DV- and CV-QKD Protocols. IEEE Photonics J. 2020, 12, 7600108. [Google Scholar] [CrossRef]
  14. Bernstein, D.J.; Buchmann, J.; Dahmen, E. Post-Quantum Cryptography; Springer: Berlin, Germany, 2009. [Google Scholar]
  15. Elliott, C.; Colvin, A.; Pearson, D.; Pikalo, O.; Schlafer, J.; Yeh, H. Current status of the DARPA quantum network (Invited Paper). In Proceedings of the SPIE 5815, Quantum Information and Computation III, Defense and Security, Orlando, FL, USA, 25 May 2005. [Google Scholar]
  16. Sasaki, M.; Fujiwara, M.; Ishizuka, H.; Klaus, W.; Wakui, K.; Takeoka, M.; Miki, S.; Yamashita, T.; Wang, Z.; Tanaka, A.; et al. Field test of quantum key distribution in the Tokyo QKD Network. Opt. Express 2011, 19, 10387–10409. [Google Scholar] [CrossRef] [PubMed]
  17. Alléaume, R.; Branciard, C.; Bouda, J.; Debuisschert, T.; Dianati, M.; Gisin, N.; Godfrey, M.; Grangier, P.; Länger, T.; Lütkenhaus, N.; et al. Using quantum key distribution for cryptographic purposes. J. Theor. Comput. Sci. 2014, 560, 62–81. [Google Scholar] [CrossRef]
  18. Nagayama, S.; Van Meter, R. Internet-Draft: IKE for IPsec with QKD. 2009. Available online: https://tools.ietf.org/html/draft-nagayama-ipsecme-ipsec-with-qkd-01 (accessed on 28 July 2020).
  19. Mink, A.; Frankel, S.; Perlner, R. Quantum Key Distribution (QKD) and Commodity Security Protocols: Introduction and Integration. Intern. J. Netw. Secur. Appl. 2009, 1, 101–112. [Google Scholar]
  20. Yin, J.; Cao, Y.; Li, Y.H.; Liao, S.K.; Zhang, L.; Ren, J.G.; Cai, W.Q.; Liu, W.Y.; Li, B.; Dai, H.; et al. Satellite-based entanglement distribution over 1200 kilometers. Science 2017, 356, 1140–1144. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  21. Dequal, D.; Vallone, G.; Bacco, D.; Gaiarin, S.; Luceri, V.; Bianco, G.; Villoresi, P. Experimental single-photon exchange along a space link of 7000 km. Phys. Rev. A 2016, 93, 010301. [Google Scholar] [CrossRef] [Green Version]
  22. Briegel, H.J. Cluster States. In Compendium of Quantum Physics; Greenberger, D., Hentschel, K., Weinert, F., Eds.; Springer: Berlin/Heidelberg, Germany, 2009; pp. 96–105. [Google Scholar]
  23. Gilbert, G.; Hamrick, M.; Weinstein, Y.S. Efficient construction of photonic quantum-computational clusters. Phys. Rev. A 2006, 73, 064303. [Google Scholar] [CrossRef] [Green Version]
  24. Baldi, M.; Bianchi, M.; Chiaraluce, F. Security and complexity of the McEliece cryptosystem based on QC LDPC codes. IET Inf. Secur. 2013, 7, 212–220. [Google Scholar] [CrossRef] [Green Version]
  25. Sun, X.; Zou, D.; Qu, Z.; Djordjevic, I.B. Run-time reconfigurable adaptive LDPC coding for optical channels. Opt. Express 2018, 26, 29319–29329. [Google Scholar] [CrossRef]
  26. Ma, X.; Zeng, P.; Zhou, H. Phase-matching quantum key distribution. Phys. Rev. X 2018, 8, 031043. [Google Scholar] [CrossRef] [Green Version]
  27. Lo, H.-K.; Ma, X.; Chen, K. Decoy state quantum key distribution. Phys. Rev. Lett. 2005, 94, 230504. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  28. Tamura, Y.; Sakuma, H.; Morita, K.; Suzuki, M.; Yamamoto, Y.; Shimada, K.; Honma, Y.; Sohma, K.; Fujii, T.; Hasegawa, T.; et al. The First 0.14-dB/km loss optical fiber and its impact on submarine transmission. J. Lightw. Technol. 2018, 36, 44–49. [Google Scholar] [CrossRef]
  29. Pan, Z.; Seshadreesan, K.P.; Clark, W.; Adcock, M.R.; Djordjevic, I.B.; Shapiro, J.H.; Guha, S. Secret Key Distillation over a Pure Loss Quantum Wiretap Channel under Restricted Eavesdropping. In Proceedings of the 2019 IEEE International Symposium on Information Theory (ISIT 2019), Paris, France, 7–12 July 2019; pp. 3032–3036. [Google Scholar]
  30. Pan, Z.; Djordjevic, I.B. Security of Satellite-Based CV-QKD under Realistic Assumptions. In Proceedings of the 22nd International Conference on Transparent Optical Networks ICTON 2020, Bari, Italy, 19–23 July 2020. [Google Scholar]
  31. Wang, T.-L.; Gariano, J.; Djordjevic, I.B. Employing Bessel-Gaussian Beams to Improve Physical-Layer Security in Free-Space Optical Communications. IEEE Photonics J. 2018, 10, 7907113. [Google Scholar] [CrossRef]
  32. Wang, T.-L.; Djordjevic, I.B.; Nagel, J. Laser Beam Propagation Effects on Secure Key Rates for Satellite-to-Ground Discrete Modulation CV-QKD. Appl. Opt. 2019, 58, 8061–8068. [Google Scholar] [CrossRef]
Figure 1. Illustrating the type I fusion process. PBS: polarization beam splitter.
Figure 1. Illustrating the type I fusion process. PBS: polarization beam splitter.
Entropy 22 00831 g001
Figure 2. Gilbert’s approach to create the T-shape cluster state.
Figure 2. Gilbert’s approach to create the T-shape cluster state.
Entropy 22 00831 g002
Figure 3. Establishing EPR pairs between nodes 1 and 9 as well as between nodes 3 and 7.
Figure 3. Establishing EPR pairs between nodes 1 and 9 as well as between nodes 3 and 7.
Entropy 22 00831 g003
Figure 4. Illustration of post-quantum cryptography-based information reconciliation.
Figure 4. Illustration of post-quantum cryptography-based information reconciliation.
Entropy 22 00831 g004
Figure 5. Proposed hybrid QKD-PQC scheme against MDI-QKD and TF-QKD in terms of secret-key rate vs. distance, assuming that ultra-low loss fiber is used.
Figure 5. Proposed hybrid QKD-PQC scheme against MDI-QKD and TF-QKD in terms of secret-key rate vs. distance, assuming that ultra-low loss fiber is used.
Entropy 22 00831 g005
Figure 6. Terrestrial quantum communication network to be developed at the University of Arizona.
Figure 6. Terrestrial quantum communication network to be developed at the University of Arizona.
Entropy 22 00831 g006
Figure 7. Free-space optical transceiver used in outdoor FSO link.
Figure 7. Free-space optical transceiver used in outdoor FSO link.
Entropy 22 00831 g007

Share and Cite

MDPI and ACS Style

Djordjevic, I.B. On Global Quantum Communication Networking. Entropy 2020, 22, 831. https://doi.org/10.3390/e22080831

AMA Style

Djordjevic IB. On Global Quantum Communication Networking. Entropy. 2020; 22(8):831. https://doi.org/10.3390/e22080831

Chicago/Turabian Style

Djordjevic, Ivan B. 2020. "On Global Quantum Communication Networking" Entropy 22, no. 8: 831. https://doi.org/10.3390/e22080831

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop