2020
DOI: 10.1002/que2.31
|View full text |Cite
|
Sign up to set email alerts
|

Design and analysis of random multiple access quantum key distribution

Abstract: Summary This article proposes a potential application of quantum key distribution in multiuser networks. In modern networks, variety of multiple access technologies are used for multiuser access purposes. In this article, we focus on a type of widely used media access control protocol—carrier‐sense multiple access (CSMA) and analyze the use of carrier‐sense multiple access with collision avoidance (CSMA/CA) for the quantum key distribution in the network. The quantum key generation is based on a successful exp… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
25
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
7

Relationship

1
6

Authors

Journals

citations
Cited by 23 publications
(25 citation statements)
references
References 25 publications
(70 reference statements)
0
25
0
Order By: Relevance
“…• QKD protocols based on polarized 58,59 or entangled photons, 60,61 which are widely known and used, however, they involve a series of loopholes in key managements that degrade their performance in practical applications. In fact, these techniques have four possible security loopholes where an eavesdropper can steal:…”
Section: Affinity With Quantum Cryptography Protocolsmentioning
confidence: 99%
“…• QKD protocols based on polarized 58,59 or entangled photons, 60,61 which are widely known and used, however, they involve a series of loopholes in key managements that degrade their performance in practical applications. In fact, these techniques have four possible security loopholes where an eavesdropper can steal:…”
Section: Affinity With Quantum Cryptography Protocolsmentioning
confidence: 99%
“…However, there is a special case that the quantum data may be processed directly. For example, quantum communication has become a hot topic in recent years, and in quantum channels, there may be some noise itself is quantum . Figure illustrates the structure of quantum machine learning.…”
Section: Introductionmentioning
confidence: 99%
“…Subsequently, these keys enable secure communication and authentication. Non-ideal apparatuses, especially single-photon detectors with imperfections, have been exploited to carry out side-channel attacks against practical QKD [9][10][11][12][13][14][15][16][17][18][19], although the QKD is unbreakable in theory.…”
Section: Introductionmentioning
confidence: 99%