2024
DOI: 10.1038/s41534-024-00828-7
|View full text |Cite
|
Sign up to set email alerts
|

Optimal quantum key distribution networks: capacitance versus security

Lorenzo Cirigliano,
Valentina Brosco,
Claudio Castellano
et al.

Abstract: The rate and security of quantum communications between users placed at arbitrary points of a quantum communication network depend on the structure of the network, on its extension and on the nature of the communication channels. In this work we propose a strategy for the optimization of trusted-relays based networks that intertwines classical network approaches and quantum information theory. Specifically, by suitably defining a quantum communication efficiency functional, we identify the optimal quantum comm… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 52 publications
0
2
0
Order By: Relevance
“…Meanwhile, standardisation of mainly trusted node QKD networks but also others is pursued by several organizations (see [450] for a recent summary) and in particular the interplay between the network structure, key management policy and degree of practical security might benefit from further applications of network theory. Good examples of the latter include trading some rate to increased security using multiple [36] or single paths [518]. In particular, [518] introduces the concept of quantum efficiency to describe the tradeoff and maximum efficiency networks that optimize it, as well as an algorithm to find them for a given relative importance between rate and security.…”
Section: Avenues For Further Researchmentioning
confidence: 99%
See 1 more Smart Citation
“…Meanwhile, standardisation of mainly trusted node QKD networks but also others is pursued by several organizations (see [450] for a recent summary) and in particular the interplay between the network structure, key management policy and degree of practical security might benefit from further applications of network theory. Good examples of the latter include trading some rate to increased security using multiple [36] or single paths [518]. In particular, [518] introduces the concept of quantum efficiency to describe the tradeoff and maximum efficiency networks that optimize it, as well as an algorithm to find them for a given relative importance between rate and security.…”
Section: Avenues For Further Researchmentioning
confidence: 99%
“…Good examples of the latter include trading some rate to increased security using multiple [36] or single paths [518]. In particular, [518] introduces the concept of quantum efficiency to describe the tradeoff and maximum efficiency networks that optimize it, as well as an algorithm to find them for a given relative importance between rate and security. Alternatively, one may consider the case where only some of the nodes are trusted and ask about the connected components for a given maximum number of hops between trusted nodes.…”
Section: Avenues For Further Researchmentioning
confidence: 99%