2012 Fourth International Conference on Ubiquitous and Future Networks (ICUFN) 2012
DOI: 10.1109/icufn.2012.6261711
|View full text |Cite
|
Sign up to set email alerts
|

Secure and efficient key management technique in quantum cryptography network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
4
1
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(5 citation statements)
references
References 8 publications
0
4
0
Order By: Relevance
“…Such a process is often known as a client-server operation. The client-server topology reconcile and verify the keys reservation and their subsequent distribution for their business need and data encryption [52]. In addition, the key management layer in the QKD-DWDM network should be designed in such a way as to be able to support multi-point to multi-point communication.…”
Section: Key Management In Qkd-dwdm Networkmentioning
confidence: 99%
“…Such a process is often known as a client-server operation. The client-server topology reconcile and verify the keys reservation and their subsequent distribution for their business need and data encryption [52]. In addition, the key management layer in the QKD-DWDM network should be designed in such a way as to be able to support multi-point to multi-point communication.…”
Section: Key Management In Qkd-dwdm Networkmentioning
confidence: 99%
“…Some work has been done to study the architecture required for securing communications within a network scenario. In [6] and [7], a conceptual framework is presented consisting of QKD, key management, and application layers. The key management layer implements the standard Key Management Interoperability Protocol (KMIP) [8].…”
Section: Related Workmentioning
confidence: 99%
“…Other techniques involve multi-party key distribution at the level of the quantum protocol 10,11 but with less applicability to existing QKD devices. KMS designs for large scale networks 12 or with focus on secure key forwarding 13 have been studied before, as well as QKD analysis in light of network topology and performance indicators 14 , but without a practical and scalable approach for key forwarding in the various scenarios we have proposed. Similar linear programming approaches have been used for entanglement distribution 15,16 and for physical-level wavelength-division multiplexing 17,18 .…”
Section: Introductionmentioning
confidence: 99%