2021
DOI: 10.1109/access.2021.3102313
|View full text |Cite
|
Sign up to set email alerts
|

Toward a Complete Software Stack to Integrate Quantum Key Distribution in a Cloud Environment

Abstract: The coming advent of Quantum Computing promises to jeopardize current communications security, undermining the effectiveness of traditional public-key based cryptography. Different strategies (Post-Quantum or Quantum Cryptography) have been proposed to address this problem. Many techniques and algorithms based on quantum phenomena have been presented in recent years; the most relevant example is the introduction of Quantum Key Distribution (QKD). This approach allows to exchange cryptographic keys among partie… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
11
0
1

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 10 publications
(12 citation statements)
references
References 25 publications
0
11
0
1
Order By: Relevance
“…Fig. 2 and Table 1 show the analysis of key computation time for MKSS-QKDTWIA with MRFC [18], SS-QKD [19] and ECSM-QKDP [20]. From the analysis, it is known that the computation time of keys for MKSS-QKDTWIA is less than the MRFC [18], SS-QKD [19] and ECSM-QKDP [20].…”
Section: Performance Analysismentioning
confidence: 99%
See 2 more Smart Citations
“…Fig. 2 and Table 1 show the analysis of key computation time for MKSS-QKDTWIA with MRFC [18], SS-QKD [19] and ECSM-QKDP [20]. From the analysis, it is known that the computation time of keys for MKSS-QKDTWIA is less than the MRFC [18], SS-QKD [19] and ECSM-QKDP [20].…”
Section: Performance Analysismentioning
confidence: 99%
“…Pedone [19] designed the software stack (SS) for introducing the quantum key distribution (QKD) systems in a cloud environment. The developed software stack was combined with the modern infrastructures and controls a cloud-native method for improvement.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…e quantum cryptography [20][21][22][23], which combines quantum computations with classical cryptography, uses laws of physics and quantum mechanics for secure exchange of information between the participating parties. A quantum key exchange or distribution algorithm [24][25][26][27][28][29] does not depend on the computationally hard nature of some mathematical problem. Rather, it uses the laws of quantum mechanics to provide unconditional security.…”
Section: Introductionmentioning
confidence: 99%
“…When this happens, their interconnection via a global quantum network, the Quantum Internet, will unlock further possibilities, such as blind QC and distributed QC [14]. Meanwhile, in a shorter term, the Quantum Internet will enable high-impact applications not related to computing, e.g., quantum sensing [8] and Quantum Key Distribution (QKD) [7].…”
Section: Introductionmentioning
confidence: 99%