Back
 CN  Vol.2 No.3 , August 2010
Comparison of 4 Multi-User Passive Network Topologies for 3 Different Quantum Key Distribution
Abstract: The purpose of this paper is to compare the performance of four passive optical network topologies in implementing multi-user quantum key distribution, using 3 protocols proposed by quantum cryptography (B92, EPR, and SSP). The considered networks are the passive-star network, the optical-ring network based on the Signac interferometer, the wavelength-routed network, and the wavelength-addressed bus network. The quantum bit-error rate and sifted key rate for each of these topologies are analysed to determine their suitability for providing quantum key distribution-service to networks of various sizes. The efficiency of the three considered protocols is also determined.
Cite this paper: nullF. Garzia and R. Cusani, "Comparison of 4 Multi-User Passive Network Topologies for 3 Different Quantum Key Distribution," Communications and Network, Vol. 2 No. 3, 2010, pp. 166-182. doi: 10.4236/cn.2010.23025.
References

[1]   N. Gisin, G. Ribordy, W. Tittel and H. Zbinden, “Quan- tum Cryptography,” Reveiw of Modern Physics, Vol.2, Septemner 2001, pp. 1-57.

[2]   W. K. Wootters and W. Zurek, “A Single Quantum Can- not be Cloned,” Nature, Vol. 299, London, 1982. pp. 802-803.

[3]   P.Kumavor, A. Beal, S. Yelin, E. Donkor and B. Wang, “Comparison of Four Multi-user Quantum Key Distribu- tion Schemes Over Passive Optical Networks,” Journal of Lightwave Technology, Vol 23, No.1 January 2005, p.268.

[4]   C. H. Bennett and G. Brassard, “Quantum Cryptography: Public Key Distribution and Coin Tossing,” IEEE Confonference on Computers, Systems Signal Processing, Bangalore, 1984.

[5]   C. Bennett, “Quantum Cryptography Using Any Two Non-orthogonal States,” Physical Review Letter, Vol. 68, 1992, p. 3121,

[6]   K. J. Gordon, V. Fernandez, P. D. Townsend and G. S. Buller, “A Short Wavelength Giga Hertz Clocked Fiber-Optic Quantum Key Distribution System,” IEEE Journal of Quantum Electronics, Vol 40, No7, July 2004, pp. 900-908.

[7]   A. Einstein, B. Podolsky and N. Rosen, “Can Quantum- Mechanical Description of Physical Reality be Considered Complete,” Physical Review, Vol. 41, May 1935, p. 777.

[8]   M. M. Ishtiaq Khan and M. Sher: “Protocols for Secure Quantum Transmission: a Review of Recent Develop- ments,” Pakistan Journal of Information and Technology Vol. 2, No. 3, 2003, pp. 265-276.

[9]   J. Bell, “On the Einstein, Podolsky, Rosen Paradox,” Physics, Vol. 1, 1964, pp. 195-200.

[10]   D. Bru? and N. Lutkenhaus, “Quantum Key Distribution: From Principles to Practicalities,” Vol. 2, September 1999.

[11]   C. Bennett, F. Bessette, G. Brassard, L. Salvail and J. Smolin, “Experimental Quantum Cryptography”, Journal of Cryptography, Vol. 5, No. 1, 1992, pp. 3-28.

[12]   A. Muller, J. Breguet and N. Gisin, “Experimental Demonstration of Quantum Cryptography Using Polarized Photons in Optical Fiber Over More Than 1 km,” Europhysics Letter, Vol. 23, 1993, pp. 383-388.

[13]   D. Stucki et al., “Photon Counting for Quantum Key Distribution With Peltier Cooled InGaAs/InP APD’s,” Journal of Modern Optics, Vol. 48, No. 13, 2001, pp. 1967-1981.

[14]   P. D. Townsend, “Quantum Cryptography on Multi-user Optical Fiber Networks,” Journal of Nature, Vol. 385, No.2, 1997, pp. 47-49.

[15]   T. Nishioka, H. Ishizuka, T. Hasegawa, and J. Abe, “Circular Type Quantum Key Distribution,” IEEE Photon Technical Letter, Vol. 14, No. 4, April 2002, pp. 576-578.

[16]   C. A. Fuchs, N. Gisin, R. B. Griffiths, C. S. Niu and A. Peres, “Optimal Eavesdropping in Quantum Crypto- graphy I,” Physical Review A, Vol. 56, 1997, pp. 1163.

[17]   C. A. Fuchs and A. Peres, “Quantum State Disturbance VS. Information Gain: Uncertainty Relations for Quantum Information,” Physical Review A, Vol. 53, 1996, pp. 2038-2045.

[18]   D. Bru?, “Optimal Eavesdropping in Quantum Crypto- graphy With Six States,” Physical Reveiw Letter, Vol. 81, 1998, p. 3018.

[19]   D. Stucki, N. Gisin, O. Guinnard, G. Ribordi and H. Zbinden, “Quantum Key Distribution Over 67 km With a Plug&Play System,” New Journal of Physics, Vol. 4, July 2002, pp. 1-8.

[20]   P. A. Hiskett et al., “Eighty Kilometer Transmission Experiment Using an InGaAs/InP SPAD-based Quantum Cryptography Receiver Operating at 1.55 ?m,” Journal of Modern Optics, Vol. 48, No. 13, July 2001, pp. 1957-1966.

[21]   D. S. Bethune and W. P. Risk, “Autocompensating Quan- tum Cryptography,” New Journal of Physics, Vol. 4, July 2002, pp. 1-15.

[22]   X. Fang and R. O. Claus, “Polarization-dependent All- fiber Wavelength Division Multiplexer Based on a Signac Interferometer,” Optical Letter, Vol. 20, No. 20, October 1995, pp. 2146-2148,.

[23]   P. D. Townsend, J. G. Rarity and P. R. Tapster, “Enhanc- ed Single Photon Fringe Visibility in a 10 km-long Prototype Quantum Cryptography Channel,” Electronics Letter, Vol. 29, July 1993, pp. 1291-1293.

[24]   C. Marand and P. D. Townsend, “Quantum Key Distri- bution Over Distances as Long as 30 km,” Optical Letter, Vol. 20, No. 16, August 1995, pp. 1695-1697.

[25]   H. Zbinden, “Interferometry With Faraday Mirrors for Quantum Cryptography,” Electronics Letter, Vol. 33, 1997, pp. 586-588.

[26]   H. Kosaka, A. Tomita, Y. Nambu, N. Kimura and K. Nakamura, “Single Photon Interference Experiment Over 100 km for Quantum Cryptography System Using a Balanced Gated-mode Photon Detector,” Electronics Letter, Vol. 39, No. 16, 2003, pp. 1199-1201.

[27]   S. J. D. Phoenix et al., “Multi-user Quantum Crypto- graphy on Optical Networks,” Journal of Modern Optics, Vol. 42, No. 6, January 1995, pp. 1155–1163.

[28]   A. Muller, T. Herzog, B. Huttner, W. Tittel, H. Zbinden, and N. Gisin, “Plug and Play Systems for Quantum Cryptography,” Applied Physics Letter, Vol. 70, No. 7, February 1997, pp. 793–795.

[29]   E. Waks et al., “Secure Communication: Quantum Cryptography With a Photon Turnstile,” Nature, Vol. 420, London, December 2002, p. 762.

[30]   E. Moreau et al., “Single-mode Solid-state Single Photon Source Based on Isolated Quantum Dots in Pillar Microcavities,” Applied Physcis Letter, Vol. 79, No. 18, October 2001, pp. 2865-2867.

[31]   H. Bechmann-Pasquinucci, and N. Gisin, “Incoherent and Coherent Eavesdropping in the 6-state Protocol of Quantum Cryptography,” Physical Review A, Vol. 59, No. 6, 1998, pp. 1-11.

[32]   A. Ekert, “Quantum Cryptography Based on Bell's Theorem,” Physical Review Letter, Vol. 67, 1991, pp. 661-663.

[33]   R. J. Hughes, G. L. Morgan and C. G. Peterson, “Practical Quantum Key Distribution Over a 48-km Optical Fiber Network,” Physics Division Los Alamos National Liberatory. NM 87545.

 
 
Top