Matematicheskie Voprosy Kriptografii [Mathematical Aspects of Cryptography]
RUS  ENG    JOURNALS   PEOPLE   ORGANISATIONS   CONFERENCES   SEMINARS   VIDEO LIBRARY   PACKAGE AMSBIB  
General information
Latest issue
Archive
Impact factor
Guidelines for authors

Search papers
Search references

RSS
Latest issue
Current issues
Archive issues
What is RSS



Mat. Vopr. Kriptogr.:
Year:
Volume:
Issue:
Page:
Find






Personal entry:
Login:
Password:
Save password
Enter
Forgotten password?
Register


Matematicheskie Voprosy Kriptografii [Mathematical Aspects of Cryptography], 2023, Volume 14, Issue 3, Pages 9–33
DOI: https://doi.org/10.4213/mvk444
(Mi mvk444)
 

This article is cited in 2 scientific papers (total in 2 papers)

Distribution of secret keys in a quantum network with trusted intermediate nodes

I. M. Arbekova, S. N. Molotkov

a Academy of cryptography of the Russian Federation, Moscow
Full-text PDF (529 kB) Citations (2)
References:
Abstract: The basic configuration in quantum cryptography is a point-to-point configuration. This technology is not applicable to a quantum network, where long-distance distribution of keys is required. In this paper we present a procedure for sequential transfer of an external $\varepsilon_{K}$-secret key through intermediate trusted nodes using $\varepsilon_{i}$-secret keys on separate network segments. It is shown that if the external key is $\varepsilon_{K}$-secret, then after transmission through the trusted node its secrecy becomes equal to $\varepsilon_{K}+\varepsilon_{1}$. The result is generalized to the entire length of the communication line. The secrecy of the transmitted key at the final point becomes $\varepsilon_{L}=\varepsilon_{K}+\sum_{i=1}^{L}\varepsilon_{i}$, where $L$ is the number of this line segments. It is shown that for any measurements of the eavesdropper leading to classical probability distributions the complexity of revealing the transmitted key in the class of algorithms based on the consideration of the most probable keys only are determined by the secrecy parameter $\varepsilon_{L}$.
Key words: quantum network, $\varepsilon$-secrecy, brute force algorithms.
Received 30.IX.2022
Document Type: Article
UDC: 519.719.2
Language: Russian
Citation: I. M. Arbekov, S. N. Molotkov, “Distribution of secret keys in a quantum network with trusted intermediate nodes”, Mat. Vopr. Kriptogr., 14:3 (2023), 9–33
Citation in format AMSBIB
\Bibitem{ArbMol23}
\by I.~M.~Arbekov, S.~N.~Molotkov
\paper Distribution of secret keys in a quantum network with trusted intermediate nodes
\jour Mat. Vopr. Kriptogr.
\yr 2023
\vol 14
\issue 3
\pages 9--33
\mathnet{http://mi.mathnet.ru/mvk444}
\crossref{https://doi.org/10.4213/mvk444}
Linking options:
  • https://www.mathnet.ru/eng/mvk444
  • https://doi.org/10.4213/mvk444
  • https://www.mathnet.ru/eng/mvk/v14/i3/p9
  • This publication is cited in the following 2 articles:
    Citing articles in Google Scholar: Russian citations, English citations
    Related articles in Google Scholar: Russian articles, English articles
    Математические вопросы криптографии
     
      Contact us:
     Terms of Use  Registration to the website  Logotypes © Steklov Mathematical Institute RAS, 2024