{"title":"A New Proposal for QKD Relaying Models","authors":"Cuong Le Quoc, P. Bellot","doi":"10.1109/ICCCN.2008.ECP.92","DOIUrl":null,"url":null,"abstract":"We investigate a quasi-trusted QKD relaying model. This is a three-party communication model. Two nodes Alice and Bob want to establish a secret key. However, the distance between them exceeds the limited range of QKD. Carol is a intermediate node that could share QKD links with Alice and Bob. Carol is assumed to be quasi-trusted: she correctly follows the given three-party protocol. However, she may be eavesdropped by the malicious person Eve. We propose two single-photon based protocols that allow Alice, Carol and Bob to achieve the goal. As a result, these protocols could be applied to securely extend up to two times the limited range of QKD without invoking entangled photons.","PeriodicalId":314071,"journal":{"name":"2008 Proceedings of 17th International Conference on Computer Communications and Networks","volume":"33 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 Proceedings of 17th International Conference on Computer Communications and Networks","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCCN.2008.ECP.92","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
Abstract
We investigate a quasi-trusted QKD relaying model. This is a three-party communication model. Two nodes Alice and Bob want to establish a secret key. However, the distance between them exceeds the limited range of QKD. Carol is a intermediate node that could share QKD links with Alice and Bob. Carol is assumed to be quasi-trusted: she correctly follows the given three-party protocol. However, she may be eavesdropped by the malicious person Eve. We propose two single-photon based protocols that allow Alice, Carol and Bob to achieve the goal. As a result, these protocols could be applied to securely extend up to two times the limited range of QKD without invoking entangled photons.