{"title":"Stochastic routing in large grid-shaped quantum networks","authors":"Cuong Le Quoc, P. Bellot, A. Demaille","doi":"10.1109/RIVF.2007.369152","DOIUrl":null,"url":null,"abstract":"This paper investigates the problem of secret key transmissions for an arbitrary Alice-Bob pair in quantum key distribution (QKD)-based networks. We develop a realistic QKD- based network framework and we show that the key transmission problem on such a framework can be considered as a variant of the classical percolation problem. We also present an adaptive stochastic routing algorithm to protect users from inevitable eavesdroppers. Simulations were carried out not only to validate our approach, but also to compute critical parameters to ensure security. These results show that large quantum networks with eavesdroppers do provide security.","PeriodicalId":158887,"journal":{"name":"2007 IEEE International Conference on Research, Innovation and Vision for the Future","volume":"65 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2007-03-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"12","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2007 IEEE International Conference on Research, Innovation and Vision for the Future","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/RIVF.2007.369152","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 12
Abstract
This paper investigates the problem of secret key transmissions for an arbitrary Alice-Bob pair in quantum key distribution (QKD)-based networks. We develop a realistic QKD- based network framework and we show that the key transmission problem on such a framework can be considered as a variant of the classical percolation problem. We also present an adaptive stochastic routing algorithm to protect users from inevitable eavesdroppers. Simulations were carried out not only to validate our approach, but also to compute critical parameters to ensure security. These results show that large quantum networks with eavesdroppers do provide security.