Abstract

We suggest a continuous variable quantum conferencing network scheme with an entangled source in the middle. Here, the source generates a multipartite entangled state and distributes the modes of the state to an arbitrary number of legitimate network users. The entangled modes that were received and measured by the users share mutual information, which is utilized to generate secure conferencing key between users. The scheme is proven secure against collective attacks on both the untrusted source in the middle and all the quantum links. Simulation results show that the presented scheme can achieve high rate secure conferencing for 100 users within a 400 m-radius community or factory area.

Highlights

  • IntroductionQuantum key distribution (QKD) [1,2,3], which is one of the most widely implemented areas of quantum information, enables secure communication for legal participants over public channels

  • Quantum key distribution (QKD) [1,2,3], which is one of the most widely implemented areas of quantum information, enables secure communication for legal participants over public channels.The security of QKD has been guaranteed on the theory of quantum physics against adversaries with unlimited computing power [4,5]

  • We consider the Continuous variable (CV) quantum conferencing with entanglement in the middle against collective attacks and give the simulation results of our security analysis

Read more

Summary

Introduction

Quantum key distribution (QKD) [1,2,3], which is one of the most widely implemented areas of quantum information, enables secure communication for legal participants over public channels. The security of QKD has been guaranteed on the theory of quantum physics against adversaries with unlimited computing power [4,5]. A quantum network was proposed to extend QKD from point-to-point configuration to a multi-user and large-scale scenario. A series of quantum networks based on point-to-point QKD devices are designed and developed [9,10,11,12,13], including two principle types: quantum channel switching networks [14] and trusted-repeater-based quantum networks [15]

Objectives
Results
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call