Abstract
The question of the transfer of an external independent key through trusted nodes, between which the keys obtained during the quantum key distribution are located, is investigated. It is shown that when pushing external ɛ K -secret key through a chain of trusted nodes connecting separate segments with ɛ i -secret keys obtained by quantum key distribution, the final matched key between the extreme nodes of the network turns out to be -secret (where i is the number of the network segment, N s is the number of network segments connecting the extreme nodes), provided that the external key is encrypted on the ɛ i –secret keys in the one-time pad mode. It is also shown that for any measurements of an eavesdropper providing him with additional information about the keys, the complexity of partial/complete search for an matched key is determined by the secrecy parameter ɛ.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.