Abstract
The global interest in quantum networks stems from the security guaranteed by the laws of physics. The deployment of quantum networks means facing the challenges of scaling up the physical hardware and, more importantly, of scaling up all other network layers and optimally utilizing network resources. Here, we consider two related protocols and their experimental demonstrations on an eight-user quantum network test bed, and discuss their usefulness with the aid of example use cases. First, we consider an authentication-transfer protocol to manage a fundamental limitation of quantum communication—the need for a preshared key between every pair of users linked together on the quantum network. By temporarily trusting some intermediary nodes for a short period of time (<35min in our network), we can generate and distribute these initial authentication keys with a very high level of security. Second, when end users quantify their trust in intermediary nodes, our flooding protocol can be used to improve both end-to-end communication speeds and increase security against malicious nodes.5 MoreReceived 2 April 2021Accepted 16 November 2021DOI:https://doi.org/10.1103/PRXQuantum.3.020311Published by the American Physical Society under the terms of the Creative Commons Attribution 4.0 International license. Further distribution of this work must maintain attribution to the author(s) and the published article's title, journal citation, and DOI.Published by the American Physical SocietyPhysics Subject Headings (PhySH)Research AreasQuantum communicationQuantum cryptographyQuantum networksQuantum Information
Published Version (Free)
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have