ZHANG Shibin, XIE Zhihai, YIN Yifen, CHANG Yan, SHENG Zhiwei, YAN Lili, WANG Haichun, HAN Guihua, HUANG Yuanyuan, WAN Guogen. Study on Quantum Trust Model Based on Node Trust Evaluation[J]. Chinese Journal of Electronics, 2017, 26(3): 608-613. doi: 10.1049/cje.2016.11.007
Citation: ZHANG Shibin, XIE Zhihai, YIN Yifen, CHANG Yan, SHENG Zhiwei, YAN Lili, WANG Haichun, HAN Guihua, HUANG Yuanyuan, WAN Guogen. Study on Quantum Trust Model Based on Node Trust Evaluation[J]. Chinese Journal of Electronics, 2017, 26(3): 608-613. doi: 10.1049/cje.2016.11.007

Study on Quantum Trust Model Based on Node Trust Evaluation

doi: 10.1049/cje.2016.11.007
Funds:  This work is supported by the National Natural Science Foundation of China (No.61572086, No.61402058), Sichuan Strategic Emerging Industry Plan of China (No.2013GZX0137), and Chengdu Science and Technology Research Plan of China (No.2014-HM01-1108-SF).
  • Received Date: 2015-03-04
  • Rev Recd Date: 2015-12-06
  • Publish Date: 2017-05-10
  • Trust is the premise and foundation of secure communication, no matter in the quantum communication or classical communication. In fact, the existing quantum secure communication protocols and technologies are implicitly related to trust; or assume some trust premise in advance; or create or obtain a trust relationship. This paper studies on quantum trust model using node trust evaluation based on author's own research achievements. We introduce the trust management into quantum communication network to build secure trusted quantum communication network based on evaluating the trust values of nodes, which are used to evaluate the reliability of each user. We put forward a scheme of quantum trust model based on node trust evaluation, and describe the thought and process of trust evaluation in detail based on the principles of quantum entanglement and quantum teleportation. We analyze the feasibility and safety of this scheme, which provides a new thinking and method for establishing a credible secure quantum communication network.
  • loading
  • J.M. Arrazola and N. Lütkenhaus, "Quantum communication with coherent states and linear optics", Physical Review A, Vol.90, No.4, pp.042335-042345, 2014.
    N. Metwally, "Entangled network and quantum communication", Physics Letters A, Vol.375, No.48, pp.4268-4273, 2011.
    O. Hirota and H.P. Yuen, "Introduction to special issue on secure quantum communication", Quantum Information Processing, Vol.13, No.10, pp.2153-2154, 2014.
    P. Townsend, "Quantum cryptography on multiuser optical fiber network", Nature, Vol.385, No.6611, pp.47-49, 1997.
    G. Brassard, F. Bussieres, N. Godbout, et al., "Multi-user quantum key distribution using wave-length division multiplexing", Proc. of SPIE 2003, Vol.5260, No.6, pp.149-153, 2003
    M. Goodmans, "Quantum cryptography for optical networks:A system perspective", Proc. of IEEE-LEOS Cone Tucson, Arizona, pp.1040-1041, 2003.
    C. Elliott, A. Colvin, D. Pearson, et al., "Current status of the DARPA quantum network", Proc. of SPIE 2005, Vol.5815, pp.138-149, 2005.
    G. Brassard, F. Bussieres, N. Godbout, et al., "Entanglement and wavelength division multiplexing for quantum cryptography networks", Proc. of AIP Conf. 2004, Vol.734, pp.323-326, 2004.
    P.D. Kumavor, A.C. Beal, S. Yelin, et al., "Comparison of four multi-user quantum key distribution schemes over passive optical networks", Journal of Lightwave Technology, Vol.23, No.1, pp.268-276, 2005.
    C.H. Zhu, C.X. Pei, H.X. Ma, et al., "A scheme for quantum local area networks and performance analysis" Journal of Xidian University, Vol.33, No.6, pp.839-843, 2006. (in Chinese)
    F.G. Deng, X.H. Li, C.Y. Li, et al., "Economical quantum secure direct communication network with single photons", Chinese Physics, Vol.16, No.12, pp.3553-3559, 2007.
    M. Peev, A. Poppe, O. Maurhart, et al., "The SECOQC quantum key distribution network in Vienna", New Journal of Physics, Vol.11, No.7, pp.075001(1-4), 2009.
    C.H. Hong, J.O. Heo, G.L. Khym, et al., "N quantum channels are sufficient for multi-user quantum key distribution protocol betweenn users", Optics Communications, Vol.283, No.10, pp.2644-2646, 2010.
    M. Sasaki, M. Fujiwara, H. Ishizuka, et al., "Field test of quantum key distribution in the Tokyo QKD Network", Optics Express, Vol.19, No.11, pp.10387-10409, 2011.
    M. Razavi, "Multiple-access quantum-classical networks", The 10th Proc. of International Conference on Quantum Communication, Measurement and Computing (QCMC), Am. Inst. Phys., Vol.1363, pp.39-42, 2011.
    X.T. Yu, J. Xu and Z.C. Zhang, "Routing protocol for wireless ad hoc quantum communication network based on quantum teleportation", Acta Phys. Sin., Vol.61, No.22, pp.514-518, 2012. (in Chinese)
    L.H. Gong, Y. Liu and N.R. Zhou, "Novel quantum virtual private network scheme for PON via quantum secure direct communication", International Journal of Theoretical Physics, Vol.52, No.9, pp.3260-3268, 2013.
    Y. Liu, Y. Cao, M. Curty, et al., "Experimental unconditionally secure bit commitment", Physical Review Letters, Vol.112, No.1, pp.010504(208-220), 2014.
    S.B. Zhang and C.X. Xu, "Study on the trust evaluation approach based on cloud model", Chinese Journal of Conputers, Vol.35, No.2, pp.422-431, 2013. (in Chinese)
    S.B. Zhang, S. Xiao, Y. Chang, et al., "Study on network user behavior evaluation model based on cloud model theory", Journal of Chinese Computer Systems, Vol.34, No.10, pp.2367-2372, 2013. (in Chinese)
    H.X. Xu, "Overview of the development of quantum communication network", Journal of CAEIT, Vol.9, No.3, pp.259-271, 2014. (in Chinese)
    CHINADAILY, "China to launch quantum experiment satellite in 2016", http://www.chinadaily.com.cn/china/2013-03/07/content-16289463.htm, 2013-03-07.
    D.F. Li, Intuitionistic Fuzzy Set Decision and Game Analysis Methodologies, National Defence Industry Press, Beijing, China, pp.34-58, 2012. (in Chinese)
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (151) PDF downloads(469) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return