LIU Xingtong, WANG Jian, LI Ruilin, ZHANG Chen. Security Analysis of Stochastic Routing Scheme in Grid-Shaped Partially-Trusted Relay Quantum Key Distribution Network[J]. Chinese Journal of Electronics, 2018, 27(2): 234-240. doi: 10.1049/cje.2018.01.013
Citation: LIU Xingtong, WANG Jian, LI Ruilin, ZHANG Chen. Security Analysis of Stochastic Routing Scheme in Grid-Shaped Partially-Trusted Relay Quantum Key Distribution Network[J]. Chinese Journal of Electronics, 2018, 27(2): 234-240. doi: 10.1049/cje.2018.01.013

Security Analysis of Stochastic Routing Scheme in Grid-Shaped Partially-Trusted Relay Quantum Key Distribution Network

doi: 10.1049/cje.2018.01.013
Funds:  This work is supported by the National Natural Science Foundation of China (No.61601476).
More Information
  • Corresponding author: WANG Jian (corresponding author) was born in 1975, doctor, professor at Department of Communication Engineering, School of Electronic Science, National University of Defense Technology. His research interests include quantum cryptography, information security, and network security (
  • Received Date: 2017-03-01
  • Rev Recd Date: 2017-07-14
  • Publish Date: 2018-03-10
  • Quantum key distribution (QKD) technology provides proved unconditional security in pointto-point key transmissions based on quantum mechanics. However, several limitations, most prominently range, make it complex to construct large QKD network. The trusted relay QKD network is the most practical scene, and stochastic routing scheme was proposed to solve the fatal problem that some relay nodes may be controlled by adversary. But most results in stochastic routing scheme hinge on an adversary model without consideration of attacker's prior-knowledge and attack strategy. To reveal the security problem, we propose a new adversary model and apply it in grid-shaped partially-trusted relay QKD network. Then we analyze the best attack strategy and the impact on security under various situations respectively. Analysis and simulation results show that in some cases the security of stochastic routing scheme will be compromised, and a generalized upper bound for the overall safe probability is obtained. We also discuss how to alleviate the security problem, making the network more robust to attacks.
  • loading
  • C.H. Bennett and G. Brassard, "Quantum cryptography:Public key distribution and coin tossing", Proc. of Int. Conf. on Computers, Systems, and Signal Processing, Bangalore, India, pp.175-179, 1984.
    C.H. Bennett, G. Brassard and N.D. Mermin, "Quantum cryptography without Bell's theorem", Phys. Rev. Lett, Vol.68, No.5, pp.557-559, 1992.
    W.C. Zhang, X. Yan, X.F. Wang and F.Y. Miao, "An efficient quantum mechanism based fair non-repudiation protocol", Chinese Journal of Electronics, Vol.17, No.1, pp.170-172, 2008.
    Q.P. Zhou, Y.L. Zhang, F. Zhou, et al., "Remote generation of quantum communication channel with continuous variable via beam splitters", Chinese Journal of Electronics, Vol.19, No.2, pp.329-332, 2010.
    E. Biham, B. Huttner and T. Mor, "Quantum cryptographic network based on quantum memories", Phys. Rev. A, Vol.54, No.4, pp.2651-2658, 1996.
    P.D. Townsend, "Quantum cryptography on multiuser optical fibre networks", Nature, Vol.385, No.6611, pp.47-49, 1997.
    P.D. Townsend, "Quantum cryptography on optical fiber networks", Optical Fiber Technology, Vol.4, No.4, pp.345-370, 1998.
    V. Fernandez, R.J. Collins, K.J. Gordon, et al., "Passive optical network approach to gigahertz-clocked multiuser quantum key distribution", IEEE journal of quantum electronics, Vol.43, No.2, pp.130-138, 2007.
    A. Poppe, M. Peev and O. Maurhart, "Outline of the SECOQC quantum-key-distribution network in Vienna", International Journal of Quantum Information, Vol.6, No.2, pp.209-218, 2008.
    G. Brassard, F. Bussiéres, N. Godbout, et al., "Multiuser quantum key distribution using wavelength division multiplexing", Applications of Photonic Technology, Proceedings of SPIE, Vol.5260, pp.149-153, 2003.
    P. Toliver, R.J. Runser, T.E. Chapuran, et al., "Experimental investigation of quantum key distribution through transparent optical switch elements", IEEE Photonics Technology Letters, Vol.15, No.11, pp.1669-1671, 2003.
    J.L. Dai and W.H. Zhang, "A quantum network for implementation of the optimal quantum cloning", Chinese Physics B, Vol.18, No.2, pp.426-429, 2009.
    M. Dianati, R. Alléaume, M. Gagnaire, et al., "Architecture and protocols of the future European quantum key distribution network", Security and Communication Networks, Vol.1, No.1, pp.57-74, 2008.
    C. Elliott, A. Colvin, D. Pearson, et al., "Current status of the DARPA Quantum Network", arXiv:quant-ph/0503058, 2005.
    SECOQC, "Development of a global network for secure communication based on quantum cryptography",,2008.
    R. Alléaume R, J. Bouda, C. Branciard, et al., "Using quantum key distribution for cryptographic purposes:A survey", Theoretical Computer Science, Vol.560, No.1, pp.62-81, 2014.
    M. Peev, M. Pacher, C. Alléaume, et al., "The SECOQC quantum key distribution network in Vienna", New Journal of Physics, Vol.11, No.7, Article ID 075001, 37 pages, 2009.
    C. Elliott, C. Pearson and G. Troxel, "Quantum cryptography in Practice", Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications, Karlsruhe, Germany, pp.227-238, 2003.
    T. Kimura, Y. Nambu, T. Hatanaka, et al., "Singlephoton interference over 150-km transmission using silica-based integrated-optic interferometers for quantum cryptography", Japanese Journal of Applied Physics, Vol.43, No.9, pp.1217-1210, 2004.
    D. Collins, N. Gisin and H. Riedmatten, "Quantum relays for long distance quantum cryptography", Journal of Modern Optics, Vol.52, No.5, pp.735-753, 2005.
    C. Elliott, "Building the quantum network", New Journal of Physics, Vol.4, No.1, pp.46-58, 2002.
    Q.C. Le, P. Bellot and A. Demaille, "On the security of quantum networks:a proposal framework and its capacity", Proceedings of the International Conference on New Technologies, Mobility, and Security, Paris, France, pp.385-396, 2007.
    H. Wen, Z.F. Han, Y.B. Zhao, et al., "Multiple stochastic paths scheme on partially-trusted relay quantum key distribution network", Science in China Series F:Information Sciences, Vol.52, No.1, pp.18-22, 2009.
    R.B. Travis, P.H. Kevin and C.S. Barry, "Distributed authentication for randomly compromised networks", New Journal of Physics, Vol.11, No.8, Article ID 085005, 13 pages, 2009.
    L. Salvail, M. Peev, E. Diamanti, et al., "Security of trusted repeater quantum key distribution networks", Journal of Computer Security, Vol.18, No.1, pp.61-87, 2010.
    H. Takesue, S.W. Nam, Q. Zhang, et al., "Quantum key distribution over a 40-dB channel loss using superconducting singlephoton detectors", Nature Photonics, Vol.1, No.6, pp.343-348, 2007.
    R. Ursin, F. Tiefenbacher, T. Schmitt-Manderbach, et al., "Entanglement-based quantum communication over 144 km", Nature Physics, Vol.3, No.7, pp.481-486, 2007.
    C.E. Shannon, "Communication theory of secrecy systems", Bell Labs Technical Journal, Vol.28, No.4, pp.656-715, 1949.
  • 加载中


    通讯作者: 陈斌,
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (203) PDF downloads(425) Cited by()
    Proportional views


    DownLoad:  Full-Size Img  PowerPoint