Abstract
How many users can a quantum cryptography network support when certain services are demanded? The answer to this question depends on three factors: the speed of quantum key distribution, the organization and traffic engineering of the quantum cryptography network, and the engineering of services. In this article we focus on the second factor which is lacked in the literature to our knowledge but in urgent need for constructing an optimized large-scale quantum cryptography network. In order to provide an overall understanding about a quantum cryptography network, we also briefly introduce the characteristics of quantum cryptography and service engineering.
Similar content being viewed by others
References
Scarani V, Bechmann-Pasquinucci H, Cerf N J, et al. The security of practical quantum key distribution. Rev Mod Phys, 2009, 81: 1301–1350
Gisin N, Ribordy G, Tittel W, et al. Quantum cryptography. Rev Mod Phys, 2002, 74: 145–195
Shor P W, Preskill J. Simple proof of security of the BB84 quantum key distribution protocol. Phys Rev Lett, 2000, 85: 441–444
Bennett C H, Brassard G. Quantum cryptography: Public key distribution and coin tossing. In: Proceedings of IEEE International Conference on Computers, Systems & Signal. New York: IEEE, 1984. 175–179
Scarani V, Acin A, Ribordy G, et al. Quantum cryptography protocols robust against photon number splitting attacks for weak laser pulse implementations. Phys Rev Lett, 2004, 92: 057901
Hwang W. Quantum key distribution with high loss: Toward global secure communication. Phys Rev Lett, 2003, 91: 057901
Wang X B. Beating the photon-number-splitting attack in practical quantum cryptography. Phys Rev Lett, 2003, 94: 230503
Weedbrook C, Lance A M, Bowen W P, et al. Quantum cryptography without switching. Phys Rev Lett, 2004, 93: 170504
Grosshans F, Grangier P. Continuous variable quantum cryptography using coherent states. Phys Rev Lett, 2002, 88: 057902
Ekert A K. Quantum cryptography based on Bell’s theorem. Phys Rev Lett,1991, 67: 661–663
Wang X B, Peng C Z, Zhang J, et al. General theory of decoy-state quantum cryptography with source errors. Phys Rev A, 2008, 77: 042311
Lo H K, Ma X, Chen K. Decoy state quantum key distribution. Phys Rev Lett, 2005, 94: 230504
Schmitt-Manderbach T, Weier H, Fürst M, et al. Experimental demonstration of free-space decoy-state quantum key distribution over 144 km. Phys Rev Lett, 2007, 98: 010504
Wang Q, Chen W, Xavier G, et al. Experimental decoy-state quantum key distribution with a sub-Poissionian heralded single-photon source. Phys Rev Lett, 2008, 100: 090501
Peng C Z, Zhang J, Yang D, et al. Experimental long-distance decoy-state quantum key distribution based on polarization encoding. Phys Rev Lett, 2007, 98: 010505
Liu Y, Chen T Y, Wang J, et al. Decoy-state quantum key distribution with polarized photons over 200 km. Opt Express, 2010, 18: 8587–8594
Chen T Y, Wang J, Liang H, et al. Metropolitan all-pass and inter-city quantum communication network. Opt Express, 2010, 18: 27217–27225
Zhou Y Y, Zhou X J. SARG04 decoy-state quantum key distribution based on an unstable source. Optoelectron Lett, 2011, 7: 389–393
Capmany J, Fernandez-Pousa C R. Optimum design for BB84 quantum key distribution in tree-type passive optical networks. J Opt Soc Am B, 2010, 27: A147–A151
Jain N, Wittmann C, Lydersen L, et al. Device calibration impacts security of quantum key distribution. Phys Rev Let, 2011, 107: 110501
Cooper R B. Introduction to Queueing Theory. New York: Elsevier North Holland Inc., 1981
Engset T O. The probability calculation to determine the number of switches in automatic telephone exchanges. Telektronikk, 1991, 1–5
Zeng G. Two common properties fo the Erlang-B function, Erlang-C function and Engset blocking function. Math Comput Model, 2003, 37: 1287–1296
Wong E W M, Zalesky A, Zukerman M. A state-dependent approximation for the generalized Engset model. IEEE Commun Lett, 2009, 13: 962–964
Cohen J W. The generalized Engset formulae. Philips Telecommun Rev, 1957, 18: 158–170
Overby H. Performance modelling of optical packet switched networks with the Engset traffic model. Opt Express, 2005, 13: 1685–1695
Tanenbaum A S. Computer Networks. 4th ed. Upper Saddle River: Pearson Education Inc., 2003
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Zhao, Y., Zhao, M., Zhao, Y. et al. The organization and traffic engineering of a quantum cryptography network. Sci. China Phys. Mech. Astron. 55, 1562–1570 (2012). https://doi.org/10.1007/s11433-012-4844-0
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11433-012-4844-0