Advertisement

Journal of Network and Systems Management

, Volume 18, Issue 3, pp 283–299 | Cite as

Building a Quantum Network: How to Optimize Security and Expenses

  • Stefan RassEmail author
  • Angelika Wiegele
  • Peter Schartner
Article

Abstract

Quantum key distribution (QKD) is regarded as a key-technology for the upcoming decades. Its practicability has been demonstrated through various experimental implementations. Wide-area QKD networks are a natural next step and should inherit the selling point of provable security. However, most research in QKD focuses on point-to-point connections, leaving end-to-end security to the trustworthiness of intermediate repeater nodes, thus defeating any formal proof of security: why bother outwitting QKD, if the repeater node is an easy prey, and an equally valuable target? We discuss methods of designing QKD networks with provable end-to-end security at provably optimized efforts. We formulate two optimization problems, along with investigations of computational difficulty: First, what is the minimal cost for a desired security? Second, how much security is achievable under given (budget-)constraints? Both problems permit applications of commercial optimization software, so allow taking a step towards an economic implementation of a globally spanning QKD network.

Keywords

Network design End-2-end security Quantum cryptography Mixed-integer programming Information-theoretic security Topological vulnerability analysis 

Notes

Acknowledgments

We thank the anonymous reviewers for valuable comments. The clarity, readability and overall contribution of the paper could be greatly improved by implementing their suggestions.

References

  1. 1.
    Poppe, A., Peev, M., Maurhart, O.: Outline of the SECOQC Quantum-Key-Distribution network in Vienna. Int. J. Quant. Inf. 6(No. 2), 209–218 (2008)CrossRefGoogle Scholar
  2. 2.
    Shor, P., Preskill, J.: Simple proof of security of the BB84 quantum key distribution protocol. Phys. Rev. Lett. 85, 441–444 (2000)CrossRefGoogle Scholar
  3. 3.
    Alléaume, R., Bouda, J., Branciard, C., Debuisschert, T., Dianati, M., Gisin, N., Godfrey, M., Grangier, P., Länger, T., Leverrier, A., Lütkenhaus, N., Painchault, P., Peev, M., Poppe, A., Pornin, T., Rarity, J., Renner, R., Ribordy, G., Riguidel, M., Salvail, L., Shields, A., Weinfurter, H., Zeilinger, A.: SECOQC white paper on quantum key distribution and cryptography, SECOQC Website. http://www.secoqc.net/downloads/secoqc_crypto_wp.pdf. Accessed 03 Feb 2010
  4. 4.
    Lo, H.-K., Chau, H.F.: Unconditional security of quantum key distribution over arbitrarily long distances. Science 283, 2050–2056 (1999)CrossRefGoogle Scholar
  5. 5.
    Schmitt-Manderbach, T., Weier, H., Fürst, M., Ursin, R., Tiefenbacher, F., Scheidl, T., Perdigues, J., Sodnik, Z., Kurtsiefer, C., Rarity, J., Zeilinger, A., Weinfurter, H.: Experimental demonstration of free-space decoy-state quantum key distribution over 144 km. Phys. Rev. Lett. 98(1), 010504 (2007)CrossRefGoogle Scholar
  6. 6.
    Rarity, J., Tapster, P., Gorman, P., Knight, P.: Ground to satellite secure key exchange using quantum cryptography. New J. Phys. 4, 82.1–82.21 (2002)CrossRefGoogle Scholar
  7. 7.
    SECOQC—development of a global network for secure communication based on quantum cryptography. http://www.secoqc.net/. Accessed 03 Feb 2010
  8. 8.
    Wang, Y., Desmedt, Y.: Perfectly secure message transmission revisited. IEEE Trans. Inf. Theory 54(6), 2582–2595 (2008)CrossRefMathSciNetGoogle Scholar
  9. 9.
    Ashwin Kumar, M., Goundan, P. R., Srinathan, K., Pandu Rangan, C.: On perfectly secure communication over arbitrary networks. In: PODC ‘02: Proceedings of the 21st Annual Symposium on Principles of Distributed Computing, pp. 193–202. ACM, New York (2002)Google Scholar
  10. 10.
    Shamir, A.: How to share a secret. Commun. ACM 22(11), 612–613 (1979)zbMATHCrossRefMathSciNetGoogle Scholar
  11. 11.
    Shannon, C.: Communication theory of secrecy systems. Bell Syst. Technical. J. 28, 656–715 (1949)zbMATHMathSciNetGoogle Scholar
  12. 12.
    Rass, S., Schartner, P.: Game-theoretic security analysis of quantum networks. In: Proceedings of the 3rd International Conference on Quantum, Nano- and Micro Technologies, pp. 20–25. IEEE Computer Society Press (2009)Google Scholar
  13. 13.
    Shahriari, H. R., Sadoddin, R., Jalili, R., Zakeri, R., Omidian, A. R.: Information and communications security. In: Network Vulnerability Analysis through Vulnerability Take-Grant Model (VTG), pp. 256–268. Springer, Berlin (2005)Google Scholar
  14. 14.
    Combinatorial analysis utilizing logical dependencies residing on networks (CAULDRON). http://ait.gmu.edu/~csis/. Accessed 04 Feb 2010
  15. 15.
    Houmb, S. H., Franqueira, V. N. L.: Estimating ToE risk level using CVSS. In: Proceedings of the International Conference on Availability, Reliability and Security, pp. 718–725. IEEE Computer Society Press (2009)Google Scholar
  16. 16.
    Innerhofer-Oberperfler, F., Breu, R.: An empirically derived loss taxonomy based on publicly known security incidents. In: Proceedings of the International Conference on Availability, Reliability and Security, pp 66–73. IEEE Computer Society Press (2009)Google Scholar
  17. 17.
    Rass, S.: On Information-Theoretic Security: Contemporary Problems and Solutions. PhD thesis, Klagenfurt University, Institute of Applied Informatics (2009)Google Scholar
  18. 18.
    Rass, S., Schartner, P.: Security in quantum networks as an optimization problem. In: Proceedings of the International Conference on Availability, Reliability and Security, pp. 493–498. IEEE Computer Society Press (2009)Google Scholar
  19. 19.
    Thomas, L.C.: Games, Theory and Applications. Ellis Horwood Ltd, Chichester (1986)Google Scholar
  20. 20.
    Ilog, Inc. Solver CPLEX. http://www.ilog.com/products/cplex/. Accessed 04 Feb 2010
  21. 21.
    Chartrand, G., Zhang, P.: Introduction to Graph Theory. McGraw-Hill, Boston (2005)zbMATHGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC 2010

Authors and Affiliations

  • Stefan Rass
    • 1
    Email author
  • Angelika Wiegele
    • 2
  • Peter Schartner
    • 1
  1. 1.Institute of Applied Informatics, System Security GroupUniversitaet KlagenfurtKlagenfurtAustria
  2. 2.Institute of Mathematics, Operations ResearchUniversitaet KlagenfurtKlagenfurtAustria

Personalised recommendations