Springer Nature is making SARS-CoV-2 and COVID-19 research free. View research | View latest news | Sign up for updates

Standardization of Quantum Key Distribution in ETSI

Abstract

This article describes in the first part the background of this new key distribution technology for cryptographic keys, called QKD (quantum key distribution) and compares it to classic key distribution principles and its basic functioning. In the second part it introduces the need for QKD and the link to standardization, with its approach by the ISG (industry specification group) QKD in ETSI (European Telecommunication Standards Institute). Finally the article gives an outlook on the future next steps.

This is a preview of subscription content, log in to check access.

References

  1. 1.

    Alleaume, R., et al. (2007). SECOQC white paper, quantum key distribution and cryptography.

  2. 2.

    Renner, R. (2005). Security of quantum key distribution. PhD thesis, ETH Zurich (eprint quant-ph=0512258=).

  3. 3.

    Rivest R., Shamir A., Adleman L. (1978) A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM 21(2): 120–126

  4. 4.

    Vernam G. S. (1926) Cipher printing telegraph system for secret wire and radio telegraph communications. Journal American Institute of Electrical Engineers XLV: 109–115

  5. 5.

    Shannon C. E. (1949) Communication theory of secrecy systems. Bell System Technical Journal 28(4): 656–715

  6. 6.

    Wooters W., Zurek W. (1982) Single quantum cannot be cloned. Nature 299: 802–803

  7. 7.

    Schrödinger, E. (1935). Die gegenwärtige Situation in der Quantenmechanik, Naturwissenschaften, 23, 807 (823,844).

  8. 8.

    Bennett, C. H., Brassard, G. (1984). Quantum cryptography: public key distribution and coin tossing. In (Proceedings of the IEEE international conference on computers, systems and signal processing). (pp. 175–179) Bangalore, India

  9. 9.

    Gisin N., Ribordy G., Tittel W., Zbinden H. (2002) Quantum cryptography. Reviews of Modern Physics 74: 145

  10. 10.

    Collins D., Gisin N., Riedmatten H. (2005) Quantum relays for long distance quantum cryptography. Journal of Modern Optics 52: 735

  11. 11.

    Elliott C. (2002) Building the quantum network. New Journal of Physics 4: 46

  12. 12.

    Elliott, C. et al. (2005). Current status of the darpa quantum network (eprint arxiv:quant-ph=0503058=).

  13. 13.

    Peev, M., Pacher, C., Alléaume, R., Barreiro, C., Bouda, J., Boxleitner, W., et al. (2009). The SECOQC quantum key distribution network in Vienna. New Journal of Physics, 11, 075001, 37 pp.

  14. 14.

    Dodson, D., Fujiwara, M., Grangier, P., Hayashi, M., Imafuku, K., Kitayama, K.-I., et al. (2009). UQC Report: “Updating Quantum Cryptography”. Quantum physics; Cryptography and security. (available at http://arxiv.org/abs/0905.4325).

  15. 15.

    Laenger, T., Soto Rodriguez, M., Peev, M., Alleaume, R., Mink, A., Lowans, B., et al. (2010). ETSI GS QKD 002 V1.0.0. Use Cases.

  16. 17.

    Länger, T. & Lenhart, G. (2009) ETSI standardization of quantum key distribution and the ETSI standardization initiative ISG-QKD. New Journal of Physics, 11, 055051, 16 pp.

Download references

Author information

Correspondence to Gaby Lenhart.

Rights and permissions

Reprints and Permissions

About this article

Cite this article

Weigel, W., Lenhart, G. Standardization of Quantum Key Distribution in ETSI. Wireless Pers Commun 58, 145–157 (2011). https://doi.org/10.1007/s11277-011-0293-8

Download citation

Keywords

  • Cryptography
  • ICT
  • Industry
  • Information theory
  • Privacy
  • Quantum cryptography
  • Security