Chinese Journal of Network and Information Security ›› 2017, Vol. 3 ›› Issue (11): 12-21.doi: 10.11959/j.issn.2096-109x.2017.00215
• Academic paper • Previous Articles Next Articles
Chao YANG1(),Hong-qi ZHANG1,Jin-hai SU1,Hua-cheng CHEN2
Revised:
2017-11-02
Online:
2017-11-01
Published:
2017-11-30
Supported by:
CLC Number:
Chao YANG,Hong-qi ZHANG,Jin-hai SU,Hua-cheng CHEN. Routing scheme for key-relaying-based quantum key distribution network in wide-area[J]. Chinese Journal of Network and Information Security, 2017, 3(11): 12-21.
[1] | BENNETT C H . BRASSARD G . Quantum cryptography:public key distribution and coin tossing[C]// IEEE International Confe-rence on Computers,Systems,and Signal Processing. 1984: 175-1984. |
[2] | 马瑞霖 . 量子密码通信[M]. 北京: 科学出版社. 2006. |
MA R L . Quantum cryptography communication[M]. Beijing: China Science Publishing. 2006. | |
[3] | 尹浩, 马怀新 . 军事量子通信概论[M]. 北京: 军事科学出版社. 2006.6. |
YIN H , MA H X . The outline of military quantum communication[M]. Beijing: Military Science Publishing House. 2006.6 | |
[4] | 李泽霞, 边文越 . 未来10年中国可能发生的19个重大科技突破[J]. 中国科学院院刊, 2013,28(5): 601-604. |
LI Z X , BIAN W Y . The 19 Chinese possible major technological breakthroughs in the next 10 Years[J]. JBulletin of Chinese Academy of Sciences. 2013,28(5): 601-604. | |
[5] | 吴张斌, 陈光, 杨伯君 . 量子密钥分配网络分析[J]. 光通信研究, 2009,2: 22-24. |
WU ZH B , CHEN G , YANG B J . Analysis of quantum key distribution networks[J]. Study on Optical Communications. 2009,2: 22-24. | |
[6] | NICOL′O L P , et al. Long-distance trust-free quantum key distribu-tion[J]. IEEE Journal of Selected Topics in Quantum Electronics, 2015,21(3): 6600508. |
[7] | TANIZAWA Y , TAKAHASHI R , DIXON A R . A routing method designed for a Quantum Key Distribution network[C]// The Eighth International Conference on Ubiquitous and Future Networks,IEEE. 2016: 208-214. |
[8] | DIANATI M , ALLéAUME R , GAGNAIRE M , et al. Architecture and protocols of the future European quantum key distribution network[J]. Security & Communication Networks, 2008,1(1): 57-74. |
[9] | 韩伟, 武欣嵘, 朱勇 , 等. 基于信任中继的 QKD 网络路由选择研究[J]. 军事通信技术, 2013,34(4): 43-48. |
HAN W , WU X R , ZHU Y , et al. QKD network routing research based on trust relay[J]. Journal of Military Communications Technology. 2013,34(4): 43-48. | |
[10] | 石磊, 苏锦海, 郭义喜 . 量子密钥分发网络端密钥协商最优路径选择算法[J]. 计算机应用, 2013,34(4): 3336-3341. |
SHI L , SU J H , et al. Optimal routing selection algorithm of end-to-end key agreement in quantum key distribution network[J]. Journal of Computer Applications. 2013,34(4): 3336-3341. | |
[11] | PHOENIX S J D , BARNETT S M . Relay QKD networks & bit transport[J]. arXiv:1502.06319v1[quant-ph], 23 Feb 2015. |
[12] | WEN H , HAN Z F , ZHAO Y B , et al. Multiple stochastic paths scheme on partiallytrusted relay quantum key distribution net-work[J]. Science in China, 2009,52(1): 18-22. |
[13] | BARNETT S M , PHOENIX S J D . Securing a quantum key distri-bution relay network using secret sharing[C]// 2011 IEEE GCC Conference and Exhibition(GCC). 2011: 19-22. |
[14] | BENNETT C H . Quantum cryptography using any two nonorthogonal[J]. Physical Review Letters, 1992,68(21): 3121. |
[15] | LO H K , MA X F , CHEN K . Decoy state quantum key distribu-tion[J]. Physical Review Letters, 2005,942(3): 230-504. |
[16] | 陈晖, 张文政 . 量子密钥分发技术的机遇与挑战[J]. 中国电子科学研究院学报, 2014,9(1): 27-31. |
CHEN H , ZHANG W Z . The opportunity and challenge on quantum key distribution[J]. Journal of CAEIT, 2014,9(1): 27-31. | |
[17] | 吴华, 王向斌 . 量子通信现状与展望[J]. 中国科学, 2014,44(3): 296-311. |
WU H , WANG X B , PAN J W . Quantum communication:status and prospects[J]. Science China, 2014,44(3): 296-311. |
[1] | Xianyi CHEN, Jun GU, Kai YAN, Dong JIANG, Linfeng XU, Zhangjie FU. Double adversarial attack against license plate recognition system [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 16-27. |
[2] | Tianpeng YE, Xiang LIN, Jianhua LI, Xuankai ZHANG, Liwen XU. Personalized lightweight distributed network intrusion detection system in fog computing [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 28-37. |
[3] | Lijun ZU, Yalin CAO, Xiaohua MEN, Zhihui LYU, Jiawei YE, Hongyi LI, Liang ZHANG. Adaptive selection method of desensitization algorithm based on privacy risk assessment [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 49-59. |
[4] | Ruiqi XIA, Manman LI, Shaozhen CHEN. Identification on the structures of block ciphers using machine learning [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 79-89. |
[5] | Jingyi YUAN, Zichuan LI, Guojun PENG. EN-Bypass: a security assessment method on e-mail user interface notification [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 90-101. |
[6] | Feng YU, Qingxin LIN, Hui LIN, Xiaoding WANG. Privacy-enhanced federated learning scheme based on generative adversarial networks [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 113-122. |
[7] | Chuntao ZHU, Chengxi YIN, Bolin ZHANG, Qilin YIN, Wei LU. Forgery face detection method based on multi-domain temporal features mining [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 123-134. |
[8] | Xiaomeng LI, Daidou GUO, Xunfang ZHUO, Heng YAO, Chuan QIN. Carrier-independent screen-shooting resistant watermarking based on information overlay superimposition [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 135-149. |
[9] | Zhao CAI, Tao JING, Shuang REN. Survey on Ethereum phishing detection technology [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 21-32. |
[10] | Yan PAN, Wei LIN, Yuefei ZHU. Progressive active inference method of protocol state machine [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 81-93. |
[11] | Pan YANG, Fei KANG, Hui SHU, Yuyao HUANG, Xiaoshao LYU. Binary program taint analysis optimization method based on function summary [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 115-131. |
[12] | Tian XIAO, Zhihao JIANG, Peng TANG, Zheng HUANG, Jie GUO, Weidong QIU. High-performance directional fuzzing scheme based on deep reinforcement learning [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 132-142. |
[13] | Chenghao YUAN, Yong LI, Shuang REN. Dynamic multi-keyword searchable encryption scheme [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 143-153. |
[14] | Zezhou HOU, Jiongjiong REN, Shaozhen CHEN. Security evaluation for parameters of SIMON-like cipher based on neural network distinguisher [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 154-163. |
[15] | Xuejing GUO, Yixiang FANG, Yi ZHAO, Tianzhu ZHANG, Wenchao ZENG, Junxiang WANG. Traditional guidance mechanism based deep robust watermarking [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 175-183. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|