Journal on Communications ›› 2019, Vol. 40 ›› Issue (9): 168-174.doi: 10.11959/j.issn.1000-436x.2019210
• Distinguished and Excellent Young Scholars • Previous Articles Next Articles
Revised:
2019-08-20
Online:
2019-09-25
Published:
2019-09-28
Supported by:
CLC Number:
Hua WANG,Yongli ZHAO. Overview of quantum key distribution metropolitan optical networking technology[J]. Journal on Communications, 2019, 40(9): 168-174.
[16] | ZHAO Y L , CAO Y , WANG W ,et al. Resource allocation in optical networks secured by quantum key distribution[J]. IEEE Communication Magazine, 2018,56(8): 130-137. |
[17] | CAO Y , ZHAO Y L , YU X S ,et al. Resource assignment strategy in optical networks integrated with quantum key distribution[J]. Journal of Optical Communications and Networking, 2017,9(11): 995-1004. |
[18] | WANG H , ZHAO Y , YU X ,et al. Protection schemes for key services in optical networks secured by quantum key distribution (QKD)[J]. Journal of Optical Communications and Networking, 2018,11(3): 67-78. |
[19] | CAO Y , ZHAO Y L , WU Y ,et al. Time-scheduled quantum key distribution (QKD) over WDM networks[J]. Journal of Lightwave Technology, 2018,36(16): 3382-3395. |
[20] | WANG H , ZHAO Y , YU X ,et al. Resilient quantum key distribution (QKD)-integrated optical networks with secret-key recovery strategy[J]. IEEE ACCESS, 2019(05): 60079-60090. |
[21] | CAO Y , ZHAO Y , WANG J ,et al. SDQaaS:software defined networking for quantum key distribution as a service[J]. Optics Express, 2019,27(5): 6892-6909. |
[22] | ALEJANDRO A , VICTOR L , JESUS M M ,et al. Virtual network function deployment and service automation to provide end-to-end quantum encryption[J]. IEEE/OSA Journal of Optical Communications and Networking, 2018,10(4): 421-430. |
[23] | ALEJANDRO A , EMILIO H , PAUL ANTHONY H ,et al. Secure NFV orchestration over an SDN-Controlled optical network with time-shared quantum key distribution resources[J]. Journal of Lightwave Technology, 2017,35(8): 1357-1362. |
[24] | AGUADO A , LOPEZ V , LOPEZ D ,et al. The engineering of software-defined quantum key distribution networks[J]. IEEE Communications Magazine, 2019,57(7): 20-26. |
[25] | CHOI I , YOUNG R J , TOWNSEND P D . Quantum key distribution on a 10Gb/s WDM-PON[J]. Optics express, 2010,18(9): 9600-9612. |
[26] | YOSHINO K , OCHI T , FUJIWARA M ,et al. Maintenance-free operation of WDM quantum key distribution system through a field fiber over 30 days[J]. Optics express, 2013,21(25): 31395-31401. |
[27] | YOSHINO K , FUJIWARA M , TANAKA A ,et al. High-speed wavelength-division multiplexing quantum key distribution system[J]. Optics letters, 2012,37(2): 223-225. |
[28] | GILLES B , FELIX B , NICOLAS G ,et al. Multiuser quantum key distribution using wavelength division multiplexing[J]. Applications of Photonic Technology , 2003(5260): 149-153. |
[29] | BORIS K , CHARLES C L , RAPHAEL H ,et al. Provably secure and practical quantum key distribution over 307 km of optical fibre[J]. Nature Photonics, 2015(9): 163-168. |
[30] | TANAKA A , SASAKI M , FUJIWARA M ,et al. Field test of quantum key distribution in the Tokyo QKD Network[J]. Optics Express, 2011,19(11): 10387-10409. |
[31] | YIN H , CHEN T , YU Z ,et al. Measurement-device-independent quantum key distribution over a 404 km optical fiber[J]. Physical Review Letters, 2016(117): 1-5. |
[32] | CHEN W , HAN Z , ZHANG T ,et al. Field experiment on a “star type”metropolitan quantum key distribution network[J]. IEEE Photonics Technology Letters, 2009,21(9): 575-577. |
[33] | STUCKI D , GISIN N , GUINNARD O ,et al. Quantum key distribution over 67 km with a plug&play system[J]. New Journal of Physics, 2002,4(41): 1-8. |
[34] | DIXON A , DYNES J , LUCAMARINI M ,et al. High speed prototype quantum key distribution system and long term field trial[J]. Optics express, 2015,23(6): 7583-7592. |
[35] | CHEN T Y , WANG J , LIANG H ,et al. Metropolitan all-pass and inter-city quantum communication network[J]. Optics express, 2010,18(26): 27217-27225. |
[36] | GREEN P E , COLDREN L A , JOHNSON K M ,et al. All-optical packet-switched metropolitan-area network proposal[J]. Journal of Lightwave Technology, 1993,11(5/6): 754-763. |
[37] | KAORU S , TOSHIMORI H , MIKIO F ,et al. Performance of long-distance quantum key distribution over 90-km optical links installed in a field environment of Tokyo metropolitan area[J]. Journal of Lightwave Technology, 2013,32(1): 141-151. |
[38] | STEFANO P , CARLO O , GAETANA S ,et al. High-rate measurement-device-independent quantum cryptography[J]. Nature Photonics, 2015(9): 397-402. |
[39] | LI C , ZHOU H , WANG Y ,et al. Secure quantum key distribution network with Bell states and local unitary operations[J]. Chinese Physics Letters, 2005,57(12): 1049-1052. |
[40] | TOLIVER P , RUNSER R , CHAPURAN T ,et al. Experimental investigation of quantum key distribution through transparent optical switch elements[J]. IEEE Photonics Technology Letters, 2003,15(11): 1669-1671. |
[41] | TAKEOKA M , GUHA S , WILDE M M . Fundamental rate-loss tradeoff for optical quantum key distribution[J]. Nature Communications, 2014,(5): 1-7. |
[42] | PATEL K , DYNES J , CHOI I ,et al. Coexistence of high-bit-rate quantum key distribution and data on optical fiber[J]. Physical Review X, 2012(2): 1-8. |
[43] | XIA T , CHEN D , WELLBROCK G ,et al. In-band quantum key distribution (QKD) on fiber populated by high-speed classical data channels[C]// Optical Fiber Communication Conference. IEEE/OSA, 2006: 1-3. |
[44] | PATEL K , DYNES J , LUCAMARINI M ,et al. Quantum key distribution for 10 Gb/s dense wavelength division multiplexing networks[J]. Applied Physics Letters, 2014,22(19): 1-4. |
[45] | QI B , ZHU W , QIAN L ,et al. Feasibility of quantum key distribution through a dense wavelength division multiplexing network[J]. New Journal of Physics, 2010(12): 1-18. |
[46] | RUNSER R , CHAPURAN T , TOLIVER P ,et al. Demonstration of 1.3 μm quantum key distribution (QKD) compatibility with 1.5 μm metropolitan wavelength division multiplexed (WDM) systems[C]// Optical Fiber Communication Conference. IEEE/OSA, 2005: 1-3. |
[47] | THIAGO F , GUILHERME B , GUILHERME P ,et al. Impact of Raman scattered noise from multiple telecom channels on fiber-optic quantum key distribution systems[J]. Journal of Lightwave Technology, 2014,32(13): 2332-2339. |
[48] | WANG L , HONG C , FRIBERG S . Generation of correlated photons via four-wave mixing in optical fibres[J]. Journal of optics B:Quantum and semiclassical optics, 2001,3(5): 346-352. |
[50] | TURITSYN S K , ANIA-CASTA?óN J D , BABIN S A ,et al. 270-km ultralong Raman fiber laser[J]. Physical review letters, 2009,103(13): 1-4. |
[51] | HARALD R , SYLVIA S , ANDREAS P ,et al. Quantum key distribution integrated into commercial WDM systems[C]// Optical Fiber Communication Conference. IEEE/OSA, 2008: 1-3. |
[52] | MCCORMICK C F , MARINO A M , BOYER V ,et al. Strong low-frequency quantum correlations from a four-wave-mixing amplifier[J]. Physical Review A, 2008(78): 1-5. |
[53] | ZHU W , CROZIER K B . Quantum mechanical limit to plasmonic enhancement as observed by surface-enhanced Raman scattering[J]. Nature Communications, 2014(5): 1-8. |
[1] | FOK M P , WANG Z , DENG Y ,et al. Optical layer security in fiber-optic networks[J]. IEEE Transactions on Information Forensics and Security, 2011,6(3): 725-736. |
[2] | RIVEST R , SHAMIR A , ADLEMAN L . A method for obtaining digital signatures and public-key cryptosystems[J]. Communications of the ACM, 1978,21(2): 120-126. |
[3] | FAUSTO M , WALTER F , JOSé S ,et al. RSA encryption algorithm optimization to improve performance and security level of network messages[J]. International Journal of Computer Science and Network Security, 2016,16(8): 55-62. |
[4] | NINA S , MARIJA F , SZILARD Z ,et al. Physical-layer security in evolving optical networks[J]. IEEE Communication Magazine, 2016,54(8): 110-117. |
[5] | PAUL A M D , . The principles of quantum mechanics[M]// 3rd ed. Oxford:Clarendon Press, 1947. |
[6] | ISLAM N T , LIM C W , CAHALL C ,et al. Provably secure and high-rate quantum key distribution with time-bin qudits[J]. Science Advances, 2017,3(11): 1-6. |
[7] | LO H , CURTY M , TAMAKI K . Secure quantum key distribution[J]. Nature photonics, 2014(8): 595-604. |
[8] | DANNA R , JIM W H , PATRICK R R ,et al. Long-distance decoy-state quantum key distribution in optical fiber[J]. Physic Review Letter, 2007,98(1): 1-4. |
[9] | SHOR P W , PRESKILL J . Simple proof of security of the BB84 quantum key distribution protocol[J]. Physical review letters, 2000,85(2): 441-444. |
[10] | MOMTCHIL P , ANDREAS P , OLIVER M ,et al. The SECOQC quantum key distribution network in Vienna[J]. New Journal of Physics, 2009,11(7): 1-37. |
[11] | PEEV M , PACHER C , ALLEAUME R ,et al. Long-term performance of the SwissQuantum quantum key distribution network in a field environment[J]. New Journal of Physics, 2011(13): 1-19. |
[12] | HUGHES R J , MORGAN G L , PETERSON C G . Quantum key distribution over a 48 km optical fibre network[J]. Journal of Modern Optics, 2000,47(2-3): 533-547. |
[13] | WANG S , CHEN W , YIN Z ,et al. Field and long-term demonstration of a wide area quantum key distribution network[J]. Optics express, 2014,22(18): 21739-21756. |
[14] | CAO Y , ZHAO Y L , YU X S ,et al. Experimental demonstration of end-to-end key on demand service provisioning over quantum key distribution networks with software defined networking[C]// In Proceedings of the OFC. IEEE/OSA, 2019: 1-3. |
[15] | CAO Y , ZHAO Y L , COLMAN-MEIXNER C ,et al. Key on demand (KoD) for software-defined optical networks secured by quantum key distribution (QKD)[J]. Optics Express, 2017,25(22): 26453-26467. |
[54] | NEJABATI R , WANG R , BRAVALHERI A ,et al. First demonstration of quantum-secured,inter-domain 5G service orchestration and on-demand NFV chaining over flexi-WDM optical networks[C]// Optical Fiber Communication Conference. IEEE/OSA, 2019: 1-3. |
[1] | Shiqi ZHAO, Xiaohong HUANG, Zhigang ZHONG. Research and implementation of reputation-based inter-domain routing selection mechanism [J]. Journal on Communications, 2023, 44(6): 47-56. |
[2] | Yingze LIU, Yuanbo GUO, Chen FANG, Yongfei LI, Qingli CHEN. Intelligent planning method for cyber defense strategies based on bounded rationality [J]. Journal on Communications, 2023, 44(5): 52-63. |
[3] | Yuancheng LI, Yongtai QIN. Deep reinforcement learning based algorithm for real-time QoS optimization of software-defined security middle platform [J]. Journal on Communications, 2023, 44(5): 181-192. |
[4] | Renchao XIE, Wen WEN, Qinqin TANG, Yunlong LIU, Gaochang XIE, Tao HUANG. Survey on rail transit mobile edge computing network security [J]. Journal on Communications, 2023, 44(4): 201-215. |
[5] | Zhiyong LUO, Yu ZHANG, Qing WANG, Weiwei SONG. Study of SDN intrusion intent identification algorithm based on Bayesian attack graph [J]. Journal on Communications, 2023, 44(4): 216-225. |
[6] | Ming XU, Baojun ZHANG, Yiming WU, Chenduo YING, Ning ZHENG. Cyber attacks and privacy protection distributed consensus algorithm for multi-agent systems [J]. Journal on Communications, 2023, 44(3): 117-127. |
[7] | Haiyan KANG, Molan LONG. Research on network attack analysis method based on attack graph of absorbing Markov chain [J]. Journal on Communications, 2023, 44(2): 122-135. |
[8] | Caixia LIU, Xinsheng JI, Jiangxing WU. Endogenous security common problems and solutions of the mobile communication networks [J]. Journal on Communications, 2022, 43(9): 70-79. |
[9] | Runhua SHI, Hui YU, Weiyang KE, Xiaotong XU. Quantum anonymous one-vote veto protocol based on BB84 states [J]. Journal on Communications, 2022, 43(8): 109-120. |
[10] | Weiyu CHEN, Junshan LUO, Fanggang WANG, Haiyang DING, Shilian WANG, Guojiang XIA. Survey of capacity limits and implementation techniques in wireless covert communication [J]. Journal on Communications, 2022, 43(8): 203-218. |
[11] | Yuanbo GUO, Yongfei LI, Qingli CHEN, Chen FANG, Yangyang HU. Fusion of Focal Loss’s cyber threat intelligence entity extraction [J]. Journal on Communications, 2022, 43(7): 85-92. |
[12] | Hongbin LUO, Shan ZHANG, Zhiyuan WANG. Architecture and mechanisms for secure and efficient internetworking of heterogeneous network [J]. Journal on Communications, 2022, 43(4): 36-49. |
[13] | Huanhuan LIAN, Huiying HOU, Yunlei ZHAO. Post-quantum verifier-based three-party password authenticated key exchange protocol [J]. Journal on Communications, 2022, 43(4): 95-106. |
[14] | Yu ZHANG, Xiongwen ZHAO, Xiaoqing WANG, Suiyan GENG, Peng QIN, Zhenyu ZHOU. Robust resource allocation algorithm for multicarrier NOMA security communication system [J]. Journal on Communications, 2022, 43(3): 42-52. |
[15] | Hongyu YANG, Haihang YUAN, Liang ZHANG. Host security assessment method based on attack graph [J]. Journal on Communications, 2022, 43(2): 89-99. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|