Show simple item record

dc.contributor.authorLemons, N.
dc.contributor.authorGelfand, B.
dc.contributor.authorLawrence, N.
dc.contributor.authorThresher, A.
dc.contributor.authorTripp, J.L.
dc.contributor.authorGammel, W.P.
dc.contributor.authorNadiga, A.
dc.contributor.authorMeier, K.
dc.contributor.authorNewell, R.
dc.date.accessioned2024-08-18T22:58:25Z
dc.date.available2024-08-18T22:58:25Z
dc.date.issued2023-06-29
dc.identifier.citationNathan Lemons, Boris Gelfand, Nigel Lawrence, Austin Thresher, Justin L. Tripp, William Pierre Gammel, Aniruddha Nadiga, Kristina Meier, and Raymond Newell, "Extending quantum key distribution through proxy re-encryption," J. Opt. Commun. Netw. 15, 457-465 (2023)
dc.identifier.issn1943-0620
dc.identifier.doi10.1364/JOCN.474487
dc.identifier.urihttp://hdl.handle.net/10150/674666
dc.description.abstractModern quantum key distribution (QKD) network designs are based on sending photons from one node to another and require free-space or dedicated fiber optic cables between nodes. The purpose of this is to co-generate secret key material on both sides of the quantum channel. In addition to this quantum link, there are several insecure classical channels that allow QKD algorithms to exchange book-keeping information and send symmetrically encrypted data. The attenuation of photons transmitted through fiber becomes too high to practically generate key material over fiber at distances of more than 100 km. Free-space transmission through the atmosphere or the vacuum of space can reduce attenuation, but at the cost of system complexity and sensitivity to other impairments, such as weather. To extend the effective range of QKD networks, we present a method that combines QKD algorithms with post-quantum, homomorphic key-switching to allow multiple parties to effectively share secret key material over longer distances through semi-trusted relay nodes. We define how such a system should work for arbitrary network topologies and provide proofs that our scheme is both correct and secure. We assess the feasibility of this solution by building and evaluating two implementations based on lattice-based cryptography: learning with errors. © 2009-2012 Optica Publishing Group.
dc.language.isoen
dc.publisherInstitute of Electrical and Electronics Engineers Inc.
dc.rights© 2023 Optica Publishing Group under the terms of the Optica Open Access Publishing Agreement.
dc.rights.urihttp://rightsstatements.org/vocab/InC/1.0/
dc.titleExtending quantum key distribution through proxy re-encryption
dc.typeArticle
dc.typetext
dc.contributor.departmentProgram in Applied Mathematics, The University of Arizona
dc.identifier.journalJournal of Optical Communications and Networking
dc.description.noteImmediate access
dc.description.collectioninformationThis item from the UA Faculty Publications collection is made available by the University of Arizona with support from the University of Arizona Libraries. If you have questions, please contact us at repository@u.library.arizona.edu.
dc.eprint.versionFinal Published Version
dc.source.journaltitleJournal of Optical Communications and Networking
refterms.dateFOA2024-08-18T22:58:25Z


Files in this item

Thumbnail
Name:
jocn-15-7-457.pdf
Size:
3.091Mb
Format:
PDF
Description:
Final Published Version

This item appears in the following Collection(s)

Show simple item record