Secret Key Rate Over Multiple Relays in Quantum Key Distribution for Cyber–Physical Systems

    Research output: Contribution to journalArticlepeer-review

    3 Scopus citations

    Abstract

    —In a cyber–physical system, quantum key distribution (QKD) protocols can provide a continuous supply of common secret key bits for secure communications between the control center and a remote device. QKD protocols operate on a peer-to-peer basis between two adjacent nodes and are distance-limited. Hence, trusted nodes are installed between two communicating end nodes for a better QKD range and key rate. These trusted nodes relay in a hop-by-hop manner, key bits generated in the first hop to the other end node. At each trusted node, the first hop key bits are encrypted by other locally generated key bits before being relayed. Since QKD process is stochastic, secret key bits are generated at different rates at different hops. Thus, buffer is needed at a trusted node to temporally hold some key bits while waiting for other key bits. There is no existing work that accounts for such a realistic relaying operation in deriving the key rate. This article contributes to developing a key rate model to determine accurately the end-to-end rates across multiple trusted nodes. We have evaluated accuracy of the proposed model through extensive simulations. The results show that there exist an optimal number of trusted nodes for a given distance between two end nodes. For example, the optimal number of relays increases from four for 100 km to six for 200 km.

    Original languageBritish English
    Pages (from-to)9599-9609
    Number of pages11
    JournalIEEE Transactions on Industrial Informatics
    Volume20
    Issue number7
    DOIs
    StatePublished - 2024

    Keywords

    • Communication security
    • Cryptography
    • one-time-pad (OTP)
    • Peer-to-peer computing
    • Photonics
    • Quantum channels
    • Quantum key distribution
    • quantum key distribution (QKD)
    • Quantum state
    • Relays
    • secret key rate
    • trusted node

    Fingerprint

    Dive into the research topics of 'Secret Key Rate Over Multiple Relays in Quantum Key Distribution for Cyber–Physical Systems'. Together they form a unique fingerprint.

    Cite this