Loading…
Multi-protocol updating for seamless key negotiation in quantum metropolitan networks
Quantum key distribution (QKD) can provide long-term security for numerous users. Currently, quantum networks are still in the early stages of small-scale deployment, most of which can only support a single QKD protocol (QKDP). However, with the advancement of various QKDPs, a single-protocol quantu...
Saved in:
Published in: | Journal of optical communications and networking 2024-07, Vol.16 (7), p.735-749 |
---|---|
Main Authors: | , , , , , , , , , |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that this one cites |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | Quantum key distribution (QKD) can provide long-term security for numerous users. Currently, quantum networks are still in the early stages of small-scale deployment, most of which can only support a single QKD protocol (QKDP). However, with the advancement of various QKDPs, a single-protocol quantum network is no longer sufficient to meet the demands of multiple users, prompting the emergence of multi-protocol quantum networks. Nevertheless, the transition from a single-protocol to a multi-protocol quantum network still faces many challenging issues, such as key negotiation interruptions due to device initialization and channel calibration during protocol updating. To address the quantum key negotiation interruption problem, we propose a seamless key negotiation oriented multi-protocol updating algorithm in this work, which can fulfill the protocol updating requests of different users in quantum metropolitan networks. Furthermore, to better improve network performance while meeting diverse user demands, we propose four heuristic algorithms for optimal QKDP recommendation, focusing on their applications for multi-protocol updating in different types of typical networks. We perform the simulations with different QKDP recommendation algorithms to analyze the impact of the cache time of the key cache area on the key negotiation interruption probability and the time resource utilization. Simulation results demonstrate that the proposed algorithm can reduce the key negotiation interruption probability by 77.7% while increasing the time resource utilization by 15.3% compared to no key cache area. |
---|---|
ISSN: | 1943-0620 1943-0639 |
DOI: | 10.1364/JOCN.511999 |