Loading…
Towards efficient and secure quantum-classical communication networks
The rapid advancement of quantum technologies calls for the design and deployment of quantum-safe cryptographic protocols and communication networks. There are two primary approaches to achieving quantum-resistant security: quantum key distribution (QKD) and post-quantum cryptography (PQC). While ea...
Saved in:
Published in: | arXiv.org 2024-11 |
---|---|
Main Authors: | , , , , , , , , , |
Format: | Article |
Language: | English |
Subjects: | |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | |
---|---|
cites | |
container_end_page | |
container_issue | |
container_start_page | |
container_title | arXiv.org |
container_volume | |
creator | Zeng, Pei Bandyopadhyay, Debayan Méndez Méndez, José A Bitner, Nolan Kolar, Alexander Solomon, Michael T Heremans, F Joseph Awschalom, David D Jiang, Liang Liu, Junyu |
description | The rapid advancement of quantum technologies calls for the design and deployment of quantum-safe cryptographic protocols and communication networks. There are two primary approaches to achieving quantum-resistant security: quantum key distribution (QKD) and post-quantum cryptography (PQC). While each offers unique advantages, both have drawbacks in practical implementation. In this work, we introduce the pros and cons of these protocols and explore how they can be combined to achieve a higher level of security and/or improved performance in key distribution. We hope our discussion inspires further research into the design of hybrid cryptographic protocols for quantum-classical communication networks. |
format | article |
fullrecord | <record><control><sourceid>proquest</sourceid><recordid>TN_cdi_proquest_journals_3124858954</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>3124858954</sourcerecordid><originalsourceid>FETCH-proquest_journals_31248589543</originalsourceid><addsrcrecordid>eNqNiksKwjAUAIMgWLR3CLgutEmjdS0VD9B9CekLpJ8Xm5fQ69uFB3A1AzMHlgkpq6KphTixnGgsy1Lc7kIpmbG285sOA3Gw1hkHGLnGgROYFICvSWNMS2FmTeSMnrnxy5Jw1-g8coS4-TDRhR2tngnyH8_s-mq757v4BL8moNiPPgXcUy8rUTeqeaha_nd9AfwUPBE</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>3124858954</pqid></control><display><type>article</type><title>Towards efficient and secure quantum-classical communication networks</title><source>ProQuest - Publicly Available Content Database</source><creator>Zeng, Pei ; Bandyopadhyay, Debayan ; Méndez Méndez, José A ; Bitner, Nolan ; Kolar, Alexander ; Solomon, Michael T ; Heremans, F Joseph ; Awschalom, David D ; Jiang, Liang ; Liu, Junyu</creator><creatorcontrib>Zeng, Pei ; Bandyopadhyay, Debayan ; Méndez Méndez, José A ; Bitner, Nolan ; Kolar, Alexander ; Solomon, Michael T ; Heremans, F Joseph ; Awschalom, David D ; Jiang, Liang ; Liu, Junyu</creatorcontrib><description>The rapid advancement of quantum technologies calls for the design and deployment of quantum-safe cryptographic protocols and communication networks. There are two primary approaches to achieving quantum-resistant security: quantum key distribution (QKD) and post-quantum cryptography (PQC). While each offers unique advantages, both have drawbacks in practical implementation. In this work, we introduce the pros and cons of these protocols and explore how they can be combined to achieve a higher level of security and/or improved performance in key distribution. We hope our discussion inspires further research into the design of hybrid cryptographic protocols for quantum-classical communication networks.</description><identifier>EISSN: 2331-8422</identifier><language>eng</language><publisher>Ithaca: Cornell University Library, arXiv.org</publisher><subject>Communication networks ; Quantum cryptography ; Security</subject><ispartof>arXiv.org, 2024-11</ispartof><rights>2024. This work is published under http://arxiv.org/licenses/nonexclusive-distrib/1.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://www.proquest.com/docview/3124858954?pq-origsite=primo$$EHTML$$P50$$Gproquest$$Hfree_for_read</linktohtml><link.rule.ids>780,784,25753,37012,44590</link.rule.ids></links><search><creatorcontrib>Zeng, Pei</creatorcontrib><creatorcontrib>Bandyopadhyay, Debayan</creatorcontrib><creatorcontrib>Méndez Méndez, José A</creatorcontrib><creatorcontrib>Bitner, Nolan</creatorcontrib><creatorcontrib>Kolar, Alexander</creatorcontrib><creatorcontrib>Solomon, Michael T</creatorcontrib><creatorcontrib>Heremans, F Joseph</creatorcontrib><creatorcontrib>Awschalom, David D</creatorcontrib><creatorcontrib>Jiang, Liang</creatorcontrib><creatorcontrib>Liu, Junyu</creatorcontrib><title>Towards efficient and secure quantum-classical communication networks</title><title>arXiv.org</title><description>The rapid advancement of quantum technologies calls for the design and deployment of quantum-safe cryptographic protocols and communication networks. There are two primary approaches to achieving quantum-resistant security: quantum key distribution (QKD) and post-quantum cryptography (PQC). While each offers unique advantages, both have drawbacks in practical implementation. In this work, we introduce the pros and cons of these protocols and explore how they can be combined to achieve a higher level of security and/or improved performance in key distribution. We hope our discussion inspires further research into the design of hybrid cryptographic protocols for quantum-classical communication networks.</description><subject>Communication networks</subject><subject>Quantum cryptography</subject><subject>Security</subject><issn>2331-8422</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2024</creationdate><recordtype>article</recordtype><sourceid>PIMPY</sourceid><recordid>eNqNiksKwjAUAIMgWLR3CLgutEmjdS0VD9B9CekLpJ8Xm5fQ69uFB3A1AzMHlgkpq6KphTixnGgsy1Lc7kIpmbG285sOA3Gw1hkHGLnGgROYFICvSWNMS2FmTeSMnrnxy5Jw1-g8coS4-TDRhR2tngnyH8_s-mq757v4BL8moNiPPgXcUy8rUTeqeaha_nd9AfwUPBE</recordid><startdate>20241105</startdate><enddate>20241105</enddate><creator>Zeng, Pei</creator><creator>Bandyopadhyay, Debayan</creator><creator>Méndez Méndez, José A</creator><creator>Bitner, Nolan</creator><creator>Kolar, Alexander</creator><creator>Solomon, Michael T</creator><creator>Heremans, F Joseph</creator><creator>Awschalom, David D</creator><creator>Jiang, Liang</creator><creator>Liu, Junyu</creator><general>Cornell University Library, arXiv.org</general><scope>8FE</scope><scope>8FG</scope><scope>ABJCF</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>HCIFZ</scope><scope>L6V</scope><scope>M7S</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>PTHSS</scope></search><sort><creationdate>20241105</creationdate><title>Towards efficient and secure quantum-classical communication networks</title><author>Zeng, Pei ; Bandyopadhyay, Debayan ; Méndez Méndez, José A ; Bitner, Nolan ; Kolar, Alexander ; Solomon, Michael T ; Heremans, F Joseph ; Awschalom, David D ; Jiang, Liang ; Liu, Junyu</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-proquest_journals_31248589543</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2024</creationdate><topic>Communication networks</topic><topic>Quantum cryptography</topic><topic>Security</topic><toplevel>online_resources</toplevel><creatorcontrib>Zeng, Pei</creatorcontrib><creatorcontrib>Bandyopadhyay, Debayan</creatorcontrib><creatorcontrib>Méndez Méndez, José A</creatorcontrib><creatorcontrib>Bitner, Nolan</creatorcontrib><creatorcontrib>Kolar, Alexander</creatorcontrib><creatorcontrib>Solomon, Michael T</creatorcontrib><creatorcontrib>Heremans, F Joseph</creatorcontrib><creatorcontrib>Awschalom, David D</creatorcontrib><creatorcontrib>Jiang, Liang</creatorcontrib><creatorcontrib>Liu, Junyu</creatorcontrib><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>Materials Science & Engineering Collection</collection><collection>ProQuest Central (Alumni)</collection><collection>ProQuest Central UK/Ireland</collection><collection>ProQuest Central Essentials</collection><collection>AUTh Library subscriptions: ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Engineering Collection</collection><collection>Engineering Database</collection><collection>ProQuest - Publicly Available Content Database</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>Engineering collection</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Zeng, Pei</au><au>Bandyopadhyay, Debayan</au><au>Méndez Méndez, José A</au><au>Bitner, Nolan</au><au>Kolar, Alexander</au><au>Solomon, Michael T</au><au>Heremans, F Joseph</au><au>Awschalom, David D</au><au>Jiang, Liang</au><au>Liu, Junyu</au><format>book</format><genre>document</genre><ristype>GEN</ristype><atitle>Towards efficient and secure quantum-classical communication networks</atitle><jtitle>arXiv.org</jtitle><date>2024-11-05</date><risdate>2024</risdate><eissn>2331-8422</eissn><abstract>The rapid advancement of quantum technologies calls for the design and deployment of quantum-safe cryptographic protocols and communication networks. There are two primary approaches to achieving quantum-resistant security: quantum key distribution (QKD) and post-quantum cryptography (PQC). While each offers unique advantages, both have drawbacks in practical implementation. In this work, we introduce the pros and cons of these protocols and explore how they can be combined to achieve a higher level of security and/or improved performance in key distribution. We hope our discussion inspires further research into the design of hybrid cryptographic protocols for quantum-classical communication networks.</abstract><cop>Ithaca</cop><pub>Cornell University Library, arXiv.org</pub><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | EISSN: 2331-8422 |
ispartof | arXiv.org, 2024-11 |
issn | 2331-8422 |
language | eng |
recordid | cdi_proquest_journals_3124858954 |
source | ProQuest - Publicly Available Content Database |
subjects | Communication networks Quantum cryptography Security |
title | Towards efficient and secure quantum-classical communication networks |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-27T17%3A34%3A43IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=document&rft.atitle=Towards%20efficient%20and%20secure%20quantum-classical%20communication%20networks&rft.jtitle=arXiv.org&rft.au=Zeng,%20Pei&rft.date=2024-11-05&rft.eissn=2331-8422&rft_id=info:doi/&rft_dat=%3Cproquest%3E3124858954%3C/proquest%3E%3Cgrp_id%3Ecdi_FETCH-proquest_journals_31248589543%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=3124858954&rft_id=info:pmid/&rfr_iscdi=true |