DocumentCode :
1810445
Title :
How to overcome the ´Trusted Node Model´ in Quantum Cryptography
Author :
Schartner, Peter ; Rass, Stefan
Author_Institution :
Syst. Security Group, Klagenfurt Univ., Klagenfurt, Austria
Volume :
3
fYear :
2009
fDate :
29-31 Aug. 2009
Firstpage :
259
Lastpage :
262
Abstract :
Among the various proposals for quantum network design, the trusted node model is still the most flexible one for delivery of messages over arbitrary long distances. However, the outstanding security features of these networks are equally well defeated by the trusted relay. In brief this means, that messages sent over a certain node become completely insecure as soon as the node is compromised and the attacker hence knows the keys stored within this node. In this paper we propose a simple technique to reduce the damage in case of a compromised node. More precisely we will show, that none of the messages handled by the compromised node becomes insecure, as long as the compromised node is shut down in a certain time interval after detecting the attack. Additionally, our approach reduces the memory needed to store key material inside the nodes by 50%, whilst increasing security.
Keywords :
quantum cryptography; quantum cryptography; quantum network design; trusted node model; Buffer storage; Computer networks; Cryptography; Design engineering; Optical fibers; Proposals; Quantum computing; Relays; Repeaters; Security; Perfectly Secure Communication; Quantum Cryptography; Trusted Relay;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computational Science and Engineering, 2009. CSE '09. International Conference on
Conference_Location :
Vancouver, BC
Print_ISBN :
978-1-4244-5334-4
Electronic_ISBN :
978-0-7695-3823-5
Type :
conf
DOI :
10.1109/CSE.2009.171
Filename :
5283524
Link To Document :
بازگشت