Security of Quantum Repeater Network Operation
Technical Report,29 May 2014,28 May 2016
KEIO UNIVERSITY Fujisawa Japan
Pagination or Media Count:
Much of the work on quantum networks, both entangled and unentangled, has been about the uses of quantum networks to enhance end-host security. The most famous such application, of course, is quantum key distribution QKD, detecting eavesdroppers and creating shared, secret random numbers for use as encryption keys Bennett and Brassard, 1984. Typically the study of these applications involves information theoretic analysis of the amount of information that an attacker can glean from the use of the network. In this project, we addressed security and quantum networks from an entirely different angle we investigated the security of the networks themselves. We wanted to know if a single misbehaving node, or a small number of them, can disrupt operation of the network. Our work produced a first-of-its-kind taxonomy of potential attacks on quantum repeater network operations.
- Computer Systems