Warning: You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in or
create an account, your edits will be attributed to your username, along with other benefits.
The edit can be undone.
Please check the comparison below to verify that this is what you want to do, and then publish the changes below to finish undoing the edit.
Latest revision |
Your text |
Line 1: |
Line 1: |
| The very first and initial network stage has trusted quantum repeaters, i.e. we do not study the scenerio where repeaters could be accessible to a dishonest party (Eve). Quantum Repeaters are used to transmit quantum information over long distances. As quantum channels are inherently lossy so, to reach longer distances, intermediate nodes called quantum repeaters are necessary. These
| | Quantum repeaters are used to transmit quantum information over long dis- |
| repeaters are placed at calculated intervals along the quantum channel, allowing qubits to be transmitted over arbitrarily long distances. In its simplest form, a quantum repeater works by first generating entanglement between the repeater and each of the end nodes individually. This stage has possibility of having at-least two nodes connected by repeaters and a sequence of short distance links that connect intermediary repeaters. The two ends can receive quantum-generated codes but cannot send or receive quantum states as end-to-end transmission of qubits is not allowed. Any two end users can share an encryption key and here the trusted repeater would have access to keys as well. Each pair of adjacent nodes uses [[Quantum Key Distribution]] to exchange encryption keys. These pairwise keys allow the end nodes to generate their own key which would be longer in length, provided that all intermediary nodes are trusted. The first step towards upgrading these networks could be [[Measurement Device Independent Quantum Key Distribution (MDI-QKD)]], which is a QKD protocol that is secure even with untrusted measurement devices. | | tances. Quantum channels are inherently lossy. Hence to reach longer dis- |
| [[Category:Network Stages]]
| | tances, intermediate nodes called quantum repeaters are necessary. These |
| | repeaters are placed at calculated intervals along the quantum channel, allow- |
| | ing qubits to be transmitted over arbitrarily long distances. In its simplest |
| | form, a quantum repeater works by �rst generating entanglement between the |
| | repeater and each of the end nodes individually. |
| | This stage has the functionality of forming a trusted repeater network, hav- |
| | ing at least two end nodes. The two ends can receive quantum-generated |
| | codes but cannot send or receive quantum states as end-to-end transmission |
| | of qubits is not allowed. Any two end users can share an encryption key and |
| | here the trusted repeater would have access to keys as well. |
| | Each pair of adjacent nodes uses Quantum Key Distribution (link here) to |
| | exchange encryption keys. These pairwise keys allow the end nodes to generate |
| | their own key, provided that all intermediary nodes are trusted. The �rst step |
| | towards upgrading these networks could be measurement deviceindependent |
| | QKD (link here), which is a QKD protocol that is secure even with un-trusted |
| | measurement devices. |