Latest Research

Home>Latest Research>Scalable authentication and optimal flooding in a quantum network

February 10, 2021

Return to Latest Research

Scalable authentication and optimal flooding in a quantum network

By Naomi R. Solomons, Alasdair I. Fletcher, Djeylan Aktas et al.

Submitted to arXiv on 28 January 2021.

The global interest in quantum networks stems from the security guaranteed by the laws of physics. Deploying quantum networks means facing the challenges of scaling up the physical hardware and, more importantly, of scaling up all other network layers and optimally utilising network resources. Here we consider two related protocols, their experimental demonstrations on an 8-user quantum network test-bed, and discuss their usefulness with the aid of example use cases. First, an authentication transfer protocol to manage a fundamental limitation of quantum communication — the need for a pre-shared key between every pair of users linked together on the quantum network. By temporarily trusting some intermediary nodes for a short period of time (<35 min in our network), we can generate and distribute these initial authentication keys with a very high level of security. Second, when end users quantify their trust in intermediary nodes, our flooding protocol can be used to improve both end-to-end communication speeds and increase security against malicious nodes.

Read the whole paper here. 

Important information

Thank you for your interest in the work of the Quantum Communications Hub (2014-2024). The project is now complete but you can still explore all our resources on this website. You can also download our legacy report through this link

Information on the Hub’s SPOQC quantum cubesat mission, scheduled to launch in 2025, can be accessed in this section, but please note that this website will no longer be updated with new content. Information around the launch of the mission will be publicised through press releases.