Experimental quantum cryptography
Journal of Cryptology - Eurocrypt '90
IEEE Security and Privacy
Architectural implications of quantum computing technologies
ACM Journal on Emerging Technologies in Computing Systems (JETC)
Particle-based methodology for representing mobile ad-hoc networks
InterSense '06 Proceedings of the first international conference on Integrated internet ad hoc and sensor networks
Security and self-organization in transparent optical networks: an overview
AcessNets '06 Proceedings of the 1st international conference on Access networks
Communication Links for Distributed Quantum Computation
IEEE Transactions on Computers
System design for a long-line quantum repeater
IEEE/ACM Transactions on Networking (TON)
Secure identification and QKD in the bounded-quantum-storage model
CRYPTO'07 Proceedings of the 27th annual international cryptology conference on Advances in cryptology
Towards the world-wide quantum network
ISPEC'08 Proceedings of the 4th international conference on Information security practice and experience
Protocol design for quantum repeater networks
AINTEC '11 Proceedings of the 7th Asian Internet Engineering Conference
A prototype of a free-space QKD scheme based on the B92 protocol
Proceedings of the 4th International Symposium on Applied Sciences in Biomedical and Communication Technologies
Attacks on fixed apparatus quantum key distribution schemes
TPNC'12 Proceedings of the First international conference on Theory and Practice of Natural Computing
On the security of interferometric quantum key distribution
TPNC'12 Proceedings of the First international conference on Theory and Practice of Natural Computing
Quantum Information & Computation
A sessional blind signature based on quantum cryptography
Quantum Information Processing
The Correlation Conversion property of quantum channels
Quantum Information Processing
Hi-index | 0.00 |
BBN, Harvard, and Boston University are building the DARPA Quantum Network, the world's first network that delivers end-to-end network security via high-speed Quantum Key Distribution, and testing that Network against sophisticated eavesdropping attacks. The first network link has been up and steadily operational in our laboratory since December 2002. It provides a Virtual Private Network between private enclaves, with user traffic protected by a weak-coherent implementation of quantum cryptography. This prototype is suitable for deployment in metro-size areas via standard telecom (dark) fiber. In this paper, we introduce quantum cryptography, discuss its relation to modern secure networks, and describe its unusual physical layer, its specialized quantum cryptographic protocol suite (quite interesting in its own right), and our extensions to IPsec to integrate it with quantum cryptography.