dc.contributor.author | Jiang, Yuming | |
dc.contributor.author | Sun, Fengyou | |
dc.date.accessioned | 2018-05-24T12:48:28Z | |
dc.date.available | 2018-05-24T12:48:28Z | |
dc.date.created | 2018-01-19T13:35:07Z | |
dc.date.issued | 2017 | |
dc.identifier.isbn | 978-1-5386-3920-7 | |
dc.identifier.uri | http://hdl.handle.net/11250/2499118 | |
dc.description.abstract | This paper aims to present a mathematical tool useful for quantum key distribution network configuration. In particular, the paper studies the throughput of secret key distribution in a quantum key distribution network with trusted repeaters. In addition, the backlog of secret keys at a trusted repeater is also investigated. The analysis is based on the queueing principle of secret keys in the trusted repeater, implied by that the transmission of secret keys in the network is store-and-forward. The obtained results are applied to a discrete-variable protocol with weak coherent pulse sources, where realistic system parameters are integrated in the analysis. It is shown that, if the secret key rates on the transmission path are different, the transient throughput of secret key distribution through the network also vary, located between an upper bound and a lower bound of the secrete key distribution rate. | nb_NO |
dc.language.iso | eng | nb_NO |
dc.publisher | Institute of Electrical and Electronics Engineers (IEEE) | nb_NO |
dc.relation.ispartof | Proceedings of IEEE GLOBECOM 2017 Workshops | |
dc.title | Performance Guarantees in Quantum Key Distribution Networks | nb_NO |
dc.type | Chapter | nb_NO |
dc.description.version | submittedVersion | nb_NO |
dc.identifier.doi | 10.1109/GLOCOMW.2017.8269074 | |
dc.identifier.cristin | 1547518 | |
dc.description.localcode | © 2018 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. | nb_NO |
cristin.unitcode | 194,63,30,0 | |
cristin.unitname | Institutt for informasjonssikkerhet og kommunikasjonsteknologi | |
cristin.ispublished | true | |
cristin.fulltext | preprint | |
cristin.qualitycode | 1 | |