Scalable authentication and optimal flooding in a quantum network

Research output: Contribution to journalArticlepeer-review

Full text download(s)

Published copy (DOI)

Author(s)

  • Naomi R. Solomons
  • Alasdair I. Fletcher
  • Djeylan Aktas
  • Natarajan Venkatachalam
  • Sören Wengerowsky
  • Martin Lončarić
  • Sebastian P. Neumann
  • Bo Liu
  • Željko Samec
  • Mario Stipčević
  • Rupert Ursin
  • Stefano Pirandola
  • John G. Rarity
  • Siddarth Koduru Joshi

Department/unit(s)

Publication details

JournalPRX Quantum
DateAccepted/In press - 16 Nov 2021
DatePublished (current) - 18 Apr 2022
Volume3
Number of pages18
Original languageEnglish

Abstract

The global interest in quantum networks stems from the security guaranteed by the laws of physics. Deploying quantum networks means facing the challenges of scaling up the physical hardware and, more importantly, of scaling up all other network layers and optimally utilising network resources. Here we consider two related protocols, their experimental demonstrations on an 8-user quantum network test-bed, and discuss their usefulness with the aid of example use cases. First, an authentication transfer protocol to manage a fundamental limitation of quantum communication -- the need for a pre-shared key between every pair of users linked together on the quantum network. By temporarily trusting some intermediary nodes for a short period of time (

Bibliographical note

©2022, The Author(s).

    Research areas

  • quant-ph

Discover related content

Find related publications, people, projects, datasets and more using interactive charts.

View graph of relations