Huang Peng, Liu Ye, Zhou Nan-run, Zeng Gui-hua. A Secure Quantum Virtual Private Network Scheme in Passive Optical Network[J]. Journal of Electronics & Information Technology, 2009, 31(7): 1758-1762. doi: 10.3724/SP.J.1146.2008.00423
Citation:
Huang Peng, Liu Ye, Zhou Nan-run, Zeng Gui-hua. A Secure Quantum Virtual Private Network Scheme in Passive Optical Network[J]. Journal of Electronics & Information Technology, 2009, 31(7): 1758-1762. doi: 10.3724/SP.J.1146.2008.00423
Huang Peng, Liu Ye, Zhou Nan-run, Zeng Gui-hua. A Secure Quantum Virtual Private Network Scheme in Passive Optical Network[J]. Journal of Electronics & Information Technology, 2009, 31(7): 1758-1762. doi: 10.3724/SP.J.1146.2008.00423
Citation:
Huang Peng, Liu Ye, Zhou Nan-run, Zeng Gui-hua. A Secure Quantum Virtual Private Network Scheme in Passive Optical Network[J]. Journal of Electronics & Information Technology, 2009, 31(7): 1758-1762. doi: 10.3724/SP.J.1146.2008.00423
A novel Passive Optical Network (PON) model is proposed. By exploiting this architecture, an efficient Quantum Key Distribution (QKD) protocol with Quantum Identity Authentication (QIA) is designed. In this scheme, both the QIA and QKD between optical line terminal and optical network units in this PON are implemented. Also, the QKD is implemented between each two optical network units in the same optical virtual private network with the simple operations of optical line terminal. The security proofs and the proposed experimental scheme show this protocol is feasible and absolutely secure. Quantum virtual private network can be ultimately realized by using the conversation key generated by QKD protocol to encrypt the intra-communication data.
Chae C J, Lee S J, and Kim G Y, et al.. A PON systemsuitable for internetworking optical network units using afiber bragg grating on feeder fiber [J].IEEE PhotonicsTechnology Letters.1999, 11(12):1686-1688[2]Sun X F, Chan C K, and Chen L K. A survivable WDM-PONarchitecture with centralized alternate-path protectionswitching for traffic restoration [J].IEEE PhotonicsTechnology Letters.2006, 18(4):631-633[3]Su Y K, Tian X Q, and Hu W S, et al.. Optical VPN in PONusing TDM-FDM signal format[C]. Proceedings of OpticalFiber Communication Conference, Anehaim, CA, Mar. 2006,OTuJ5.[4]Meng Y, Jiang T, and Xiao D. Analysis and solutions ofsecurity issue in Ethernet PON[C]. Proceedings of TheInternational Society for Optical Engineering, Bellingham,WA, 2005, 5626(1): 391-393.[5]Zhou N R, Zeng G H, and Nie Y Y, et al.. A novel quantumblock encryption algorithm based on quantum computation[J].Physica A.2006, 362(2):305-313[6]曾贵华. 量子密码学[M]. 北京: 科学出版社, 2006: 99-100.Zeng G H. Quantum Cryptography [M]. Beijing: SciencePress, 2006: 99-100.