Advanced Search
Volume 31 Issue 7
Dec.  2010
Turn off MathJax
Article Contents
Huang Peng, Liu Ye, Zhou Nan-run, Zeng Gui-hua. A Secure Quantum Virtual Private Network Scheme in Passive Optical Network[J]. Journal of Electronics & Information Technology, 2009, 31(7): 1758-1762. doi: 10.3724/SP.J.1146.2008.00423
Citation: Huang Peng, Liu Ye, Zhou Nan-run, Zeng Gui-hua. A Secure Quantum Virtual Private Network Scheme in Passive Optical Network[J]. Journal of Electronics & Information Technology, 2009, 31(7): 1758-1762. doi: 10.3724/SP.J.1146.2008.00423

A Secure Quantum Virtual Private Network Scheme in Passive Optical Network

doi: 10.3724/SP.J.1146.2008.00423
  • Received Date: 2008-04-16
  • Rev Recd Date: 2009-03-17
  • Publish Date: 2009-07-19
  • A novel Passive Optical Network (PON) model is proposed. By exploiting this architecture, an efficient Quantum Key Distribution (QKD) protocol with Quantum Identity Authentication (QIA) is designed. In this scheme, both the QIA and QKD between optical line terminal and optical network units in this PON are implemented. Also, the QKD is implemented between each two optical network units in the same optical virtual private network with the simple operations of optical line terminal. The security proofs and the proposed experimental scheme show this protocol is feasible and absolutely secure. Quantum virtual private network can be ultimately realized by using the conversation key generated by QKD protocol to encrypt the intra-communication data.
  • loading
  • Chae C J, Lee S J, and Kim G Y, et al.. A PON systemsuitable for internetworking optical network units using afiber bragg grating on feeder fiber [J].IEEE PhotonicsTechnology Letters.1999, 11(12):1686-1688[2]Sun X F, Chan C K, and Chen L K. A survivable WDM-PONarchitecture with centralized alternate-path protectionswitching for traffic restoration [J].IEEE PhotonicsTechnology Letters.2006, 18(4):631-633[3]Su Y K, Tian X Q, and Hu W S, et al.. Optical VPN in PONusing TDM-FDM signal format[C]. Proceedings of OpticalFiber Communication Conference, Anehaim, CA, Mar. 2006,OTuJ5.[4]Meng Y, Jiang T, and Xiao D. Analysis and solutions ofsecurity issue in Ethernet PON[C]. Proceedings of TheInternational Society for Optical Engineering, Bellingham,WA, 2005, 5626(1): 391-393.[5]Zhou N R, Zeng G H, and Nie Y Y, et al.. A novel quantumblock encryption algorithm based on quantum computation[J].Physica A.2006, 362(2):305-313[6]曾贵华. 量子密码学[M]. 北京: 科学出版社, 2006: 99-100.Zeng G H. Quantum Cryptography [M]. Beijing: SciencePress, 2006: 99-100.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (3478) PDF downloads(735) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return