Abstract
Abstract The paper presents some secure optical network models. The security of the models is achieved using quantum cryptographic-key distribution. Both point-topoint and multiple-access broadcast networks are considered. In the modeling of these networks, the simplicity, generality and flexibility are highly maintained. This enables the efficient use of these models for software simulation purposes. Each secure optical communication network model is assumed to be composed of N communication nodes (stations) that are connected by fiber-optic links. Some hardware requirements are briefly explained. Also, samples of simulation results for these network models are presented.
The original version of this chapter was revised: The copyright line was incorrect. This has been corrected. The Erratum to this chapter is available at DOI: 10.1007/978-0-387-35586-3_46
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
A. S. Tanenbaum, Computer Networks, Third Edition, Prentice-Hall International, Inc., USA, 1996.
J. Nechvatal, Computer Security; Public-Key Cryptography, National Institute of Standards and Technology Special Publication 800-2, USA, 1991.
T. P. Spiller, “Quantum Information Processing: Cryptography, Computation, and Teleportation,” IEEE Proceedings. Vol. 84. No. 12_ nn. 1717–1746, December 1996
C. H. Bennettet al. “Experimental Quantum Cryptography,” Journal of Cryptology, Vol. 5, No.3, pp.3–28, 1992.
S. T. Faraj et al. “Simulation of a Quantum Cryptographic Protocol,” Proceeding of AlHadba' Conference on Informatics and Software Pngineering Mniicel traqs 7000
S. T. Faraj et al. “Quantum Cryptographic Key Distribution in Multiple-Access Networks,” Proceeding of 16th IFIP World Computer Congress China 20on
P. D. Townsend and D. W. Smith, “Key distribution in a multiple access network using quantum cryptography,” US Patent No. 5, 768, 378. June 1998.
S. J. D. Phoenix and S. M. Barnett, “Quantum Cryptography Using Discarded Data”, British Telecomm. PLC., Int. Pat. Pub. No. 94/08409, April 1994.
C. H. Bennett, IBM Corp., “Interferometric Quantum Cryptographic Key Distribution System,” US Patent No. 5, 307, 410, April 1994.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2002 IFIP International Federation for Information Processing
About this chapter
Cite this chapter
Faraj, S.T., Al-Naima, F., Ameen, S.Y. (2002). Optical Network Models for Quantum Cryptography. In: Ghonaimy, M.A., El-Hadidi, M.T., Aslan, H.K. (eds) Security in the Information Society. IFIP Advances in Information and Communication Technology, vol 86. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-35586-3_35
Download citation
DOI: https://doi.org/10.1007/978-0-387-35586-3_35
Publisher Name: Springer, Boston, MA
Print ISBN: 978-1-4757-1026-7
Online ISBN: 978-0-387-35586-3
eBook Packages: Springer Book Archive