International Symposium on Collaborative Technologies and Systems (CTS'06)
DOI: 10.1109/cts.2006.16
|View full text |Cite
|
Sign up to set email alerts
|

An overview of Quantum Cryptography for Wireless Networking Infrastructure

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(3 citation statements)
references
References 18 publications
0
3
0
Order By: Relevance
“…As indicated in Section IV-B, authenticated packets in QKD post-processing can be used to effectively exchange information about the geographical position of nodes. Although several experiments have been conducted regarding mobile QKD networking [61][62][63][64][65], due to the high sensitivity of quantum equipment to various environmental factors 5 and relatively low key generation rates in free-space QKD links [23,58,[67][68][69], in this paper we assume that QKD networks are composed of static nodes representing secure access points 6 . We follow the idea "the greater the distance separating two nodes, the slower they appear to be moving with respect to each other" outlined in [70] to implement caching in GPSRQ, which is discussed further below.…”
Section: Greedy Perimeter Stateless Routing Protocolmentioning
confidence: 99%
“…As indicated in Section IV-B, authenticated packets in QKD post-processing can be used to effectively exchange information about the geographical position of nodes. Although several experiments have been conducted regarding mobile QKD networking [61][62][63][64][65], due to the high sensitivity of quantum equipment to various environmental factors 5 and relatively low key generation rates in free-space QKD links [23,58,[67][68][69], in this paper we assume that QKD networks are composed of static nodes representing secure access points 6 . We follow the idea "the greater the distance separating two nodes, the slower they appear to be moving with respect to each other" outlined in [70] to implement caching in GPSRQ, which is discussed further below.…”
Section: Greedy Perimeter Stateless Routing Protocolmentioning
confidence: 99%
“…Another typical approach to provide communication level security is quantum cryptography that transmits data in the form of photons. By hiding the photon‐encoding bases or entanglement patterns, the state of the quantum bit (referred to as qubit ) becomes uncertain.…”
Section: Introductionmentioning
confidence: 99%
“…Sheikh et al (2006) discuss various QKD-algorithms in terms of their applicability in a wireless setting. In particular, they consider attenuation and losses in the atmosphere, and report on various environmental influences that free-space QKD may suffer from.…”
Section: Outlook: Towards Mobile and Ad-hoc Qkd Networkmentioning
confidence: 99%