Upgrading PPP security by Quantum Key Distribution

Quantum cryptography could be integrated in various existing concepts and protocols to secure communications that require very high level of security. The aim of this paper is to analyse the use of quantum cryptography within PPP. We introduce basic concepts of the Point to Point Protocol; we propose a solution that integrates quantum key distribution into PPP. An example is given to demonstrate the operational feasibility of this solution

[1]  W. Wootters,et al.  A single quantum cannot be cloned , 1982, Nature.

[2]  Christoph Guenther The Relevance of Quantum Cryptography in Modern Cryptographic Systems , 2004 .

[3]  R. All'eaume Réalisation expérimentale de sources de photons uniques, caractérisation et application à la cryptographie quantique , 2004 .

[4]  Kenneth G. Paterson,et al.  Why Quantum Cryptography , 2004 .

[5]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[6]  Richard J. Hughes,et al.  Practical free-space quantum key distribution over 10 km in daylight and at night , 2002, quant-ph/0206092.

[7]  Charles H. Bennett,et al.  Quantum cryptography: uncertainty in the service of privacy. , 1992, Science.

[8]  D. Bethune,et al.  Autocompensating quantum cryptography , 2002, quant-ph/0204144.

[9]  MayersDominic Unconditional security in quantum cryptography , 2001 .

[10]  Lo,et al.  Unconditional security of quantum key distribution over arbitrarily long distances , 1999, Science.

[11]  Ekert,et al.  Quantum cryptography based on Bell's theorem. , 1991, Physical review letters.

[12]  Dominic Mayers,et al.  Unconditional security in quantum cryptography , 1998, JACM.

[13]  Chip Elliott,et al.  Quantum cryptography in practice , 2003, SIGCOMM '03.

[14]  N. Cerf,et al.  Quantum key distribution using gaussian-modulated coherent states , 2003, Nature.

[15]  C. Elliott Building the quantum network* , 2002 .

[16]  A. Mink,et al.  Quantum key distribution with 1.25 Gbps clock synchronization , 2004, InternationalQuantum Electronics Conference, 2004. (IQEC)..

[17]  Gilles Brassard,et al.  Quantum Cryptography , 2005, Encyclopedia of Cryptography and Security.

[18]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[19]  염흥렬,et al.  [서평]「Applied Cryptography」 , 1997 .

[20]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.