Novel Quantum Virtual Private Network Scheme for PON via Quantum Secure Direct Communication

Two quantum secure direct communication (QSDC) protocols with quantum identification (QI) based on passive optical network (PON) architecture are proposed. One QSDC protocol can be implemented between two different optical network units just with simple configurations of PON by optical line terminal when they are in the same virtual private network after optical line terminal performing QI to the optical network units in the given PON architecture. The other QSDC protocol is also implemented between any two legitimated users in the virtual private network but with considerable reduction of workload of the optical line terminal. The security analysis shows that the proposed QSDC schemes with quantum identification are unconditionally secure and allow the legitimate users to exchange their secret information efficiently and to realize a quantum virtual private network in the PON networks ultimately.

[1]  Geun-Young Kim,et al.  A PON system suitable for internetworking optical network units using a fiber Bragg grating on the feeder fiber , 1999 .

[2]  Christian Kurtsiefer,et al.  LETTER TO THE EDITOR: Secure communication with single-photon two-qubit states , 2001 .

[3]  H. Hoffmann,et al.  Comment on 'Secure direct communication with a quantum one-time pad' , 2005 .

[4]  Simon J. D. Phoenix,et al.  Design of quantum cryptography systems for passive optical networks , 1994 .

[5]  Fu-Guo Deng,et al.  Reply to ``Comment on `Secure direct communication with a quantum one-time-pad' '' , 2005 .

[6]  Gilles Brassard,et al.  Quantum Cryptography , 2005, Encyclopedia of Cryptography and Security.

[7]  Dongyang Long,et al.  Quantum Secure Direct Communication with Two-Photon Four-Qubit Cluster States , 2012 .

[8]  Fuguo Deng,et al.  Reply to ``Comment on `Secure direct communication with a quantum one-time-pad' '' , 2004, quant-ph/0405177.

[9]  K. Boström,et al.  Deterministic secure direct communication using entanglement. , 2002, Physical review letters.

[10]  Shor,et al.  Simple proof of security of the BB84 quantum key distribution protocol , 2000, Physical review letters.

[11]  杨宇光,et al.  An efficient quantum secure direct communication scheme with authentication , 2007 .

[12]  Hai Xu,et al.  Experimental study of high speed polarization-coding quantum key distribution with sifted-key rates over Mbit/s. , 2006, Optics express.

[13]  A. Mink,et al.  Quantum key distribution with 1.25 Gbps clock synchronization , 2004, InternationalQuantum Electronics Conference, 2004. (IQEC)..

[14]  Dominic Mayers,et al.  Unconditional security in quantum cryptography , 1998, JACM.

[15]  Q. Cai Eavesdropping on the two-way quantum communication protocols with invisible photons , 2005, quant-ph/0508002.

[16]  Zhan-jun Zhang Comment on : Quantum direct communication with authentication , 2006, quant-ph/0604125.

[17]  Fuguo Deng,et al.  Two-step quantum direct communication protocol using the Einstein-Podolsky-Rosen pair block , 2003, quant-ph/0308173.

[18]  A. Walker,et al.  Performance and design of InGaAs /InP photodiodes for single-photon counting at 1.55 microm. , 2000, Applied optics.

[19]  Antoni Wójcik Eavesdropping on the "ping-pong" quantum communication protocol. , 2003, Physical review letters.

[20]  Fuguo Deng,et al.  Improving the security of secure direct communication based on the secret transmitting order of particles , 2006, quant-ph/0612016.

[21]  G. Buller,et al.  Design and performance of an InGaAs-InP single-photon avalanche diode detector , 2006, IEEE Journal of Quantum Electronics.