### International Journal of Computer Network and Information Security(IJCNIS)

*ISSN: *2074-9090 (Print), *ISSN: *2074-9104 (Online)

*Published By: *MECS Press

*IJCNIS Vol.4, No.6, Jun. 2012*

#### Multi-User Quantum Key Distribution Using Wavelength Division Multiplexing

Full Text (PDF, 1044KB), PP.43-48

Views:149 Downloads:9

#### Author(s)

#### Index Terms

#### Abstract

Quantum cryptography, exclusively known as Quantum key distribution (QKD), has attracted a lot of attention in the recent years with the discovery that it can provide absolute secrecy for communications. We report a new architecture for constructing a fiber-based network of quantum key distribution using optical wavelength division multiplexing in the fiber, and also using some wavelength protocols. The advantages are discussed in detail for demonstrating the experimental report in the way of feasibility for the proposed architecture.

#### Cite This Paper

P. Lokesh Kumar Reddy,B. Rama Bhupal Reddy,S. Rama Krishna,"Multi-User Quantum Key Distribution Using Wavelength Division Multiplexing", IJCNIS, vol.4, no.6, pp.43-48, 2012.

#### Reference

[1]D.Stinson, Cryptography – Theory and practice, CRC press, Inc., 2000.

[2]W.K. Wootters and W.H. Zurek, "A Single quantum cannot be clonned", Nature 299, pp.802-803,1982.

[3]Ch.H.Bennet, G. Brassard and N.D. Mermin, "Quantum Cryptography without Bell's theorem," phys. Rev. Lett. 68, pp.557-559, 1992.

[4]N. Gisin, G, Ribordy, W. Tittel, and H. Zbinden, "Quantum cryptography", Rev. of Mod. Phys. 74, pp.145-192, 2002.

[5]C. Bennett, G. Brassard, J. Robert, "Privacy amplification by public discussion", SIAM J. Comp. 17, pp. 210—229, 1988.

[6]D.Bethune, W.Risk, "Auto compensating quantum cryptography", New J. of Physics 4, pp.42.1-42.15, 2002.

[7]R. Hughes, G. Morgan, and C. Peterson, "Quantum key distribution over a 48 km optica fiber network," J. Modern Opt. 47, pp.533-547, 2000.

[8]D. Stucki, N. Gisin, O. Guinnard, G. Ribordy, and H. Zbinden, "Quantum Key distribution over 67 km with a Plug and Play system", New J. of Physics 4, pp. 41.1-41.8, 2002.

[9]G. Brassard, N. Lutkenhaus, T. Mor, and B.C. Sanders, "Limitations on practical quantum cryptography", Phys. Rev. Lett. 85, pp.1330-1333, 2000.

[10]S.Felix, A. Stefanov, H Zbinden, and N. Gisin, "Faint laser quantum key distribution: Eavesdropping exploiting multiphoton pulses," J. of Mod. Optics 48, pp. 2009-2021, 2001.

[11]D. Gottesman, H. Lo, N. Ltkenhaus, J. Preskill, "Security of quantum key distribution with imperfect devices", http://arxiv.org/abs/quant-ph/0212066

[12]Ch.H. Bennett, "Quantum cryptography using any two nonorthogonal states," Phys. Rev. Lett. 68, pp. 3121– 3124, 1992.

[13]D. Stucki, G. Ribordy, A. Stefanov, H. Zbinden, "Photon counting for quantum key distribution with Peltier cooled In GaAs/InP APD's", J. of Mod. Optics 43 (2001).

[14]P.D. Townsend, "Quantum cryptography on multi-user optical fiber networks", Nature 385, pp. 47–49, 1997.

[15]C.Eliot, "Building the quantum network", New J. of Physics 4, pp.46.1-46.12, 2002.