Please use this identifier to cite or link to this item:
https://accedacris.ulpgc.es/handle/10553/130556
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Guerra Yánez,Carlos | - |
dc.contributor.author | Mederos Barrera,Antonio | - |
dc.contributor.author | De Marco, Innocenzo | - |
dc.contributor.author | Orsucci, Davide | - |
dc.contributor.author | Moll, Florian | - |
dc.contributor.author | Ghassemlooy, Zabih | - |
dc.contributor.author | Zvanovec, Stanislav | - |
dc.date.accessioned | 2024-05-20T13:45:34Z | - |
dc.date.available | 2024-05-20T13:45:34Z | - |
dc.date.issued | 2024 | - |
dc.identifier.issn | 0090-6778 | - |
dc.identifier.other | Scopus | - |
dc.identifier.uri | https://accedacris.ulpgc.es/handle/10553/130556 | - |
dc.description.abstract | The use of quantum key distribution (QKD) to improve security may impact the quality of service (Qos) of high rate classical data links. The key generation process with an empty buffer can be modeled as a queuing system, and data throughput limits can be determined using queueing theory to assess the impact on the QoS. The proposed key generation model is based on an on-demand paradigm. Based on the results of this study, a discrete variable (DV)-QKD-secured link could be designed using the data rate bounds to guarantee a given QoS. Furthermore, we validate the derived bounds by comparing the theoretical derivations with simulations. We show that in a one-time-pad system, the achievable throughput approaches 0.59 times the secret key rate as the key length increases. In the case of a key scheme with key reuse, the throughput is asymptotically linear with the number of key reuses, and the slope of the curve corresponds to the secret key rate multiplied by a function of the protocol and channel characteristics. The analysis is carried out on optical fiber and free-space links. | - |
dc.language | eng | - |
dc.relation.ispartof | IEEE Transactions on Communications | - |
dc.source | IEEE Transactions on Communications[ISSN 0090-6778], (Enero 2024) | - |
dc.subject | 3325 Tecnología de las telecomunicaciones | - |
dc.subject.other | Ciphers | - |
dc.subject.other | Encryption | - |
dc.subject.other | Modeling | - |
dc.subject.other | Optical Communication | - |
dc.subject.other | Protocols | - |
dc.subject.other | Quality Of Service | - |
dc.subject.other | Quantum Computing | - |
dc.subject.other | Quantum Theory | - |
dc.subject.other | Queueing Analysis | - |
dc.subject.other | Queueing Analysis | - |
dc.subject.other | Stochastic Processes | - |
dc.subject.other | Throughput | - |
dc.title | The Throughput Bottleneck of Quantum-secure Communication Links: Analysis and Mitigation | - |
dc.type | info:eu-repo/semantics/Article | - |
dc.type | Article | - |
dc.identifier.doi | 10.1109/TCOMM.2024.3394746 | - |
dc.identifier.scopus | 85192148892 | - |
dc.identifier.isi | 001340385300021 | - |
dc.contributor.orcid | NO DATA | - |
dc.contributor.orcid | NO DATA | - |
dc.contributor.orcid | NO DATA | - |
dc.contributor.orcid | NO DATA | - |
dc.contributor.orcid | NO DATA | - |
dc.contributor.orcid | NO DATA | - |
dc.contributor.orcid | NO DATA | - |
dc.contributor.authorscopusid | 57315214300 | - |
dc.contributor.authorscopusid | 57220806560 | - |
dc.contributor.authorscopusid | 57204613742 | - |
dc.contributor.authorscopusid | 56603980400 | - |
dc.contributor.authorscopusid | 22734930200 | - |
dc.contributor.authorscopusid | 7004547192 | - |
dc.contributor.authorscopusid | 8346275300 | - |
dc.identifier.eissn | 1558-0857 | - |
dc.description.lastpage | 6426 | - |
dc.identifier.issue | 10 | - |
dc.description.firstpage | 6416 | - |
dc.relation.volume | 72 | - |
dc.investigacion | Ingeniería y Arquitectura | - |
dc.type2 | Artículo | - |
dc.contributor.daisngid | No ID | - |
dc.contributor.daisngid | No ID | - |
dc.contributor.daisngid | No ID | - |
dc.contributor.daisngid | No ID | - |
dc.contributor.daisngid | No ID | - |
dc.contributor.daisngid | No ID | - |
dc.contributor.daisngid | No ID | - |
dc.description.numberofpages | 11 | - |
dc.utils.revision | Sí | - |
dc.contributor.wosstandard | WOS:Guerra-Yánez, C | - |
dc.contributor.wosstandard | WOS:Mederos-Barrera, A | - |
dc.contributor.wosstandard | WOS:de Marco, I | - |
dc.contributor.wosstandard | WOS:Orsucci, D | - |
dc.contributor.wosstandard | WOS:Moll, F | - |
dc.contributor.wosstandard | WOS:Ghassemlooy, Z | - |
dc.contributor.wosstandard | WOS:Zvánovec, S | - |
dc.date.coverdate | Enero 2024 | - |
dc.identifier.ulpgc | Sí | - |
dc.contributor.buulpgc | BU-TEL | - |
dc.description.sjr | 3,889 | - |
dc.description.jcr | 7,2 | - |
dc.description.sjrq | Q1 | - |
dc.description.jcrq | Q1 | - |
dc.description.scie | SCIE | - |
dc.description.miaricds | 11,0 | - |
item.grantfulltext | none | - |
item.fulltext | Sin texto completo | - |
crisitem.author.dept | GIR IOCAG: Procesado de Imágenes y Teledetección | - |
crisitem.author.dept | IU de Oceanografía y Cambio Global | - |
crisitem.author.orcid | https://orcid.org/0000-0003-1680-0726 | - |
crisitem.author.parentorg | IU de Oceanografía y Cambio Global | - |
crisitem.author.fullName | Guerra Yánez,Carlos | - |
crisitem.author.fullName | Mederos Barrera, Antonio Ramón | - |
Appears in Collections: | Artículos |
Items in accedaCRIS are protected by copyright, with all rights reserved, unless otherwise indicated.