Claims
- 1. A method of arbitrating selection of shared secret bits between a plurality of quantum cryptographic key distribution (QKD) devices, comprising:
designating one of the QKD devices as a master device and at least one of the other of the plurality of QKD devices as a slave device; selecting a block of the shared secret bits at the master device; and notifying the slave device of the selected block of the shared secret bits.
- 2. The method of claim 1, wherein the shared secret bits have been agreed upon by the master device and the slave device using one or more quantum cryptographic techniques.
- 3. The method of claim 1, wherein designating one of the QKD devices as a master device and at least one of the other of the plurality of QKD devices as a slave device comprises:
configuring, prior to operation, the one of the QKD devices as a master device and the at least one of the other of the plurality of QKD devices as a slave device.
- 4. The method of claim 1, wherein designating one of the QKD devices as a master device and at least one of the other of the plurality of QKD devices as a slave device comprises:
performing a distributed algorithm at the one of the QKD devices and the at least one of the other of the plurality of QKD devices to designate the one of the QKD devices as a master device and the at least one of the other of the plurality of QKD devices as a slave device
- 5. The method of claim 1, wherein the one of the QKD devices is designated as a master device and the at least one of the other of the plurality of QKD devices is designated as a slave device based on equipment present in the one of the QKD devices and the at least one of the other of the plurality of QKD devices.
- 6. The method of claim 1, wherein the one of the QKD devices is designated as a master device and the at least one of the other of the plurality of QKD devices is designated as a slave device based on actions directed by at least one of a centralized network management system and a distributed network management system.
- 7. The method of claim 1, further comprising:
retrieving the selected block of the shared secret bits from a memory.
- 8. The method of claim 7, further comprising:
using the selected block of the shared secret bits for cryptographically protecting data sent between the master device and the slave device.
- 9. The method of claim 1, further comprising:
sending a message from the slave device to the master device acknowledging the selected block of the shared secret bits.
- 10. The method of claim 7, further comprising:
using the selected block of the shared secret bits for generating a pseudo-random number sequence.
- 11. A quantum cryptographic key distribution system, comprising:
a first quantum cryptographic device designated as a slave device and configured to store shared secret data; and a second quantum cryptographic device designated as a master device and configured to:
select a block of the shared secret data, and notify the slave device of the selected block of the shared secret data.
- 12. A computer-readable medium containing instructions for controlling at least one processor to perform a method of arbitrating selection of shared secret bits between a plurality of quantum cryptographic key distribution (QKD) devices, the method comprising:
designating one of the QKD devices as a master device and at least one of the other of the plurality of QKD devices as a slave device; selecting a block of the shared secret bits, wherein the shared secret bits have been transmitted between the master device and the slave device using one or more quantum cryptographic techniques; notifying the slave device of the selected block of the shared secret bits; and cryptographically protecting data sent between the master device and the slave device using the selected block of the shared secret bits.
- 13. A system for arbitrating selection of shared secret bits between a plurality of quantum cryptographic key distribution (QKD) devices, comprising:
means for designating one of the QKD devices as a master device and at least one of the other of the plurality of QKD devices as a slave device; means for selecting a block of the shared secret bits at the master device; and means for notifying the slave device of the selected block of the shared secret bits.
- 14. A method of allocating shared secret data at a plurality of devices, comprising:
selecting a block of the shared secret data at a first of the plurality of devices; sending an identifier of the selected block to a second of the plurality of devices; and allocating the selected block at the first and second of the plurality of devices for use in cryptographically protecting data sent between the first and second of the plurality of devices.
- 15. The method of claim 14, wherein the plurality of devices comprise quantum cryptographic key distribution devices.
- 16. The method of claim 15, wherein the shared secret data has been agreed upon by the first and second of the plurality of quantum cryptographic key distribution devices using one or more quantum cryptographic techniques.
- 17. The method of claim 14, further comprising:
designating the first of the plurality of devices as a master device and the second of the plurality of devices as a slave device.
- 18. The method of claim 17, wherein designating the first of the plurality of devices as a master device and the second of the plurality of devices as a slave device comprises:
configuring, prior to operation, the first of the plurality of devices as a master device and the second of the plurality of devices as a slave device.
- 19. The method of claim 17, wherein designating the first of the plurality of devices as a master device and the second of the plurality of devices as a slave device comprises:
performing a distributed algorithm at the first and second of the plurality of devices to identify the first of the plurality of devices as a master device and the second of the plurality of devices as a slave device.
- 20. The method of claim 17, wherein the first of the plurality of devices is designated as a master device and the second of the plurality of devices is designated as a slave device based on equipment present in the first and second plurality of devices.
- 21. The method of claim 17, wherein the first of the plurality of devices is designated as a master device and the second of the plurality of devices is designated as a slave device based on actions directed by at least one of a centralized network management system and a distributed network management system.
- 22. A system for allocating shared secret bits at a plurality of quantum cryptographic key distribution devices, comprising:
a first quantum cryptographic device configured to:
select a block of the shared secret bits, and send an identifier of the selected block to a second of the plurality of devices; and the second quantum cryptographic device configured to:
retrieve the selected block for use in cryptographically protecting data sent between the second quantum cryptographic device and the first quantum cryptographic device.
- 23. A computer-readable medium containing instructions for controlling at least one processor to perform a method of allocating shared secret bits at a first quantum
- 23. A computer-readable medium containing instructions for controlling at least one processor to perform a method of allocating shared secret bits at a first quantum cryptographic key distribution device of a plurality of quantum cryptographic key distribution devices, the method comprising:
selecting a block of the shared secret bits; sending an identifier of the selected block to a second of the plurality of quantum cryptographic key distribution devices; and retrieving the selected block for use in cryptographically protecting data sent between the first and second of the plurality of quantum cryptographic key distribution devices.
- 24. A data structure encoded on a computer readable medium, comprising:
first data comprising a first block of secret bits transmitted via one or more quantum cryptographic techniques; second data comprising a first label identifying the first block of secret bits; third data comprising a second block of secret bits transmitted via the one or more quantum cryptographic techniques; and fourth data comprising a second label identifying the second block of secret bits.
- 25. The data structure of claim 24, wherein the first and second labels comprise at least one of a sequence number, a time stamp, and a textual string.
- 26. The data structure of claim 24, wherein each of the first and second blocks of secret bits comprise at least one of a fixed-size block and a variable size block of secret bits.
- 27. The data structure of claim 24, further comprising:
fifth data comprising a third block of secret bits transmitted via the one or more quantum cryptographic techniques; and sixth data comprising a third label identifying the third block of secret bits.
- 28. The data structure of claim 27, wherein the first, second, third and fourth data are stored in a first reservoir associated with a first quantum cryptographic peer.
- 29. The data structure of claim 28, wherein the fifth and sixth data are stored in a second reservoir associated with a second quantum cryptographic peer.
RELATED APPLICATIONS
[0001] The present application is related to U.S. patent application Ser. No. 09/943,709 (Attorney Docket No. 01-4015), entitled “Systems and Methods for Path Set-up in a Quantum Key Distribution Network” and filed Aug. 31, 2001; U.S. patent application Ser. No. 09/944,328 (Attorney Docket No. 00-4069), entitled “Quantum Cryptographic Key Distribution Networks with Untrusted Switches” and filed Aug. 31, 2001; and U.S. patent application Ser. No. 10/271,103, entitled “Systems and Methods for Framing Quantum Cryptographic Links” and filed Oct. 15, 2002, the disclosures of which are incorporated by reference herein in their entirety.
GOVERNMENT CONTRACT
[0002] The U.S. Government has a paid-up license in this invention and the right in limited circumstances to require the patent owner to license others on reasonable terms as provided for by the terms of Contract No. F30602-01-C-0170, awarded by the Defense Advanced Research Projects Agency (DARPA).