Information

  • Author Services

Initiatives

You are accessing a machine-readable page. In order to be human-readable, please install an RSS reader.

All articles published by MDPI are made immediately available worldwide under an open access license. No special permission is required to reuse all or part of the article published by MDPI, including figures and tables. For articles published under an open access Creative Common CC BY license, any part of the article may be reused without permission provided that the original article is clearly cited. For more information, please refer to https://www.mdpi.com/openaccess .

Feature papers represent the most advanced research with significant potential for high impact in the field. A Feature Paper should be a substantial original Article that involves several techniques or approaches, provides an outlook for future research directions and describes possible research applications.

Feature papers are submitted upon individual invitation or recommendation by the scientific editors and must receive positive feedback from the reviewers.

Editor’s Choice articles are based on recommendations by the scientific editors of MDPI journals from around the world. Editors select a small number of articles recently published in the journal that they believe will be particularly interesting to readers, or important in the respective research area. The aim is to provide a snapshot of some of the most exciting work published in the various research areas of the journal.

Original Submission Date Received: .

  • Active Journals
  • Find a Journal
  • Journal Proposal
  • Proceedings Series
  • For Authors
  • For Reviewers
  • For Editors
  • For Librarians
  • For Publishers
  • For Societies
  • For Conference Organizers
  • Open Access Policy
  • Institutional Open Access Program
  • Special Issues Guidelines
  • Editorial Process
  • Research and Publication Ethics
  • Article Processing Charges
  • Testimonials
  • Preprints.org
  • SciProfiles
  • Encyclopedia

applsci-logo

Article Menu

research papers on quantum key distribution

  • Subscribe SciFeed
  • Recommended Articles
  • Google Scholar
  • on Google Scholar
  • Table of Contents

Find support for a specific problem in the support section of our website.

Please let us know what you think of our products and services.

Visit our dedicated information section to learn more about MDPI.

JSmol Viewer

Quantum key distribution networks: challenges and future research issues in security.

research papers on quantum key distribution

1. Introduction

2. background to quantum key distribution (qkd) networks, 2.1. quantum node, 2.2. quantum link, 2.3. qkd network type, 2.3.1. active optical switch network, 2.3.2. trusted node network, 2.3.3. quantum repeater network, 3. key results of existing qkd networks, 4. challenges and research issues, 4.1. lacking the point-to-multipoint (p2m) mechanism in qkd networks, 4.2. numerous quantum node resources are consumed by the multiple-path strategy, 4.3. no suitable security interface between the classical end users/applications and quantum nodes, 5. conclusions, author contributions, institutional review board statement, informed consent statement, data availability statement, conflicts of interest.

  • Bennett, C.H.; Brassard, G. Quantum Cryptography: Public Key Distribution and Coin Tossing. In Proceedings of the IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, India, 9–12 December 1984; pp. 175–179. [ Google Scholar ]
  • Shor, P.W.; Preskill, J. Simple Proof of Security of the BB84 Quantum Key Distribution Protocol. Phys. Rev. Lett. 2000 , 85 , 441–444. [ Google Scholar ] [ CrossRef ] [ Green Version ]
  • Gottesman, D.; Hoi-Kwong, L. Proof of security of quantum key distribution with two-way classical communications. IEEE Trans. Inf. Theory 2003 , 49 , 457–475. [ Google Scholar ] [ CrossRef ] [ Green Version ]
  • Tsurumaru, T.; Tamaki, K. Security proof for quantum-key-distribution systems with threshold detectors. Phys. Rev. A 2008 , 78 , 032302. [ Google Scholar ] [ CrossRef ]
  • Bennett, C.H.; Brassard, G.; Mermin, N.D. Quantum cryptography without Bell’s theorem. Phys. Rev. Lett. 1992 , 68 , 557–559. [ Google Scholar ] [ CrossRef ] [ PubMed ]
  • Cerf, N.J.; Bourennane, M.; Karlsson, A.; Gisin, N. Security of Quantum Key Distribution Using d-Level Systems. Phys. Rev. Lett. 2002 , 88 , 127902. [ Google Scholar ] [ CrossRef ] [ PubMed ] [ Green Version ]
  • Long, G.; Liu, X. Theoretically efficient high-capacity quantum-key-distribution scheme. Phys. Rev. A 2002 , 65 , 032302. [ Google Scholar ] [ CrossRef ] [ Green Version ]
  • Grosshans, F.; Van Assche, G.; Wenger, J.; Brouri, R.; Cerf, N.J.; Grangier, P. Quantum key distribution using gaussian-modulated coherent states. Nature 2003 , 421 , 238. [ Google Scholar ] [ CrossRef ] [ Green Version ]
  • Hwang, W.-Y. Quantum Key Distribution with High Loss: Toward Global Secure Communication. Phys. Rev. Lett. 2003 , 91 , 057901. [ Google Scholar ] [ CrossRef ] [ Green Version ]
  • Lo, H.K.; Ma, X.F.; Chen, K. Decoy state quantum key distribution. Phys. Rev. Lett. 2005 , 94 , 4. [ Google Scholar ] [ CrossRef ] [ Green Version ]
  • Hwang, T.; Lee, K.C.; Li, C.M. Provably secure three-party authenticated quantum key distribution protocols. IEEE Trans. Depend. Secur. 2007 , 4 , 71–80. [ Google Scholar ] [ CrossRef ]
  • Li, X.H.; Deng, F.G.; Zhou, H.Y. Efficient quantum key distribution over a collective noise channel. Phys. Rev. A 2008 , 78 , 022321. [ Google Scholar ] [ CrossRef ] [ Green Version ]
  • Lo, H.-K.; Curty, M.; Qi, B. Measurement-Device-Independent Quantum Key Distribution. Phys. Rev. Lett. 2012 , 108 , 130503. [ Google Scholar ] [ CrossRef ] [ PubMed ] [ Green Version ]
  • Yang, C.-W. New Probabilistic Quantum Key Distribution Protocol. Int. J. Theor. Phys. 2018 , 57 , 3651–3657. [ Google Scholar ] [ CrossRef ]
  • Boyer, M.; Kenigsberg, D.; Mor, T. Quantum Key Distribution with Classical Bob. Phys. Rev. Lett. 2007 , 99 , 140501. [ Google Scholar ] [ CrossRef ] [ PubMed ] [ Green Version ]
  • Boyer, M.; Gelles, R.; Kenigsberg, D.; Mor, T. Semiquantum key distribution. Phys. Rev. A 2009 , 79 , 032341. [ Google Scholar ] [ CrossRef ] [ Green Version ]
  • Krawec, W.O. Mediated semiquantum key distribution. Phys. Rev. A 2015 , 91 , 032323. [ Google Scholar ] [ CrossRef ] [ Green Version ]
  • Xu, F.; Qi, B.; Liao, Z.; Lo, H.-K. Long distance measurement-device-independent quantum key distribution with entangled photon sources. Appl. Phys. Lett. 2013 , 103 , 61101. [ Google Scholar ] [ CrossRef ] [ Green Version ]
  • Liu, Y.; Chen, T.Y.; Wang, L.J.; Liang, H.; Shentu, G.L.; Wang, J.; Cui, K.; Yin, H.-L.; Liu, N.-L.; Li, L.; et al. Experimental measurement-device-independent quantum key distribution. Phys. Rev. Lett. 2013 , 111 , 130502. [ Google Scholar ] [ CrossRef ] [ PubMed ] [ Green Version ]
  • Elliott, C.; Pearson, D.; Troxel, G. Quantum cryptography in practice. In Proceedings of the Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM’03), Karlsruhe, Germany, 25–29 August 2003; pp. 227–238. [ Google Scholar ]
  • Elliott, C.; Yeh, H. DARPA Quantum Network Testbed ; Technical Report; BBN Technologies Cambridge: New York, NY, USA, 2007; Available online: https://apps.dtic.mil/sti/pdfs/ADA471450.pdf (accessed on 25 March 2021).
  • Elliott, C.; Colvin, A.; Pearson, D.; Pikalo, O.; Schlafer, J.; Yeh, H. Current status of the DARPA quantum network. In Quantum Information and Computation III ; International Society for Optics and Photonics: Washington, DC, USA, 2005; Volume 5815. [ Google Scholar ]
  • Kollmitzer, C.; Pivk, M. Applied Quantum Cryptography ; Springer Science & Business Media: Berlin, Germany, 2010; Volume 797. [ Google Scholar ]
  • Dianati, M.; Alléaume, R.; Gagnaire, M.; Shen, X. Architecture and protocols of the future European quantum key distribution network. Sec. Commun. Netw. 2008 , 1 , 57–74. [ Google Scholar ] [ CrossRef ]
  • Peev, M.; Länger, T.; Lorünser, T.; Happe, A.; Maurhart, O.; Poppe, A.; Themel, T. The SECOQC quantum key distribution network in Vienna. New J. Phys. 2009 , 11 , 75001. [ Google Scholar ] [ CrossRef ] [ Green Version ]
  • Masahide Sasaki. Tokyo QKD network and the evolution to secure photonic network. In Proceedings of the Conference on Laser Applications to Photonic Applications (CLEO’11), Baltimore, MD, USA, 1–6 May 2011; OSA: Washington, DC, USA, 2011; Volume 1. [ Google Scholar ]
  • Sarkar, K.; Basavaraju, T.G.; Puttamadappa, C. Ad Hoc Mobile Wireless Networks ; CRC Press: Boca Raton, FL, USA, 2008; Volume 1. [ Google Scholar ]
  • Xu, F.; Chen, W.; Wang, S.; Yin, Z.; Zhang, Y.; Liu, Y.; Zhou, Z.; Zhao, Y.; Li, H.; Liu, D.; et al. Field experiment on a robust hierarchical metropolitan quantum cryptography network. Chin. Sci. Bull. 2009 , 54 , 2991–2997. [ Google Scholar ] [ CrossRef ] [ Green Version ]
  • Han, Z.-F.; Xu, F.-X.; Chen, W.; Wang, S.; Yin, Z.-Q.; Zhang, Y.; Liu, Y.; Zhou, Z.; Li, H.-W.; Liu, D.; et al. An application-oriented hierarchical quantum cryptography net- work test bed. In Proceedings of the Optical Fiber Communication Conference, San Diego, CA, USA, 21–25 March 2010. [ Google Scholar ]
  • Wang, S.; Chen, W.; Yin, Z.-Q.; Li, H.-W.; He, D.-Y.; Li, Y.-H.; Zhou, Z.; Song, X.-T.; Li, F.-Y.; Wang, D.; et al. Field and long-term demonstration of a wide area quantum key distribution network. Opt. Express 2014 , 22 , 21739. [ Google Scholar ] [ CrossRef ] [ Green Version ]
  • European Commission. China to Launch World’s First Quantum Communication Network. 2017. Available online: https://cordis.europa.eu/article/id/122516.trending-science-china-to-launch-worlds-first-quantum-communication-network/en (accessed on 3 August 2017).
  • ChinaDaily. Quantum Tech to Link Jinan Governments. 2017. Available online: http://www.chinadaily.com.cn/china/2017-07/11/content_30065215.htm (accessed on 11 July 2017).
  • Travagnin, M.; Lewis, A. Quantum Key Distribution in Field Implementations. 2019. EUR 29865 EN. Available online: https://op.europa.eu/en/publicationdetail/-/publication/e93e5bf9-efc3-11e9-a32c-01aa75ed71a1/language-en (accessed on 15 October 2019).
  • Zhao, Y. The integration of QKD and security services. In Proceedings of the ITU QIT4N Workshop, Shanghai, China, 5–7 June 2019; Available online: https://www.itu.int/en/ITU-T/Workshops-and-Seminars/2019060507/Documents/Yong (accessed on 5 June 2019).
  • Wang, S.; Chen, W.; Yin, Z.-Q.; Zhang, Y.; Zhang, T.; Li, H.-W.; Xu, F.-X.; Zhou, Z.; Yang, Y.; Huang, D.-J.; et al. Field test of wavelength-saving quantum key distribution network. Opt. Lett. 2010 , 35 , 2454–2456. [ Google Scholar ] [ CrossRef ] [ Green Version ]
  • Van Meter, R.; Satoh, T.; Ladd, T.D.; Munro, W.J.; Nemoto, K. Path selection for quantum repeater networks. Netw. Sci. 2013 , 3 , 82–95. [ Google Scholar ] [ CrossRef ] [ Green Version ]
  • Tanizawa, Y.; Takahashi, R.; Dixon, A.R. A routing method designed for a Quantum Key Distribution network. In Proceedings of the 2016 Eighth International Conference on Ubiquitous and Future Networks (ICUFN), Vienna, Austria, 5–8 July 2016; pp. 208–214. [ Google Scholar ]
  • Yang, C.; Zhang, H.; Su, J. The QKD network: Model and routing scheme. J. Mod. Opt. 2017 , 64 , 2350–2362. [ Google Scholar ] [ CrossRef ]
  • Mehic, M.; Fazio, P.; Rass, S.; Maurhart, O.; Peev, M.; Poppe, A.; Rozhon, J.; Niemiec, M.; Voznak, M. A Novel Approach to Quality-of-Service Provisioning in Trusted Relay Quantum Key Distribution Networks. IEEE/ACM Trans. Netw. 2019 , 28 , 168–181. [ Google Scholar ] [ CrossRef ] [ Green Version ]
  • Hahn, F.; Pappa, A.; Eisert, J. Quantum network routing and local complementation. NPJ Quantum Inf. 2019 , 5 , 76. [ Google Scholar ] [ CrossRef ] [ Green Version ]
  • Amer, O.; Krawec, W.O.; Wang, B. Efficient Routing for Quantum Key Distribution Networks. arXiv 2020 , arXiv:2005.12404. [ Google Scholar ]
  • Tang, Z.; Qin, Y.; Jiang, Z.; Krawec, W.O.; Zhang, P. Quantum-Secure Networked Microgrids. In Proceedings of the 2020 IEEE Power & Energy Society General Meeting (PESGM), Washington, DC, USA, 3–6 August 2020; pp. 1–5. [ Google Scholar ]
  • Tang, Z.; Zhang, P.; Krawec, W.O.; Jiang, Z. Programmable Quantum Networked Microgrids. IEEE Trans. Quantum Eng. 2020 , 1 , 1–13. [ Google Scholar ] [ CrossRef ]
  • Salvail, L.; Peev, M.; Diamanti, E.; Alléaume, R.; Lütkenhaus, N.; Langer, T. Security of trusted repeater quantum key distribution networks. J. Comput. Secur. 2010 , 18 , 61–87. [ Google Scholar ] [ CrossRef ] [ Green Version ]
  • Tang, Y.L.; Yin, H.L.; Zhao, Q.; Liu, H.; Sun, X.X.; Huang, M.Q.; Zhang, W.-J.; Chen, S.-J.; Zhang, L.; You, L.-X.; et al. Measurement-device-independent quantum key distribution over untrustful metropolitan network. Phys. Rev. X 2016 , 6 , 011024. [ Google Scholar ] [ CrossRef ] [ Green Version ]
  • Tanizawa, Y.; Takahashi, R.; Sato, H.; Dixon, A.R.; Kawamura, S. A Secure Communication Network Infrastructure Based on Quantum Key Distribution Technology. IEICE Trans. Commun. 2016 , 99 , 1054–1069. [ Google Scholar ] [ CrossRef ]
  • Fröhlich, B.; Dynes, J.F.; Lucamarini, M.; Sharpe, A.W.; Yuan, Z.; Shields, A.J. A quantum access network. Nature 2013 , 501 , 69–72. [ Google Scholar ] [ CrossRef ] [ PubMed ] [ Green Version ]
  • Cai, C.; Sun, Y.; Niu, J.; Ji, Y. A Quantum Access Network Suitable for Internetworking Optical Network Units. IEEE Access 2019 , 7 , 92091–92099. [ Google Scholar ] [ CrossRef ]
  • Wegman, M.N.; Carter, J. New hash functions and their use in authentication and set equality. J. Comput. Syst. Sci. 1981 , 22 , 265–279. [ Google Scholar ] [ CrossRef ] [ Green Version ]
  • Choi, I.; Young, R.J.; Townsend, P.D. Quantum information to the home. New J. Phys. 2011 , 13 , 063039. [ Google Scholar ] [ CrossRef ]
  • Liao, S.-K.; Lin, J.; Ren, J.-G.; Liu, W.-Y.; Qiang, J.; Yin, J.; Li, Y.; Shen, Q.; Zhang, L.; Liang, X.-F.; et al. Space-to-Ground Quantum Key Distribution Using a Small-Sized Payload on Tiangong-2 Space Lab. Chin. Phys. Lett. 2017 , 34 , 090302. [ Google Scholar ] [ CrossRef ]
  • Lucamarini, M.; Yuan, Z.L.; Dynes, J.F.; Shields, A.J. Overcoming the rate–distance limit of quantum key distribution without quantum repeaters. Nature 2018 , 557 , 400–403. [ Google Scholar ] [ CrossRef ]
  • Minder, M.; Pittaluga, M.; Roberts, G.L.; Lucamarini, M.; Dynes, J.F.; Yuan, Z.L.; Shields, A.J. Experimental quantum key distribution beyond the repeaterless secret key capacity. Nat. Photon. 2019 , 13 , 334. [ Google Scholar ] [ CrossRef ]
  • Wang, S.; He, D.-Y.; Yin, Z.-Q.; Lu, F.-Y.; Cui, C.-H.; Chen, W.; Zhou, Z.; Guo, G.-C.; Han, Z.-F. Beating the Fundamental Rate-Distance Limit in a Proof-of-Principle Quantum Key Distribution System. Phys. Rev. X 2019 , 9 , 021046. [ Google Scholar ] [ CrossRef ] [ Green Version ]
  • Liu, Y.; Yu, Z.-W.; Zhang, W.; Guan, J.-Y.; Chen, J.-P.; Zhang, C.; Hu, X.-L.; Li, H.; Jiang, C.; Lin, J.; et al. Experimental Twin-Field Quantum Key Distribution through Sending or Not Sending. Phys. Rev. Lett. 2019 , 123 , 100505. [ Google Scholar ] [ CrossRef ] [ PubMed ] [ Green Version ]
  • Zhong, X.; Hu, J.; Curty, M.; Qian, L.; Lo, H.-K. Proof-of-Principle Experimental Demonstration of Twin-Field Type Quantum Key Distribution. Phys. Rev. Lett. 2019 , 123 , 100506. [ Google Scholar ] [ CrossRef ] [ PubMed ] [ Green Version ]
  • Chen, J.-P.; Zhang, C.; Liu, Y.; Jiang, C.; Zhang, W.; Hu, X.-L.; Guan, J.-Y.; Yu, Z.-W.; Xu, H.; Lin, J.; et al. Sending-or-Not-Sending with Independent Lasers: Secure Twin-Field Quantum Key Distribution over 509 km. Phys. Rev. Lett. 2020 , 124 , 070501. [ Google Scholar ] [ CrossRef ] [ PubMed ] [ Green Version ]
  • Elliott, C. Building the quantum network. New J. Phys. 2002 , 4 , 46. [ Google Scholar ] [ CrossRef ]
  • Alléaume, R.; Branciard, C.; Bouda, J.; Debuisschert, T.; Dianati, M.; Gisin, N.; Godfrey, M.; Grangier, P.; Länger, T.; Lütkenhaus, N.; et al. Using quantum key distribution for cryptographic purposes: A survey. Theor. Comput. Sci. 2014 , 560 , 62–81. [ Google Scholar ] [ CrossRef ]
  • Hall, M.A.; Altepeter, J.B.; Kumar, P. Ultrafast Switching of Photonic Entanglement. Phys. Rev. Lett. 2011 , 106 , 053901. [ Google Scholar ] [ CrossRef ] [ PubMed ] [ Green Version ]
  • Lu, J.; Zhou, L.; Kuang, L.-M.; Nori, F. Single-photon router: Coherent control of multichannel scattering for single photons with quantum interferences. Phys. Rev. A 2014 , 89 , 013805. [ Google Scholar ] [ CrossRef ] [ Green Version ]
  • Lemr, K.; Bartkiewicz, K.; Černoch, A.; Soubusta, J. Resource-efficient linear-optical quantum router. Phys. Rev. A 2013 , 87 , 062333. [ Google Scholar ] [ CrossRef ] [ Green Version ]
  • Briegel, H.J.; Dür, W.; Cirac, J.I.; Zoller, P. Quantum repeaters: The role of imperfect local operations in quantum communication. Phys. Rev. Lett. 1998 , 81 , 5932–5935. [ Google Scholar ] [ CrossRef ]
  • Bouwmeester, D.; Pan, J.-W.; Mattle, K.; Eibl, M.; Weinfurter, H.; Zeilinger, A. Experimental quantum teleportation. Nature 1997 , 390 , 575–579. [ Google Scholar ] [ CrossRef ] [ Green Version ]
  • Furusawa, A.; Sørensen, J.L.; Braunstein, S.L.; Fuchs, C.A.; Kimble, H.J.; Polzik, E.S. Unconditional Quantum Teleportation. Science 1998 , 282 , 706–709. [ Google Scholar ] [ CrossRef ] [ PubMed ] [ Green Version ]
  • Pan, J.-W.; Bouwmeester, D.; Weinfurter, H.; Zeilinger, A. Experimental Entanglement Swapping: Entangling Photons That Never Interacted. Phys. Rev. Lett. 1998 , 80 , 3891. [ Google Scholar ] [ CrossRef ]
  • RFC 2328—OSPF Version 2. RFC. The Neighborhood of Each Network Node in The Graph Depends on the Network’s Type (Point-To-Point, Broadcast, NBMA Or Point-To-Multipoint) and the Number of Routers Having an Interface to the Network. Available online: https://dl.acm.org/doi/pdf/10.17487/RFC2328 (accessed on 25 March 2021).
  • AIT QKD R10 Software. Available online: https://github.com/axdhill/ait-qkd (accessed on 27 June 2016).
  • OpenSSL, OpenSSL Project. Available online: onhttps://openssl.org (accessed on 25 March 2021).
  • Townsend, P.D. Quantum cryptography on multiuser optical fibre networks. Nature 1997 , 385 , 47–49. [ Google Scholar ] [ CrossRef ]
  • Zavitsanos, D.; Ntanos, A.; Giannoulis, G.; Avramopoulos, H. On the QKD Integration in Converged Fiber/Wireless Topologies for Secured, Low-Latency 5G/B5G Fronthaul. Appl. Sci. 2020 , 10 , 5193. [ Google Scholar ] [ CrossRef ]
  • Hillery, M.; Bužek, V.; Berthiaume, A. Quantum secret sharing. Phys. Rev. A 1999 , 59 , 1829. [ Google Scholar ] [ CrossRef ] [ Green Version ]
  • Karlsson, A.; Koashi, M.; Imoto, N. Quantum entanglement for secret sharing and secret splitting. Phys. Rev. A 1999 , 59 , 162. [ Google Scholar ] [ CrossRef ]
  • Bagherinezhad, S.; Karimipour, V. Quantum secret sharing based on reusable Greenberger-Horne-Zeilinger states as secure carriers. Phys. Rev. A 2003 , 67 , 044302. [ Google Scholar ] [ CrossRef ] [ Green Version ]
  • Guo, G.-P.; Guo, G.-C. Quantum secret sharing without entanglement. Phys. Lett. A 2003 , 310 , 247–251. [ Google Scholar ] [ CrossRef ] [ Green Version ]
  • Liu-Jun, W.; Kai-Yi, Z.; Jia-Yong, W.; Jie, C.; Yong-Hua, Y.; Shi-Biao, T.; Di, Y.; Yan-Lin, T.; Zhen, Z.; Yu, Y.; et al. Experimental Authentication of Quantum Key Distribution with Post-quantum Cryptography. arXiv 2020 , arXiv:2009.04662. [ Google Scholar ]

Click here to enlarge figure

NetworkDARPASECOQCUQCCChina QKD
Project year2002–20062004–200820102014–2017
QKD Network typeActive optical switch + Trusted nodeTrusted nodeTrusted nodeTrusted node
QKD protocolBB84 protocol5 different QKD protocolsBB84 and BBM92BB84
Max. key generating rate400 bps
over 29 km
3.1 kbps
over 33 km
304 kpbs
over 45 km
250 kbps
over 43 km
MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

Tsai, C.-W.; Yang, C.-W.; Lin, J.; Chang, Y.-C.; Chang, R.-S. Quantum Key Distribution Networks: Challenges and Future Research Issues in Security. Appl. Sci. 2021 , 11 , 3767. https://doi.org/10.3390/app11093767

Tsai C-W, Yang C-W, Lin J, Chang Y-C, Chang R-S. Quantum Key Distribution Networks: Challenges and Future Research Issues in Security. Applied Sciences . 2021; 11(9):3767. https://doi.org/10.3390/app11093767

Tsai, Chia-Wei, Chun-Wei Yang, Jason Lin, Yao-Chung Chang, and Ruay-Shiung Chang. 2021. "Quantum Key Distribution Networks: Challenges and Future Research Issues in Security" Applied Sciences 11, no. 9: 3767. https://doi.org/10.3390/app11093767

Article Metrics

Article access statistics, further information, mdpi initiatives, follow mdpi.

MDPI

Subscribe to receive issue release notifications and newsletters from MDPI journals

A Review on Quantum Key Distribution Protocols, Challenges, and Its Applications

  • Conference paper
  • First Online: 11 March 2024
  • Cite this conference paper

research papers on quantum key distribution

  • Neha Sharma 12 ,
  • Pardeep Singh 13 ,
  • Abhineet Anand 14 ,
  • Sunil Chawla 12 ,
  • Anuj Kumar Jain 12 &
  • Vinay Kukreja 12  

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 896))

Included in the following conference series:

  • International Conference on Recent Developments in Cyber Security

381 Accesses

1 Citations

Quantum key distribution (QKD) is a technology that enables secure communication by using the principles of quantum mechanics to generate and distribute cryptographic keys. QKD provides unconditionally secure communication, making it an essential technology for various industries such as military, finance, and health care. This paper provides an overview of QKD, including its principles, different protocols, experimental implementations, practical applications, ongoing research efforts, and future prospects. The different QKD protocols, such as BB84, E91, and SARG04, are described along with their experimental implementations using both discrete-variable and continuous-variable techniques. The practical applications of QKD, including secure communication, data privacy, and cryptography, are discussed, along with ongoing research efforts aimed at improving the speed, range, and scalability of QKD. The paper concludes with a summary of the key contributions of QKD to the field of quantum information science and its potential impact on society.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save.

  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
  • Available as EPUB and PDF
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Xu F, Ma X, Zhang Q, Lo HK, Pan JW (2020) Secure quantum key distribution with realistic devices. Rev Mod Phys 92(2):025002

Article   MathSciNet   Google Scholar  

Mehic M, Niemiec M, Rass S, Ma J, Peev M, Aguado A, Martin V, Schauer S, Poppe A, Pacher C, Voznak M (2020) Quantum key distribution: a networking perspective. ACM Comput Surv (CSUR) 53(5):1–41

Google Scholar  

Zapatero V, van Leent T, Arnon-Friedman R, Liu WZ, Zhang Q, Weinfurter H, Curty M (2023) Advances in device-independent quantum key distribution. NPJ Quantum Inform 9(1):10

Nadlinger DP, Drmota P, Nichol BC, Araneda G, Main D, Srinivas R, Lucas DM, Ballance CJ, Ivanov EY-Z, Sekatski P, Urbanke RL, Renner R, Sangouard N, Bancal JD (2022) Experimental quantum key distribution certified by Bell’s theorem. Nature 607(7920):682–686

Xie YM, Lu YS, Weng CX, Cao XY, Jia ZY, Bao Y, Wang Y, Fu Y, Yin H-L, Chen ZB (2022) Breaking the rate-loss bound of quantum key distribution with asynchronous two-photon interference. PRX Quantum 3(2):020315

Saluja K, Bansal A, Vajpaye A, Gupta S, Anand A (2022, April) Efficient bag of deep visual words based features to classify CRC images for colorectal tumor diagnosis. In: 2022 2nd International conference on advance computing and innovative technologies in engineering (ICACITE). IEEE, pp 1814–1818

Wang S, Yin ZQ, He DY, Chen W, Wang RQ, Ye P, Zhou Y, Fan-Yuan G-J, Wang F-X, Chen W, Zhu Y-G, Morozov PV, Divochiy AV, Zhou Z, Guo G-C, Han ZF (2022) Twin-field quantum key distribution over 830-km fibre. Nat Photonics 16(2):154–161

Wang S, He DY, Yin ZQ, Lu FY, Cui CH, Chen W, Zhou Z, Guo G-C, Han ZF (2019) Beating the fundamental rate-distance limit in a proof-of-principle quantum key distribution system. Phys Rev X 9(2):021046

Basset FB, Valeri M, Roccia E, Muredda V, Poderini D, Neuwirth J, Spagnolo N, Rota MB, Carvacho G, Sciarrino F, Trotta R (2021) Quantum key distribution with entangled photons generated on demand by a quantum dot. Sci Adv 7(12):eabe6379

Saluja K, Gupta S, Vajpayee A, Debnath SK, Bansal A, Sharma N (2022) Blockchain technology: applied to big data in collaborative edges. Meas Sens 24:100521

Minder M, Pittaluga M, Roberts GL, Lucamarini M, Dynes JF, Yuan ZL, Shields AJ (2019) Experimental quantum key distribution beyond the repeaterless secret key capacity. Nat Photonics 13(5):334–338

Article   Google Scholar  

Zhang G, Haw JY, Cai H, Xu F, Assad SM, Fitzsimons JF, Zhou X, Zhang Y, Yu S, Wu J, Ser W, Kwek LC, Liu AQ (2019) An integrated silicon photonic chip platform for continuous-variable quantum key distribution. Nat Photonics 13(12):839–842

Singh P, Prakash V, Bathla G, Singh RK (2022) QoS aware task consolidation approach for maintaining SLA violations in cloud computing. Comput Electr Eng 99(107789)

Bhatt C, Kumar I, Vijayakumar V, Singh KU, Kumar A (2021) The state of the art of deep learning models in medical science and their challenges. Multimed Syst 27(4):599–613. https://doi.org/10.1007/s00530-020-00694-1

Sharma N, Chakraborty C (2022) Evaluation of bioinspired algorithms for image optimization. J Electron Imaging 31(4):041206

Sharma N, Chakraborty C, Kumar R (2022) Optimized multimedia data through computationally intelligent algorithms. Multimedia Syst 1–17

Wang H et al (2018) A flexible key-updating method for software-defined optical networks secured by quantum key distribution. Opt Fiber Technol 45:195–200

Dong K, Zhao Y, Yu X, Zhang J, Yu H, Li Z (2019) Auxiliary graph based routing, wavelength and time-slot assignment in metro quantum optical networks. In: Proceedings of IEEE OECC/PSC, Fukuoka, Japan, pp 1–3

Cao Y, Zhao Y, Wang J, Yu X, Ma Z, Zhang J (2019) SDQaaS: software defined networking for quantum key distribution as a service. Opt Exp 27(5):6892–6909

Cao Y, Zhao Y, Wang J, Yu X, Ma Z, Zhang J (2019) Costefficient quantum key distribution (QKD) over WDM networks. IEEE/OSA J Opt Commun Netw 11(6):285–298

Dong K, Zhao Y, Yu X, Nag A, Zhang J (2020) Auxiliary graph based routing, wavelength, and time-slot assignment in metro quantum optical networks with a novel node structure. Opt Exp 28(5):5936–5952

Lu L, Yu X, Zhao Y, Zhang J (2020) Dynamic wavelength and key resource adjustment in WDM based QKD optical networks. In: Proceedings of OSA ACP, Beijing, China, p 184

Li X, Zhao Y, Nag A, Yu X, Zhang J (2020) Key-recycling strategies in quantum-key-distribution networks. Appl Sci 10(11):1–19

Download references

Author information

Authors and affiliations.

Chitkara University Institute of Engineering and Technology, Chitkara University, Rajpura, Punjab, 140401, India

Neha Sharma, Sunil Chawla, Anuj Kumar Jain & Vinay Kukreja

Computer Science and Engineering, Graphic Era Hill University, Dehradun, India

Pardeep Singh

Apex Institute of Technology, Chandigarh University, Mohali, India

Abhineet Anand

You can also search for this author in PubMed   Google Scholar

Corresponding author

Correspondence to Neha Sharma .

Editor information

Editors and affiliations.

Center for Cyber Security and Cryptology, Sharda University, Greater Noida, Uttar Pradesh, India

Nihar Ranjan Roy

Department of Computer Science and Engineering, Institute of Technology, Nirma University, Ahmedabad, Gujarat, India

Sudeep Tanwar

Department of Computer Science Engineering, Shri Vishwakarma Skill University, Gurugram, Haryana, India

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Cite this paper.

Sharma, N., Singh, P., Anand, A., Chawla, S., Jain, A.K., Kukreja, V. (2024). A Review on Quantum Key Distribution Protocols, Challenges, and Its Applications. In: Roy, N.R., Tanwar, S., Batra, U. (eds) Cyber Security and Digital Forensics. REDCYSEC 2023. Lecture Notes in Networks and Systems, vol 896. Springer, Singapore. https://doi.org/10.1007/978-981-99-9811-1_43

Download citation

DOI : https://doi.org/10.1007/978-981-99-9811-1_43

Published : 11 March 2024

Publisher Name : Springer, Singapore

Print ISBN : 978-981-99-9810-4

Online ISBN : 978-981-99-9811-1

eBook Packages : Engineering Engineering (R0)

Share this paper

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

  • Publish with us

Policies and ethics

  • Find a journal
  • Track your research

Physical Review Research

  • Collections
  • Editorial Team
  • Open Access

Modified BB84 quantum key distribution protocol robust to source imperfections

Margarida pereira, guillermo currás-lorenzo, álvaro navarrete, akihiro mizutani, go kato, marcos curty, and kiyoshi tamaki, phys. rev. research 5 , 023065 – published 27 april 2023.

  • Citing Articles (11)
  • INTRODUCTION
  • DESCRIPTION OF THE EMITTED STATES AND…
  • SECURITY PROOF
  • RESULTS AND DISCUSSION
  • CONCLUSIONS
  • ACKNOWLEDGMENTS

The Bennett-Brassard 1984 (BB84) protocol is the most widely implemented quantum key distribution (QKD) scheme. However, despite enormous theoretical and experimental efforts in the past decades, the security of this protocol with imperfect sources has not yet been rigorously established. In this paper, we address this shortcoming and prove the security of the BB84 protocol in the presence of multiple source imperfections, including state preparation flaws and side channels, such as Trojan-horse attacks, mode dependencies and classical correlations between the emitted pulses. To do so, we consider a modified BB84 protocol that exploits the basis mismatched events, which are often discarded in standard security analyses of this scheme; and employ the reference technique, a powerful mathematical tool to accommodate source imperfections in the security analysis of QKD. Moreover, we compare the achievable secret-key rate of the modified BB84 protocol with that of the three-state loss-tolerant protocol, and show that the addition of a fourth state, while redundant in ideal conditions, significantly improves the estimation of the leaked information in the presence of source imperfections, resulting in a better performance. This paper demonstrates the relevance of the BB84 protocol in guaranteeing implementation security, taking us a step further towards closing the existing gap between theory and practice of QKD.

Figure

  • Received 24 October 2022
  • Accepted 22 March 2023

DOI: https://doi.org/10.1103/PhysRevResearch.5.023065

research papers on quantum key distribution

Published by the American Physical Society under the terms of the Creative Commons Attribution 4.0 International license. Further distribution of this work must maintain attribution to the author(s) and the published article's title, journal citation, and DOI.

Published by the American Physical Society

Physics Subject Headings (PhySH)

  • Research Areas

Authors & Affiliations

  • 1 Vigo Quantum Communication Center, University of Vigo, Vigo E-36315, Spain
  • 2 Escuela de Ingeniería de Telecomunicación, Department of Signal Theory and Communications, University of Vigo, Vigo E-36310, Spain
  • 3 atlanTTic Research Center, University of Vigo, Vigo E-36310, Spain
  • 4 Faculty of Engineering, University of Toyama, Gofuku 3190, Toyama 930-8555, Japan
  • 5 Mitsubishi Electric Corporation, Information Technology R&D Center, 5-1-1 Ofuna, Kamakura-shi, Kanagawa 247-8501, Japan
  • 6 National Institute of Information and Communications Technology, Nukui-kita, Koganei, Tokyo 184-8795, Japan
  • * [email protected]

Article Text

Vol. 5, Iss. 2 — April - June 2023

Subject Areas

  • Quantum Physics
  • Quantum Information

research papers on quantum key distribution

Authorization Required

Other options.

  • Buy Article »
  • Find an Institution with the Article »

Download & Share

Secret-key rate R as a function of the overall system loss (dB) for δ = 0.063 and different values of ε U when applying the RT to the modified BB84 protocol.

Secret-key rate R as a function of the overall system loss (dB) for different parameter regimes when applying the RT to the modified BB84 protocol (BB84) and to the three-state protocol (3-state). The solid lines correspond to δ = 0.063 and the dashed lines correspond to δ = 0.126 .

Diagram of the entanglement-based scenario and Eve's most general coherent attack when the QKD protocol is run sequentially. Eve must perform her attack on the k th pulse before she learns information about systems B k + 1 , E k + 1 , and therefore U ̂ ( k ) cannot take systems B k + 1 , E k + 1 as an input. Conversely, Eve's attack on the k th pulse can depend on information that she has learned about the systems B k − 1 , E k − 1 . This is why U ̂ ( k ) takes Eve's updated ancilla E ̃ k as an input.

Sign up to receive regular email alerts from Physical Review Research

Reuse & Permissions

It is not necessary to obtain permission to reuse this article or its components as it is available under the terms of the Creative Commons Attribution 4.0 International license. This license permits unrestricted use, distribution, and reproduction in any medium, provided attribution to the author(s) and the published article's title, journal citation, and DOI are maintained. Please note that some figures may have been included with permission from other third parties. It is your responsibility to obtain the proper permission from the rights holder directly for these figures.

  • Forgot your username/password?
  • Create an account

Article Lookup

Paste a citation or doi, enter a citation.

Thank you for visiting nature.com. You are using a browser version with limited support for CSS. To obtain the best experience, we recommend you use a more up to date browser (or turn off compatibility mode in Internet Explorer). In the meantime, to ensure continued support, we are displaying the site without styles and JavaScript.

  • View all journals
  • Explore content
  • About the journal
  • Publish with us
  • Sign up for alerts
  • Open access
  • Published: 23 February 2024

Practical high-dimensional quantum key distribution protocol over deployed multicore fiber

  • Mujtaba Zahidy 1 ,
  • Domenico Ribezzo 2 , 3 , 4 ,
  • Claudia De Lazzari 5 ,
  • Ilaria Vagniluca 5 ,
  • Nicola Biagi 5 ,
  • Ronny Müller 1 ,
  • Tommaso Occhipinti 5 ,
  • Leif K. Oxenløwe   ORCID: orcid.org/0000-0001-6013-3639 1 ,
  • Michael Galili 1 ,
  • Tetsuya Hayashi   ORCID: orcid.org/0000-0003-0321-3581 6 ,
  • Dajana Cassioli   ORCID: orcid.org/0000-0001-7574-5099 7 , 8 ,
  • Antonio Mecozzi   ORCID: orcid.org/0000-0001-8730-5699 2 , 8 ,
  • Cristian Antonelli 2 , 8 ,
  • Alessandro Zavatta 3 , 5 &
  • Davide Bacco   ORCID: orcid.org/0000-0002-7757-4331 5 , 9  

Nature Communications volume  15 , Article number:  1651 ( 2024 ) Cite this article

4241 Accesses

5 Citations

25 Altmetric

Metrics details

  • Quantum information
  • Quantum physics

Quantum key distribution (QKD) is a secure communication scheme for sharing symmetric cryptographic keys based on the laws of quantum physics, and is considered a key player in the realm of cyber-security. A critical challenge for QKD systems comes from the fact that the ever-increasing rates at which digital data are transmitted require more and more performing sources of quantum keys, primarily in terms of secret key generation rate. High-dimensional QKD based on path encoding has been proposed as a candidate approach to address this challenge. However, while proof-of-principle demonstrations based on lab experiments have been reported in the literature, demonstrations in realistic environments are still missing. Here we report the generation of secret keys in a 4-dimensional hybrid time-path-encoded QKD system over a 52-km deployed multicore fiber link forming by looping back two cores of a 26-km 4-core optical fiber. Our results indicate that robust high-dimensional QKD can be implemented in a realistic environment by combining standard telecom equipment with emerging multicore fiber technology.

Similar content being viewed by others

research papers on quantum key distribution

Path-encoded high-dimensional quantum communication over a 2-km multicore fiber

research papers on quantum key distribution

2× N twin-field quantum key distribution network configuration based on polarization, wavelength, and time division multiplexing

research papers on quantum key distribution

Simultaneous transmission of hyper-entanglement in three degrees of freedom through a multicore fiber

Introduction.

Global data transmission is increasing exponentially every year 1 and security of communication against new forms of attacks has become a relevant concern for scientific communities and cyber-security experts, as well as for the general public. While computationally secure encryption protocols 2 , 3 are the basic building blocks of today’s communication network, quantum key distribution (QKD) is the only known method that can guarantee information-theoretic secure encryption between two or more parties. In particular, QKD allows to share a symmetric cryptographic key, useful to encrypt data communication without binding the security to any assumption on the attacker’s capabilities. The two most important figures of merit of QKD are the secret-key generation rate, and the overall link distance between users, which are both limited by the loss and noise levels affecting the transmitted quantum signals. Indeed, in the absence of high-performance quantum memory 4 , which is still challenging today 5 , the achievable rate and distance for a given error rate affecting the quantum signal reception are limited, with bounds discussed in 6 .

An alternative approach to addressing the noise limit and the low generation rate relies on the use of high-dimensional (Hi-D) quantum states— qudits —for quantum communication purposes. As shown in 7 , 8 , 9 , protocols based on qudits are considerably more resilient to noise than protocols based on qubits. These protocols allow the generation of a secure key even at high noise levels and can provide high communication capacity. More in detail, the highest tolerance in two-dimensional systems based on the BB84 protocol using one-way reconciliation, in the case of coherent attacks, corresponds to a quantum bit error rate (QBER) of ~ 11% 10 , whereas this threshold increases to 18% and 24% for four-dimensional and eight-dimensional systems, respectively 7 , 8 .

Proof-of-concept experiments exploiting Hi-D encoding have already been demonstrated using different degrees of freedom such as frequency 11 , orbital angular momentum (OAM) 12 , 13 , 14 , path-encoding 15 , 16 , OAM-Path hybrid 17 , OAM-Polarization hybrid 18 , time-energy and time-bin encoding 19 , 20 , 21 and Frequency-time hybrid 22 . Multicore fibers, whose potential in transmitting classical data at petabit-per-second rates has been recently demonstrated 23 , are also being considered for quantum applications. The reason is that they allow implementing practical Hi-D QKD systems based on path-encoding protocols, which do not suffer from state fragility seen in other protocols like those based on OAM encoding, and they do not reduce the effective qudit rate—a drawback of protocols based on time-bin encoding. However, all demonstrations of Hi-D path-encoding reported in the literature are in-lab tests 15 , 24 , 25 .

In this work, we report the successful transmission of hybrid time-path Hi-D quantum states with a final secret key rate (SKR) of 51.5 kbps through a 52-km long multicore fiber link exhibiting 22 dB of channel loss, deployed in the city of L’Aquila, Italy 26 . Our experiment paves the way towards the deployment of future Hi-D QKD systems in real scenarios.

Experimental Implementation

We performed the 4 D time-path-encoding QKD field trial experiment in a 52-km multicore fiber deployed in the city of L’Aquila, Italy. The fiber loop was characterized by 22 dB of losses, mostly due to fiber connectors. The implemented protocol is a 4-dimensional generalization of BB84, where weak coherent pulses form the quantum states. In order to detect photon-number splitting attacks, Alice and Bob run a two-decoy-state protocol, using states with unequal mean photon numbers μ 1 and μ 2 , together with the vacuum state 27 , 28 . Alice transmits the signal states with probabilities \({p}_{{\mu }_{1}}\) and \({p}_{{\mu }_{2}}\) , whose values result from the optimization of the secure key generation rate. The transmitted states are modulated in the \({{{{{{{\mathcal{X}}}}}}}}\) or \({{{{{{{\mathcal{Z}}}}}}}}\) , the two mutual unbiased bases, with probabilities \({P}_{{{{{{{{\mathcal{Z}}}}}}}}}\) and \({P}_{{{{{{{{\mathcal{X}}}}}}}}}\) , respectively. A detailed description of the protocol is provided in the Methods section.

Figure  1 a is a plot of the expected secret key rates versus channel loss in the 4D protocols. The secret key rate is evaluated based on the experimental parameters of Table  1 29 , where \({{{{{{{{\rm{QBER}}}}}}}}}_{{{{{{{{{\mathcal{Z}}}}}}}}}_{{\mu }_{n}}}\) and \({{{{{{{{\rm{QBER}}}}}}}}}_{{{{{{{{{\mathcal{X}}}}}}}}}_{{\mu }_{n}}}\) are the quantum bit-error rates measured for the \({{{{{{{\mathcal{Z}}}}}}}}\) and \({{{{{{{\mathcal{X}}}}}}}}\) bases, respectively, and for an average photon number μ n ( n  = 1, 2), and p gate is the probability that a photon falls within the photodetection temporal gate. The values of \({p}_{{\mu }_{1}}\) and \({p}_{{\mu }_{2}}\) , as well as those of \({P}_{{{{{{{{\mathcal{Z}}}}}}}}}\) and \({P}_{{{{{{{{\mathcal{X}}}}}}}}}\) resulted from the maximization of the secret key rate. Note that although the Hi-D protocols provide higher resilience against errors, the final achievable range is shorter, and the SKR drops to zero at lower channel losses. The reason for this behavior must be found in the fact that a higher-dimensional system uses more detectors (or more active time of a detector in hybrid time-bin protocols) than a protocol with a lower dimension, and this results in higher dark count rates and lower signal-to-noise ratio, see Supplementary Note  1 . At the channel loss of 22 dB the secret key rate of the 4D protocol was estimated to be 51.5 kbps. The stability of the QKD implementation is illustrated in Fig.  1 b, where we plot the QBER measured in the \({{{{{{{\mathcal{Z}}}}}}}}\) and \({{{{{{{\mathcal{X}}}}}}}}\) bases in a time window of 60 minutes. The figure shows greater stability in the \({{{{{{{\mathcal{Z}}}}}}}}\) basis, which indicates that the relative phase between pulses propagating in the different fiber cores is sufficiently stable to guarantee long-term operation. On the other hand, the relative phase between pulses propagating in the same fiber core is expected to be at least as stable. In fact, the large QBER values observed in the \({{{{{{{\mathcal{X}}}}}}}}\) basis are to be ascribed to mechanical vibrations present in the environment and affecting the fiber-based interferometer used for receiving \({{{{{{{\mathcal{X}}}}}}}}\) -states. Note that these QBER spikes are absent in controlled laboratory environments 30 and can be improved by acting on the receiver setup (improved isolation). On the other hand, the Z-basis phase which corresponds to the full multicore fiber interferometer, was intact as it was only influenced by the natural phase drift in the fiber. We compared the 4D implementation with a 2D path-encoded implementation in the same setup. The results of this comparison are presented in Supplementary Note  1 .

figure 1

a Secret key generation rate as a function of the channel loss for the parameters of the implementation. The star represents the achieved generation rate at the field-deployed channel loss. b Long-term stability of the implementation. Each point represents 10 seconds of measurement. While the \({{{{{{{\mathcal{Z}}}}}}}}\) basis shows great stability over time - an indication of slow phase drift in the fiber—the \({{{{{{{\mathcal{X}}}}}}}}\) basis shows moments of high QBER due to vibration at the receiver site.

High-dimensional QKD protocols are introduced and designed for their higher capacity and resilience against noise. This, in turn, yields a higher secure-key generation rate compared to standard 2D counterparts for approximately similar QBER values 7 , 8 . However, depending on the physical properties that are used to encode information, the practical implementation of a Hi-D QKD system may result in fragile quantum states and poor performance (e.g. in terms of QBER). For instance, qudits based on the orbital angular momentum (OAM) of light suffer from crosstalk in optical fiber and turbulence in free space. In this work, through a field trial in a realistic urban environment, we demonstrate that path-encoding based on the use of multicore fibers is a robust scheme, standing out as a promising candidate for future Hi-D QKD systems. The robustness of this scheme is a consequence of the slow phase drift in deployed multicore fibers, which can be effectively tracked with the PLL developed for the field trial.

It is important to stress that, while in this work 4D states were formed in a time-path Hilbert space, in principle it is possible to generate Hi-D states with path-encoding alone. The advantage of avoiding time-bin encoding is an increase in quantum-state-generation rate, however, this approach requires stabilizing the phase of a larger number of spatial paths. Photonic integrated circuits (PICs) are an effective platform for the implementation of path-encoded Hi-D state sources and receivers 31 , 32 , and are intrinsically scalable to large dimensions. For comparison, we listed multiple Hi-D studies indicating relevant parameters and the final SKR in Supplementary Note  2 . Additionally, we added to the comparison some of the recent works in Supplementary Note  3 with normalized SKR per source repetition rate and the number of detectors with their efficiencies. This aims to provide a fair comparison taking into account only the protocol, its implementation, and the receiver’s efficiency.

To summarize, we have demonstrated a Hi-D QKD system based on path-and-time-bin-encoding in a 52-km-long multicore fiber link field-deployed in the historical downtown area of the city of L’Aquila, Italy. Our results show higher noise tolerance of the proposed Hi-D scheme, compared to a reference 2D scheme, see Supplementary Note  1 , as well as an enhanced secret key generation rate. This work paves the way toward the practical implementation of future Hi-D QKD systems.

A complete description of the experimental setup is presented in supplementary note  4 .

A detailed representation of the source structure is given in Fig.  2 -Alice box. A continuous wave laser, labeled as Q , is carved to form a train of 120 ps-long time-bin pulses with two cascaded intensity modulators, shown as one in the diagram, for a high extinction ratio. The state’s repetition rate is 487 MHz with the two pulses of a time-bin state being separated in time by 800 ps. The carving follows a pseudo-random binary sequence of length l  = 2 12 −1, which is used to emulate random quantum state generation. Carving the pulses out of a CW laser increases the chance of phase correlation between consecutive qudits. It is necessary to devise a phase randomization stage to close the loophole and prevent attacks 33 , 34 , 35 . A second continuous wave laser, labeled as M , is attenuated and multiplexed with the quantum signal through a beam-splitter, and it serves as a monitor laser for the dual-band phase locking scheme. The two outputs of the beam-splitter impinge upon two electro-optical modulators (EOMs) that encode information into four-dimensional quantum states. To optimize the effect of the EOMs on the quantum signal and prevent undesired modulation in the monitor laser, the polarization of the quantum signal is aligned with the EOM ordinary axis and that of the monitor laser with the extraordinary axis. The polarization alignment is achieved by means of the three polarization controllers shown in the figure. Insertion loss in the two spatial paths is equalized with the use of a variable optical attenuator, while a free-space delay line is used to equalize the corresponding propagation delays and maximize visibility in the reception of \({{{{{{{\mathcal{Z}}}}}}}}\) -states.

figure 2

Schematic of transmitter (Alice), receiver (Bob) both located at the University of L'Aquila headquarters, and multicore fiber channel. Transmitter . Q (M) Laser Quantum (Monitor) Laser, IM Intensity modulator, VOA Variable Optical Attenuator, PC Polarization Controller, ϕ -Mod Phase Modulator, BS Beam-splitter, FS Free-Space. Receiver . PLL Phase-Locked Loop, ϕ -shifter Piezo Phase Shifter, DWDM Dense Wavelength Division Multiplexer, APD Avalanche Photo-Diode, FM Faraday Mirror. Channel . Channel is formed by concatenating four multicore fibers with four uncoupled cores, each of approximately 6.5-km length. At the endpoint, two cores are connected back into the others, resulting in a 52-km-long two-core fiber link. The multicore fibers are deployed in an underground tunnel in the historical downtown area of the city of L'Aquila, Italy. The map depicting the city of L'Aquila and the span of the multicore fiber is roughly drawn based on the exact map presented in ref. 26 . b The cross-section of the MCF. The four cores and the trench design are visible in the photo 26 .

The state encoding process is illustrated in Fig.  3 . The train of pulse pairs, with each pulse forming a time-bin state, is intensity-modulated at the output of the beam-splitter so that either a \({{{{{{{\mathcal{Z}}}}}}}}\) -state or an \({{{{{{{\mathcal{X}}}}}}}}\) -state is generated in each time slot. For the former, one pulse of a pair of subsequent pulses is suppressed in each spatial path, whereas for the latter, both pulses of a pair of subsequent pulses are suppressed in one of the two spatial paths. A phase modulator then applies a phase ϕ   ∈  {0,  π } to generate \({\left\vert {\cap }^{\phi }\cap \right\rangle }_{A}+{\left\vert --\right\rangle }_{B}\) .

figure 3

Two replicas of a periodic train of pulse pairs are intensity-modulated at the output of a beam-splitter, prior to transmission in fiber cores A and B, while only the replica in the path to core A is also phase-modulated, so as to generate states in the \({{{{{{{\mathcal{Z}}}}}}}}\) and \({{{{{{{\mathcal{X}}}}}}}}\) bases. An RF signal is used to synchronize modulation in the two spatial paths, where the modulation signals are produced by a field-programmable gate array. Examples of the signals transmitted in two fiber cores are shown in the lower part of the figure, along with the corresponding quantum states.

All the EOM modulators are driven by a field-programmable gate array that also provides a down-sampled clock signal for synchronization to both the transmitter and receiver.

Phase stabilization

We employed the dual-band phase stabilization technique to compensate for relative phase drifts between the two fiber cores. The monitor signal, launched at a frequency 400 GHz lower than that of the quantum signal, is co-propagated with the quantum signal and experiences similar phase changes. At the receiver (for any basis choice), two cascaded dense wavelength division multiplexers (DWDMs), each with 25–30 dB isolation, are used to demultiplex the quantum and monitor/PLL signals, and to effectively suppress out-of-band noise impairing the quantum signal. The avalanche photodiodes produce suitable signals for the PLL circuits with a monitor-signal power of approximately - 45 dBm, which is the value targeted with the monitor signal launch power used in the experiment. The PLL features an ADuC7020 micro-controller unit (MCU) from Analog Devices with four 12-bit analog to digital converters (ADCs) and 41.78 MHz clock rate. It produces a feedback signal that is used to control a phase shifter, as can be seen in Fig.  2 . Details on the PLL design can be found in ref. 36 .

The receiver (Bob) is composed of two 2 × 2 beam-splitters, B S A and B S B , placed in each core to passively select the basis of measurement. One output of each beam-splitter is used for \({{{{{{{\mathcal{X}}}}}}}}\) -basis measurements, while the other two outputs are used for \({{{{{{{\mathcal{Z}}}}}}}}\) -basis measurements. The \({{{{{{{\mathcal{X}}}}}}}}\) -basis receiver scheme is implemented in the form of a fiber-based unbalanced Michelson interferometer, with 800 ps temporal delay in one arm.

One output of each beam-splitter enters an unbalanced Michelson interferometer that implements the \({{{{{{{\mathcal{X}}}}}}}}\) -basis measurements, while the other two outputs are used for \({{{{{{{\mathcal{Z}}}}}}}}\) -basis measurements.

The unbalanced Michelson interferometer is fiber-based, with 800 ps temporal delay in one arm. A PLL with an additional laser source at the same frequency of the monitor laser is used to compensate for unavoidable phase drifts. The monitor laser signal transmitted with the quantum signal is too weak to be used in the PLL and does not interfere with the locally added laser signal. (PLL laser in Fig.  2 ). Two DWDMs are used to multiplex and demultiplex the PLL laser and the \({{{{{{{\mathcal{X}}}}}}}}\) -signal state to be received. Other parts of the interferometer are two Faraday mirrors used to compensate for polarization rotations due to fiber propagation, and a free-space delay element, needed to compensate for differential propagation delays in the two arms. the overall loss of the interferometer is around 4 dB.

The \({{{{{{{\mathcal{Z}}}}}}}}\) -basis measurement is performed by interfering signals in the two cores on a beam-splitter, and the quantum signal is extracted by means of two DWDMs prior to detection. The combined DWDMs for isolation add 1.5 dB of loss. The monitor signal from one of the two DWDMs feeds an APD to provide feedback to the PLL circuit.

All the detectors used for the quantum signals are superconducting nanowire single-photon detectors.

Here, we describe the protocol that allows Alice and Bob to establish a common secure key using 4D time-path encoding.

Alice prepares the states described in the “section Source” and sends them through the quantum channel. The bases are chosen randomly with probabilities \({P}_{{{{{{{{\mathcal{Z}}}}}}}}}\) and \({P}_{{{{{{{{\mathcal{X}}}}}}}}}\) , and the states are prepared also randomly with no memory. As a countermeasure against photon-number splitting attacks, a decoy-state protocol is implemented, where the mean-photon number of each quantum state is adjusted to two pre-selected values with probabilities \({p}_{{\mu }_{1}}\) and \({p}_{{\mu }_{2}}\) .

Bob randomly selects a basis and performs the measurement. In our implementation, a beam-splitter passively chooses the basis of measurement.

After a round of transmission and measurement, Alice and Bob communicate the basis of state preparation and measurement. At this stage, they discard all the instances in which the preparation and measurement bases mismatch.

Out of the remaining instances of exchanged qudits, Alice and Bob publicly reveal part of the prepared states and measurement outcomes to estimate the quantum bit error rate.

The remaining qudits yield two bits of information per detection instance, on which error reconciliation and privacy amplification are applied, ending with the establishment of a shared secure key.

Quantum channel

The protocol implemented in this work expands the Hilbert space dimension of a 2 D time-bin protocol into a 4 D space by adding the path dimension. The protocol requires two optical paths or channels to encode information in the relative phase of the two paths. In our implementation, the spatial paths are the cores of four 6.5-km long uncoupled-core four-core optical fibers deployed in the city of L’Aquila, Italy. The characteristics of the individual cores are similar to those of standard single-mode fibers, with negligible crosstalk between cores (below—40 dB/km) 26 , 37 . Each fiber is terminated by a spliced SC MCF connector on both ends. This allows to concatenate all the available fibers and form a 26-km fiber link. The resulting quantum channel length is 52 km, since only two cores are used for the path encoding, allowing to connect and loop back two cores into the other two. The overall fiber loss is measured to be 22 dB, of which 12 dB are to be ascribed to the SC MCF connectors and the fan-in/fan-out connectors.

Parameter optimization

In order to maximize the gain in this implementation, we optimized the 4D final secret key rate, Eq. ( 1 ) where the parameters are given in Table  1 .

The secret key length ℓ 4 D is estimated in a finite-block-size regime with secrecy parameter \({\epsilon }_{\sec }\) , correctness parameter ϵ c o r r , and post-processing block size n in 4D with 38

where \({D}_{0}^{Z}\) and \({D}_{1}^{Z}\) are the lower bounds of vacuum and single-photon events in the Z basis, \(H(x): \!\!\!=-x{\log }_{2}(x/3)-(1-x){\log }_{2}(1-x)\) is the Shannon entropy for 4 D variables, ϕ Z is the phase error rate upper bound, and λ E C is the number of bits that are publicly disclosed during error correction 38 . The term \(-6\,{\log }_{2}\,(21/{\epsilon }_{\sec })\) bounds the information that Eve has about the key, while \(-\,{\log }_{2}\,(2/{\epsilon }_{corr})\) corresponds to the bit disclosed during error verification; ϵ s e c  =  ϵ c o r r  = 10 −12 have been set. We chose a block size of n Z  = 10 8 for finite key analysis for 4D protocol, and we estimated for the 4D states an error reconciliation efficiency f e r r ,4 D  =  λ E C /( n Z \(*\) H 4 D ( ϕ Z )) = 1.06, which is in line with the most recent results reported in the literature for the measured QBER values adopting the original cascade error correction protocol 39 .

Parameters such as mean photon numbers for signal and decoy state, μ 1 and μ 2 respectively, probabilities of transmitting signal and decoy, \({p}_{{\mu }_{1}}\) and \({p}_{{\mu }_{2}}\) , and probabilities of basis choice, \({P}_{{{{{{{{\mathcal{X}}}}}}}}}\) and \({P}_{{{{{{{{\mathcal{Z}}}}}}}}}\) , are chosen to maximize the secret key rate. In the optimization, security parameters, channel loss, detector efficiencies, and dark counts are also taken into account.

Data availability

The data that support the findings of this study are available from the corresponding authors upon request.

Cisco: Cisco Annual Internet Report - white paper. https://www.cisco.com/c/en/us/solutions/collateral/executive-perspectives/annual-internet-report/white-paper-c11-741490.pdf (2018).

Rivest, R. L., Shamir, A. & Adleman, L. A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21 , 120–126 (1978).

Article   MathSciNet   Google Scholar  

Bernstein, D. J. & Lange, T. Post-quantum cryptography. Nature 549 , 188–194 (2017).

Article   ADS   CAS   PubMed   Google Scholar  

Huttner, B. et al. Long-range qkd without trusted nodes is not possible with current technology. npj Quantum Inf. 8 , 108 (2022).

Article   ADS   Google Scholar  

Stas, P.-J. et al. Robust multi-qubit quantum network node with integrated error detection. Science 378 , 557–560 (2022).

Pirandola, S., Laurenza, R., Ottaviani, C. & Banchi, L. Fundamental limits of repeaterless quantum communications. Nat. Commun. 8 , 15043 (2017).

Article   ADS   PubMed   PubMed Central   Google Scholar  

Sheridan, L. & Scarani, V. Security proof for quantum key distribution using qudit systems. Phys. Rev. A 82 , 030301 (2010).

Cerf, N. J., Bourennane, M., Karlsson, A. & Gisin, N. Security of quantum key distribution using d -level systems. Phys. Rev. Lett. 88 , 127902 (2002).

Article   ADS   PubMed   Google Scholar  

Bechmann-Pasquinucci, H. & Tittel, W. Quantum cryptography using larger alphabets. Phys. Rev. A 61 , 062308 (2000).

Article   ADS   MathSciNet   Google Scholar  

Shor, P. W. & Preskill, J. Simple proof of security of the bb84 quantum key distribution protocol. Phys. Rev. Lett. 85 , 441–444 (2000).

Kues, M. et al. On-chip generation of high-dimensional entangled quantum states and their coherent control. Nature 546 , 622–626 (2017).

Mirhosseini, M. et al. High-dimensional quantum cryptography with twisted light. N. J. Phys. 17 , 033033 (2015).

Cozzolino, D. et al. Orbital angular momentum states enabling fiber-based high-dimensional quantum communication. Phys. Rev. Appl. 11 , 064058 (2019).

Article   ADS   CAS   Google Scholar  

Cozzolino, D. et al. Air-core fiber distribution of hybrid vector vortex-polarization entangled states. Adv. Photonics 1 , 046005 (2019).

Cañas, G. et al. High-dimensional decoy-state quantum key distribution over multicore telecommunication fibers. Phys. Rev. A 96 , 022317 (2017).

Da Lio, B. et al. Stable transmission of high-dimensional quantum states over a 2-km multicore fiber. IEEE J. Sel. Top. Quantum Electron. 26 , 1–8 (2020).

Article   Google Scholar  

Jo, Y., Park, H. S., Lee, S.-W. & Son, W. Efficient high-dimensional quantum key distribution with hybrid encoding. Entropy 21 , 80 (2019).

Wang, F.-X. et al. Characterizing high-quality high-dimensional quantum key distribution by state mapping between different degrees of freedom. Phys. Rev. Appl. 11 , 024070 (2019).

Islam, N. T., Lim, C. C. W., Cahall, C., Kim, J. & Gauthier, D. J. Provably secure and high-rate quantum key distribution with time-bin qudits. Sci. Adv. 3 , 1701491 (2017).

Steinlechner, F. et al. Distribution of high-dimensional entanglement via an intra-city free-space link. Nat. Commun. 8 , 15971 (2017).

Article   ADS   CAS   PubMed   PubMed Central   Google Scholar  

Martin, A. et al. Quantifying photonic high-dimensional entanglement. Phys. Rev. Lett. 118 , 110501 (2017).

Cheng, X. et al. Secure high dimensional quantum key distribution based on wavelength-multiplexed time-bin encoding. In: Conference on Lasers and Electro-Optics, pp. 1–3. Optica Publishing Group, STh1D.3 . https://doi.org/10.1364/CLEO_SI.2021.STh1D.3 (2021).

Jørgensen, A. A. et al. Petabit-per-second data transmission using a chip-scale microcomb ring resonator source. Nat. Photon. 16 , 798–802 (2022).

Ding, Y. et al. High-dimensional quantum key distribution based on multicore fiber using silicon photonic integrated circuits. npj Quantum Inf. 3 , 25 (2017).

Da Lio, B. et al. Path-encoded high-dimensional quantum communication over a 2-km multicore fiber. npj Quantum Inf. 7 , 63 (2021).

Hayashi, T. et al. Field-deployed multi-core fiber Testbed https://doi.org/10.23919/PS.2019.8818058 (2019).

Hwang, W.-Y. Quantum key distribution with high loss: toward global secure communication. Phys. Rev. Lett. 91 , 057901 (2003).

Lo, H.-K., Ma, X. & Chen, K. Decoy state quantum key distribution. Phys. Rev. Lett. 94 , 230504 (2005).

Islam, N. T., Lim, C. C. W., Cahall, C., Kim, J. & Gauthier, D. J. Securing quantum key distribution systems using fewer states. Phys. Rev. A 97 , 042347 (2018).

Ribezzo, D. et al. Deploying an inter-european quantum network. Adv. Quantum Technol. 6 , 2200061 (2023).

Bacco, D., Ding, Y., Dalgaard, K., Rottwitt, K. & Oxenløwe, L. K. Space division multiplexing chip-to-chip quantum key distribution. Sci. Rep. 7 , 12459 (2017).

Wang, J. et al. Multidimensional quantum entanglement with large-scale integrated optics. Science 360 , 285–291 (2018).

Article   ADS   MathSciNet   CAS   PubMed   Google Scholar  

Gottesman, D., Lo, H.-K., Lutkenhaus, N. & Preskill, J. Security of quantum key distribution with imperfect devices. In: International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings 136 (2004).

Tang, Y.-L. et al. Source attack of decoy-state quantum key distribution using phase information. Phys. Rev. A 88 , 022308 (2013).

Sun, S. & Huang, A. A review of security evaluation of practical quantum key distribution system. Entropy 24 , 260 (2022).

Article   ADS   MathSciNet   PubMed   PubMed Central   Google Scholar  

Bacco, D. et al. Characterization and stability measurement of deployed multicore fibers for quantum applications. Photon. Res. 9 , 1992–1997 (2021).

Luis, R.S. et al. Evaluation of dynamic skew on spooled and deployed multicore fibers using o-band signals. In: 2020 Optical Fiber Communications Conference and Exhibition (OFC) 1–3 (2020). https://ieeexplore.ieee.org/document/9083203 .

Vagniluca, I. et al. Efficient time-bin encoding for practical high-dimensional quantum key distribution. Phys. Rev. Appl. 14 , 014051 (2020).

Mueller, R. et al. Efficient Information Reconciliation for High-Dimensional Quantum Key Distribution. arXiv 2307.02225 (2023).

OpenStreetMap. https://www.openstreetmap.org/copyright Accessed 2023-09-30.

Download references

Acknowledgements

C.A. and A.M. are funded by QUID (Quantum Italy Deployment) funded by the European Commission in the Digital Europe Programme under the grant agreement No 101091408., L.O. received funding from the Center of Excellence SPOC (ref DNRF123), A.Z. received funding from the Project QuONTENT under the Progetti di Ricerca, CNR program funded by the Consiglio Nazionale delle Ricerche (CNR) and by the European Union—PON Ricerca e Innovazione 2014-2020 FESR—Project ARS01/00734 QUANCOM. D.B received funding from the IFD DK project Fire-Q (No. 9090-00031B), by EQUO (European Quantum Ecosystem) funded by the European Commission in the Digital Europe Programme under the grant agreement No 101091561 and by the European Union ERC project QOMUNE (101077917). The authors acknowledge OpenStreetMap 40 for providing the map of L’Aquila City, Italy.

Author information

Authors and affiliations.

Department of Electrical and Photonics Engineering, Technical University of Denmark, Ørsteds Pl., Kgs. Lyngby, 2800, Denmark

Mujtaba Zahidy, Ronny Müller, Leif K. Oxenløwe & Michael Galili

Department of Physical and Chemical Sciences, University of L’Aquila, L’Aquila, Italy

Domenico Ribezzo, Antonio Mecozzi & Cristian Antonelli

Istituto Nazionale di Ottica, Consiglio Nazionale delle Ricerche (CNR-INO), Firenze, 50125, Italy

Domenico Ribezzo & Alessandro Zavatta

University of Naples Federico II, Napoli, Italy

Domenico Ribezzo

QTI S.r.l., Firenze, 50125, Italy

Claudia De Lazzari, Ilaria Vagniluca, Nicola Biagi, Tommaso Occhipinti, Alessandro Zavatta & Davide Bacco

Optical Communications Laboratory, Sumitomo Electric Industries, Ltd., Yokohama, 244-8588, Japan

Tetsuya Hayashi

Department of Information Engineering, Computer Science and Mathematics, University of L’Aquila, L’Aquila, Italy

Dajana Cassioli

National Laboratory of Advanced Optical Fibers for Photonics (FIBERS), CNIT, L’Aquila, Italy

Dajana Cassioli, Antonio Mecozzi & Cristian Antonelli

Department of Physics and Astronomy, University of Florence, Via Sansone 1, Firenze, 50019, Italy

Davide Bacco

You can also search for this author in PubMed   Google Scholar

Contributions

D.B., A.Z., and M.Z. conceived the research idea and designed the experiment. M.Z., D.R., A.Z., and D.B. performed the measurements; M.Z., D.R., C.D.L., I.V., N.B., R.M. performed the data analysis, M.Z., D.R., C.A., A.M., and D.B. wrote the manuscript. L.K.O., T.O., M.G., D.C. provided critical feedback together with all authors. T.H., C.A., A.M., and D.C. facilitate access to the fiber infrastructure.

Corresponding author

Correspondence to Davide Bacco .

Ethics declarations

Competing interests.

The authors declare no competing interests.

Peer review

Peer review information.

Nature Communications thanks Dong-Dong Li and the other, anonymous, reviewer(s) for their contribution to the peer review of this work. A peer review file is available.

Additional information

Publisher’s note Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Supplementary information

Supplementary information, peer review file, rights and permissions.

Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article’s Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/ .

Reprints and permissions

About this article

Cite this article.

Zahidy, M., Ribezzo, D., De Lazzari, C. et al. Practical high-dimensional quantum key distribution protocol over deployed multicore fiber. Nat Commun 15 , 1651 (2024). https://doi.org/10.1038/s41467-024-45876-x

Download citation

Received : 03 March 2023

Accepted : 06 February 2024

Published : 23 February 2024

DOI : https://doi.org/10.1038/s41467-024-45876-x

Share this article

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

By submitting a comment you agree to abide by our Terms and Community Guidelines . If you find something abusive or that does not comply with our terms or guidelines please flag it as inappropriate.

Quick links

  • Explore articles by subject
  • Guide to authors
  • Editorial policies

Sign up for the Nature Briefing newsletter — what matters in science, free to your inbox daily.

research papers on quantum key distribution

Help | Advanced Search

Computer Science > Cryptography and Security

Title: overview of quantum key distribution technique within ipsec architecture.

Abstract: Quantum Key Distribution (QKD) is an approach for establishing symmetrical binary keys between distant users in an information-theoretically secure way. In this paper we provide an overview of existing solutions that integrate QKD within the most popular architecture for establishing secure communications in modern IP (Internet Protocol) networks - IPsec (Internet Protocol security). The provided overview can be used to further design the integration of QKD within the IPsec architecture striving for a standardized solution.
Subjects: Cryptography and Security (cs.CR); Quantum Physics (quant-ph)
Cite as: [cs.CR]
  (or [cs.CR] for this version)
  Focus to learn more arXiv-issued DOI via DataCite

Submission history

Access paper:.

  • Other Formats

license icon

References & Citations

  • INSPIRE HEP
  • Google Scholar
  • Semantic Scholar

DBLP - CS Bibliography

Bibtex formatted citation.

BibSonomy logo

Bibliographic and Citation Tools

Code, data and media associated with this article, recommenders and search tools.

  • Institution

arXivLabs: experimental projects with community collaborators

arXivLabs is a framework that allows collaborators to develop and share new arXiv features directly on our website.

Both individuals and organizations that work with arXivLabs have embraced and accepted our values of openness, community, excellence, and user data privacy. arXiv is committed to these values and only works with partners that adhere to them.

Have an idea for a project that will add value for arXiv's community? Learn more about arXivLabs .

IEEE Account

  • Change Username/Password
  • Update Address

Purchase Details

  • Payment Options
  • Order History
  • View Purchased Documents

Profile Information

  • Communications Preferences
  • Profession and Education
  • Technical Interests
  • US & Canada: +1 800 678 4333
  • Worldwide: +1 732 981 0060
  • Contact & Support
  • About IEEE Xplore
  • Accessibility
  • Terms of Use
  • Nondiscrimination Policy
  • Privacy & Opting Out of Cookies

A not-for-profit organization, IEEE is the world's largest technical professional organization dedicated to advancing technology for the benefit of humanity. © Copyright 2024 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.

COMMENTS

  1. Quantum Key Distribution and Its Applications

    Abstract: Quantum key distribution (QKD) provides a means to share a secret key between two distant parties securely against an eavesdropper with unlimited computational ability. QKD networks are now deployed in metropolitan areas, and continental-scale QKD networks have been constructed. This article gives an overview of the recent status of QKD.

  2. Advances in device-independent quantum key distribution

    Quantum key distribution (QKD) 1,2,3 is the remote delivery of secret keys through an insecure channel by using quantum-mechanical information carriers. When combined with the one-time pad ...

  3. Quantum Key Distribution Networks: Challenges and Future Research

    A quantum key distribution (QKD) network is proposed to allow QKD protocols to be the infrastructure of the Internet for distributing unconditional security keys instead of existing public-key cryptography based on computationally complex mathematical problems. Numerous countries and research institutes have invested enormous resources to execute correlation studies on QKD networks. Thus, in ...

  4. [2409.17075] Long-distance device-independent quantum key distribution

    Device-independent quantum key distribution (DIQKD) provides the strongest form of quantum security, as it allows two honest users to establish secure communication channels even when using fully uncharacterized quantum devices. The security proof of DIQKD is derived from the violation of a Bell inequality, mitigating side-channel attacks by asserting the presence of nonlocality. This enhanced ...

  5. High-rate intercity quantum key distribution with a semiconductor

    Rau, M. et al. Free space quantum key distribution over 500 meters using electrically driven quantum dot single-photon sources—a proof of principle experiment. N. J.

  6. Practical challenges in quantum key distribution

    V. Ravishankar. Scientific Reports (2023) Quantum key distribution (QKD) promises unconditional security in data communication and is currently being deployed in commercial applications ...

  7. A Review on Quantum Key Distribution Protocols, Challenges, and Its

    Abstract. Quantum key distribution (QKD) is a technology that enables secure communication by using the principles of quantum mechanics to generate and distribute cryptographic keys. QKD provides unconditionally secure communication, making it an essential technology for various industries such as military, finance, and health care.

  8. From Existing Quantum Key Distribution Systems Towards Future Quantum

    Abstract: With the current development of quantum computing, some existing cryptographic protocols may be broken in the future, such as RSA with Shor's algorithm. To secure the future secret communications, but also the current ones from retrospective decryption, Pre-Shared Keys (PSK) can be used today, and two types of complementary solutions are currently being studied: Post Quantum ...

  9. Quantum key distribution with entangled photons generated on ...

    Quantum key distribution—exchanging a random secret key relying on a quantum mechanical resource—is the core feature of secure quantum networks. Entanglement-based protocols offer additional layers of security and scale favorably with quantum repeaters, but the stringent requirements set on the photon source have made their use situational ...

  10. Multi‐Party Quantum Key Distribution Using Variational Quantum

    Advanced Quantum Technologies is a high-impact quantum science journal publishing theoretical & experimental research in quantum materials, optics, computing & more. Abstract The research paper introduces a novel approach to multi-party quantum key distribution using variational quantum eigensolvers (VQEs).

  11. An Overview of Quantum-Safe Approaches: Quantum Key Distribution and

    In this paper, we study the quantum-safe cryptography approaches and conduct a survey of the various quantum key distribution protocols, simulation tools, and commercial applications. In addition, we provide a comparison of the first four post-quantum cryptographic algorithms recently announced by the National Institute of Standards and Technology.

  12. Modeling research of satellite-to-ground quantum key distribution

    Abstract. Satellite-based quantum key distribution is the key to develop the intercontinental quantum network. After the demonstrations by Chinese satellite Micius, the prospect of global-scale quantum internet is no more out of reach. However, the research efforts on modeling of constellation of quantum satellite is still insufficient so far.

  13. Quantum Key Distribution: Simulation and Characterizations

    QKD becomes a significant trend of new cryptographic revolution. This paper explains how cryptography exploits the quantum mechanics in order to achieve an encryption/decryption process. Additionally, this paper provides a standard simulation for QKD-BB84 protocol and describes improvement key generation and key distribution mechanisms.

  14. Recent Advances on Quantum Key Distribution Overcoming the Linear

    Advanced Quantum Technologies is a high-impact quantum science journal publishing theoretical & experimental research in quantum materials, optics, computing & more. Abstract A crucial goal for quantum key distribution (QKD) is to transmit unconditionally secure keys over long distances. ... Search for more papers by this author. Pei Zeng, Pei ...

  15. PRX Quantum 4, 040320 (2023)

    The security of prepare-and-measure satellite-based quantum key distribution (QKD), under restricted eavesdropping scenarios, is addressed. ... In this paper, we obtain generic bounds on the key rate in the presence of bypass channels and apply them to continuous-variable QKD protocols with Gaussian encoding with direct and reverse ...

  16. An Introduction to Practical Quantum Key Distribution

    While the advent of quantum technology may seem detrimental to security, in fact, one may harness the power of quantum through quantum key distribution (QKD) for stronger security guarantees. ... Quantum communication is a highly interdisciplinary field of research and one of the goals of this article is to introduce a larger set of researchers ...

  17. Practical continuous-variable quantum key distribution with ...

    A quantum key distribution (QKD) system must fulfill the requirement of universal composability to ensure that any cryptographic application (using the QKD system) is also secure. Furthermore, the ...

  18. Quantum key distribution with correlated sources

    Quantum key distribution (QKD) allows two distant parties, Alice and Bob, to securely exchange cryptographic keys in the presence of an eavesdropper, Eve (1). Despite notable progress made in recent years, there is still a big gap between the information-theoretic security promised by the security proofs and the actual security offered by the ...

  19. Modified BB84 quantum key distribution protocol robust to source

    The Bennett-Brassard 1984 (BB84) protocol is the most widely implemented quantum key distribution (QKD) scheme. However, despite enormous theoretical and experimental efforts in the past decades, the security of this protocol with imperfect sources has not yet been rigorously established. In this paper, we address this shortcoming and prove the security of the BB84 protocol in the presence of ...

  20. Experimental quantum key distribution certified by Bell's theorem

    Certified key rate as a function of the number of rounds for S = 2.64, Q = 1.8%, γ = 13/256 and εsnd = 10 −10. We operate the DIQKD protocol at the point n = 1.5 × 10 6 on this curve ...

  21. Implementation Security in Quantum Key Distribution

    Upon completion of his Ph.D. in 2021, Víctor started a postdoc position in the same group, to later on become a senior postdoc researcher in the Vigo Quantum Communication Center. The main focus of his research is the security of quantum key distribution, and he is also interested in the foundations of quantum mechanics.

  22. Practical high-dimensional quantum key distribution protocol over

    Quantum key distribution (QKD) is a secure communication scheme for sharing symmetric cryptographic keys based on the laws of quantum physics, and is considered a key player in the realm of cyber ...

  23. Quantum Key Distribution (QKD) Protocols: A Survey

    The security strength of key distribution of most conventional cryptography is relied on mathematical complexity and the irrational time needed to break the algorithm. But it will be ineffective if the secret key distribution procedure is weak. In 1994 Peter Shor proposed an algorithm that can factorize great integer number efficiently by using principle of quantum computer, this algorithm ...

  24. [2112.13105] Overview of Quantum Key Distribution Technique within

    Quantum Key Distribution (QKD) is an approach for establishing symmetrical binary keys between distant users in an information-theoretically secure way. In this paper we provide an overview of existing solutions that integrate QKD within the most popular architecture for establishing secure communications in modern IP (Internet Protocol) networks - IPsec (Internet Protocol security). The ...

  25. Research on Quantum Key Distribution Method Based on Internet of Things

    Quantum cryptography can be transmitted through optical fiber technology or through free space. These two transmission methods are often used in IoT communications. This paper analyzes the operation process of the BB84 quantum key distribution protocol, and proposes a method capable of quantum key distribution in the Internet of Things.