Efficient QKD in Non-Ideal Scenarios with User-Defined Output Length Requirements
- URL: http://arxiv.org/abs/2509.04140v1
- Date: Thu, 04 Sep 2025 12:11:05 GMT
- Title: Efficient QKD in Non-Ideal Scenarios with User-Defined Output Length Requirements
- Authors: Andrés Martín-Megino, Blanca López, Iván Vidal Fernández, Francisco Valera Pintor,
- Abstract summary: Quantum Key Distribution (QKD) enables two parties to securely share encryption keys by leveraging the principles of quantum mechanics.<n>We introduce a variable-length adaptation of the BB84 protocol designed to meet user-defined output key length constraints.<n>We present a method for dynamically configuring the protocol's initial parameters to generate secret keys of a desired length.
- Score: 0.6099774114286839
- License: http://creativecommons.org/licenses/by-nc-nd/4.0/
- Abstract: Quantum Key Distribution (QKD) enables two parties to securely share encryption keys by leveraging the principles of quantum mechanics, offering protection against eavesdropping. In practical implementations, QKD systems often rely on a layered architecture where a key manager stores secret key material in a buffer and delivers it to higher communication layers as needed. However, this buffer can be depleted under high demand, requiring efficient replenishment strategies that minimize resource waste. Given the importance of optimizing time and resources in quantum cryptography protocols, we introduce a variable-length adaptation of the BB84 protocol designed to meet user-defined output key length constraints in non-ideal scenarios. We present a method for dynamically configuring the protocol's initial parameters to generate secret keys of a desired length. To validate our approach, we developed simulation tools to model general QKD networks and discrete-variable protocols. These tools were used to implement and evaluate our strategies, which were developed within the BB84 framework but can be extended to other QKD protocols under reasonable assumptions. The results highlight their usefulness in optimizing quantum resource usage and supporting key management, contributing to the long-term goal of scaling and strengthening secure quantum networks.
Related papers
- OptiQKD: A Machine Learning-Optimized Framework for Real-Time Parameter Tuning in Quantum Key Distribution [0.0]
We propose OptiQKD, a protocol-agnostic machine learning framework specifically engineered to maximize the Secure Key Rate (SKR) and minimize the Quantum Bit Error Rate (QBER) for the BB84, E91, and COW protocols.<n>We evaluate the framework by simulating critical environmental stressors, including depolarizing and amplitude-damping noise, under realistic device constraints.
arXiv Detail & Related papers (2026-03-04T15:43:31Z) - Reinforcement Learning for Quantum Network Control with Application-Driven Objectives [53.03367590211247]
Dynamic programming and reinforcement learning offer promising tools for optimizing control strategies.<n>We propose a novel RL framework that directly optimize non-linear, differentiable objective functions.<n>Our work comprises the first step towards non-linear objective function optimization in quantum networks with RL, opening a path towards more advanced use cases.
arXiv Detail & Related papers (2025-09-12T18:41:10Z) - System design and realisation towards optimising secure key bits in free space QKD [1.3458279593461016]
Quantum Key Distribution (QKD) is rapidly transitioning from cutting-edge laboratory research to real-world deployment in established communication networks.<n>We present a practical and systematic framework for implementing QKD, focused on the BB84 protocol.<n>We outline a simple algorithm for key sifting that is easily implementable in hardware.
arXiv Detail & Related papers (2025-08-14T08:57:59Z) - Hybrid Quantum Security for IPsec [1.8637078358591843]
This paper presents the first systematic comparison of sequential versus parallel hybrid QKD-PQC key establishment strategies for IPsec.<n>We introduce two novel approaches for incorporating QKD into Internet Key Exchange version 2 (IKEv2) with support for both ETSI GS QKD 004 stateful and ETSI GS QKD 014 stateless API specifications.<n>Our key insight is that parallel hybrid approaches eliminate the multiplicative latency penalties inherent in sequential methods mandated by RFC 9370.
arXiv Detail & Related papers (2025-07-12T13:54:04Z) - A Fully Device-Independent Ternary Quantum Key Distribution Protocol Based on the Impossible Colouring Game [0.59374762912328]
We propose a quantum key distribution protocol based on the two-party Impossible Colouring pseudo-telepathy game.<n>The protocol harnesses Bell inequality violations that arise from contextuality in the Kochen-Specker theorem.<n>It operates within an adequate security framework and demonstrates an improved key generation rate compared to standard quantum key distribution schemes.
arXiv Detail & Related papers (2025-05-21T14:52:31Z) - Practical hybrid PQC-QKD protocols with enhanced security and performance [44.8840598334124]
We develop hybrid protocols by which QKD and PQC inter-operate within a joint quantum-classical network.
In particular, we consider different hybrid designs that may offer enhanced speed and/or security over the individual performance of either approach.
arXiv Detail & Related papers (2024-11-02T00:02:01Z) - Towards efficient and secure quantum-classical communication networks [47.27205216718476]
There are two primary approaches to achieving quantum-resistant security: quantum key distribution (QKD) and post-quantum cryptography (PQC)
We introduce the pros and cons of these protocols and explore how they can be combined to achieve a higher level of security and/or improved performance in key distribution.
We hope our discussion inspires further research into the design of hybrid cryptographic protocols for quantum-classical communication networks.
arXiv Detail & Related papers (2024-11-01T23:36:19Z) - Efficient Device-Independent Quantum Key Distribution [4.817429789586127]
Device-independent quantum key distribution (DIQKD) is a key distribution scheme whose security is based on the laws of quantum physics.
We propose an efficient device-independent quantum key distribution protocol in which one participant prepares states and transmits them to another participant.
arXiv Detail & Related papers (2023-11-16T13:01:34Z) - Robust and efficient verification of graph states in blind
measurement-based quantum computation [52.70359447203418]
Blind quantum computation (BQC) is a secure quantum computation method that protects the privacy of clients.
It is crucial to verify whether the resource graph states are accurately prepared in the adversarial scenario.
Here, we propose a robust and efficient protocol for verifying arbitrary graph states with any prime local dimension.
arXiv Detail & Related papers (2023-05-18T06:24:45Z) - New protocols for quantum key distribution with explicit upper and lower bound on secret key rate [0.0]
We present two new schemes for quantum key distribution (QKD) that neither require entanglement nor an ideal single-photon source.<n>These protocols are shown to be secure against multiple attacks, including intercept-resend and a class of collective attacks.<n>A trade-off between quantum resources and information revealed to an eavesdropper (Eve) is observed, with higher efficiency achievable through the use of additional quantum resources.
arXiv Detail & Related papers (2022-12-26T11:14:39Z) - Data post-processing for the one-way heterodyne protocol under
composable finite-size security [62.997667081978825]
We study the performance of a practical continuous-variable (CV) quantum key distribution protocol.
We focus on the Gaussian-modulated coherent-state protocol with heterodyne detection in a high signal-to-noise ratio regime.
This allows us to study the performance for practical implementations of the protocol and optimize the parameters connected to the steps above.
arXiv Detail & Related papers (2022-05-20T12:37:09Z) - Composably secure data processing for Gaussian-modulated continuous
variable quantum key distribution [58.720142291102135]
Continuous-variable quantum key distribution (QKD) employs the quadratures of a bosonic mode to establish a secret key between two remote parties.
We consider a protocol with homodyne detection in the general setting of composable finite-size security.
In particular, we analyze the high signal-to-noise regime which requires the use of high-rate (non-binary) low-density parity check codes.
arXiv Detail & Related papers (2021-03-30T18:02:55Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.