Quantum Key Distribution: Bridging Theoretical Security Proofs, Practical Attacks, and Error Correction for Quantum-Augmented Networks
- URL: http://arxiv.org/abs/2511.20602v1
- Date: Tue, 25 Nov 2025 18:31:02 GMT
- Title: Quantum Key Distribution: Bridging Theoretical Security Proofs, Practical Attacks, and Error Correction for Quantum-Augmented Networks
- Authors: Nitin Jha, Abhishek Parakh, Mahadevan Subramaniam,
- Abstract summary: Quantum Key Distribution (QKD) is revolutionizing cryptography by promising information-theoretic security through the immutable laws of quantum mechanics.<n>Yet, the challenge of transforming idealized security models into practical, resilient systems remains a pressing issue.<n>This review critically dissects and synthesizes the latest advancements in QKD protocols and their security vulnerabilities.
- Score: 0.0
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Quantum Key Distribution (QKD) is revolutionizing cryptography by promising information-theoretic security through the immutable laws of quantum mechanics. Yet, the challenge of transforming these idealized security models into practical, resilient systems remains a pressing issue, especially as quantum computing evolves. In this review, we critically dissect and synthesize the latest advancements in QKD protocols and their security vulnerabilities, with a strong emphasis on rigorous security proofs. We actively categorize contemporary QKD schemes into three key classes: uncertainty principle-based protocols (e.g., BB84), hybrid architectures that enable secure direct communication (eg, three-stage protocol), and continuous-variable frameworks. We further include two modern classes of QKD protocols, namely Twin-field QKD and Device-Independent QKD, both of which were developed to have practical implementations over the last decade. Moreover, we highlight important experimental breakthroughs and innovative mitigation strategies, including the deployment of advanced Quantum Error Correction Codes (QECCs), that significantly enhance channel fidelity and system robustness. By mapping the current landscape, from sophisticated quantum attacks to state-of-the-art error correction methods, this review fills an important gap in the literature. To bring everything together, the relevance of this review concerning quantum augmented networks (QuANets) is also presented. This allows the readers to gain a comprehensive understanding of the security promises of quantum key distribution from theoretical proofs to experimental validations.
Related papers
- Quantum Key Distribution with Imperfections: Recent Advances in Security Proofs [0.0]
Quantum Key Distribution (QKD) can enable two spatially separated parties to establish an information-theoretically secure encryption.<n>Security proofs robust against a wide range of eavesdropping strategies have established the theoretical soundness of several QKD protocols.<n>Most proofs are based on idealized models of the physical systems involved in such protocols and often include assumptions that are not satisfied in practical implementations.
arXiv Detail & Related papers (2026-02-04T21:16:33Z) - Verifier-initiated quantum message-authentication via quantum zero-knowledge proofs [38.81686642226027]
We introduce a new method where the verifier can request authentication only when needed, improving efficiency for quantum networks and blockchain applications.<n>Our approach adapts the concept of zero-knowledge widely used in classical cryptography to quantum settings, ensuring that verification reveals nothing about secret keys.<n>This work delivers the first general verifier-initiated quantum signature scheme with formal security, paving the way for scalable, secure authentication in future quantum infrastructures and decentralized systems.
arXiv Detail & Related papers (2025-12-05T04:40:34Z) - Quantum Key Distribution [9.403735049058284]
Quantum Key Distribution (QKD) is a technology that ensures secure communication by leveraging the principles of quantum mechanics.<n>This chapter provides an overview of this quantum technology's maturity and trends.
arXiv Detail & Related papers (2025-07-31T02:20:02Z) - Hybrid Quantum Security for IPsec [1.8637078358591843]
This paper presents the first systematic comparison of sequential versus parallel hybrid QKD-PQC key establishment strategies for IPsec.<n>We introduce two novel approaches for incorporating QKD into Internet Key Exchange version 2 (IKEv2) with support for both ETSI GS QKD 004 stateful and ETSI GS QKD 014 stateless API specifications.<n>Our key insight is that parallel hybrid approaches eliminate the multiplicative latency penalties inherent in sequential methods mandated by RFC 9370.
arXiv Detail & Related papers (2025-07-12T13:54:04Z) - Device-Independent Quantum Key Distribution: Protocols, Quantum Games, and Security [0.0]
Quantum Key Distribution (QKD) is based on the laws of quantum mechanics to enable provably secure communication.<n>Despite its theoretical security promise, practical QKD systems are vulnerable to serious attacks, including side-channel attacks and detector loopholes.<n> Device-Independent Quantum Key Distribution (DIQKD) overcomes these limitations by relying solely on observed nonlocal correlations.
arXiv Detail & Related papers (2025-05-20T11:52:21Z) - Practical hybrid PQC-QKD protocols with enhanced security and performance [44.8840598334124]
We develop hybrid protocols by which QKD and PQC inter-operate within a joint quantum-classical network.
In particular, we consider different hybrid designs that may offer enhanced speed and/or security over the individual performance of either approach.
arXiv Detail & Related papers (2024-11-02T00:02:01Z) - Towards efficient and secure quantum-classical communication networks [47.27205216718476]
There are two primary approaches to achieving quantum-resistant security: quantum key distribution (QKD) and post-quantum cryptography (PQC)
We introduce the pros and cons of these protocols and explore how they can be combined to achieve a higher level of security and/or improved performance in key distribution.
We hope our discussion inspires further research into the design of hybrid cryptographic protocols for quantum-classical communication networks.
arXiv Detail & Related papers (2024-11-01T23:36:19Z) - Quantum-Secured Data Centre Interconnect in a field environment [38.4938584033229]
Quantum key distribution (QKD) is an established quantum technology at a high readiness level.
In this article, we present the successful implementation of a QKD field trial within a commercial data centre environment.
The achieved average secret key rate of 2.392 kbps and an average quantum bit error rate of less than 2% demonstrate the commercial feasibility of QKD in real-world scenarios.
arXiv Detail & Related papers (2024-10-14T08:05:25Z) - Unveiling Hidden Vulnerabilities in Quantum Systems by Expanding Attack Vectors through Heisenberg's Uncertainty Principle [0.0]
This study uncovers novel vulnerabilities within Quantum Key Distribution (QKD) protocols.
The newly identified vulnerabilities arise from the complex interaction between Bell Inequalities (BIs) and Hidden Variable Theories (HVTs)
arXiv Detail & Related papers (2024-09-27T06:18:36Z) - The Evolution of Quantum Secure Direct Communication: On the Road to the Qinternet [49.8449750761258]
Quantum secure direct communication (QSDC) is provably secure and overcomes the threat of quantum computing.<n>We will detail the associated point-to-point communication protocols and show how information is protected and transmitted.
arXiv Detail & Related papers (2023-11-23T12:40:47Z) - Practical quantum secure direct communication with squeezed states [37.69303106863453]
We report the first table-top experimental demonstration of a CV-QSDC system and assess its security.<n>This realization paves the way into future threat-less quantum metropolitan networks, compatible with coexisting advanced wavelength division multiplexing (WDM) systems.
arXiv Detail & Related papers (2023-06-25T19:23:42Z) - Authentication of quantum key distribution with post-quantum
cryptography and replay attacks [1.8476815769956565]
Quantum key distribution (QKD) and post-quantum cryptography (PQC) are two cryptographic mechanisms with quantum-resistant security.
We propose two protocols based on PQC to realize the full authentication of QKD data post-processing.
arXiv Detail & Related papers (2022-06-02T17:29:34Z) - Backflash Light as a Security Vulnerability in Quantum Key Distribution
Systems [77.34726150561087]
We review the security vulnerabilities of quantum key distribution (QKD) systems.
We mainly focus on a particular effect known as backflash light, which can be a source of eavesdropping attacks.
arXiv Detail & Related papers (2020-03-23T18:23:12Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.