Quantum key distribution without authentication and information leakage
- URL: http://arxiv.org/abs/2601.02846v1
- Date: Tue, 06 Jan 2026 09:25:45 GMT
- Title: Quantum key distribution without authentication and information leakage
- Authors: Zixuan Hu, Zhenyu Li,
- Abstract summary: Quantum key distribution (QKD) is the most widely studied quantum cryptographic model.<n>We propose a new QKD variant that removes the need for a separate authentication mechanism.<n>Our design achieves (almost) perfect information-theoretic security with the protocol keys reusable.
- Score: 14.19611301695484
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Quantum key distribution (QKD) is the most widely studied quantum cryptographic model that exploits quantum effects to achieve information-theoretically secure key establishment. Conventional QKD contains public classical post-processing steps that require authentication to prevent impersonation and maintain security. However, a major limitation of QKD is it cannot perform authentication by itself, and thus requires a separate authentication mechanism. In addition, these public classical steps also have information leakage which subjects QKD to additional attack strategies and reduces the final key rate. In this work, we propose a new QKD variant that removes the need for a separate authentication mechanism, eliminates information leakage, and achieves a substantially higher key rate. By having two more protocol keys than conventional QKD and no public classical steps, our design achieves (almost) perfect information-theoretic security with the protocol keys reusable.
Related papers
- Pervasive Vulnerability Analysis and Defense for QKD-based Quantum Private Query [7.908856604745481]
This study focuses on hidden information extraction under undetermined signal bits, revealing that most such QPQ protocols face severe security threats even without complex quantum resources.<n>To address these critical flaws, the proposed multi-encryption defense scheme is compatible with existing QPQ protocols.
arXiv Detail & Related papers (2026-01-05T09:05:49Z) - Verifier-initiated quantum message-authentication via quantum zero-knowledge proofs [38.81686642226027]
We introduce a new method where the verifier can request authentication only when needed, improving efficiency for quantum networks and blockchain applications.<n>Our approach adapts the concept of zero-knowledge widely used in classical cryptography to quantum settings, ensuring that verification reveals nothing about secret keys.<n>This work delivers the first general verifier-initiated quantum signature scheme with formal security, paving the way for scalable, secure authentication in future quantum infrastructures and decentralized systems.
arXiv Detail & Related papers (2025-12-05T04:40:34Z) - QKD Oracles for Authenticated Key Exchange [1.3999481573773072]
In particular, improper handling of QKD key IDs leads to Dependent-Key attacks on AKE.<n>We demonstrate the usability of our QKD oracle for cryptographic security analyses by integrating it into a prominent security model for AKE.<n>This is the first provably secure hybrid protocol that maintains information-theoretic security of QKD.
arXiv Detail & Related papers (2025-09-15T21:55:55Z) - On Post-Quantum Cryptography Authentication for Quantum Key Distribution [0.0]
Quantum Key Distribution (QKD) users authenticate themselves using pre-shared key material to join a quantum network.<n>Public Key Infrastructure (PKI) combined with Post-Quantum Cryptography (PQC) offers a more scalable solution.<n>Unlike traditional PKI, which relies on classical cryptographic algorithms such as RSA, the approach presented in this paper leverages PQC algorithms believed to be resistant to quantum attacks.
arXiv Detail & Related papers (2025-07-28T20:40:11Z) - Secure Multi-Party Biometric Verification using QKD assisted Quantum Oblivious Transfer [34.46964288961048]
We present a practical implementation of a secure multiparty computation application enabled by quantum oblivious transfer (QOT)<n>The QOT protocol uses polarization-encoded entangled states to share oblivious keys between two parties with quantum key distribution (QKD) providing authentication.<n>A practical use case is demonstrated for privacy-preserving fingerprint matching against no-fly lists from Interpol and the United Nations.
arXiv Detail & Related papers (2025-01-09T15:51:30Z) - Practical hybrid PQC-QKD protocols with enhanced security and performance [44.8840598334124]
We develop hybrid protocols by which QKD and PQC inter-operate within a joint quantum-classical network.
In particular, we consider different hybrid designs that may offer enhanced speed and/or security over the individual performance of either approach.
arXiv Detail & Related papers (2024-11-02T00:02:01Z) - QKD Based on Time-Entangled Photons and its Key-Rate Promise [24.07745562101555]
Time-entanglement-based QKD promises to increase the secret key rate and distribution compared to other QKD implementations.
We overview state-of-the-art from the information and coding theory perspective.
arXiv Detail & Related papers (2023-03-03T14:40:40Z) - One-Time Universal Hashing Quantum Digital Signatures without Perfect
Keys [24.240914319917053]
We show that imperfect quantum keys with limited information leakage can be used for digital signatures and authentication without compromising security.
This study significantly reduces the delay for data postprocessing and is compatible with any quantum key generation protocols.
arXiv Detail & Related papers (2023-01-03T14:54:27Z) - Authentication of quantum key distribution with post-quantum
cryptography and replay attacks [1.8476815769956565]
Quantum key distribution (QKD) and post-quantum cryptography (PQC) are two cryptographic mechanisms with quantum-resistant security.
We propose two protocols based on PQC to realize the full authentication of QKD data post-processing.
arXiv Detail & Related papers (2022-06-02T17:29:34Z) - Experimental Authentication of Quantum Key Distribution with
Post-quantum Cryptography [3.627592297350721]
We experimentally verified the feasibility, efficiency and stability of the PQC algorithm in QKD authentication.
Using PQC authentication we only need to believe the CA is safe, rather than all trusted relays.
arXiv Detail & Related papers (2020-09-10T04:12:07Z) - Backflash Light as a Security Vulnerability in Quantum Key Distribution
Systems [77.34726150561087]
We review the security vulnerabilities of quantum key distribution (QKD) systems.
We mainly focus on a particular effect known as backflash light, which can be a source of eavesdropping attacks.
arXiv Detail & Related papers (2020-03-23T18:23:12Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.