Score: 0

On Post-Quantum Cryptography Authentication for Quantum Key Distribution

Published: July 28, 2025 | arXiv ID: 2507.21325v1

By: Juan Antonio Vieira Giestinhas, Timothy Spiller

Potential Business Impact:

Lets more people securely share secret codes.

Business Areas:
Quantum Computing Science and Engineering

The traditional way for a Quantum Key Distribution (QKD) user to join a quantum network is by authenticating themselves using pre-shared key material. While this approach is sufficient for small-scale networks, it becomes impractical as the network grows, due to the total quadratic increase in the number of pre-shared keys required. To address this scalability issue, Public Key Infrastructure (PKI) combined with Post-Quantum Cryptography (PQC) offers a more scalable solution, allowing users to authenticate the QKD traffic remotely to obtain information-theoretical secure (ITS) keys under the presented assumptions. Unlike traditional PKI, which relies on classical cryptographic algorithms such as RSA, the approach presented in this paper leverages PQC algorithms that are believed to be resistant to quantum attacks. Similarly to the SIGMA or TLS protocols, authentication, confidentiality, and integrity are achievable against bounded adversaries to ensure secure and scalable quantum networks.

Country of Origin
🇬🇧 United Kingdom

Page Count
63 pages

Category
Physics:
Quantum Physics