On Post-Quantum Cryptography Authentication for Quantum Key Distribution
By: Juan Antonio Vieira Giestinhas, Timothy Spiller
Potential Business Impact:
Lets more people securely share secret codes.
The traditional way for a Quantum Key Distribution (QKD) user to join a quantum network is by authenticating themselves using pre-shared key material. While this approach is sufficient for small-scale networks, it becomes impractical as the network grows, due to the total quadratic increase in the number of pre-shared keys required. To address this scalability issue, Public Key Infrastructure (PKI) combined with Post-Quantum Cryptography (PQC) offers a more scalable solution, allowing users to authenticate the QKD traffic remotely to obtain information-theoretical secure (ITS) keys under the presented assumptions. Unlike traditional PKI, which relies on classical cryptographic algorithms such as RSA, the approach presented in this paper leverages PQC algorithms that are believed to be resistant to quantum attacks. Similarly to the SIGMA or TLS protocols, authentication, confidentiality, and integrity are achievable against bounded adversaries to ensure secure and scalable quantum networks.
Similar Papers
Combined Quantum and Post-Quantum Security Performance Under Finite Keys
Quantum Physics
Makes secret messages safe even if hackers peek.
Hybrid Quantum Security for IPsec
Cryptography and Security
Makes internet secrets safe from future computers.
Hybrid Schemes of NIST Post-Quantum Cryptography Standard Algorithms and Quantum Key Distribution for Key Exchange and Digital Signature
Cryptography and Security
Makes secret messages safer from future computers.