Abstract
Quantum key distribution (QKD) is an unconditionally secure technology that utilizes the fundamental principles of quantum mechanics and the "one-time pad" encryption. However, the high construction cost of the current QKD network (QKDN) results in limited application. Therefore, this paper takes the low-cost semi-trusted quantum nodes into consideration for low-security requests. The hybrid-trusted QKDN (HT-QKDN) consists of trusted nodes and semi-trusted nodes. To ensure security, we propose an HT-QKDN routing scheme. The scheme uses multi-path transmission to distribute quantum keys in a predetermined proportion via both trusted and hybrid-trusted paths. The trusted path is composed entirely of trusted nodes, while trusted nodes and semi-trusted nodes coexist on the hybrid-trusted path. The multi-path routing problem is considered as a k Max–Min problem. First, the multiple candidate paths with the lowest cost designed between the source and destination nodes are selected by the improved Yen’s algorithm. Then, the optimal paths are selected from the candidate paths using the greedy algorithm by load balancing and key resource consumption. The simulation results show that the HT-QKDN is feasible, and the proposed routing scheme has superior performance.















Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.Data availability
The datasets used or analyzed during the current study are available from the corresponding author on reasonable request.
References
Dianati, M., Alléaume, R., Gagnaire, M., Shen, X.: Architecture and protocols of the future European quantum key distribution network. Secur. Commun. Netw. 1(1), 57–74 (2008)
Fan, F., Shi-hai, W., Jie, Y., Wei, H., Bin-lian, X.: Review of quantum secret communication technology. J. CAEIT 13(3), 356–362 (2018)
Xiaoxing, L., Kun, M.: Survey of quantum key application for guaranteeing content security. Comput. Eng. 45(12), 19–25 (2019)
Wenhua, L., Xizheng, Y., Xiaoran, X.: Discussion on key technologies of quantum secure communication and networking application. Design. Tech. Posts Telecommun. 2, 69–75 (2019)
Ren-feng, X., Zheng-xing, X., Yue-ping, L., Zhe, N., Xiao-jun, W.: Quantum key relay protocols between any terminals in internet. Appl. Res. Comput. 30(2), 507–509 (2013)
Fröhlich, B., Dynes, J.F., Lucamarini, M., Sharpe, A.W., Yuan, Z., Shields, A.J.: A quantum access network. Nature 501(7465), 69–72 (2013)
Diamanti, E., Lo, H.-K., Qi, B., Yuan, Z.: Practical challenges in quantum key distribution. NPJ Q. Inf. 2(1), 1–12 (2016)
Atzori, L., Iera, A., Morabito, G.: The internet of things: a survey. Comput. Netw. 54(15), 2787–2805 (2010)
Tan, L., Wang, N.: Future internet: the internet of things. In: 2010 3rd International Conference on Advanced Computer Theory and Engineering (ICACTE), vol. 5, pp. 5–376 (2010)
Meng, X., Yu, X., Chen, W., Zhao, Y., Zhang, J.: Residual-adaptive key provisioning in quantum-key-distribution enhanced internet of things (q-iot). In: 2020 International Wireless Communications and Mobile Computing (IWCMC), pp. 2022–2027 (2020)
Mavromatis, A., Ntavou, F., Salas, E.H., Kanellos, G.T., Nejabati, R., Simeonidou, D.: Experimental demonstration of quantum key distribution (QKD) for energy-efficient software-defined internet of things. In: 2018 European Conference on Optical Communication (ECOC), pp. 1–3 (2018)
Wang, Y., Li, Q., Mao, H., Han, Q., Huang, F., Xu, H.: Topological optimization of hybrid quantum key distribution networks. Opt. Express 28(18), 26348–26358 (2020)
Yang, C., Zhang, H., Su, J.: The QKD network: model and routing scheme. J. Mod. Opt. 64(21), 2350–2362 (2017)
Han, Q., Yu, L., Zheng, W., Cheng, N., Niu, X.: A novel QKD network routing algorithm based on optical-path-switching. J. Inf. Hiding Multimed. Signal Process. 5(1), 13–19 (2014)
Li, Z., Yu, X., Zhao, Y., Zhang, J.: Synchronization and resource allocation in quantum key distribution optical networks. In: 2020 IEEE Computing, Communications and IoT Applications (ComComAp), pp. 01–06 (2020). IEEE
Patil, A., Pant, M., Englund, D., Towsley, D., Guha, S.: Entanglement generation in a quantum network at distance-independent rate. NPJ Q. Inf. 8(1), 1–9 (2022)
Pant, M., Krovi, H., Towsley, D., Tassiulas, L., Jiang, L., Basu, P., Englund, D., Guha, S.: Routing entanglement in the quantum internet. NPJ Q. Inf. 5(1), 1–9 (2019)
Ma, C., Guo, Y., Su, J.: A multiple paths scheme with labels for key distribution on quantum key distribution network. In: 2017 IEEE 2nd Advanced Information Technology, Electronic and Automation Control Conference (IAEAC), pp. 2513–2517 (2017)
Ya-bin, X., Shu-juan, C., Yan-ping, L.: Research on multipath key transmission in quantum key distribution networks. J. Univ. Electron. Sci. Technol. China 2, 1368 (2020)
Sijiang, X., Qiong, G., Yan, F.: A multiple paths routing scheme with least number of public nodes based on trust relaying quantum key distribution network. Netinfo Secur. 7, 8 (2021)
Sharma, P., Agrawal, A., Bhatia, V., Prakash, S., Mishra, A.K.: Quantum key distribution secured optical networks: a survey. IEEE Open J. Commun. Soc. 109, 1008 (2021)
Hahn, F., Pappa, A., Eisert, J.: Quantum network routing and local complementation. NPJ Q. Inf. 5(1), 1–7 (2019)
Mannalath, V., Pathak, A.: Multiparty entanglement routing in quantum networks. arXiv preprint arXiv:2211.06690 (2022)
Pirandola, S., Andersen, U.L., Banchi, L., Berta, M., Bunandar, D., Colbeck, R., Englund, D., Gehring, T., Lupo, C., Ottaviani, C., et al.: Advances in quantum cryptography. Adv. Opt. Photonics 12(4), 1012–1236 (2020)
Tsai, C.-W., Yang, C.-W., Lin, J., Chang, Y.-C., Chang, R.-S.: Quantum key distribution networks: challenges and future research issues in security. Appl. Sci. 11(9), 3767 (2021)
Aguado, A., Lopez, V., Lopez, D., Peev, M., Poppe, A., Pastor, A., Folgueira, J., Martin, V.: The engineering of software-defined quantum key distribution networks. IEEE Commun. Mag. 57(7), 20–26 (2019)
Aguado, A., Hugues-Salas, E., Haigh, P.A., Marhuenda, J., Price, A.B., Sibson, P., Kennard, J.E., Erven, C., Rarity, J.G., Thompson, M.G., et al.: Secure NFV orchestration over an SDN-controlled optical network with time-shared quantum key distribution resources. J. Lightwave Technol. 35(8), 1357–1362 (2017)
Zhao, Y., Cao, Y., Wang, W., Wang, H., Yu, X., Zhang, J., Tornatore, M., Wu, Y., Mukherjee, B.: Resource allocation in optical networks secured by quantum key distribution. IEEE Commun. Mag. 56(8), 130–137 (2018)
Cao, Y., Zhao, Y., Colman-Meixner, C., Yu, X., Zhang, J.: Key on demand (KOD) for software-defined optical networks secured by quantum key distribution (QKD). Opt. Express 25(22), 26453–26467 (2017)
Cao, Y., Zhao, Y., Yu, X., Zhang, J.: Key on demand (KOD) for software-defined optical networks secured by quantum key distribution (QKD). JOSA B 36(3), 31–40 (2019)
Cao, Y., Zhao, Y., Wang, J., Yu, X., Ma, Z., Zhang, J.: SDQAAS: software defined networking for quantum key distribution as a service. Opt. Express 27(5), 6892–6909 (2019)
Wang, H., Zhao, Y., Li, Y., Yu, X., Zhang, J., Liu, C., Shao, Q.: A flexible key-updating method for software-defined optical networks secured by quantum key distribution. Opt. Fiber Technol. 45, 195–200 (2018)
Wang, H., Zhao, Y., Tornatore, M., Yu, X., Zhang, J.: Dynamic secret-key provisioning in quantum-secured passive optical networks (pons). Opt. Express 29(2), 1578–1596 (2021)
Wang, Q., Yu, X., Zhu, Q., Zhao, Y., Zhang, J.: Quantum key pool construction and key distribution scheme in multi-domain Qkd optical networks (Qkd-on). In: 4th Optics Young Scientist Summit (OYSS 2020). International Society for Optics and Photonics, vol. 11781, p. 1178122 (2021)
Shannon, C.E.: Communication theory of secrecy systems. Bell Syst Tech. J. 28(4), 656–715 (1949)
Morris, J.D., Grimaila, M.R., Hodson, D.D., Jacques, D., Baumgartner, G.: A survey of quantum key distribution (QKD) technologies. In: Emerging Trends in ICT Security, pp. 141–152 (2014)
NSA, N.: NSA suite B cryptography (2015)
Grover, L.K.: A fast quantum mechanical algorithm for database search. In: Proceedings of the Twenty-eighth Annual ACM Symposium on Theory of Computing, pp. 212–219 (1996)
Bernstein, D.J., Lange, T.: Post-quantum cryptography. Nature 549(7671), 188–194 (2017)
Acknowledgements
This work was supported by National key research and development program of China, Joint research of IoT security system and key technologies based on quantum key (Grant No. 2020YFE0200600).
Funding
This work was supported by National key research and development program of China, Joint research of IoT security system and key technologies based on quantum key (Grant No. 2020YFE0200600).
Author information
Authors and Affiliations
Contributions
All authors contributed to the study conception and design. Material preparation, data collection and analysis were performed by LQC and JQC. The first draft of the manuscript was written by JQC and all authors commented on previous versions of the manuscript. All authors read and approved the final manuscript.
Corresponding author
Ethics declarations
Conflict of interest
The authors have no conflicts of interest to declare that are relevant to the content of this article.
Code availability
The code required to reproduce these findings cannot be shared at this time as the data also forms part of an ongoing study.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Chen, LQ., Chen, JQ., Chen, QY. et al. A quantum key distribution routing scheme for hybrid-trusted QKD network system. Quantum Inf Process 22, 75 (2023). https://doi.org/10.1007/s11128-022-03825-x
Received:
Accepted:
Published:
DOI: https://doi.org/10.1007/s11128-022-03825-x