Skip to main content

Advertisement

Log in

A quantum key distribution routing scheme for hybrid-trusted QKD network system

  • Published:
Quantum Information Processing Aims and scope Submit manuscript

Abstract

Quantum key distribution (QKD) is an unconditionally secure technology that utilizes the fundamental principles of quantum mechanics and the "one-time pad" encryption. However, the high construction cost of the current QKD network (QKDN) results in limited application. Therefore, this paper takes the low-cost semi-trusted quantum nodes into consideration for low-security requests. The hybrid-trusted QKDN (HT-QKDN) consists of trusted nodes and semi-trusted nodes. To ensure security, we propose an HT-QKDN routing scheme. The scheme uses multi-path transmission to distribute quantum keys in a predetermined proportion via both trusted and hybrid-trusted paths. The trusted path is composed entirely of trusted nodes, while trusted nodes and semi-trusted nodes coexist on the hybrid-trusted path. The multi-path routing problem is considered as a k Max–Min problem. First, the multiple candidate paths with the lowest cost designed between the source and destination nodes are selected by the improved Yen’s algorithm. Then, the optimal paths are selected from the candidate paths using the greedy algorithm by load balancing and key resource consumption. The simulation results show that the HT-QKDN is feasible, and the proposed routing scheme has superior performance.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15

Similar content being viewed by others

Explore related subjects

Discover the latest articles, news and stories from top researchers in related subjects.

Data availability

The datasets used or analyzed during the current study are available from the corresponding author on reasonable request.

References

  1. Dianati, M., Alléaume, R., Gagnaire, M., Shen, X.: Architecture and protocols of the future European quantum key distribution network. Secur. Commun. Netw. 1(1), 57–74 (2008)

    Article  Google Scholar 

  2. Fan, F., Shi-hai, W., Jie, Y., Wei, H., Bin-lian, X.: Review of quantum secret communication technology. J. CAEIT 13(3), 356–362 (2018)

    Google Scholar 

  3. Xiaoxing, L., Kun, M.: Survey of quantum key application for guaranteeing content security. Comput. Eng. 45(12), 19–25 (2019)

    Google Scholar 

  4. Wenhua, L., Xizheng, Y., Xiaoran, X.: Discussion on key technologies of quantum secure communication and networking application. Design. Tech. Posts Telecommun. 2, 69–75 (2019)

    Google Scholar 

  5. Ren-feng, X., Zheng-xing, X., Yue-ping, L., Zhe, N., Xiao-jun, W.: Quantum key relay protocols between any terminals in internet. Appl. Res. Comput. 30(2), 507–509 (2013)

    Google Scholar 

  6. Fröhlich, B., Dynes, J.F., Lucamarini, M., Sharpe, A.W., Yuan, Z., Shields, A.J.: A quantum access network. Nature 501(7465), 69–72 (2013)

    Article  ADS  Google Scholar 

  7. Diamanti, E., Lo, H.-K., Qi, B., Yuan, Z.: Practical challenges in quantum key distribution. NPJ Q. Inf. 2(1), 1–12 (2016)

    Google Scholar 

  8. Atzori, L., Iera, A., Morabito, G.: The internet of things: a survey. Comput. Netw. 54(15), 2787–2805 (2010)

    Article  MATH  Google Scholar 

  9. Tan, L., Wang, N.: Future internet: the internet of things. In: 2010 3rd International Conference on Advanced Computer Theory and Engineering (ICACTE), vol. 5, pp. 5–376 (2010)

  10. Meng, X., Yu, X., Chen, W., Zhao, Y., Zhang, J.: Residual-adaptive key provisioning in quantum-key-distribution enhanced internet of things (q-iot). In: 2020 International Wireless Communications and Mobile Computing (IWCMC), pp. 2022–2027 (2020)

  11. Mavromatis, A., Ntavou, F., Salas, E.H., Kanellos, G.T., Nejabati, R., Simeonidou, D.: Experimental demonstration of quantum key distribution (QKD) for energy-efficient software-defined internet of things. In: 2018 European Conference on Optical Communication (ECOC), pp. 1–3 (2018)

  12. Wang, Y., Li, Q., Mao, H., Han, Q., Huang, F., Xu, H.: Topological optimization of hybrid quantum key distribution networks. Opt. Express 28(18), 26348–26358 (2020)

    Article  ADS  Google Scholar 

  13. Yang, C., Zhang, H., Su, J.: The QKD network: model and routing scheme. J. Mod. Opt. 64(21), 2350–2362 (2017)

    Article  ADS  Google Scholar 

  14. Han, Q., Yu, L., Zheng, W., Cheng, N., Niu, X.: A novel QKD network routing algorithm based on optical-path-switching. J. Inf. Hiding Multimed. Signal Process. 5(1), 13–19 (2014)

    Google Scholar 

  15. Li, Z., Yu, X., Zhao, Y., Zhang, J.: Synchronization and resource allocation in quantum key distribution optical networks. In: 2020 IEEE Computing, Communications and IoT Applications (ComComAp), pp. 01–06 (2020). IEEE

  16. Patil, A., Pant, M., Englund, D., Towsley, D., Guha, S.: Entanglement generation in a quantum network at distance-independent rate. NPJ Q. Inf. 8(1), 1–9 (2022)

    Google Scholar 

  17. Pant, M., Krovi, H., Towsley, D., Tassiulas, L., Jiang, L., Basu, P., Englund, D., Guha, S.: Routing entanglement in the quantum internet. NPJ Q. Inf. 5(1), 1–9 (2019)

    Google Scholar 

  18. Ma, C., Guo, Y., Su, J.: A multiple paths scheme with labels for key distribution on quantum key distribution network. In: 2017 IEEE 2nd Advanced Information Technology, Electronic and Automation Control Conference (IAEAC), pp. 2513–2517 (2017)

  19. Ya-bin, X., Shu-juan, C., Yan-ping, L.: Research on multipath key transmission in quantum key distribution networks. J. Univ. Electron. Sci. Technol. China 2, 1368 (2020)

    Google Scholar 

  20. Sijiang, X., Qiong, G., Yan, F.: A multiple paths routing scheme with least number of public nodes based on trust relaying quantum key distribution network. Netinfo Secur. 7, 8 (2021)

    Google Scholar 

  21. Sharma, P., Agrawal, A., Bhatia, V., Prakash, S., Mishra, A.K.: Quantum key distribution secured optical networks: a survey. IEEE Open J. Commun. Soc. 109, 1008 (2021)

    Google Scholar 

  22. Hahn, F., Pappa, A., Eisert, J.: Quantum network routing and local complementation. NPJ Q. Inf. 5(1), 1–7 (2019)

    Google Scholar 

  23. Mannalath, V., Pathak, A.: Multiparty entanglement routing in quantum networks. arXiv preprint arXiv:2211.06690 (2022)

  24. Pirandola, S., Andersen, U.L., Banchi, L., Berta, M., Bunandar, D., Colbeck, R., Englund, D., Gehring, T., Lupo, C., Ottaviani, C., et al.: Advances in quantum cryptography. Adv. Opt. Photonics 12(4), 1012–1236 (2020)

    Article  ADS  Google Scholar 

  25. Tsai, C.-W., Yang, C.-W., Lin, J., Chang, Y.-C., Chang, R.-S.: Quantum key distribution networks: challenges and future research issues in security. Appl. Sci. 11(9), 3767 (2021)

    Article  Google Scholar 

  26. Aguado, A., Lopez, V., Lopez, D., Peev, M., Poppe, A., Pastor, A., Folgueira, J., Martin, V.: The engineering of software-defined quantum key distribution networks. IEEE Commun. Mag. 57(7), 20–26 (2019)

    Article  Google Scholar 

  27. Aguado, A., Hugues-Salas, E., Haigh, P.A., Marhuenda, J., Price, A.B., Sibson, P., Kennard, J.E., Erven, C., Rarity, J.G., Thompson, M.G., et al.: Secure NFV orchestration over an SDN-controlled optical network with time-shared quantum key distribution resources. J. Lightwave Technol. 35(8), 1357–1362 (2017)

    Article  ADS  Google Scholar 

  28. Zhao, Y., Cao, Y., Wang, W., Wang, H., Yu, X., Zhang, J., Tornatore, M., Wu, Y., Mukherjee, B.: Resource allocation in optical networks secured by quantum key distribution. IEEE Commun. Mag. 56(8), 130–137 (2018)

    Article  Google Scholar 

  29. Cao, Y., Zhao, Y., Colman-Meixner, C., Yu, X., Zhang, J.: Key on demand (KOD) for software-defined optical networks secured by quantum key distribution (QKD). Opt. Express 25(22), 26453–26467 (2017)

    Article  ADS  Google Scholar 

  30. Cao, Y., Zhao, Y., Yu, X., Zhang, J.: Key on demand (KOD) for software-defined optical networks secured by quantum key distribution (QKD). JOSA B 36(3), 31–40 (2019)

    Article  Google Scholar 

  31. Cao, Y., Zhao, Y., Wang, J., Yu, X., Ma, Z., Zhang, J.: SDQAAS: software defined networking for quantum key distribution as a service. Opt. Express 27(5), 6892–6909 (2019)

    Article  ADS  Google Scholar 

  32. Wang, H., Zhao, Y., Li, Y., Yu, X., Zhang, J., Liu, C., Shao, Q.: A flexible key-updating method for software-defined optical networks secured by quantum key distribution. Opt. Fiber Technol. 45, 195–200 (2018)

    Article  ADS  Google Scholar 

  33. Wang, H., Zhao, Y., Tornatore, M., Yu, X., Zhang, J.: Dynamic secret-key provisioning in quantum-secured passive optical networks (pons). Opt. Express 29(2), 1578–1596 (2021)

    Article  ADS  Google Scholar 

  34. Wang, Q., Yu, X., Zhu, Q., Zhao, Y., Zhang, J.: Quantum key pool construction and key distribution scheme in multi-domain Qkd optical networks (Qkd-on). In: 4th Optics Young Scientist Summit (OYSS 2020). International Society for Optics and Photonics, vol. 11781, p. 1178122 (2021)

  35. Shannon, C.E.: Communication theory of secrecy systems. Bell Syst Tech. J. 28(4), 656–715 (1949)

    Article  MathSciNet  MATH  Google Scholar 

  36. Morris, J.D., Grimaila, M.R., Hodson, D.D., Jacques, D., Baumgartner, G.: A survey of quantum key distribution (QKD) technologies. In: Emerging Trends in ICT Security, pp. 141–152 (2014)

  37. NSA, N.: NSA suite B cryptography (2015)

  38. Grover, L.K.: A fast quantum mechanical algorithm for database search. In: Proceedings of the Twenty-eighth Annual ACM Symposium on Theory of Computing, pp. 212–219 (1996)

  39. Bernstein, D.J., Lange, T.: Post-quantum cryptography. Nature 549(7671), 188–194 (2017)

    Article  ADS  Google Scholar 

Download references

Acknowledgements

This work was supported by National key research and development program of China, Joint research of IoT security system and key technologies based on quantum key (Grant No. 2020YFE0200600).

Funding

This work was supported by National key research and development program of China, Joint research of IoT security system and key technologies based on quantum key (Grant No. 2020YFE0200600).

Author information

Authors and Affiliations

Authors

Contributions

All authors contributed to the study conception and design. Material preparation, data collection and analysis were performed by LQC and JQC. The first draft of the manuscript was written by JQC and all authors commented on previous versions of the manuscript. All authors read and approved the final manuscript.

Corresponding author

Correspondence to Li-Quan Chen.

Ethics declarations

Conflict of interest

The authors have no conflicts of interest to declare that are relevant to the content of this article.

Code availability

The code required to reproduce these findings cannot be shared at this time as the data also forms part of an ongoing study.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Chen, LQ., Chen, JQ., Chen, QY. et al. A quantum key distribution routing scheme for hybrid-trusted QKD network system. Quantum Inf Process 22, 75 (2023). https://doi.org/10.1007/s11128-022-03825-x

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11128-022-03825-x

Keywords