Next Article in Journal
CGA-MGAN: Metric GAN Based on Convolution-Augmented Gated Attention for Speech Enhancement
Next Article in Special Issue
Development of a High Min-Entropy Quantum Random Number Generator Based on Amplified Spontaneous Emission
Previous Article in Journal
Source Acquisition Device Identification from Recorded Audio Based on Spatiotemporal Representation Learning with Multi-Attention Mechanisms
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Review

Application and Development of QKD-Based Quantum Secure Communication

China Academy of Information and Communication Technology (CAICT), Beijing 100191, China
*
Author to whom correspondence should be addressed.
Entropy 2023, 25(4), 627; https://doi.org/10.3390/e25040627
Submission received: 21 February 2023 / Revised: 18 March 2023 / Accepted: 29 March 2023 / Published: 6 April 2023

Abstract

:
Quantum key distribution (QKD) protocols have unique advantages of enabling symmetric key sharing with information-theoretic security (ITS) between remote locations, which ensure the long-term security even in the era of quantum computation. QKD-based quantum secure communication (QSC) enhancing the security of key generation and update rate of keys, which could be integrated with a variety of cryptographic applications and communication protocols, has become one of the important solutions to improve information security. In recent years, the research on QKD has been active and productive, the performance of novel protocol systems has been improved significantly, and the feasibility of satellite-based QKD has been experimentally verified. QKD network construction, application exploration, and standardization have been carried out in China as well as other countries and regions around the world. Although QKD-based QSC applications and industrialization are still in the initial stage, the research and exploration momentum is positive and more achievements could be expected in the future.

1. Introduction

With the development of ability to produce, manipulate, and measure quantum states at the sub-atomic scale, the exploration of disruptive and innovative applications for the acquisition, processing, and transmission of information has been sped up [1]. Quantum information technology can break through the capability limits of classical information technology, and bring a quantum leap in computation power, network information security, measurement accuracy, etc. [2] Nowadays, quantum information science and technology, including quantum computing, quantum communication, and quantum sensing, has become one of the global hotspots for the high-tech industry [3,4].
Quantum communication realizing quantum state transmission or key distribution by using quantum superposition or entanglement effects, with the assistance of classical communication, can guarantee information theory security (ITS) at protocol level [5]. Quantum communication includes a variety of protocols and applications, such as quantum teleportation [6], quantum key distribution (QKD) [7], quantum secret sharing [8], quantum dense coding [9], and quantum secure direct communication [10], etc. Based on quantum teleportation and quantum memory and relay, the quantum information network, also known as the quantum Internet [11], can be built, which has become a focus for scientific research, but is still far from practical deployment and application. Quantum secure communication (QSC) using QKD to provide pre-shared keys for various cryptographic applications in the ICT system and network, typically combined with symmetric encryption, has entered industrial practice in the last decades [12].
Addressing the potential information security threats brought by quantum computing is the major interest for the industrial adoption of QKD-based QSC. Quantum computers capable of effectively running the Shor algorithm, which is predicted to appear around 2033 [13], can crack key establishment mechanisms of current public-key cryptography, ex RSA and ECDH algorithms. Standardization and migration efforts of post-quantum cryptography (PQC), expected to resist known threats of quantum computing, have continued to advance recently [14]. Compared with PQC, QKD protocols still offer unique and significant advantages of creating symmetric keys between remote locations, with information-theoretic security (ITS) guaranteed by quantum mechanics [15]. QKD-based QSC can ensure the security of symmetric key establishment, which will not be degraded over time, and also can achieve higher frequency of key updates, thus improving the overall security of encryption applications.
As one of the most influential and practical quantum information technologies, QKD-based QSC scientific research, application exploration, and industrial development have kept active and steady progress in the past decade. Several national quantum science and technology strategies have identified the QKD network as the initial stage in realizing the future quantum Internet [16], leveraging its advantages for network information security assurance [17,18]. A variety of novel QKD protocols and implementations continued to be optimized, and system performance such as maximum transmission distance and secure key rate had notable breakthroughs [19,20]. The integrated deployment and flexible networking of QKD and ICT systems and networks were explored [21]. Different types of QKD systems and encryption solutions have been commercialized by multiple vendors and service providers [22]. QKD network construction and demonstration application projects, mainly supported by public R&D funds, have been carried out in a number of countries and regions around the world [23]. Continuous innovation, application exploration, and commercialization practice indicate the importance of QKD-based QSC technology and application in the upcoming quantum era, which have been widely recognized and valued by government, academia, and industry.
In this paper, Section 2 briefly overviews the advances and trends in QKD technology research, Section 3 reviews the applications of QKD-based QSC in China, Section 4 summarizes the standardization of QKD and QSC conducted by the China Communications Standards Association (CCSA), Section 5 discusses the test and verification practices of QKD and QSC products and networks, and Section 6 summarizes application challenges for QKD-based QSC and the outlook for future development.

2. QKD Technology Research Advances

QKD is the most essential building block in QSC systems and networks that provides symmetric key sharing functions. QKD system performance, reliability and practical security are the decisive factors that directly affect whether QSC can be large-scale deployed and applied in practice [24]. The continuous progress and breakthrough in QKD technology research are the fundamental driving forces for the commercial application, exploration, and industrial development of QSC.

2.1. System Performance Enhancement

QKD systems can be realized based on various protocols and implementations with different strengths and limitations. Entanglement protocol-based QKD [25], which requires the generation and transmission of entangled photon pairs, has relatively limited system performance due to low entanglement yield and fidelity at the current state of the art, though it has better compatibility with the future quantum Internet architecture.
Preparation-measurement protocols-based QKD are more interested in research and application areas, which can be implemented using discrete variables (DV) or continuous variables (CV), and quantum state encoding can utilize different degrees of freedom of optical signal, ex polarization [26], phase [27], position, and phase difference between adjacent pulses [28], etc. The key rate of a typical point-to-point preparation-measurement QKD system is correlated to transmission efficiency. Due to the inherent loss limitation of optical fiber channels, it is difficult to exceed the single-span 500 km fiber transmission limit [29]. In addition, the imperfection of receiver-side detectors of preparation-measurement QKD systems may lead to side-channel security vulnerabilities and become a risk point for practical system security.
Since 2018, a twin-field (TF) QKD protocol has been proposed and received much attention [30], in which dual-end preparation and center measurement architecture can eliminate all side channel vulnerabilities at the detector, as well as increasing the theoretical secure key rate correlated to the square root of transmission efficiency and breaking the PLOB boundary of quantum channel capacity [31]. With the improvement of theories and protocols such as the sending-or-not-sending (SNS) protocol [32], the two-way classical communication (TWCC) method [33], and the active odd-parity paring method [34], TF-QKD has become one of the widely recognized next-generation long-range, high-security QKD solutions. A non-exhaustive list of recent typical QKD hero experiments is shown in Table 1.
In the latest record-setting experiment, a USTC team used an optimized four-phase twin-field protocol, combined with independent source phase-locking, channel phase compensation, and high SNR single-photon detection and screening, to extend the transmission distance limit of the repeater-less QKD system up to 830 km [19]. However, it should be noted that typical TF-QKD systems require photon level interference control between long-range independent lasers, which imposes harsh requirements on light source frequency locking and channel fluctuation compensation. The TF-QKD system was still under development in the laboratory, and no commercial products or implementation solutions were provided.
To further enhance the key rate and performance of the QKD system, different multiplexing techniques, such as time division multiplexing (TDM), wavelength division multiplexing (WDM), and space division multiplexing (SDM), could be considered to realize the parallel transmission of multiple QKD channels. Although time multiplexing based on optical path switching introduced a small amount of channel loss, the redundancy of the QKD system could guarantee the point-to-point key rate [40]. Multi-wavelength WDM or [41] SDM of multi-core or few-mode fibers [42] could provide solutions for QKD systems to transmit in parallel in the same fiber and enhance the final key rate.
Different from DV-QKD protocols that use weakly coherent pulsed quasi-single photons to encode quantum states, CV-QKD protocols typically use two-dimensional Gaussian modulation (GM) of quantum coherent states [43]. On one hand, CV-QKD systems can utilize conventional optical communication components, such as IQ modulators and coherent detectors, which are more advantageous in terms of miniaturization and cost reduction. On the other hand, CV-QKD can achieve a high security key rate of Mbps at tens of kilometers transmission distance. It is expected to become the mainstream technology for metro-area QKD solutions.
After 20 years of development, CV-QKD protocols mainly focused on GG02 [44], No-Switching [45], and discrete modulation [46], while the proof of protocol security has been completed [47]. System architecture evolved from transmitting local-oscillation, to local local-oscillation and discrete digital modulation systems. In 2022, the ISC team obtained a 21.53 Mbps secure key rate in a single-carrier four-state discrete digital modulation CV-QKD system experiment at a distance of 25 km [48], and a probabilistic shaping 256 QAM discrete modulation and digital coherent demodulation CV-QKD system to achieve a 9.193 Mbps secure key rate at a distance of 50 km [49]. Although the hardware of discrete digital modulation CV-QKD system was relatively simple, it relied on a high-performance DSP for coherent demodulation, signal compensation, and high-throughput post-processing. Until now it was still in laboratory development stage, and commercialized products have not been widely available.
Because of the advantages of high-dimensional quantum states (qudit) such as higher information capacity and noise resilience, high-dimensional QKD was another frontier research hotspot [50]. The qudit state preparation and QKD based on various degrees of freedom such as OAM, time, frequency, and time-bin have been demonstrated in various scenarios [51], such as fiber optic channels [52], including multimode and multicore fibers, etc., free-space channels [53], and underwater channels [54]. The high-dimensional encoding experiments in the MDI-QKD protocol were also verified [55]. It should be noted that the generation and control of qudit still had some limitations and problems in both theory and experiment, and the reliance on devices and channels such as integrated photonics and multicore/multimode fibers also posed challenges to the practical application of high-dimensional QKD.

2.2. Satellite-Based QKD Experiments

Satellite platforms for satellite-ground quantum communication and QKD have unique advantages in scientific research and applications [56]. On the one hand, as QKD terminals, satellites can significantly improve the transmission distance. The loss of the low earth orbit (LEO) satellite to the ground downlink channel is only about 40–50 dB, which is more than 10 orders of magnitude lower than that of fiber channel loss at the same distance [57]. Before the practical use of quantum storage and quantum relays, satellite platforms are the only solution to achieve thousands of kilometers of quantum communication. On the other hand, as QKD relay node, satellites can realize on-demand networking with ground stations worldwide, which has the advantages of mobility, coverage, and survivability, and thus can enhance the security of the QKD key relay function.
In recent years, a few countries and regions around the world have started to fund and implement satellite quantum communication and QKD research and application projects. Canada’s QEYSSat project, which has received tens of millions of dollars investment, collaborated with Honeywell on an earth-to-satellite quantum communication uplink containing a ground-based quantum source and miniaturized satellite receivers [58]. The CubeSat-based Quantum Communication Mission (CQuCoM), a joint effort by National University of Singapore and several other institutions, used the CubeSat platform deployed from the International Space Station for entangled photon transmission and QKD experiments to demonstrate a high-performance light source and pointing mechanism to establish satellite-to-ground entangled distribution, and tried to establish the basis for quantum constellation of LEO trusted relays [59]. The University of Grenoble, France, has proposed the Nanobob nano-satellite program to realize the uplink configuration for quantum communication from ground-to-satellite, while conducting research such as precise clock synchronization [60].
In 2016, USTC collaboration with other Chinese research institutions launched the first quantum science experiment satellite Micius and carried out a number of groundbreaking space quantum communication experiments in the following six years. The main technical achievements of Micius are shown in Table 2.
It should be noted that satellite-based quantum communications and QKD require solving a series of engineering challenges such as satellite acquisition, tracking and pointing (ATP), real-time channel compensation, and satellite-ground synchronization, as well as fulfilling requirements of weather conditions, all-day operation, and reliable maintenance. Due to limitation of daylight background noise and its own orbit altitude, the Micius satellite could only transmit quantum state signals with ground station between a short window (several minutes per day) on clear nights. In the future, by using a 1550 nm wavelength source combined with up-conversion detectors, it could be expected to improve detection efficiency and achieve day-time operation.

3. QSC Application Exploration in China

Over the past decade, with the increasing maturity of QKD technology, QKD trial network construction and QKD-based QSC application exploration have been widely conducted in many countries and regions around the world [21,71,72]. In China, steady progress has been made in QKD-based QSC application exploration, such as converging quantum encryption with multiple ICT protocols and systems, QKD network construction and demonstrational applications, and QSC applications based on QKD satellites.

3.1. Quantum Encryption and ICT Systems Integration

The key exchange mechanism (KEM), digital signature (DS) and authentication mechanism in public key cryptography, such as RSA and ECC, and symmetric encryption algorithm, such as AES, can guarantee the integrity, non-repudiation, and confidentiality of information [73]. To address the quantum computing security threats to existing public-key cryptography, quantum encryption based on QKD and/or quantum random number generators (QRNG), as well as novel key exchange mechanisms and digital signature algorithms in PQC, can be integrated with ICT systems and networks in different ways, as shown in Table 3.
Cryptographically secure pseudo-random number generators (CSPRNGs) are commonly used as random entropy sources for various algorithms. Using a quantum random number generator (QRNG) as an entropy source or fusing the output random numbers with a PRNG can enhance the randomness and performance [74].
If large-scale quantum computers are realized, current KEM and DS based on factoring, discrete logarithms, and elliptic curve cryptography will be at risk. In contrast, symmetric cryptographic, such as AES and hash functions, would not be as drastically impacted [75]. Using PQC to upgrade KEM and DS that face upcoming risk has become an important effort by ISO and industry. It should be noted that transition and upgrade of PQC requires the support of security-proof algorithm standards and reliable commercialized products, as well as considering algorithm performance, ease of implementation, compliance, etc. For the upgrade of a large number of ICT system devices, it will take a long time to complete [76].
QKD can provide a novel ITS solution for KEM in high-security requirement scenarios and where fiber resources are available, using the QKD system or network to provide symmetric key for encryption is a typical QSC use case. In practical application of this use case, the quantum key generated by the QKD system, or the relay key generated by the QKD network, is invoked by the encryptor on demand as real-time updatable key primitives in symmetric encryption to participate in the working key and session key generation process, thus enhancing the overall encryption security. It should be noted that QKD only solved the KEM problem; DS and authentication still needed the assistance of current encryption algorithms or PQC. Due to the secure key rate limitation, QKD keys are usually used as primitives in symmetric encryption algorithms, e.g., ASE, and further involved in session key generation [77]. Furthermore, in actual application, demand for fiber resources for the QKD system, the deployment, calibration and maintenance of hardware, and the sensitivity of the system to environmental impacts, such as fiber and equipment vibrations and ambient temperature fluctuations, are possible problems that lead to difficulty of commercializing and promoting QKD.
In order to implement the so-called ITS encryption, quite demanding requirements should to be met, for example, random entropy source based on QRNGs and KEM based on a practical security-verified QKD system or network, while key storage and forwarding based on trusted nodes should be avoided by using only pre-shared keys and universal hash checks for DS and authentication, and using only one-time-pad (OTP) for encryption processes. Use cases meeting all the above requirements are very limited and have more theoretical significance than practical value.

3.2. Application Schemes of Quantum Keys

In QKD-based QSC, providing an end-to-end quantum key or relayed key for different types of encryptions is the basis for expanding use cases and commercial opportunities. Typical QSC between virtual private network (VPN) gateways, as shown in Figure 1a, could initiate key requests from the QKD system or network directly, and obtain quantum keys or relay keys on-line. At this time, the security of symmetrical keys is related to practical security of the QKD system and QKD network (QKDN), which requires standardization and verification to ensure. These use cases are the mainstream of QSC applications. Different types of quantum encryption VPNs, and routers, etc., have appeared and been deployed in multiple experimental and demonstration networks [78].
For more application scenarios which could not directly obtain quantum keys from QKD systems and QKDN, with assistance of key charging and storage schemes, one can realize offline quantum key services, as shown in Figure 1b. Terminal key service (TKS) was responsible for quantum key charging and storage functions, as well as synchronization and certification between the encryption equipment and terminals [79]. Based on the offline QKD key service, so-called quantum-encrypted mobile phones and customer premise equipment (CPE) have started tentative commercialization promotion in several network operators and infrastructure providers [80]. It should be pointed out that the security of final symmetry keys may be degraded and not meet the ITS requirement, due to the additional key storage and interaction function of TKS.
After obtaining quantum keys, how to effectively integrate them into encryption algorithms is also critical to support QSC applications. IPSec, MacSec, TLS, OTNSec, and other encryption protocols usually have self-negotiated key mechanisms based on public-key cryptography, which also contain functions such as security alliance establishment and identity authentication in order to ensure integrity and non-repudiation of information. Therefore, it was not feasible to use quantum keys to directly replace the self-negotiated key in the above protocols.
The QKD key could be used as a special pre-shared symmetrical key and mixed with a self-negotiated key in various encryption protocols to generate quantum-enhanced hybrid session keys. The combination of different keys, by XOR function or stirring function based on abstract operation, could provide better compatibility and reliability, especially when the QKD key was not available because of system or fiber channel failure. Key hybrid protocols could be easily implemented in software, while acquisition of quantum keys from QKD systems or QKDNs needs application interface and protocol support, which should be standardized to ensure internetworking.

3.3. QKD Network Construction and Application

Based on the quantum key generation function of the point-to-point QKD system, key storage and relay function of trusted nodes, and the key routing and networking function of the network controller, end-to-end quantum key service of the QKDN could be realized. Forming large-scale so-called “quantum key infrastructure” is the most ambitious target of the QKD industry.
Since the first 125 km commercial fiber QKD emerged in 2004 [81], Chinese teams from both academia and industry have completed a number of QKD network constructions and demonstrational applications [82,83,84]. In 2016, the Beijing–Shanghai Backbone project built a quantum secure communication backbone for connecting Beijing and Shanghai, via Jinan, Hefei and other places, running in a total length of more than 2000 km, connecting metro-area networks of various cities and creating a large-scale quantum communication technology verification and application demonstration platform [65].
Based on the achievements of the Beijing–Shanghai Backbone, a larger-scale wide area QKD network was further under construction. The national QKD network project with a total length of over 10,000 km could connect major metropolitans such as Harbin, Wuhan, Chengdu, and Guangzhou, and also form a ring network in the eastern China areas, thus enhancing accessibility, service capability, and reliability of the entire QKD network.
In QKD metro-networks [85] such as Hefei and Jinan, dozens of user nodes, including government departments, financial agencies, and research institutes, are combined with trusted nodes through star-type or ring-type networking to form QKD services and provided quantum-encrypted real-time voice communication, file transfer, etc.
In addition to China, a number of QKD network construction projects and demonstration applications have been carried out in Europe, another important region for conducting QKD-based exploration of quantum secure communication applications. Since 2008, several QKD networks have been experimentally validated in Austria, Switzerland, Spain, and France [23]. In 2019, the Open European Quantum Key Distribution Testbed project supported more than twenty EU projects and teams to conduct experiments on QKD networks and cryptographic applications. Initial construction of inter-European quantum networks for deployment and applications have begun [86].
During QKD network construction and deployment, it is very important to share the existing fiber communication network infrastructure by performing wavelength division multiplexing between QKD and optical communication systems, e.g., OTN. Quantum signals are very weak and susceptible to classical signal impairments, such as spontaneous Raman scattering. Careful selection of the optimal wavelength of the quantum signal, reduction of classical optical signal launch power, and additional specially designed time and frequency domain filters are needed to achieve co-propagation between QKD and classical optical signals in areas of tens of square kms. [87]. However, since quantum signals could not pass through optical amplifiers such as EDFA, the co-propagation of QKD and OTN systems is limited to point-to-point links, and long-distance and multi-span integration is still very challenging.

3.4. QSC Application Based on QKD Satellites

In addition to the above-mentioned scientific experiments, the Micius satellite combined with ground fiber QKD network has verified the feasibility of the space- and ground-integrated quantum communication network [65]. By improving the operating frequency, telescope size, and coupling efficiency of the ground station, and using the optimized unbalanced basis selection protocol, the QKD key rate of a single orbit (about 6 min) under ideal weather conditions was up to 47.8 kbps, and the maximum satellite-relayed QKD key was about 36 Mbit per week [65].
To take advantage of the mobility and flexibility of satellite-based QKD, a portable ground station is essential supporting equipment. Portable ground stations weighing less than 100 kg, requiring less than 1 m3 of space, and taking no more than 12 h to install have been successfully developed and could be deployed on the rooftops of urban buildings to complete space-to-ground QKD experiments with Micius [88]. Satellite-based QKD is one of the most important use cases to fully utilize the advantages of QKD, which could provide quantum key services for remote locations or moving objects that do not have fiber accessibility.
It should be noted that satellite-based QKD applications still face many technical and engineering challenges. Micius is a LEO satellite having a limited transmission time window and ground coverage in a single orbit, and it could only work at night due to the limitation of light source working wavelengths and solar background noise. As a result, Micius was mainly used to verify the feasibility of space-to-ground QKD while its practical capability could not to be expected too much.
In recent years, there has been some progress to enhance satellite-based quantum communication capabilities, such as realizing daytime free-space QKD to overcome the effect of sunlight scattering background noise. By using a 1550 nm wavelength light source and detector, the intensity and scattering of daylight could be effectively avoided, and by combining a narrow bandwidth grating filter and an ultra-low noise up-conversion single photon detector, the background noise could be further reduced and 20 bps key rate QKD was achieved [89].
To realize a global space-to-ground quantum communication and QKD network, it was still necessary to further increase the number of satellites and heighten the orbit altitude to form a quantum constellation combining LEO and geosynchronous orbit (GEO) satellites. In 2022, a new QKD nano-satellite “Jinan-1” was successfully launched, weighing only 1/6 of the Micius., with about six times higher light source frequency, and capability to accomplish post-processing and key generation in real time [90]. In the future, it can be expected that the nano-satellites and portable ground stations will carry out more interesting QKD experiments and demonstrational QSC applications.

4. QSC Standardization in CCSA

With the advancement of QKD technology, development of commercialized products by multiple vendors, and exploration of QKD network construction and QSC application, the QKD-based QSC industry was initially formed in China, which includes research institutions, system vendors, network and service providers, and encryption service users, etc. In the QSC industry, standardization is an important segment to promote QKD network construction and deployment as well as QSC large-scale application, and has become a common concern to the management agencies, academia, and industry [91].
CCSA is the platform responsible for the research of China’s ICT standards system and specification development [92]. In 2016, CCSA established the Special Task Group on Quantum Communication and Information Technology (ST7). It is responsible for the standardization of quantum communication technologies and quantum communication networks, quantum computing technologies related to quantum communication, and general quantum information components. CCSA-ST7 brought together more than 60 stakeholders in the Chinese QSC market. Up to December 2022, it has established and carried out the development of 25 national and industrial standards related to quantum secure communications, as shown in Table 4.

4.1. QKD System and Component Standards

The specifications on minimum functional and performance requirements for QKD systems and components can provide vendors guidance on product design and development. At the same time, they can also provide users the necessary support to procure products, build networks, and encrypt applications.
QKD systems are the core of QKD network and QSC applications, and their functional and performance technical requirements and test methods are a priority for standardization. DV-QKD systems based on the decoy state BB84 protocol are the mainstream products in the Chinese QSC market. YDT 3834.1 and YDT 3835.1 standards specify system application code, model and reference points, system performance parameters, technical requirements of QKD transmitter and receiver, reliability and environmental adaptability, as well as the corresponding test methods. In addition, CV-QKD systems based on Gaussian modulated coherent state protocols, such as GG02 and No-switching, have been preliminarily commercialized, and similar specifications are also under development.
Developing technical specifications for key components in QKD systems could help to enhance the engineering and integration levels while promoting cooperation in the industry chain between component suppliers and system vendors. YDT 3907 series standards, which specified key components such as light sources, single photon detectors, QRNGs, decoy state modulators, quantum state modulators, and demodulators used in DV-QKD systems, cover optoelectronic characteristics, operating conditions, external dimensions, and corresponding test methods.
QRNGs can be used as QKD system components or as standalone products to provide better security and performance of random entropy sources for cryptographic applications, such as databases and cloud computing [93]. QRNGs have emerged in the Chinese market with a variety of products based on different technologies, such as phase rise and fall, vacuum noise, amplified spontaneous radiation noise, etc. QRNG product standards will regulate the system technical scheme, functional model, technical requirements, performance parameters, interfaces, reliability requirements, and related test methods.

4.2. QKD Network Standards

The QKD network is a supporting platform to realize end-to-end quantum keys service, and also a crucial step must be taken to break through the limitations of the QKD point-to-point application mode [94]. With the progress of QKDN construction and demonstration applications, network-related standardization has been carried out in international standard development organizations, such as ITU-T and ETSI [95]. In CCSA-ST7, specifications for QKD network architecture, protocol, interfaces, management, and key management are also being studied and developed.
The QSC network architecture standard refers to the ITU-T Y.3800 series of recommendations, specified functional architecture, network elements model and function, reference points, and network configuration procedure of QKD-based QSC networks. It also provides a framework overview for QKDN and QSC networks, and lays the foundation for subsequent network-related standards.
Trusted nodes are unavoidable functional modules of the QKD network at present, and also a focus of concern about practical security of QKD networks. Their specification and verification are an important basis to ensure performance and security of QKD networks. The technical requirements standard for trusted nodes in QKDNs could provide specifications for system composition, functional processes, interface management, and security requirements.
As the interaction interface for the QKD network to provide keys to the user network, the application interface of the QKDN is critical to realize quantum key service and network interoperability, and also the priority of QKD network standardization. The QKDN key service interface standard not only clarifies the application interface, function definition, and business interaction flow between key managers and application terminals but also provides a useful reference for QSC users to obtain quantum keys.

4.3. QSC Application Standards

Exploring and expanding the applicable scope and use cases of QSC based on QKD are necessary to promote the development of the industry. National standards named quantum secure communication use cases and requirements, described application of QKD in various layers and protocols in ICT systems, such as link layers, network layers, transport layers, and application layers, and clarified application schemes of QSC in multiple scenarios, such as data center interconnections, enterprise private networks, infrastructure information systems, telecommunications backbone networks and access networks, and satellite networks, etc., while they specified fundamental requirements such as security, scalability, robustness, and interoperability.
Quantum keys provided by QKD systems and networks need to be integrated with different protocols such as IPSec, TLS, VoIP, and OTNSec in various types of cryptographic application equipment, such as VPN gateways or routers, to complete QSC service. With updated quantum key acquisition and mixing protocols briefly described in Section 3.2., quantum encryption functions could be implemented while keeping the original encryption functions as backup. In order to guide equipment development and testing, specification of QSC encryptors based on IPSec protocols define quantum key acquisition and mixing protocols, encryption algorithms, function and performance requirements, and related test methods for gateways and terminals. Similar specifications of quantum encryptors based on TLS, VoIP and OTNSec protocols are also under development.

5. QSC Testing and Verification Practice

In the QSC industry, testing and verification are another important segment to promote QKD-based QSC network deployment and application. Based on the function and performance requirements in technical specifications and corresponding testing and verification methods, QKD-based QSC systems and networks could be tested and evaluated to provide users with performance, quality, and reliability assurance, and support their commercial product procurement and application solution deployment.
It should be noted that testing and evaluation of practical security of QKD systems and networks are also a very critical aspect of verification practice [96]; however, the study on QKD security-related standards is still in process, and reference bases for standardized verification are not yet completely adequate, which require more collaborative efforts in the industry. At present, market-oriented testing and verification mainly focus on function, performance, and reliability of QKD-based QSC systems and networks.

5.1. QKD System Test Evaluation

Based on the standards of technical requirements and test methods for the decoy state BB84 protocol DV-QKD system described in Section 4.1, the test evaluation of QKD systems has been carried out in the Chinese market; its test items are shown in Table 5. Recently, typical commercialized products of mainstream system vendors in the Chinese market have been tested and certified.
In QKD system testing, security key rate is the top system parameter of concern. Since key rate is related to transmission distance and channel loss, specifying application code in terms of typical channel loss such as 10 dB and 20 dB, is an effective way to measure the performance of QKD systems. By standardizing methods and formulas used in the post-processing process, including basis comparison, QBER calculation, error correction and privacy amplification, key rate comparison for QKD systems can be conducted with different implementations. The quantum key output from the QKD system should be verified by randomness testing in accordance with standards to guarantee security of symmetric keys.
For QKD transmitters and receivers, optical characteristics of quantum channel, synchronization channel, and distillation channel are closely related to the deployment and implementation of QKD networks, which need to be tested at the system level to provide accurate reference for applications. Meanwhile, verification on the accuracy of decoy state and quantum state modulation, such as the intensity fluctuation of signal and decoy states, quadrature and conjugate error of quantum state modulation, and difference of pulse time and frequency domain characteristics, could partly provide supporting evidence for practical system security. In addition, the single-photon detector (SPD) is the main limiting factor of QKD system performance and also an important parameter in secure key rate calculation. It is necessary to test and verify the performance parameters of the SPD, including detection efficiency, post-pulse probability, and dark count rate, etc.
The quantum-state optical signal of QKD systems is extremely weak, usually below −70 dBm. Commercial QKD systems need to be deployed in the same environment with other optical communication systems, leading to high demands on reliability and environmental adaptability, which are usually ignored in lab experimental or field trials. Verification of commercial QKD system reliability such as long-term stability, system redundancy protection, fault recovery capability, and robustness under different temperature and humidity conditions is the basis for ensuring continuity of service.
Through the development of standards and test verification, one can provide useful guidance and promotion for QKD systems to evolve from research-oriented prototypes to application-oriented mature commercialized products. It is reasonable to believe that the engineering and practical level of QKD systems will be further enhanced, with continuous progress of standardization and test verification.

5.2. QKD System Test Evaluation

Connecting multiple QKD systems to build QKD networks is important to extend and enhance the capability and scope of key services. The quantum keys generated by point-to-point QKD links are synchronized by key-ID, authenticated, and stored by key managers (KMs) deployed in trusted nodes. Then the quantum keys are further relayed hop-by-hop through the classical communication channel between KMs to provide end-to-end symmetric keys, typically using OTP encryption during the relay to maintain the key’s ITS level. The above networking functions at different layers of the QKDN are accomplished with the help of network management and the controller; the QKD network framework and functional architecture should conform to the requirements of ITU-T Y.3800 series Recommendations [97].
The relay key provisioning capability of an end-to-end link is limited by the minimum value of key rate of all point-to-point QKD links within it; therefore, it is necessary to test and verify the actual key rate of all QKD links in the network. The channel loss of legacy fiber network may differ from nominal value due to various factors, such as station distance and fiber cable status, which could affect QKD key rate. It is a common solution to deploy multiple pairs of QKD systems simultaneously in a high channel loss fiber link to ensure the key rate meets the design requirements. It should be noted that this stacked QKD system deployment is not typical redundant protection used in optical communication networks, such as 1 + 1 or 1:1 protection, because all systems are in working condition together to guarantee the key rate of point-to-point links.
The protection and recovery of QKD networks are mainly realized in the key management layer, which usually requires multiple key relay paths or the formation of a ring-type network to provide backup routing support. Protection of QKD networks requires classical communication systems such as OTNs and routers to support network management and QKD distillation, which should have capabilities for their own protection and recovery. Furthermore, it also requires capabilities based on network controllers and management to realize re-routing function of key relaying. Since the KM has a caching function, upper-layer key applications are usually unaffected to the protection recovery process of key-relay rerouting. For large and complex topology QKD networks, verification of protection and recovery capabilities at both levels of classical communication and key relaying is important to guarantee QoS of key provisioning.
Necessary service support systems and networks in QKD networks, such as OTNs, IP networks, time synchronization, and network management, etc., are the basis for guaranteeing overall service quality and also need attention in network-level test verification. The planning and configuration of OTN and IP networks, multi-service support capability, and long-term stability of service are major concerns. NTP-based network time synchronization provides millisecond-level timing accuracy and supports life cycle management of keys, network performance, fault monitoring, service billing, and other management functions. Time deviation and redundancy protection for NTP time servers and clients need to be tested and verified to ensure reliability of overall time service capability of QKD networks. Other network-level tests include verification of functions such as network management systems, business support, and application service platforms.

6. Discussion and Outlook

During the past two decades, QKD technology research has remained active, performance such as transmission distance and key rate of fiber-based QKD systems have been significantly improved, and satellite-based QKD has completed feasibility verification. Commercialized QKD-based QSC systems have been carried out by many vendors, network construction has been carried out in many regions around the world with cryptographic application exploration in government, finance, infrastructure, etc. Standardization of QKD and QSC devices, systems, networks, services, and security have been carried out in several international and regional SDOs. Based on the relevant standards, test verification and certification of QKD systems and networks are also ongoing. In the foreseeable future, the momentum of QKD-based QSC technology development and application exploration will continue.
However, from the industry perspective, it is unfortunate that the application and commercialization of QKD-based QSC has not experienced the so-called “exponential growth” over the past decade, and the financial data and capital market performance of related companies were fairly lackluster. Any level-headed stakeholder will acknowledge that the application and commercialization of QKD-based QSC still face obstacles and challenges, some of which are listed as below:
  • Technology: In terms of protocol mechanism, quantum state signals in QKD systems sacrifice the robustness of transmission in exchange for the security of key generation, which is a crucial barrier to further improvement of transmission capability and key rate, and also fundamentally limits their adaptability and reliability in practical environments outside the laboratory. Although the performance of QKD systems based on new protocols such as TF and MDI have been improved, and satellite-based QKD has been proven to be technically feasible, there is still a long way to go for the commercial products based on these protocols and platforms to be applied on a large scale.
  • Application: For QKD-based QSC application, firstly, almost-dedicated fiber resources to support deployment of hardware system are needed; secondly, it may involve change or integration of the user’s network architecture, equipment, and service routing; thirdly, highly specialized configuration and maintenance management of QKD systems are also needed; finally, QKD systems are still relatively expensive. All the above issues will become capital expenditure and operating expenses that users have to be concerned about in adopting this technology. QKD technology and system development based on integrated photonics can improve the integration and robustness of the system, while reducing system cost to enhance scalability, which will be very beneficial for expanding QKD applications.
  • Standards and Certification: Although important progress has been made in QKD-related standards, much work remains to be done. One of the most significant is credible specification and test verification for practical security proof of QKD systems, which are essential to fully guarantee the ITS advantage and convince customers with high security requirements. In addition, specifying interfaces and protocols for KM layers in QKD networks to facilitate cross-domain interoperability may be another priority for future standardization.
In summary, QKD has unique advantages of secure symmetric key distribution between remote locations, which has a wide range of applications in cryptography, such as encryption and authentication, as well as guaranteeing long-term security in the era of quantum computation. QKD has been supported by both academia and industry, and technical research has made steady progress from the theoretical protocols of 40 years ago to nowadays with thousand km transmission and key sharing. With the utility of new protocol systems, the miniaturization of PIC-based systems, and the maturity of commercialized products, QKD-based QSC deployment and application will become more widespread in high-security-requirement network communication scenarios. The development of standardization and test verification will also provide useful guidance and support for its industrialization. In the quantum era, it is reasonable to be cautiously optimistic about the future development and application of QKD-based QSC.

Funding

This work was supported by the National Key Research and Development Program of China (Grants No. 2022YFB2903200).

Data Availability Statement

No new data were created.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Martin, V.; Brito, J.P.; Escribano, C.; Menchetti, M.; White, C.; Lord, A.; Wissel, F.; Gunkel, M.; Gavignet, P.; Genay, N.; et al. Quantum technologies in the telecommunications industry. EPJ Quantum Technol. 2021, 8, 19. [Google Scholar] [CrossRef]
  2. Deutsch, I.H. Harnessing the Power of the Second Quantum Revolution. PRX Quantum 2020, 1, 020101. [Google Scholar] [CrossRef]
  3. NSTC. National Strategic Overview for Quantum Information Science; NSTC: Washington, DC, USA, 2018. Available online: https://www.quantum.gov/wp-content/uploads/2020/10/2018_NSTC_National_Strategic_Overview_QIS.pdf (accessed on 20 February 2023).
  4. European Quantum Flagship, Strategic Research and Industry Agenda. 2022. Available online: https://qt.eu/about-quantum-flagship/introduction-to-the-quantum-flagship/sab-strategic-advisory-board/ (accessed on 20 February 2023).
  5. Gisin, N.; Thew, R. Quantum communication. Nat. Photonics 2007, 1, 165–171. [Google Scholar] [CrossRef] [Green Version]
  6. Bouwmeester, D.; Pan, J.-W.; Mattle, K.; Eibl, M.; Weinfurter, H.; Zeilinger, A. Experimental quantum teleportation. Nature 1997, 390, 575–579. [Google Scholar] [CrossRef] [Green Version]
  7. Bennett, C.H.; Brassard, G. Quantum cryptography: Public key distribution and coin tossing. Theor. Comput. Sci. 2014, 560, 7–11. [Google Scholar] [CrossRef]
  8. Hillery, M.; Bužek, V.; Berthiaume, A. Quantum secret sharing. Phys. Rev. A 1999, 59, 1829–1834. [Google Scholar] [CrossRef] [Green Version]
  9. Mattle, K.; Weinfurter, H.; Kwiat, P.G.; Zeilinger, A. Dense Coding in Experimental Quantum Communication. Phys. Rev. Lett. 1996, 76, 4656–4659. [Google Scholar] [CrossRef] [Green Version]
  10. Long, G.-L.; Deng, F.-G.; Wang, C.; Li, X.-H.; Wen, K.; Wang, W.-Y. Quantum secure direct communication and deterministic secure quantum communication. Front. Phys. China 2007, 2, 251–272. [Google Scholar] [CrossRef]
  11. Kimble, H.J. The quantum internet. Nature 2008, 453, 1023–1030. [Google Scholar] [CrossRef]
  12. Martin, V.; Martinez-Mateo, J.; Peev, M. Introduction to Quantum Key Distribution; Wiley Online Library: Hoboken, NJ, USA, 2017; pp. 1–17. [Google Scholar]
  13. Vermeer, M.J.D.; Peet, E.D. Securing Communications in the Quantum Computing Age: Managing the Risks to Encryption; RAND Corporation: Santa Monica, CA, USA, 2020. [Google Scholar] [CrossRef]
  14. Alagic, G.; Cooper, D.; Dang, Q.; Dang, T.; Kelsey, J.M.; Lichtinger, J.; Liu, Y.K.; Miller, C.A.; Moody, D.; Peralta, R.; et al. Status Report on the Third Round of the NIST Post-Quantum Cryptography Standardization Process; U.S. National Institute of Standards and Technology: Gasburg, MD, USA, 2022.
  15. Renner, R.; Gisin, N.; Kraus, B. Information-theoretic security proof for quantum-key-distribution protocols. Phys. Rev. A 2005, 72, 012332. [Google Scholar] [CrossRef] [Green Version]
  16. Wehner, S.; Elkouss, D.; Hanson, R. Quantum internet: A vision for the road ahead. Science 2018, 362, 9288. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  17. Nicholas, P.; van Dam Kleese, K.; Inder, M.; Thomas, S. From Long-Distance Entanglement to Building a Nationwide Quantum Internet: Report of the DOE Quantum Internet Blueprint Workshop; U.S. Department of Energy Office of Scientific and Technical Information: Oak Ridge, TN, USA, 2020.
  18. Lewis, A.M.; Travagnin, M. A Secure Quantum Communications Infrastructure for Europe: Technical Background for a Policy Vision; Publications Office of the European Union: Luxembourg, 2022. [Google Scholar]
  19. Wang, S.; Yin, Z.-Q.; He, D.-Y.; Chen, W.; Wang, R.-Q.; Ye, P.; Zhou, Y.; Fan-Yuan, G.-J.; Wang, F.-X.; Zhu, Y.-G.; et al. Twin-field quantum key distribution over 830-km fibre. Nat. Photonics 2022, 16, 154–161. [Google Scholar] [CrossRef]
  20. Yuan, Z.; Murakami, A.; Kujiraoka, M.; Lucamarini, M.; Tanizawa, Y.; Sato, H.; Shields, A.J.; Plews, A.; Takahashi, R.; Doi, K.; et al. 10-Mb/s Quantum Key Distribution. J. Light. Technol. 2018, 36, 3427–3433. [Google Scholar] [CrossRef] [Green Version]
  21. Aguado, A.; Lopez, V.; Lopez, D.; Peev, M.; Poppe, A.; Pastor, A.; Folgueira, J.; Martin, V. The Engineering of Software-Defined Quantum Key Distribution Networks. IEEE Commun. Mag. 2019, 57, 20–26. [Google Scholar] [CrossRef] [Green Version]
  22. FG-QIT4N; Standardization Outlook and Technology Maturity: Quantum Key Distribution Network. ITU-T: Geneva, Switzerland, 2021.
  23. Lewis, A.M.; Travagnin, M. Quantum Key Distribution In-Field Implementations; Publications Office of the European Union: Luxembourg, 2019. [Google Scholar]
  24. Xu, F.; Ma, X.; Zhang, Q.; Lo, H.-K.; Pan, J.-W. Secure quantum key distribution with realistic devices. Rev. Mod. Phys. 2020, 92, 025002. [Google Scholar] [CrossRef]
  25. Ekert, A.K. Quantum cryptography based on Bell’s theorem. Phys. Rev. Lett. 1991, 67, 661–663. [Google Scholar] [CrossRef] [Green Version]
  26. Peng, C.-Z.; Zhang, J.; Yang, D.; Gao, W.-B.; Ma, H.-X.; Yin, H.; Zeng, H.-P.; Yang, T.; Wang, X.-B.; Pan, J.-W. Experimental Long-Distance Decoy-State Quantum Key Distribution Based on Polarization Encoding. Phys. Rev. Lett. 2007, 98, 010505. [Google Scholar] [CrossRef] [Green Version]
  27. Hiroki, T.; Honjo, T.; Tamaki, K.; Tokura, Y. Differential phase shift quantum key distribution. In Proceedings of the 2008 First ITU-T Kaleidoscope Academic Conference—Innovations in NGN: Future Network and Services, Geneva, Switzerland, 12–13 May 2008. [Google Scholar]
  28. Bacco, D.; Christensen, J.B.; Castaneda, M.A.U.; Ding, Y.; Forchhammer, S.; Rottwitt, K.; Oxenløwe, L.K. Two-dimensional distributed-phase-reference protocol for quantum key distribution. Sci. Rep. 2016, 6, 36756. [Google Scholar] [CrossRef] [Green Version]
  29. Boaron, A.; Boso, G.; Rusca, D.; Vulliez, C.; Autebert, C.; Caloz, M.; Perrenoud, M.; Gras, G.; Bussières, F.; Li, M.-J.; et al. Secure Quantum Key Distribution over 421 km of Optical Fiber. Phys. Rev. Lett. 2018, 121, 190502. [Google Scholar] [CrossRef] [Green Version]
  30. Lucamarini, M.; Yuan, Z.L.; Dynes, J.F.; Shields, A.J. Overcoming the rate-distance limit of quantum key distribution without quantum repeaters. Nature 2018, 557, 400–403. [Google Scholar] [CrossRef] [Green Version]
  31. Minder, M.; Pittaluga, M.; Roberts, G.L.; Lucamarini, M.; Dynes, J.F.; Yuan, Z.L.; Shields, A.J. Experimental quantum key distribution beyond the repeaterless secret key capacity. Nat. Photonics 2019, 13, 334–338. [Google Scholar] [CrossRef] [Green Version]
  32. Wang, X.-B.; Yu, Z.-W.; Hu, X.-L. Twin-field quantum key distribution with large misalignment error. Phys. Rev. A 2018, 98, 062323. [Google Scholar] [CrossRef] [Green Version]
  33. Xu, H.; Yu, Z.-W.; Jiang, C.; Hu, X.-L.; Wang, X.-B. Sending-or-not-sending twin-field quantum key distribution: Breaking the direct transmission key rate. Phys. Rev. A 2020, 101, 042330. [Google Scholar] [CrossRef]
  34. Jiang, C.; Yu, Z.-W.; Hu, X.-L.; Wang, X.-B. Unconditional Security of Sending or Not Sending Twin-Field Quantum Key Distribution with Finite Pulses. Phys. Rev. Appl. 2019, 12, 024061. [Google Scholar] [CrossRef] [Green Version]
  35. Fang, X.-T.; Zeng, P.; Liu, H.; Zou, M.; Wu, W.; Tang, Y.-L.; Sheng, Y.-J.; Xiang, Y.; Zhang, W.; Li, H.; et al. Implementation of quantum key distribution surpassing the linear rate-transmittance bound. Nat. Photonics 2020, 14, 422–425. [Google Scholar] [CrossRef]
  36. Chen, J.-P.; Zhang, C.; Liu, Y.; Jiang, C.; Zhang, W.; Hu, X.-L.; Guan, J.-Y.; Yu, Z.-W.; Xu, H.; Lin, J.; et al. Sending-Or-Not-Sending with Independent Lasers: Secure Twin-Field Quantum Key Distribution over 509 km. Phys. Rev. Lett. 2020, 124, 070501. [Google Scholar] [CrossRef] [Green Version]
  37. Pittaluga, M.; Minder, M.; Lucamarini, M.; Sanzaro, M.; Woodward, R.I.; Li, M.-J.; Yuan, Z.; Shields, A.J. 600-km repeater-like quantum communications with dual-band stabilization. Nat. Photonics 2021, 15, 530–535. [Google Scholar] [CrossRef]
  38. Chen, J.-P.; Zhang, C.; Liu, Y.; Jiang, C.; Zhang, W.-J.; Han, Z.-Y.; Ma, S.-Z.; Hu, X.-L.; Li, Y.-H.; Liu, H.; et al. Twin-field quantum key distribution over a 511 km optical fibre linking two distant metropolitan areas. Nat. Photonics 2021, 15, 570–575. [Google Scholar] [CrossRef]
  39. Chen, J.-P.; Zhang, C.; Liu, Y.; Jiang, C.; Zhao, D.-F.; Zhang, W.-J.; Chen, F.-X.; Li, H.; You, L.-X.; Wang, Z.; et al. Quantum Key Distribution over 658 km Fiber with Distributed Vibration Sensing. Phys. Rev. Lett. 2022, 128, 180502. [Google Scholar] [CrossRef]
  40. Aguado, A.; Hugues-Salas, E.; Haigh, P.A.; Marhuenda, J.; Price, A.B.; Sibson, P.; Kennard, J.E.; Erven, C.; Rarity, J.G.; Thompson, M.G.; et al. Secure NFV Orchestration over an SDN-Controlled Optical Network with Time-Shared Quantum Key Distribution Resources. J. Light. Technol. 2017, 35, 1357. [Google Scholar] [CrossRef] [Green Version]
  41. Eriksson, T.A.; Luis, R.S.; Puttnam, B.J.; Rademacher, G.; Fujiwara, M.; Awaji, Y.; Furukawa, H.; Wada, N.; Takeoka, M.; Sasaki, M. Wavelength Division Multiplexing of 194 Continuous Variable Quantum Key Distribution Channels. J. Light. Technol. 2020, 38, 2214–2218. [Google Scholar] [CrossRef]
  42. Xavier, G.B.; Lima, G. Quantum information processing with space-division multiplexing optical fibres. Commun. Phys. 2020, 3, 9. [Google Scholar] [CrossRef] [Green Version]
  43. Laudenbach, F.; Pacher, C.; Fung, C.-H.F.; Poppe, A.; Peev, M.; Schrenk, B.; Hentschel, M.; Walther, P.; Hübel, H. Continuous-Variable Quantum Key Distribution with Gaussian Modulation—The Theory of Practical Implementations. Adv. Quantum Technol. 2018, 1, 1800011. [Google Scholar] [CrossRef]
  44. Grosshans, F.; Grangier, P. Continuous Variable Quantum Cryptography Using Coherent States. Phys. Rev. Lett. 2002, 88, 057902. [Google Scholar] [CrossRef] [Green Version]
  45. Weedbrook, C.; Lance, A.M.; Bowen, W.P.; Symul, T.; Ralph, T.C.; Lam, P.K. Quantum Cryptography without Switching. Phys. Rev. Lett. 2004, 93, 170504. [Google Scholar] [CrossRef] [Green Version]
  46. Leverrier, A.; Grangier, P. Unconditional Security Proof of Long-Distance Continuous-Variable Quantum Key Distribution with Discrete Modulation. Phys. Rev. Lett. 2009, 102, 180504. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  47. Jain, N.; Chin, H.-M.; Mani, H.; Lupo, C.; Nikolic, D.S.; Kordts, A.; Pirandola, S.; Pedersen, T.B.; Kolb, M.; Ömer, B.; et al. Practical continuous-variable quantum key distribution with composable security. Nat. Commun. 2022, 13, 4740. [Google Scholar] [CrossRef]
  48. Wang, H.; Li, Y.; Pi, Y.; Pan, Y.; Shao, Y.; Ma, L.; Zhang, Y.; Yang, J.; Zhang, T.; Huang, W.; et al. Sub-Gbps key rate four-state continuous-variable quantum key distribution within metropolitan area. Commun. Phys. 2022, 5, 162. [Google Scholar] [CrossRef]
  49. Pan, Y.; Wang, H.; Shao, Y.; Pi, Y.; Li, Y.; Liu, B.; Huang, W.; Xu, B. Experimental demonstration of high-rate discrete-modulated continuous-variable quantum key distribution system. Opt. Lett. 2022, 47, 3307–3310. [Google Scholar] [CrossRef]
  50. Cozzolino, D.; Da Lio, B.; Bacco, D. High-Dimensional Quantum Communication: Benefits, Progress, and Future Challenges. Adv. Quantum Technol. 2019, 2, 1900038. [Google Scholar] [CrossRef]
  51. Erhard, M.; Krenn, M.; Zeilinger, A. Advances in high-dimensional quantum entanglement. Nat. Rev. Phys. 2020, 2, 365. [Google Scholar] [CrossRef]
  52. Vagniluca, I.; Da Lio, B.; Rusca, D.; Cozzolino, D.; Ding, Y.; Zbinden, H.; Zavatta, A.; Oxenløwe, L.K.; Bacco, D. Efficient Time-Bin Encoding for Practical High-Dimensional Quantum Key Distribution. Phys. Rev. Appl. 2020, 14, 014051. [Google Scholar] [CrossRef]
  53. Steinlechner, F.; Ecker, S.; Fink, M.; Liu, B.; Bavaresco, J.; Huber, M.; Scheidl, T.; Ursin, R. Distribution of high-dimensional entanglement via an intra-city free-space link. Nat. Commun. 2017, 8, 15971. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  54. Bouchard, F.; Sit, A.; Hufnagel, F.; Abbas, A.; Zhang, Y.; Heshami, K.; Fickler, R.; Marquardt, C.; Leuchs, G.; Boyd, R.W.; et al. Quantum cryptography with twisted photons through an outdoor underwater channel. Opt. Express 2018, 26, 22563. [Google Scholar] [CrossRef] [PubMed]
  55. Sekga, C.; Mafu, M.; Senekane, M. High-dimensional quantum key distribution implemented with biphotons. Sci. Rep. 2023, 13, 1229. [Google Scholar] [CrossRef]
  56. Lu, C.-Y.; Cao, Y.; Peng, C.-Z.; Pan, J.-W. Micius quantum experiments in space. Rev. Mod. Phys. 2022, 94, 035001. [Google Scholar] [CrossRef]
  57. Wang, J.-Y.; Yang, B.; Liao, S.-K.; Zhang, L.; Shen, Q.; Hu, X.-F.; Wu, J.-C.; Yang, S.-J.; Jiang, H.; Tang, Y.-L.; et al. Direct and full-scale experimental verifications towards ground-satellite quantum key distribution. Nat. Photonics 2013, 7, 387–393. [Google Scholar] [CrossRef]
  58. Pugh, C.J.; Kaiser, S.; Bourgoin, J.-P.; Jin, J.; Sultana, N.; Agne, S.; Anisimova, E.; Makarov, V.; Choi, E.; Higgins, B.L.; et al. Airborne demonstration of a quantum key distribution receiver payload. Quantum Sci. Technol. 2017, 2, 024009. [Google Scholar] [CrossRef] [Green Version]
  59. Oi, D.K.; Ling, A.; Vallone, G.; Villoresi, P.; Greenland, S.; Kerr, E.; Macdonald, M.; Weinfurter, H.; Kuiper, H.; Charbon, E.; et al. CubeSat quantum communications mission. EPJ Quantum Technol. 2017, 4, 6. [Google Scholar] [CrossRef] [Green Version]
  60. Kerstel, E.; Gardelein, A.; Barthelemy, M.; The CSUG Team; Fink, M.; Joshi, S.K.; Ursin, R. Nanobob: A CubeSat mission concept for quantum communication experiments in an uplink configuration. EPJ Quantum Technol. 2018, 5, 6. [Google Scholar] [CrossRef]
  61. Liao, S.-K.; Cai, W.-Q.; Liu, W.-Y.; Zhang, L.; Li, Y.; Ren, J.-G.; Yin, J.; Shen, Q.; Cao, Y.; Li, Z.-P.; et al. Satellite-to-ground quantum key distribution. Nature 2017, 549, 43–47. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  62. Yin, J.; Cao, Y.; Li, Y.-H.; Ren, J.-G.; Liao, S.-K.; Zhang, L.; Cai, W.-Q.; Liu, W.-Y.; Li, B.; Dai, H.; et al. Satellite-To-Ground Entanglement-Based Quantum Key Distribution. Phys. Rev. Lett. 2017, 119, 200501. [Google Scholar] [CrossRef]
  63. Liao, S.-K.; Cai, W.-Q.; Handsteiner, J.; Liu, B.; Yin, J.; Zhang, L.; Rauch, D.; Fink, M.; Ren, J.-G.; Liu, W.-Y.; et al. Satellite-Relayed Intercontinental Quantum Network. Phys. Rev. Lett. 2018, 120, 030501. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  64. Yin, J.; Li, Y.-H.; Liao, S.-K.; Yang, M.; Cao, Y.; Zhang, L.; Ren, J.-G.; Cai, W.-Q.; Liu, W.-Y.; Li, S.-L.; et al. Entanglement-based secure quantum cryptography over 1120 kilometres. Nature 2020, 582, 501–505. [Google Scholar] [CrossRef] [PubMed]
  65. Chen, Y.-A.; Zhang, Q.; Chen, T.-Y.; Cai, W.-Q.; Liao, S.-K.; Zhang, J.; Chen, K.; Yin, J.; Ren, J.-G.; Chen, Z.; et al. An integrated space-to-ground quantum communication network over 4600 kilometres. Nature 2021, 589, 214–219. [Google Scholar] [CrossRef]
  66. Yin, J.; Cao, Y.; Li, Y.-H.; Liao, S.-K.; Zhang, L.; Ren, J.-G.; Cai, W.-Q.; Liu, W.-Y.; Li, B.; Dai, H.; et al. Satellite-based entanglement distribution over 1200 kilometers. Science 2017, 356, 1140–1144. [Google Scholar] [CrossRef] [Green Version]
  67. Ren, J.-G.; Xu, P.; Yong, H.-L.; Zhang, L.; Liao, S.-K.; Yin, J.; Liu, W.-Y.; Cai, W.-Q.; Yang, M.; Li, L.; et al. Ground-to-satellite quantum teleportation. Nature 2017, 549, 70–73. [Google Scholar] [CrossRef] [Green Version]
  68. Li, B.; Cao, Y.; Li, Y.-H.; Cai, W.-Q.; Liu, W.-Y.; Ren, J.-G.; Liao, S.-K.; Wu, H.-N.; Li, S.-L.; Li, L.; et al. Quantum State Transfer over 1200 km Assisted by Prior Distributed Entanglement. Phys. Rev. Lett. 2022, 128, 170501. [Google Scholar] [CrossRef]
  69. Xu, P.; Ma, Y.; Ren, J.-G.; Yong, H.-L.; Ralph, T.C.; Liao, S.-K.; Yin, J.; Liu, W.-Y.; Cai, W.-Q.; Han, X.; et al. Satellite testing of a gravitationally induced quantum decoherence model. Science 2019, 366, 132–135. [Google Scholar] [CrossRef] [Green Version]
  70. Dai, H.; Shen, Q.; Wang, C.-Z.; Li, S.-L.; Liu, W.-Y.; Cai, W.-Q.; Liao, S.-K.; Ren, J.-G.; Yin, J.; Chen, Y.-A.; et al. Towards satellite-based quantum-secure time transfer. Nat. Phys. 2020, 16, 848–852. [Google Scholar] [CrossRef]
  71. Sasaki, M.; Fujiwara, M.; Ishizuka, H.; Klaus, W.; Wakui, K.; Takeoka, M.; Miki, S.; Yamashita, T.; Wang, Z.; Tanaka, A.; et al. Field test of quantum key distribution in the Tokyo QKD Network. Opt. Express 2011, 19, 10387–10409. [Google Scholar] [CrossRef] [PubMed]
  72. Peters, N.A.; Alshowkan, M.; Chapman, J.C.; Evans, P.G.; Hooper, D.A.; Grice, W.P.; Lu, H.-H.; Lukens, J.M.; Pooser, R.C.; Marvinney, C.E.; et al. Quantum Networking and Communications at Oak Ridge National Laboratory. In Proceedings of the IEEE INFOCOM 2022—IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), New York, NY, USA, 2–5 May 2022. [Google Scholar]
  73. Joshi, C.; Singh, U.K. Information security risks management framework—A step towards mitigating security risks in university network. J. Inf. Secur. Appl. 2017, 35, 128–137. [Google Scholar] [CrossRef]
  74. Jacak, M.M.; Jóźwiak, P.; Niemczuk, J.; Jacak, J.E. Quantum generators of random numbers. Sci. Rep. 2021, 11, 16108. [Google Scholar] [CrossRef] [PubMed]
  75. Yunakovsky, S.E.; Kot, M.; Pozhar, N.; Nabokov, D.; Kudinov, M.; Guglya, A.; Kiktenko, E.O.; Kolycheva, E.; Borisov, A.; Fedorov, A.L. Towards security recommendations for public-key infrastructures for production environments in the post-quantum era. EPJ Quantum Technol. 2021, 8, 14. [Google Scholar] [CrossRef]
  76. Joseph, D.; Misoczki, R.; Manzano, M.; Tricot, J.; Pinuaga, F.D.; Lacombe, O.; Leichenauer, S.; Hidary, J.; Venables, P.; Hansen, R. Transitioning organizations to post-quantum cryptography. Nature 2022, 605, 237–243. [Google Scholar] [CrossRef]
  77. Mohammad, O.K.J.; Abbas, S.; El-Horbaty, E.-S.M.; Salem, A.-B.M. Advanced encryption standard development based quantum key distribution. In Proceedings of the 9th International Conference for Internet Technology and Secured Transactions, London, UK, 8–10 December 2014. [Google Scholar]
  78. Xin, H. China Realizes Secure, Stable Quantum Communication Network Spanning 4600 km. 2021. Available online: http://www.china.org.cn/china/2021-01/07/content_77088150.htm (accessed on 7 January 2021).
  79. Feng, C. China Telecom launches quantum encrypted phone calls on smartphones in a new pilot programme. The Star, 7 January 2021. [Google Scholar]
  80. Xinhua. China Launches Quantum-Secured, ‘Unhackable’ Smartphone. China Daily, 17 May 2022. [Google Scholar]
  81. Mo, X.-F.; Zhu, B.; Han, Z.-F.; Gui, Y.-Z.; Guo, G.-C. Faraday—Michelson system for quantum cryptography. Opt. Lett. 2005, 30, 2632–2634. [Google Scholar] [CrossRef]
  82. Chen, W.; Han, Z.-F.; Zhang, T.; Wen, H.; Yin, Z.-Q.; Xu, F.-X.; Wu, Q.-L.; Liu, Y.; Zhang, Y.; Mo, X.-F.; et al. Field Experiment on a “Star Type” Metropolitan Quantum Key Distribution Network. IEEE Photonics Technol. Lett. 2009, 21, 575–577. [Google Scholar] [CrossRef]
  83. Xu, F.; Chen, W.; Wang, S.; Yin, Z.; Zhang, Y.; Liu, Y.; Zhou, Z.; Zhao, Y.; Li, H.; Liu, D.; et al. Field experiment on a robust hierarchical metropolitan quantum cryptography network. Chin. Sci. Bull. 2009, 54, 2991–2997. [Google Scholar] [CrossRef] [Green Version]
  84. Zhou, S.; Zhai, G.; Shi, Y. What Drives the Rise of Metro Developments in China? Evidence from Nantong. Sustainability 2018, 10, 2931. [Google Scholar] [CrossRef] [Green Version]
  85. Chen, T.-Y.; Jiang, X.; Tang, S.-B.; Zhou, L.; Yuan, X.; Zhou, H.; Wang, J.; Liu, Y.; Chen, L.-K.; Liu, W.-Y.; et al. Implementation of a 46-node quantum metropolitan area network. NPJ Quantum Inf. 2021, 7, 134. [Google Scholar] [CrossRef]
  86. Ribezzo, D.; Zahidy, M.; Vagniluca, I.; Biagi, N.; Francesconi, S.; Occhipinti, T.; Oxenløwe, L.K.; Lončarić, M.; Cvitić, I.; Stipčević, M.; et al. Deploying an Inter-European Quantum Network. Adv. Quantum Technol. 2023, 6, 2200061. [Google Scholar] [CrossRef]
  87. Wang, L.-J.; Zou, K.-H.; Sun, W.; Mao, Y.; Zhu, Y.-X.; Yin, H.-L.; Chen, Q.; Zhao, Y.; Zhang, F.; Chen, T.-Y.; et al. Long-distance copropagation of quantum key distribution and terabit classical optical data channels. Phys. Rev. A 2017, 95, 012301. [Google Scholar] [CrossRef] [Green Version]
  88. Ren, J.-G.; Abulizi, M.; Yong, H.-L.; Yin, J. Portable ground stations for space-to-ground quantum key distribution. arXiv 2022, arXiv:2205.13828. [Google Scholar]
  89. Liao, S.-K.; Yong, H.-L.; Liu, C.; Shentu, G.-L.; Li, D.-D.; Lin, J.; Dai, H.; Zhao, S.-Q.; Li, B.; Guan, J.-Y.; et al. Long-distance free-space quantum key distribution in daylight towards inter-satellite communication. Nat. Photonics 2017, 11, 509–513. [Google Scholar] [CrossRef]
  90. Satnews. China Launches New Satellite in Important Step Towards Global Quantum Communications Network. Satnews, 31 July 2022. [Google Scholar]
  91. van Deventer, O.; Spethmann, N.; Loeffler, M.; Amoretti, M.; van den Brink, R.; Bruno, N.; Comi, P.; Farrugia, N.; Gramegna, M.; Jenet, A.; et al. Towards European standards for quantum technologies. EPJ Quantum Technol. 2022, 9, 33. [Google Scholar] [CrossRef]
  92. CCSA. China Communications Standards Association. 2022. Available online: https://www.ccsa.org.cn/english/ (accessed on 20 February 2023).
  93. Huang, L.; Zhou, H.; Feng, K.; Xie, C. Quantum random number cloud platform. NPJ Quantum Inf. 2021, 7, 107. [Google Scholar] [CrossRef]
  94. Mehic, M.; Niemiec, M.; Rass, S.; Ma, J.; Peev, M.; Aguado, A.; Martin, V.; Schauer, S.; Poppe, A.; Pacher, C.; et al. Quantum Key Distribution: A Networking Perspective. ACM Comput. Surv. 2020, 53, 1–44. [Google Scholar] [CrossRef]
  95. Stanley, M.; Gui, Y.; Unnikrishnan, D.; Hall, S.; Fatadin, I. Recent Progress in Quantum Key Distribution Network Deployments and Standards. J. Phys. Conf. Ser. 2022, 2416, 012001. [Google Scholar] [CrossRef]
  96. Sun, S.; Huang, A. A Review of Security Evaluation of Practical Quantum Key Distribution System. Entropy 2022, 24, 260. [Google Scholar] [CrossRef]
  97. ITU-T, Y.3800; Overview on Networks Supporting Quantum Key Distribution. Geneva, Switzerland, 2019.
Figure 1. QKD key service schemes in QSC encryption. (a) Typical QSC between virtual private network gateways. (b) The offline quantum key services.
Figure 1. QKD key service schemes in QSC encryption. (a) Typical QSC between virtual private network gateways. (b) The offline quantum key services.
Entropy 25 00627 g001
Table 1. Typical QKD experiments and their performance.
Table 1. Typical QKD experiments and their performance.
ProtocolChannelDistance or LossKey Rate (bps)YearReference
Modified BB84Lab fiber421 km6.52018[29]
Twin-fieldLab fiber90.8 dB0.0452019[31]
Twin-fieldLab fiber502 km0.1182020[35]
Twin-fieldLab fiber509 km0.2692020[36]
Twin-fieldLab fiber605 km0.972021[37]
Twin-fieldField Trial511 km3.452021[38]
Twin-fieldLab fiber658 km0.0922022[39]
Twin-fieldLab fiber830 km0.0142022[19]
Table 2. Micius quantum science satellite experiments.
Table 2. Micius quantum science satellite experiments.
ExperimentAchievementYearReference
Quantum Key Distribution1200 km satellite-to-ground QKD (1.1 kbps key rate)2017[61]
1000 km satellite-to-ground entanglement-based QKD (3.5 bps key rate)2017[62]
7600 km apart ground stations satellite relay QKD and encryption demonstration (key volume 100 KB)2018[63]
1120 km apart ground stations entanglement-based QKD (0.12 kbps key rate)2020[64]
Increasing key rate 40 times in satellite-ground QKD (47.8 kbps key rate)2021[65]
Quantum Teleportation1200 km apart ground stations entanglement distribution (0.869 fidelity)2017[66]
1400 km ground-to-satellite quantum teleportation (0.80 fidelity)2017[67]
1200 km apart ground stations quantum state transfer (0.82 fidelity)2022[68]
Quantum PhysicsExperimental of gravitationally induced quantum decoherence model2019[69]
Satellite-to-ground quantum-secure time transfer (9 kHz time data rate, and 30 ps transfer precision)2020[70]
Table 3. Quantum encryption and ICT systems integration.
Table 3. Quantum encryption and ICT systems integration.
SolutionEntropy SourceKey
Establishment
Digital
Signature
Encryption
CurrentCSPRNG *ECDH (SM2 **)RSA (SM2)AES (SM4 **)
PQCCSPRNGPQC KEM ***PQC DS ****AES (SM4)
QRNG + PQCQRNGPQC KEMPQC DSAES (SM4)
QKD-based QSCCSPRNG or
QRNG
QKDRSA (SM2) or
Pre-shared Key
AES (SM4)
QRNG + QKD + PQCQRNGQKDPQC DSAES (SM4)
ITS EncryptionQRNGQKDPre-shared KeyOTP
* CSPRNG: Cryptographically secure pseudo-random number generator. ** SM2/SM4: Commercial cryptographic algorithms standard in Chinese market. *** PQC KEM: CRYSTALS-KYBER, BIKE, Classic McEliece, HQC, SIKE [14]. **** PQC DS: CRYSTALS-Dilithium, FALCON, SPHINCS+ [14].
Table 4. Quantum secure communication standardization progress in CCSA-ST7.
Table 4. Quantum secure communication standardization progress in CCSA-ST7.
TypeSubjectStatus
NationalQuantum communication terms and definitionsOngoing
NationalQuantum secure communication use cases and requirementsOngoing
IndustrialQuantum key distribution (QKD) system technical requirements Part 1: BB84 protocol-based QKD systemReleased
2021
IndustrialQuantum key distribution (QKD) system test methods Part 1: BB84 protocol-based QKD systemReleased
2021
IndustrialQuantum key distribution (QKD) system application interfaceOngoing
IndustrialComponents for BB84 protocol quantum key distribution (QKD) Part 1: Light sourceReleased
2022
IndustrialComponents for BB84 protocol quantum key distribution (QKD) Part 2: Single photon detectorReleased2022
IndustrialComponents for BB84 protocol quantum key distribution (QKD) Part 3: Quantum Random Number Generator (QRNG)Released
2021
IndustrialQuantum secure communication network architectureReleased
2022
IndustrialQuantum key distribution and optical communication co-propagation technology requirementsOngoing
IndustrialQuantum key distribution (QKD) network interface requirements between key management and QKDOngoing
IndustrialQuantum key distribution (QKD) equipment security requirements Part 1: QKD based on decoy state BB84 protocolOngoing
IndustrialTechnical specifications for quantum secure communication application equipment based on IPSec ProtocolReleased
2022
IndustrialQuantum key distribution network management system technical requirementsReleased
2022
IndustrialQuantum key distribution (QKD) system technical requirements Part 2: Gaussian modulated coherent state protocol-based QKDOngoing
IndustrialQuantum key distribution (QKD) system test methods Part 2: Gaussian modulated coherent state protocol-based QKDOngoing
IndustrialTechnical requirements for trusted nodes of quantum secure communication networksOngoing
IndustrialQuantum key distribution network security technology requirementsOngoing
IndustrialComponents for BB84 protocol quantum key distribution (QKD) Part 4: Decoy state modulation moduleOngoing
IndustrialComponents for BB84 protocol quantum key distribution (QKD) Part 5: Quantum state modulation moduleOngoing
IndustrialComponents for BB84 protocol quantum key distribution (QKD) Part 6: Quantum state de-modulation moduleOngoing
IndustrialQuantum random number generator technical specificationsOngoing
IndustrialTransport layer cryptography protocol-based quantum secure communication application equipment technical specificationsOngoing
IndustrialTechnical specification for quantum secure communication application equipment for VoIP servicesOngoing
IndustrialQuantum key distribution (QKD) network technical requirements for key managementOngoing
Table 5. QKD system testing and evaluation according to YDT 3834.1/3835.1.
Table 5. QKD system testing and evaluation according to YDT 3834.1/3835.1.
QKD Test ObjectsQKD Test Items
System performanceAverage secure key rate of QKD
System channel-loss margin
QKD output key consistency
QKD output key randomness
QKD transmitterOptical source time-domain characteristics
Optical source frequency-domain characteristics
Random number generator characteristics
Decoy state modulation time-domain characteristics
Decoy state modulation probability distribution
Quantum state modulation time-domain characteristics
Quantum state modulation frequency-domain characteristics
Quantum state modulation demodulation accuracy
Average photon number of quantum state signal
Injection optical isolation
QKD receiverInjected light leakage threshold
SPD time-domain response characteristics
SPD dark count probability
SPD dead time
SPD detection efficiency
SPD post-pulse probability
Synchronization channelOptical signal time-domain characteristics
Optical signal frequency-domain characteristics
Optical signal receipt sensitivity
Distillation channelOptical signal time-domain characteristics
Optical signal frequency-domain characteristics
Other system featuresSystem long-term stability
System redundancy protection
System start-up time
System recovery time
System environmental reliability
Power supply tolerance
Network managementSystem management features
Network management features
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Lai, J.; Yao, F.; Wang, J.; Zhang, M.; Li, F.; Zhao, W.; Zhang, H. Application and Development of QKD-Based Quantum Secure Communication. Entropy 2023, 25, 627. https://doi.org/10.3390/e25040627

AMA Style

Lai J, Yao F, Wang J, Zhang M, Li F, Zhao W, Zhang H. Application and Development of QKD-Based Quantum Secure Communication. Entropy. 2023; 25(4):627. https://doi.org/10.3390/e25040627

Chicago/Turabian Style

Lai, Junsen, Fei Yao, Jing Wang, Meng Zhang, Fang Li, Wenyu Zhao, and Haiyi Zhang. 2023. "Application and Development of QKD-Based Quantum Secure Communication" Entropy 25, no. 4: 627. https://doi.org/10.3390/e25040627

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop