Abstract

Quantum key distribution (QKD) and quantum message encryption protocols promise a secure way to distribute information while detecting eavesdropping. However, current protocols may suffer from significantly reduced eavesdropping protection when only a subset of qubit are observed by an attacker. The eavesdropping detection is enhanced through a Quantum Fourier Transform (QFT)-based method, and classical-channel hardening using post-quantum or classical authenticated encryption by proposed hybrid QKD framework leveraging recent advances specifically combining a modern security-proof for Twin‑Field Quantum Key Distribution (TF-QKD). The key rate, error resilience, and security under realistic channel noise and detector imperfections are analyzed. Therefore, this framework shows better improvement in security towards key rates over longer distances and stronger eavesdropper detection compared to traditional QKD protocols. Hence, this proposed system shows better results interms of accuracy, security and efficiency.

Keywords

  • Quantum key distribution QKD
  • TwinField Quantum Key Distribution TF-QKD
  • Quantum Fourier Transform Q

References

  1. C. Rubio García, A. Cano Aguilera, C. Stan, J. José Vegas Olmos, S. Rommel and I. Tafur Monroy, "Enhanced Network Security Protocols for the Quantum Era: Combining Classical and Post-Quantum Cryptography, and Quantum Key Distribution," in IEEE Journal on Selected Areas in Communications, vol. 43, no. 8, pp. 2765-2781, Aug. 2025, doi: 10.1109/JSAC.2025.3568011.
  2. S. L. Birhanu, M. Ghadimi, Y. Hai, P. Seeling, R. Bassoli and F. H. P. Fitzek, "A Survey of Continuous Variable Quantum Key Distribution in Quantum Communication," in IEEE Access, vol. 13, pp. 166027-166061, 2025, doi: 10.1109/ACCESS.2025.3610519.
  3. J. Jordan-Parra, M. Garcia-Romero, J. Gil-Lopez, J. A. Ruiz-De-Azua and J. Paradells, "Satellite Quantum Key Distribution: Analysis, Modeling, Performance Evaluation, and Validation," in IEEE Open Journal of the Communications Society, vol. 6, pp. 8241-8271, 2025, doi: 10.1109/OJCOMS.2025.3614698.
  4. Y. Dong, J. Peng and X. Sun, "Continuous-Variable Quantum Key Distribution Scheme with Odd Coherent States," in Chinese Journal of Electronics, vol. 27, no. 2, pp. 433-438, March 2018, doi: 10.1049/cje.2017.10.005
  5. M. Y. Al-Darwbi, A. A. Ghorbani and A. H. Lashkari, "QKeyShield: A Practical Receiver-Device-Independent Entanglement-Swapping-Based Quantum Key Distribution," in IEEE Access, vol. 10, pp. 107685-107702, 2022, doi: 10.1109/ACCESS.2022.3212787.
  6. Y. -L. Tang et al., "Field Test of Measurement-Device-Independent Quantum Key Distribution," in IEEE Journal of Selected Topics in Quantum Electronics, vol. 21, no. 3, pp. 116-122, May-June 2015, Art no. 6600407, doi: 10.1109/JSTQE.2014.2361796.
  7. S. Yan, J. Wang, J. Fang, L. Jiang and X. Wang, "An Improved Polar Codes-Based Key Reconciliation for Practical Quantum Key Distribution," in Chinese Journal of Electronics, vol. 27, no. 2, pp. 250-255, March 2018, doi: 10.1049/cje.2017.07.006.
  8. X. Liu, J. Wang, R. Li and C. Zhang, "Security Analysis of Stochastic Routing Scheme in Grid-Shaped Partially-Trusted Relay Quantum Key Distribution Network," in Chinese Journal of Electronics, vol. 27, no. 2, pp. 234-240, March 2018, doi: 10.1049/cje.2018.01.013.
  9. K. -S. Shim, Y. -h. Kim, I. Sohn, E. Lee, K. -i. Bae and W. Lee, "Design and Validation of Quantum Key Management System for Construction of KREONET Quantum Cryptography Communication," in Journal of Web Engineering, vol. 21, no. 5, pp. 1377-1417, July 2022, doi: 10.13052/jwe1540-9589.2151.
  10. C. Biswas, M. M. Haque and U. Das Gupta, "A Modified Key Sifting Scheme With Artificial Neural Network Based Key Reconciliation Analysis in Quantum Cryptography," in IEEE Access, vol. 10, pp. 72743-72757, 2022, doi: 10.1109/ACCESS.2022.3188798.
  11. E. H. Laaji and A. Azizi, "A Combination of BB84 Quantum Key Distribution and an Improved Scheme of NTRU Post-Quantum Cryptosystem," in Journal of Cyber Security and Mobility, vol. 11, no. 5, pp. 673-694, September 2022, doi: 10.13052/jcsm2245-1439.1152.
  12. J. Li et al., "A Survey on Quantum Cryptography," in Chinese Journal of Electronics, vol. 27, no. 2, pp. 223-228, March 2018, doi: 10.1049/cje.2018.01.017.
  13. D. Pan et al., "The Evolution of Quantum Secure Direct Communication: On the Road to the Qinternet," in IEEE Communications Surveys & Tutorials, vol. 26, no. 3, pp. 1898-1949, thirdquarter 2024, doi: 10.1109/COMST.2024.3367535.
  14. H. -C. Chen, C. Damarjati, E. Prasetyo, C. -L. Chou, T. -L. Kung and C. -E. Weng, "Generating Multi-Issued Session Key by Using Semi Quantum Key Distribution With Time-Constraint," in IEEE Access, vol. 10, pp. 20839-20851, 2022, doi: 10.1109/ACCESS.2022.3151890.
  15. N. Ul Ain et al., "A Novel Approach Based on Quantum Key Distribution Using BB84 and E91 Protocol for Resilient Encryption and Eavesdropper Detection," in IEEE Access, vol. 13, pp. 32819-32833, 2025, doi: 10.1109/ACCESS.2025.3539178.
  16. S. Ricci, P. Dobias, L. Malina, J. Hajny and P. Jedlicka, "Hybrid Keys in Practice: Combining Classical, Quantum and Post-Quantum Cryptography," in IEEE Access, vol. 12, pp. 23206-23219, 2024, doi: 10.1109/ACCESS.2024.3364520.
  17. O. Shirko and S. Askar, "A Novel Security Survival Model for Quantum Key Distribution Networks Enabled by Software-Defined Networking," in IEEE Access, vol. 11, pp. 21641-21654, 2023, doi: 10.1109/ACCESS.2023.3251649.
  18. B. Djordjevic, "Hybrid QKD Protocol Outperforming Both DV- and CV-QKD Protocols," in IEEE Photonics Journal, vol. 12, no. 1, pp. 1-8, Feb. 2020, Art no. 7600108, doi: 10.1109/JPHOT.2019.2946910.
  19. A. Bhatia, S. Bitragunta and K. Tiwari, "PUF-AQKD: A Hardware-Assisted Quantum Key Distribution Protocol for Man-in-the-Middle Attack Mitigation," in IEEE Open Journal of the Communications Society, vol. 6, pp. 4923-4942, 2025, doi: 10.1109/OJCOMS.2025.3575206.
  20. B. Djordjevic, "QKD-Enhanced Cybersecurity Protocols," in IEEE Photonics Journal, vol. 13, no. 2, pp. 1-8, April 2021, Art no. 7600208, doi: 10.1109/JPHOT.2021.3069510.
  21. N. K. Kundu, M. R. McKay, A. Conti, R. K. Mallik and M. Z. Win, "MIMO Terahertz Quantum Key Distribution Under Restricted Eavesdropping," in IEEE Transactions on Quantum Engineering, vol. 4, pp. 1-15, 2023, Art no. 4100315, doi: 10.1109/TQE.2023.3264638.
  22. Y. Tanizawa et al., "Quantum Key Distribution Network and Quantum Secure Cloud Technologies for Genome Medicine Use Cases," in IEEE Transactions on Quantum Engineering, vol. 6, pp. 1-15, 2025, Art no. 4101215, doi: 10.1109/TQE.2025.3611335.
  23. H. Wang et al., "Resilient Quantum Key Distribution (QKD)-Integrated Optical Networks With Secret-Key Recovery Strategy," in IEEE Access, vol. 7, pp. 60079-60090, 2019, doi: 10.1109/ACCESS.2019.2915378.
  24. C. Liu, C. Zhu, X. Liu, M. Nie, H. Yang and C. Pei, "Multicarrier Multiplexing Continuous-Variable Quantum Key Distribution at Terahertz Bands Under Indoor Environment and in Inter-Satellite Links Communication," in IEEE Photonics Journal, vol. 13, no. 4, pp. 1-13, Aug. 2021, Art no. 7600113, doi: 10.1109/JPHOT.2021.3098717.
  25. M. Mehic, S. Rass, E. Dervisevic and M. Voznak, "Tackling Denial of Service Attacks on Key Management in Software-Defined Quantum Key Distribution Networks," in IEEE Access, vol. 10, pp. 110512-110520, 2022, doi: 10.1109/ACCESS.2022.3214511.