Preprint
Article

This version is not peer-reviewed.

Topology-Oblivious Random-Walk Key Relaying in Quantum Key Distribution Networks

Submitted:

06 April 2026

Posted:

08 April 2026

You are already at the latest version

Abstract
Quantum key distribution (QKD) networks require relaying when distant key management entities share no direct quantum link. Most relay strategies, however, rely on centralized control or globally maintained routing state. This paper asks whether useful security and efficiency can still be obtained with topology-oblivious stochastic forwarding. It studies the security-overhead trade-off in a model in which fragmented key material is relayed via random-walk variants and reconstructed under privacy amplification. Under a restricted model with at most one compromised relay, the analysis asks whether strictly local forwarding can retain useful information-theoretic security. Evaluation on the GÉANT topology, representing a European academic backbone network, shows clear differences between random-walk variants. The proposed highest-score-neighbor local path-diversification heuristic reduces the risk that relayed key material passes through a compromised node. The evaluation also shows that a preliminary loop-erasure step significantly shortens sampled routes and improves throughput in the model. These findings position topology-oblivious stochastic forwarding as a decentralized alternative to global-state maintenance or centralized orchestration in QKD networks.
Keywords: 
;  ;  ;  ;  ;  

1. Introduction

Quantum key distribution (QKD) can provide symmetric keys with information-theoretic security (ITS), but present-day systems are limited in distance and secret key rate. To address distance limitations, deployments are composed of multiple QKD links and a key management layer. The key management layer is responsible for authorization and key forwarding and delivery. Ultimately, any two QKD network nodes - key management entities (KMEs) - can establish a shared secret key. If no node is compromised and we use one-time pad (OTP) encryption for hop-by-hop relaying, we can reclaim ITS.
Most QKD-network proposals rely on centralized or SDN-assisted orchestration, or on topology-aware path selection [1]. In this paper, we ask whether useful efficiency (security-overhead trade-off) can be achieved when forwarding is topology-oblivious. In particular, we analyze the case in which a single relay node has been compromised. If viable, this approach could further simplify the decentralized key-management layer, especially in growing networks with nodes added over time.
By contrast, in well-known distributed link-state routing protocols such as OSPF [2], routers flood link-state advertisements (LSAs), spreading local link information in a gossip-like manner so that all routers can learn the topology. Afterwards, nodes can compute end-to-end paths using the learned topology. In this paper, we propose an alternative random-walk construction and avoid gossip protocols.
We study a topology-oblivious stochastic relay scheme that we call a random flow. In one random flow from source s to destination t, the source splits material into M fragments and emits those fragments in parallel. Each fragment is then forwarded independently using a random-walk variant. The destination reconstructs the recovered material and applies seeded privacy amplification. In this setting, routing behavior directly determines the security-overhead trade-off through proxy metrics such as exposure χ (worst-case probability of traversing a malicious node) and expected hop count h s , t . Our contributions are the following:
1.
A topology-oblivious random-flow relaying model in which fragmented key material is forwarded by stochastic rules that avoid global adjacency knowledge, link-state maintenance, and end-to-end path computation.
2.
A highest-score neighbor local diversification heuristic that improves worst-case exposure without requiring global topology knowledge or even the node count.
3.
A scouting-based loop-erasure mechanism that shortens realized payload routes, reduces queueing pressure, and eliminates self-induced cyclic waiting in the model.
4.
A formal entropy-overhead connection based on a leftover-hash-style bound, together with a separate heuristic estimator used in the simplified evaluation model.
5.
A simulation study on reconstructed and synthetic topologies that compares the evaluated random-walk variants under common exposure, hop-count, efficiency, and throughput proxies.
The remainder of the paper is organized as follows. Section 2 reviews the QKD-network setting and related work. Section 3 introduces the random-flow model, random-walk variants, privacy-amplification view, and loop-erasure mechanism. Section 4 presents the simulation setup and comparative results. Section 5 concludes the paper.
We study this approach under the restricted threat model of Section 3.1 and the evaluation setup of Section 4. In short, we assume exactly one compromised relay, focus on biconnected source–target pairs ( s , t ) , and target information-theoretic security.

3. Random Flow

At a high level, we replace deterministic routing by stochastic forwarding of fragmented key material: each of the M fragments is routed by a random walk variant from source s towards target t. Node t collects all fragments, and derives the final key K via seeded privacy amplification. We find that the random walk (RW) variant plays a significant role in exposure, the max (worst-case) probability of traversing the malicious node.
Building on the QKD transport model from the background section, we now switch to the algorithmic abstraction. We represent the QKD network as a simple, undirected graph G = ( V , E ) , where V denotes the set of trusted nodes and E denotes the set of QKD links . The per-link keys u , v introduced earlier are treated here simply as the hop-by-hop OTP resource available on edge ( u , v ) . To simplify the notation in the analysis, we assume that both the link-key blocks and the derived end-to-end key have length 256 bits.
We assume a reactive (rather than a proactive) model. In reactive mode, key allocation request triggers a transmission, and transmissions are not initiated ahead of time. A transmission (node s node t) is a key-relaying session by which a block of final keys K 1 , , K θ is established. In the base model (without loop erasure), the source s emits M raw fragments f 1 , , f M , which eventually reach destination t by means of random walks. We can define the ratio ρ between the final block size (full-entropy key count) θ and emitted fragment count M as ρ : = θ ÷ M .
The motivation behind emitting multiple fragments is clear: a node may be compromised at some point in time, and, by increasing M, we decrease the probability that all or most of them will traverse the malicious node. We later denote exposure by χ s , t - the worst-case probability that a fragment in transmission s t traverses the malicious node v, maximized over all choices of v V { s , t } available to the adversary.

3.1. Threat Model and Objectives

For confidentiality analysis, we assume at most one compromised relay m V { s , t } . Compromise reveals the relay’s full internal state and the plaintext of every fragment it forwards. Public-key wrapping of fragments does not satisfy the information-theoretic goal of QKD and remains vulnerable to harvest-now decrypt-later attacks.
The compromised relay may drop, misroute, or inject traffic. We do not attempt to address availability. For confidentiality, a fragment is treated as compromised once it passes through m. Traffic injection is handled separately by standard authentication mechanisms.
We assume honest endpoints (s and t), authenticated classical channels based on PKI and mutual TLS, and trusted QKD hardware, excluding side-channel attacks [18].
The design goals are:
1.
Information-theoretic security.
2.
Fail to establish a key when ITS is no longer possible.
3.
Tolerance of one compromised relay for biconnected s , t pairs.
4.
Compatibility with ETSI GS QKD 014.
5.
Independent fragment forwarding without global adjacency knowledge, link-state exchange, or end-to-end path computation.
Forwarding decisions use neighbor information and variant-specific token state; in the NC variant, the source additionally knows the global node-identifier universe. The topology itself may change over time. We study what confidentiality and overhead can be achieved under the assumption of exactly one malicious relay.

3.2. Random Walk Notation

We represent each in-flight (travelling from s to t) fragment f i by a token. Concretely, transmission token i is a tuple consisting of id - transmission identifier, source and target pair ( s , t ) , i - token index, f i - fragment itself, and σ i - variant-specific local state. State σ i is the only element that may change over time.
token i = ( id , s , t , i , f i , σ i ) ,
Each token i is forwarded by a discrete-time walk. The trajectory of the token i during the sampled walk is X 0 , X 1 , , X h , with X 0 = s , X k + 1 N X k , X h = t , where N X k is the neighborhood of X k . The whole trajectory is a sampled random sequence ( X k ) k = 0 h , where h is the hop count. The probability distribution from which X k + 1 is sampled is P variant .
X k + 1 P variant · | X k , σ k ,
It depends only on the current token i and variant-specific state σ (vertices are stateless under this objective and under our interpretation of the random-walk setting). The dot in P variant · | is a placeholder, and altogether the expression means “distribution over possible next nodes”. The walk terminates when it first hits the target.
For readability, we will adopt the notation P v u | instead of P ( X k + 1 | X k , σ k ) , where v = X k , u = X k + 1 and ★ is syntactically substituted for some predicate that can be evaluated from σ k . It is the probability to go from v to u given position X k and state σ k .

3.3. Base Random Walk Variants

  • Simple random walk ( R ). The simple random walk variant R is memoryless: at node v, the token chooses the next hop uniformly at random. R induces a Markov chain on V.
P R ( v u ) = 1 / | N ( v ) | , u N ( v ) , 0 , otherwise .
Non-backtracking random walk ( N B ). Non-backtracking NB suppresses immediate return. The token state σ carries a single field prev V { null } with the previous node (or null at the start). Let N ( v ) = N ( v ) { p } , where p = prev . Then
P NB ( v u | p ) = 1 / | N ( v ) | , u N ( v ) , 1 , u = p and d ( v ) = 1 , 0 , otherwise .
After choosing u, the token updates prev v . Equivalently, NB is a first-order Markov chain on directed edges. On regular expander graphs, NB can “mix” provably faster than R [19]. Informally, an expander is a sparse graph with strong connectivity.
  • Least-recently-visited walk (LRV). LRV biases the walk away from recently visited vertices. We use an LRV-vertex rule: token i maintains timestamps last : V N 0 , where last [ x ] is the most recent time at which the token visited x. We initialize last [ s ] = 1 , and return last [ x ] = 0 by default. At step k with X k = v ,
X k + 1 arg min u N ( v ) last [ u ] ,
breaking ties uniformly. Unvisited neighbors (with value 0) are preferred. Local LRV-type policies are well studied in graph exploration; they can improve practical coverage [20].

3.4. Privacy Amplification

Because a compromised node may eavesdrop raw key material, and in the security analysis we assume at most one compromised relay, we can and should divide the source material into M fragments and send them via at least partially disjoint paths.
Let χ s , t or exposure be the max probability of the eavesdropper positioned on the “worst” intermediate relay to observe a fragment travelling s t . To be precise, define p v ( s , t ) as the probability of visiting v and let χ s , t = max v G { s , t } p v ( s , t ) . Because nodes do not know the topology in advance, we may need to assume a χ value in advance when choosing M (fragment count). A safe χ value greatly depends on the random walk variant.
Assume we transmit M fragments and let G denote the number of “good” fragments, i.e., fragments not observed by the compromised relay. Then Pr [ G g ] follows a cumulative binomial distribution (see Figure 2) and can be calculated as follows:
Pr [ G g ] = k = g M M k 1 χ k χ M k
Let us define g α ( M , χ ) as the largest g such that Pr [ G g ] is at least, e.g., α = 99.99 % . It is the maximum number of fragments out of M that we can guarantee to be safe (contain full entropy) in transmission s t , for a given value of χ s , t .
g α ( M , χ ) = max g { 0 , , M } : Pr [ G g ] α
See Table 1 for g α values corresponding to different assumed χ values. For M = 1024 and χ = 95 % , the table gives g 99.99 % ( 1024 , 95 % ) = 27 . The choice χ = 95 % is not arbitrary: later measurements in Section 4.2 on GÉANT and on the synthetic graph show worst-case exposures for the better-performing variants still concentrated around 93– 96 % , making 95 % a useful conservative design point for illustration.
Let θ s , t denote the number of final 256-bit keys extracted after privacy amplification for transmission s t . Then g α should be understood as a lower bound on the number of good fragments, not directly on θ s , t .
To keep the formal result separate from the simplified evaluation model, define the estimated extracted count
θ ^ s , t g α ( M , χ s , t ) .
This estimator is used later as a heuristic proxy for extracted output under the simplified assumptions of the evaluation, but it is not itself the formal privacy-amplification guarantee. More formally, let each good fragment contribute at least μ bits of conditional min-entropy. By the leftover hash lemma / privacy-amplification bound [21,22], for privacy-amplification error ε pa , the extractor output must satisfy
θ s , t · 256 μ g α ( M , χ s , t ) 2 log 2 1 / ε pa .
Thus, θ ^ s , t = g α ( M , χ s , t ) should be read only as a heuristic extracted-count estimator for the special case in which μ 256 and the extractor overhead is neglected. The formal guarantee remains the leftover-hash-style inequality above.
For later use, define the estimated yield as the estimated extracted count normalized by the fragment count. For a fixed ordered pair ( s , t ) , the corresponding pair-specific estimator is
ρ s , t est θ ^ s , t M .
If, instead, an implementation fixes a conservative design exposure χ variant for an entire RW variant, we define the corresponding assumed yield
ρ assm θ ^ assm M = g α ( M , χ variant ) M

3.5. Exposure Reduced RW Variants

The experimental results in Section 4.2 show that the aforementioned variants R, NB, and LRV have high max s , t χ s , t values. On each evaluated graph, there exists a pair s , t such that χ s , t 96.4 % for each of these walk variants.
See Figure 3 for intuition about why high χ can arise. There is often a longer bypass path connecting s and t, but the walk is likely to be diverted back into the more “congested” direct connection. To address this, we can temporarily color nodes one by one, or otherwise assign them lower priority throughout the walk. Different walks within the same transmission should penalize different nodes. This motivates the following two constructions.
The following constructions reduce max χ from 96.4 % to 93.3 % . In the paper’s simplified exposure-based intuition, the fraction of fragment bits that avoid the compromised relay therefore increases by ( 1 0.933 ) ÷ ( 1 0.964 ) = 86 % .
  • One-by-one node-coloring (NC). If s and t are biconnected, we may color nodes one-by-one, effectively removing them from the graph. This requires knowledge of the global node-identifier universe. Under the paper’s terminology, NC remains topology-oblivious because it does not require global adjacency knowledge, link-state exchange, or path computation, but it is less local than R, NB, LRV, and HS. If M > | V | , we can choose the vertex identifier in circular order. Otherwise, when choosing the next hop, we apply the LRV walk strategy.
As a side note, this method allows for a particularly easy construction of additive (XOR) secret sharing. For each end-to-end key K { 0 , 1 } 256 , the source samples f 1 , , f M 1 $ { 0 , 1 } 256 and sets the final fragment f M so that all fragments together XOR to K
f M K i = 1 M 1 f i , so that K = i = 1 M f i .
Any subset of at most M 1 shares is uniformly distributed and independent of K, and hence reveals no information about K in the information-theoretic sense. This is known as additive (XOR) secret sharing [23]. The malicious party must observe all f i to get K.
Although additive (XOR) secret sharing is easy to implement and reason about, we instead quantify χ and apply entropy extraction because this yields a slightly higher ρ .
  • Highest-score neighbor (HS). HS is a seed-based diversification heuristic. For each fragment token i, the source s samples a fresh random seed ζ i $ { 0 , 1 } λ at the start of the walk. This seed defines a deterministic per-walk score for each vertex u V
score i ( u ) = h ( u , ζ i ) ,
where h is a deterministic mixing function of the vertex identifier u and seed ζ i . Different ζ i induce different vertex rankings without requiring topology knowledge. Intuitively, a previously very probable relay will receive a low score in some walks. HS chooses a neighbor with the largest assigned score.
X k + 1 ( i ) arg max u U i ( v ) score i ( u )
If all neighbors of v have already been visited, HS falls back to the LRV rule. Token i also maintains visit timestamps - last : V N 0 (just like in LRV). Let U ( v ) N ( v ) be the set of unvisited vertices. If a neighbor u U ( v ) , then we override score i ( u ) to 0.

3.6. Efficiency and Throughput

For a fixed source–destination pair ( s , t ) , let H s , t denote the random hop count of one fragment walk, and let h s , t E [ H s , t ] be the expected hop count. As previously assumed, the fragment size is 256 bits and matches link key size. One delivered fragment therefore consumes, in expectation, h s , t link keys. A transmission consumes M · h s , t link keys.
Suppose a transmission uses M fragments. Recall from Section 3.4 that
ρ s , t est = θ ^ s , t M , ρ assm = θ ^ assm M = g α ( M , χ variant ) M .
Because QKD-derived link keys are a scarce resource, we define the variant-specific model-based extracted efficiency as the estimated extracted output bits per consumed QKD-derived link-key bit:
η s , t est θ ^ s , t M 1 h s , t = ρ s , t est h s , t 1
When reporting a topology-wide metric over a set P of ordered ( s , t ) pairs, we use
η ¯ 1 | P | ( s , t ) P η s , t , ρ ¯ 1 | P | ( s , t ) P ρ s , t , h 1 ¯ 1 | P | ( s , t ) P 1 h s , t .
For the pair-specific estimator, the average efficiency admits the exact decomposition
η est ¯ = ρ est ¯ h 1 ¯ + Cov ρ est , h 1 ,
where the covariance is taken over ( s , t ) P . This is just the standard identity [24] E [ X Y ] = E [ X ] E [ Y ] + Cov ( X , Y ) applied to X = ρ s , t est and Y = h s , t 1 . This decomposition is useful because it separates three effects: the average security yield ρ , the average routing cost h s , t (equivalently, h s , t 1 in the formula), and the extent to which ρ s , t est and h s , t 1 are correlated across ( s , t ) pairs. For the assumed quantity, ρ assm is constant within a topology/variant, because it is computed from a single conservative design exposure χ variant rather than the pair-specific exposure χ s , t . Therefore, the covariance term is identically zero.
Next, define the raw fragment throughput T s , t as the long-run average rate, in bits/s, at which fragment bits arrive at the destination t. We assume that only one ordered pair ( s , t ) is active at a time, that QKD links continuously generate and buffer keys (starting with empty buffers). The corresponding model-based extracted throughput is
R s , t est T s , t ρ s , t est , equivalently R s , t est = T s , t η s , t est h s , t
Thus, η s , t est captures model-based extracted efficiency, while R s , t est captures the corresponding extracted-throughput proxy under the simplified entropy model.

3.7. Loop Erasure

We separate route discovery from payload transmission. In the first phase, the source emits a lightweight scouting token over the authenticated classical channel only. The scouting token carries no secret fragment material and consumes no QKD-derived link-key bits. It is forwarded according to the same stochastic forwarding rule as the corresponding payload walk and records the visited history
W = ( v 0 = s , v 1 , , v τ = t ) .
When we later report exposure for loop-erased variants, we still measure it on this original scouting walk as a conservative upper bound on literal payload exposure.
During the walk a time-bounded link key reservation is applied to traversed links. Ultimately, if some relay along this sampled walk cannot admit the request, the session may be rejected before any key material is transmitted; in a REST realization, this can be surfaced as an implementation-level failure such as HTTP 503.
After the scouting token reaches t, the recorded walk W is converted into a realized payload route by chronological loop erasure [25,26]. Concretely, one scans W from left to right and, whenever a vertex reappears, deletes the closed subwalk between the earlier occurrence and the repeat, while retaining a single copy of the repeated vertex. Let LE ( W ) denote the resulting simple st path. In the second phase, the actual fragment material is forwarded hop by hop along LE ( W ) , with each hop protected by fresh QKD-derived link-key bits used as a one-time pad.
Strictly speaking, for the NB , LRV, NC, and HS variants, LE ( W ) is not the classical loop-erased random walk distribution from probability theory; here loop erasure is used only as a path-simplification operator applied to the sampled scouting history.
This two-phase construction provides two operational benefits. First, removing loops shortens the realized payload route, thereby reducing expected hop count, QKD key consumption, and queueing pressure. Second, because the realized payload route is simple, self-induced cyclic waiting caused by one fragment revisiting the same relays is eliminated. Rejection, if necessary, occurs before secret material enters the relay path.
The interpretation of exposure under loop erasure requires care. A compromised relay that appears only on an erased segment of the scouting walk does not directly observe fragment plaintext, because the scouting phase is classical only. However, such a relay may still influence the realized route by biasing the scouting trajectory or by affecting admission decisions. Therefore, when reporting χ s , t for loop-erased variants, we count scouting hits as a conservative upper bound on literal payload exposure. This preserves comparability with the no-loop-erasure case while avoiding an optimistic estimate of adversarial influence.

3.8. Implementation Considerations

If the destination t is an adjacent neighbor of the current relay, i.e. t N ( v ) , the relay should bypass the stochastic rule and forward the fragment directly to t. This is the model we assume in the following evaluation section.
At the destination, the recovered fragment material is concatenated into Z and processed by seeded privacy amplification,
K = Ext S ( Z ) ,
where the seed S is public but authenticated end to end. In practical QKD post-processing, privacy amplification is a standard final step, and universal-hash implementations such as Toeplitz hashing are commonly used [27]. The output length and entropy constraints for this step are those already defined in Section 3.4.
Each fragment walk should use fresh independent randomness, including independent diversification seeds for HS, so that the assumptions behind the extraction step remain valid. Among the diversification variants, NC is less deployment-friendly than HS because it requires a globally known set of node identifiers. Under the paper’s terminology, this still fits the topology-oblivious setting, but it is weaker in locality than HS.

4. Experimental Evaluation

We focus on three questions: (i) exposure—how large the worst-case relay hit probability χ s , t can be for some source–target pair, and what conservative design exposure this suggests when choosing the target extracted block size θ and, where applicable, the fragment count M; (ii) efficiency—what extracted-yield estimators and model-based output per consumed QKD-derived link-key bit the evaluated variants achieve under the paper’s simplified entropy model; and (iii) scalability—how these quantities and the routing cost evolve with network size. We address these questions on topologies resembling existing quantum network deployments.

4.1. Simulated Topologies

Trusted-node QKD deployments are currently small (typically tens of nodes) due to the cost of dark fiber and QKD equipment. For context, the largest openly reported QKD deployment is the China Quantum Communication Network (CN-QCN), spanning 145 nodes [28]; however, CN-QCN uses centralized network management and exhibits a hierarchical topology with many articulation points. For our experiments, we selected three topologies spanning increasing size and structural complexity: 6, 14, and 43 nodes (SECOQC, NSFNET, GÉANT). See Figure 4, Figure 5 and Figure 6. All graphs are visualized in Gephi using a geographic layout based on approximate site latitude/longitude, and node colors denote Gephi modularity communities with no physical or administrative meaning. We deliberately focus on graphs with a nontrivial biconnected structure, and, whenever we report ITS-oriented exposure, yield, efficiency, or throughput quantities, we restrict attention to biconnected ordered pairs ( s , t ) .
  • SECOQC. The metro-scale “SEcure COmmunication based on Quantum Cryptography” testbed (Figure 4) with 6 nodes. SECOQC was a major European research initiative involving 41 research and industrial organizations from the EU, Switzerland, and Russia [29]. It ran from April 2004 to October 2008 and employed heterogeneous QKD link technologies (e.g., entanglement-based, decoy-state BB84, continuous-variable), with short physical spans typical of early field deployments.
  • NSFNET. The NSFNET T1 backbone from 1991 with 14 nodes [30] (Figure 5). Although NSFNET is a classical network, it serves as a medium-sized, historically relevant analog: in early wide-area optical transport, capacity was scarce and expensive, motivating sparse topologies and careful end-to-end provisioning. Similar constraints reappear in QKD networks.
  • GÉANT. The GÉANT GN4 Phase 3 backbone (GN4-3N) is a large, well-connected topology. Our variant (Figure 6), after pruning links longer than 1000 km to improve topology perceptibility in the graph diagram, has 43 nodes and 59 edges. GÉANT is also engaged in Europe’s “ultra-secure” communications direction (including EuroQCI-oriented efforts that consider QKD overlays), making this backbone a plausible substrate for a future QKD overlay [31,32].
In practice, the GÉANT and NSFNET topologies would require many additional relay sites because their longest links exceed the 150 –300 km range typical of current commercial devices. We do not introduce such relays here; these two graphs are treated as structural proxies.
To study scaling trends, we generate a synthetic 2-vertex-connected graph with 99 nodes and 143 edges by placing clusters of 3 nodes at randomly chosen nearby coordinates and connecting each cluster to 2–3 of its 6 closest neighbors; generation is retried if the graph is not 2-vertex-connected. See Figure 7. In that figure, darker nodes have higher sequence numbers (they appear later in snapshots), and edge directions indicate the insertion step when the edge was added. The graph has an average degree of 2.9 , comparable to the real topologies above. Furthermore, we bias edge creation toward geographically closer nodes. Each node is also assigned a sequence number so we can take snapshots at n = 3 , 6 , , 99 such that the snapshots maintain the same properties.
Table 2 summarizes basic structural metrics of the evaluated graphs.

4.2. Random Walk Security

To evaluate the security-relevant exposure, we estimate χ s , t (max intermediate-node hit probability) for a given graph and ordered pair ( s , t ) as follows. Let W be the number of completed sampled walks and X ( i ) be the path taken by the i-th walk. The empirically determined χ ^ is
χ ^ s , t = max v G { s , t } p v ( s , t ) , where p v ( s , t ) = 1 W i = 1 W v X ( i )
In each graph, we then identify max s , t χ ^ for each RW variant. This is the conservative design exposure used when dimensioning the target extracted block size θ and, when needed, the fragment count M, via the lower-bound quantities g α ( M , χ ) , θ s , t , and ρ s , t est . For many ordered pairs, this value is 1 because an articulation point is unavoidable. We therefore compute χ ^ only over biconnected ( s , t ) pairs. For loop-erased variants, X ( i ) still denotes the original sampled/scouting walk rather than only the realized payload route, so the reported χ ^ remains a conservative upper bound on literal payload exposure. Table 3 reports the detailed GÉANT breakdown, including the maximizing ( s , t , v ) triple and the average χ ^ , while Table 4 summarizes per-graph max and median χ ^ across variants. SECOQC is omitted from the exposure overview because it has no indirect biconnected source–target pair under this threat model.
As reported in Table 3 and Table 4, HS attains the lowest worst-case exposure among the evaluated variants, with NC generally close behind despite its stronger global-node knowledge requirement. If we were to assume χ 77 % when fixing random flow (HS) fragment count, we would materially overestimate g α ( M , χ ) and the resulting extracted yield for about half of biconnected GÉANT pairs. This is further illustrated in Figure 8; it shows the fraction of biconnected ( s , t ) pairs whose true HS exposure lies below an assumed χ threshold on the x-axis. If we assume a lower χ s , t than the true one, we do not merely misestimate a few pairs, but overstate the guaranteed number of good fragments and extracted final keys for a substantial fraction of pairs, as suggested by the sigmoidal shape in Figure 8.
To evaluate whether worst-case exposure max s , t χ s , t grows with network size, we measured it on successive snapshots of the synthetic graph and report the results in Figure 9. Although the worst-case exposure remains very high throughout, we do not observe a clear monotonic increase with | V | . Moreover, for the non-backtracking variants, the maximum is not attained at the final 99-node snapshot: NB peaks at 97.3 % on the 69-node snapshot, while LRV, NC, and HS peak at 97.4 % , 96.5 % , and 96.1 % , respectively, on the 78-node snapshot. This suggests that, at least for our generated graph family, worst-case exposure is driven more by structural bottlenecks than by network size alone.
These results also highlight a negative finding: worst-case exposure remains high even for HS, at 92.6 % on GÉANT and 93.3 % on the final 99-node synthetic graph, with a peak of 96.1 % on the 78-node snapshot. HS helps, but the trusted-relay problem remains unsolved in this model. Among the evaluated variants, HS gives the best worst-case exposure. NC remains close, but it assumes the globally known node set, whereas HS preserves the stronger locality of using only neighbor information plus token state.

4.3. Expected Hops and Efficiency

As shown in Figure 10 and Figure 11, the average expected hop count over all ( s , t ) pairs grows linearly with network size.
To put these numbers into context, they remain well above the corresponding average shortest-path lengths from Table 2. For the generated graph, for example, the average shortest-path length over 9702 ordered pairs is 4.8 (as seen in Table 2), whereas the average mean hop count is 10–18 with loop-erasure and 41–128 without it. The average length of the shortest path when original shortest path nodes are removed is 7.5 , still significantly below 10–18 post-loop-erasure.
The longest mean path after loop-erasure is attained by HS. This aligns with its original path-diversification motivation.
From Section 3.6, we factor pairwise efficiency as
η s , t est = ρ s , t est 1 h s , t , ρ s , t est = g α ( M , χ s , t ) M .
We further distinguish pair-specific estimated efficiency, where the exact pair-specific exposure χ s , t is used inside the heuristic estimator, from assumed efficiency, where the implementation fixes a conservative variant-specific design exposure taken from Section 4.2. Concretely, we use χ NB = 97.3 % , χ LRV = 97.4 % , χ NC = 96.5 % , and χ HS = 96.1 % , corresponding to the peak worst-case exposures reported there. Hence,
η s , t assm = ρ assm 1 h s , t , ρ assm = g α ( 1024 , χ variant ) 1024 .
In the experiments below, we report topology-wide averages η ¯ assm and η ¯ est over all biconnected ordered pairs. Since exposure is still computed from the original walk, loop-erasure affects only the denominator through the expected hop count.
In Table 6 and Table 7, we omit the simple random walk R and focus on NB, LRV, NC, and HS, since R is already dominated on the evaluated graphs in both exposure and expected hop count.
Table 6 shows that the conservative fixed-exposure assumption substantially understates achievable efficiency on all evaluated topologies: η ¯ est is consistently far above η ¯ assm . The efficiency gain is, however, noticeably smaller than the corresponding reduction in expected hop count from Table 5. This is not a contradiction. Although loop-erasure reduces average hop count dramatically, the gain in average efficiency is more modest because efficiency scales with the reciprocal hop count. Hence loop-erasure primarily removes a heavy tail of excessively long walks, rather than uniformly shortening all source–target pairs. In other words, it has a lower impact on 1 | P | ( s , t ) P h s , t 1 than on 1 | P | ( s , t ) P h s , t .
More importantly, the near-equality of η ¯ est across RW variants should not be interpreted as a simple cancellation in which lower exposure is paid for by systematically longer walks. The covariance decomposition
η ¯ est = ρ ¯ est h 1 ¯ + Cov ρ est , h 1
shows instead that pair-specific security and routing cost are strongly aligned: pairs with lower exposure also tend to have shorter walks, while difficult pairs suffer from both higher exposure and longer routes. Consequently, the covariance term is large and positive.
This alignment is already visible in the completed simulations. On NSFNET, Corr ( ρ est , h 1 ) is approximately 0.97 for all evaluated variants, both with and without loop-erasure. On GÉANT, it remains similarly high, around 0.94 0.96 . For example, on NSFNET-NB without loop-erasure, ρ ¯ est h 1 ¯ 0.198 and Cov ( ρ est , h 1 ) 0.091 , yielding η ¯ est 0.289 . On GÉANT-NB without loop-erasure, the product term is only about 0.028 , whereas the covariance term contributes about 0.066 , again showing that the pairwise alignment is substantial.
Therefore, the similarity of η ¯ est across variants is better understood as follows: on these topologies, the evaluated variants induce similar averages of ρ est , h 1 , and their covariance, rather than a clean trade-off between improved exposure and worse path length.
Finally, the distribution of pairwise efficiencies is strongly right-skewed, especially on GÉANT. For instance, for NB without loop-erasure on GÉANT, the mean pair-specific estimated efficiency is 9.4 % whereas the median is only 0.40 % ; with loop-erasure, the corresponding values are 11.0 % and 1.56 % . Thus, the mean efficiency should be read as a topology-wide average, not as a typical per-pair value.
Table 6. Topology-wide mean RWefficiency by graph and variant. For each graph and variant, we report separate rows for η ¯ assm and η ¯ est , expressed in percent. The left block uses hop counts from the original walk, while the right block uses hop counts after loop-erasure. In both blocks, the exposure term is computed from the original walk and M = 1024.
Table 6. Topology-wide mean RWefficiency by graph and variant. For each graph and variant, we report separate rows for η ¯ assm and η ¯ est , expressed in percent. The left block uses hop counts from the original walk, while the right block uses hop counts after loop-erasure. In both blocks, the exposure term is computed from the original walk and M = 1024.
Graph Metric Mean η without loop-erasure [%] Mean η with loop-erasure [%]
NB LRV NC HS NB LRV NC HS
NSFNET Assm 0.41 0.39 0.61 0.74 0.45 0.40 0.64 0.75
Est. 29 30 30 30 30 30 31 30
GÉANT Assm 0.14 0.14 0.23 0.25 0.24 0.20 0.32 0.36
Est. 9.4 9.8 9.8 9.7 11 11 11 11
Generated Assm 0.05 0.06 0.09 0.10 0.12 0.09 0.15 0.16
Est. 3.5 3.7 3.7 3.7 4.6 4.4 4.4 4.4
Table 7. Mean throughput by graph and RW variant. The top block reports raw fragment throughput Ts,t in kbit/s. The bottom block reports mean model-based extracted throughput R s , t est = Ts,t ρ s , t est in kbit/s under the simplified entropy model.
Table 7. Mean throughput by graph and RW variant. The top block reports raw fragment throughput Ts,t in kbit/s. The bottom block reports mean model-based extracted throughput R s , t est = Ts,t ρ s , t est in kbit/s under the simplified entropy model.
Metric Graph NB LRV NC HS
Ts,t NSFNET 2.03 2.02 2.05 2.03
GÉANT 1.70 1.70 1.71 1.77
Generated 1.97 1.97 1.97 2.01
R s , t est NSFNET 0.93 0.95 0.98 0.98
GÉANT 0.34 0.37 0.38 0.43
Generated 0.41 0.43 0.44 0.49

4.4. Throughput

To evaluate throughput for a fixed ( s , t ) pair, we implement the random-walk key-relaying scheme as a discrete-event simulation driven by a min-heap of timestamped events. To remain consistent with the two-phase protocol model, route discovery is treated as a preceding classical control phase that determines the realized payload route (with loop-erasure enabled, this route is LE ( W ) ). The throughput metric T s , t counts only delivered payload fragment bits; scouting/control traffic is omitted from T s , t because it uses the classical channel and consumes no QKD-derived OTP key material. Each hop of a packet from node u to node v is split into: (i) OTP key reservation on link ( u , v ) , which may incur waiting time computed from the link secret-key rate (SKR) and current key balance; (ii) a fixed-latency classical channel; and (iii) receiver admission into a finite relay buffer with FIFO backpressure. The simulator repeatedly pops the earliest event, advances the simulation clock, updates link/node state, and schedules successor events.
Each undirected link e E generates QKD key material at a constant secret-key rate g e = 1 k b i t / s for all links. Key material is consumed in 256 b i t units. Each hop spends 256 b i t for one-time-pad (OTP) encryption on the traversed QKD link. We use a default inter-node classical latency of 5 ms.
Simulations start with empty link buffers. We do not discard a warm-up period when calculating throughput; given a fixed simulation duration of 1000 s , its impact is unlikely to be large. We ignore classical network throughput (goodput) and protocol overhead, as QKD is the dominant bottleneck (e.g., 1 k b i t / s vs. typical 1 G b i t / s classical links).
Table 7 summarizes both the mean raw fragment throughput and the mean model-based extracted throughput across graphs and RW variants.
Raw fragment throughput varies only modestly across variants, but extracted throughput differs more because it inherits the pair-specific estimated yield ρ est . On NSFNET, mean raw throughput is about 2.0 kbit/s for all evaluated variants, whereas mean model-based extracted throughput ranges from roughly 0.93 to 0.98 kbit/s. On GÉANT, mean raw throughput ranges from about 1.70 to 1.77 kbit/s, while mean model-based extracted throughput rises from about 0.34 kbit/s for NB to about 0.43 kbit/s for HS. On the Generated graph, mean raw throughput again stays nearly flat across variants, at about 1.97 2.01 kbit/s, but mean model-based extracted throughput increases from about 0.41 kbit/s for NB to about 0.49 kbit/s for HS. Under the conservative assumed exposure, the corresponding extracted-throughput proxy would collapse by roughly one to two orders of magnitude, mirroring the behavior already seen in Table 6.

5. Conclusions

This paper studies topology-oblivious QKD key relaying under an explicit and restricted threat model: honest endpoints, at most one compromised relay, and biconnected source–target pairs. In this regime, local stochastic forwarding can be a usable decentralized heuristic within the simplified model, but the forwarding rule has a clear effect on both exposure and routing cost.
Among the evaluated topology-oblivious random walk variants, HS achieved the lowest worst-case exposure. On GÉANT, the maximum exposure over biconnected ordered pairs decreased from 96.1 % for LRV to 92.6 % for HS. On the 99-node synthetic graph, the corresponding maxima were 97.0 % (NB), 96.4 % (LRV), 95.2 % (NC), and 93.3 % (HS). Thus, HS provided the best diversification among the evaluated topology-oblivious methods, while avoiding the global node-set knowledge required by NC.
The second main result concerns the effect of scouting-based loop erasure on routing cost. It sharply reduced expected hop counts on the larger graphs. On GÉANT, the topology-wide mean hop count fell from 32 to 7 for NB, from 18 to 8 for LRV, from 18 to 8 for NC, and from 25 to 8 for HS. On the 99-node synthetic graph, the corresponding reductions were from 68 to 13, from 41 to 16, from 42 to 16, and from 49 to 18. Therefore, loop erasure materially lowers QKD key consumption, reduces queueing pressure, and eliminates self-induced cyclic waiting in the model.
Under the paper’s simplified entropy and throughput model, these routing improvements also translate into higher model-based extracted throughput. On GÉANT, mean extracted throughput increased from 0.34 kbit/s for NB to 0.37 kbit/s for LRV, 0.38 kbit/s for NC, and 0.43 kbit/s for HS. On the synthetic graph, the same ordering was observed: 0.41 , 0.43 , 0.44 , and 0.49 kbit/s, respectively. On NSFNET, the variants were closer, ranging from 0.93 to 0.98 kbit/s. Under conservative assumed exposure, however, this throughput proxy can collapse by roughly one to two orders of magnitude.
A further empirical finding is that pair-specific estimated yield and routing efficiency are positively aligned rather than exhibiting a simple trade-off: pairs with lower exposure also tend to have shorter walks. This effect is strong, with Corr ( ρ s , t est , h s , t 1 ) around 0.97 on NSFNET and about 0.94 0.96 on GÉANT.
Random flow does reduce the end-to-end rate obtained per consumed link-key bit, because one delivered fragment traverses multiple hops. Relative to shortest-path forwarding, the post-loop-erasure average hop-count overhead is about 1.5 × for NB and 1.7 × for LRV/NC/HS on GÉANT, and about 2.7 × , 3.3 × , 3.3 × , and 3.8 × on the synthetic graph. Without loop erasure, this overhead is substantially worse.
Overall, the paper identifies a usable middle ground between centralized, topology-aware routing and idealized disjoint-path constructions. Its main value is as a simple decentralized alternative to maintaining global routing state: HS improves local diversification without global path computation, and scouting-based loop erasure makes the resulting random-flow construction substantially cheaper in hop count. At the same time, worst-case exposure remains high even for the better variants: 92.6 % on GÉANT, 93.3 % on the final synthetic graph, and up to 96.1 % on a synthetic snapshot. Under the terminology used here, topology-oblivious excludes global adjacency knowledge, link-state exchange, and path computation, but may still allow the node-identifier universe to be known in advance, as in NC; under a one-compromised-relay model, stochastic forwarding is therefore best read as a decentralized heuristic, not as a solution to the trusted-relay problem.
Future work should tighten the entropy analysis, extend the threat model beyond a single malicious relay, and study more realistic traffic regimes. Two important next steps are proactive pairwise buffer maintenance and relaxing the stateless-relay assumption to test whether limited node-local state can further improve diversification, routing efficiency, and congestion behavior.

Author Contributions

K.P. and S.K. developed the research concept and methodology. K.P. implemented the software, conducted the main evaluation, performed the analysis, and prepared the original draft. R.I. contributed to numerical evaluation and validation. J.V. provided supervision and project leadership. E.K., E.C., L.L., and E.R. contributed through discussion, review, and support within the broader project. All authors have read and agreed to the published version of the manuscript.

Funding

This work has been supported by the Latvian Quantum Initiative under European Union Recovery and Resilience Facility project no. 2.3.1.1.i.0/1/22/I/CFLA/001.

Data Availability Statement

The graph edge lists and experiment source code supporting the findings of this study are publicly available at https://github.com/LUMII-Syslab/random-walk-key-relaying.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Dervisevic, E.; Tankovic, A.; Fazel, E.; Kompella, R.; Fazio, P.; Voznak, M.; Mehic, M. Quantum Key Distribution Networks – Key Management: A Survey. ACM Computing Surveys 2025, 57, 257:1–257:39. [Google Scholar] [CrossRef]
  2. Moy, J. OSPF Version 2. RFC 2328, 1998. [CrossRef]
  3. Liao, S.K.; Cai, W.Q.; Liu, W.Y.; Zhang, L.; Li, Y.; Ren, J.G.; Yin, J.; Shen, Q.; Cao, Y.; Li, Z.P.; et al. Satellite-to-ground quantum key distribution. Nature 2017, 549, 43–47. [Google Scholar] [CrossRef] [PubMed]
  4. Huang, D.; Huang, P.; Lin, D.; Zeng, G. Long-distance continuous-variable quantum key distribution by controlling excess noise. Scientific Reports 2016, 6, 19201. [Google Scholar] [CrossRef]
  5. Elliott, C. Building the quantum network*. New Journal of Physics 2002, 4, 46–46. [Google Scholar] [CrossRef]
  6. ETSI Industry Specification Group (ISG) Quantum Key Distribution. ETSI GS QKD 014 V1.1.1: Quantum key distribution (QKD); protocol and data format of REST-based key delivery API, 2019. tex.howpublished: Group Specification GS QKD 014 V1.1.1.
  7. Beals, T.R.; Sanders, B.C. Distributed Relay Protocol for Probabilistic Information-Theoretic Security in a Randomly-Compromised Network. 2008, Version Number, 2. [Google Scholar] [CrossRef]
  8. Wen, H.; Han, Z.; Zhao, Y.; Guo, G.; Hong, P. Multiple stochastic paths scheme on partially-trusted relay quantum key distribution network. Science in China Series F: Information Sciences 2009, 52, 18–22. [Google Scholar] [CrossRef]
  9. Kumar, P.; Kundu, N.K.; Kar, B. Quantum Key Distribution Routing Protocol in Quantum Networks: Overview and Challenges. arXiv preprint arXiv:2407.13156 2024. arXiv:2407.13156. [CrossRef]
  10. Yao, J.; Wang, Y.; Li, Q.; Mao, H.; El-Latif, A.A.A.; Chen, N. An Efficient Routing Protocol for Quantum Key Distribution Networks. Entropy 2022, 24, 911. [Google Scholar] [CrossRef]
  11. Drif, Y.; Bedhief, I.; Chatzinotas, S. Distributed Key Relay: OSPF for Effective QKD. IEEE Communications Standards Magazine 2026, 10, 154–161. [Google Scholar] [CrossRef]
  12. Álvarez Roa, M.; Stan, C.; Verschoor, S.; Tafur Monroy, I.; Rommel, S. Decentralized Key Distribution versus On-Demand Relaying for QKD Networks. Journal of Optical Communications and Networking 2025, 17, 732–742. [Google Scholar] [CrossRef]
  13. Kiktenko, E.O.; Tayduganov, A.; Fedorov, A.K. Routing Algorithm Within the Multiple Non-Overlapping Paths’ Approach for Quantum Key Distribution Networks. Entropy 2024, 26, 1102. [Google Scholar] [CrossRef] [PubMed]
  14. Wang, M.; Li, J.; Xue, K.; Li, R.; Yu, N.; Li, Y.; Liu, Y.; Sun, Q.; Lu, J. A Segment-Based Multipath Distribution Method in Partially-Trusted Relay Quantum Networks. IEEE Communications Magazine 2023, 61, 184–190. [Google Scholar] [CrossRef]
  15. Le, Q.C.; Bellot, P.; Demaille, A. Towards the World-Wide Quantum Network, 2008. Paper on partially compromised QKD networks and stochastic routing; introduces ADRA and discusses its experimental evaluation.
  16. Le, Q.C.; Bellot, P.; Demaille, A. Stochastic Routing in Large Grid Shaped Quantum Networks. In Proceedings of the Proceedings of the 5th International Conference on Computer Sciences, Research, Innovation and Vision for the Future, Hanoi, Vietnam, 2007; pp. 166–174. [Google Scholar]
  17. Ghourab, E.M.; Azab, M.; Gračanin, D. A Quantum Key Distribution Routing Scheme for a Zero-Trust QKD Network System: A Moving Target Defense Approach. Big Data and Cognitive Computing 2025, 9, 76. [Google Scholar] [CrossRef]
  18. Lydersen, L.; Wiechers, C.; Wittmann, C.; Elser, D.; Skaar, J.; Makarov, V. Hacking commercial quantum cryptography systems by tailored bright illumination. Nature Photonics 2010, 4, 686–689. [Google Scholar] [CrossRef]
  19. Alon, N.; Benjamini, I.; Lubetzky, E.; Sodin, S. Non-backtracking random walks mix faster. Communications in Contemporary Mathematics 2007, 09, 585–603. [Google Scholar] [CrossRef]
  20. Akash, A.K.; Fekete, S.; Lee, S.K.; López-Ortiz, A.; Maftuleac, D.; McLurkin, J. Lower Bounds for Graph Exploration Using Local Policies. Journal of Graph Algorithms and Applications 2017, 21, 371–387. [Google Scholar] [CrossRef]
  21. Renner, R.; Wolf, S. Simple and Tight Bounds for Information Reconciliation and Privacy Amplification. In Advances in Cryptology - ASIACRYPT 2005;Series Title: Lecture Notes in Computer Science; Hutchison, D., Kanade, T., Kittler, J., Kleinberg, J.M., Mattern, F., Mitchell, J.C., Naor, M., Nierstrasz, O., Pandu Rangan, C., Steffen, B., Eds.; Springer Berlin Heidelberg: Berlin, Heidelberg, 2005; Vol. 3788, pp. 199–216. [Google Scholar] [CrossRef]
  22. Tomamichel, M.; Schaffner, C.; Smith, A.; Renner, R. Leftover Hashing Against Quantum Side Information. IEEE Transactions on Information Theory 2011, 57, 5524–5535. [Google Scholar] [CrossRef]
  23. Stinson, D.R.; Paterson, M. Cryptography: Theory and Practice, 4 ed.; Chapman and Hall/CRC, 2018. [Google Scholar] [CrossRef]
  24. Ross, S.M. Introduction to Probability Models, 12 ed.; Academic Press, 2019. [Google Scholar]
  25. Lawler, G.F.; Limic, V. Random Walk: A Modern Introduction; Vol. 123, Cambridge Studies in Advanced Mathematics, Cambridge University Press, 2010. [CrossRef]
  26. Wilson, D.B. Generating Random Spanning Trees More Quickly than the Cover Time. In Proceedings of the Proceedings of the Twenty-Eighth Annual ACM Symposium on Theory of Computing. ACM, 1996; pp. 296–303. [Google Scholar] [CrossRef]
  27. Fung, C.H.F.; Ma, X.; Chau, H.F. Practical Issues in Quantum-Key-Distribution Postprocessing. Physical Review A 2010, 81, 012318. [Google Scholar] [CrossRef]
  28. Mehic, M.; Niemiec, M.; Rass, S.; Ma, J.; Peev, M.; Aguado, A.; Martin, V.; Schauer, S.; Poppe, A.; Pacher, C.; et al. Quantum Key Distribution: A Networking Perspective. ACM Computing Surveys 2021, 53, 1–41. [Google Scholar] [CrossRef]
  29. Peev, M.; Pacher, C.; Alléaume, R.; Barreiro, C.; Bouda, J.; Boxleitner, W.; Debuisschert, T.; Diamanti, E.; Dianati, M.; Dynes, J.F.; et al. The SECOQC quantum key distribution network in Vienna. New Journal of Physics 2009, 11, 075001. [Google Scholar] [CrossRef]
  30. Mukherjee, B.; Ramamurthy, S.; Banerjee, D.; Mukherjee, A. Some principles for designing a wide-area optical network. In Proceedings of the Proceedings of INFOCOM ’94 Conference on Computer Communications, Toronto, Ont., Canada, 1994; pp. 110–119. [Google Scholar] [CrossRef]
  31. GÉANT. GN4-3N. Available online: https://network.geant.org/gn4-3n/ (accessed on 2026-02-04)., 2023. Web page describing the GN4-3N project (2019–2023); topology diagram consulted to reconstruct node/edge lists (links > 1000 km removed in our processed graph). 2023).
  32. Xuereb, A. Towards an ultra-secure communication network for the EU. GÉANT CONNECT Available online: https://connect.geant.org/2023/12/13/towards-an-ultra-secure-communication-network-for-the-eu (accessed on 2026-02-04)., 2023. Online article discussing EuroQCI-oriented ultra-secure networking efforts including QKD.
Figure 1. Illustration of ETSI 014-style key delivery. SAE A requests a fresh key from KME α and passes the returned key identifier to SAE B, which later retrieves the same key from KME γ . The corresponding KMEs are embedded in trusted nodes with QKD link endpoints, while the underlying Q-KMS transfers the final key K f hop-by-hop using OTP protection with α , β and β , γ .
Figure 1. Illustration of ETSI 014-style key delivery. SAE A requests a fresh key from KME α and passes the returned key identifier to SAE B, which later retrieves the same key from KME γ . The corresponding KMEs are embedded in trusted nodes with QKD link endpoints, while the underlying Q-KMS transfers the final key K f hop-by-hop using OTP protection with α , β and β , γ .
Preprints 206890 g001
Figure 2. Prob of receiving g good fragments.
Figure 2. Prob of receiving g good fragments.
Preprints 206890 g002
Figure 3. High χ construction example.
Figure 3. High χ construction example.
Preprints 206890 g003
Figure 4. SECOQC Vienna QKD network.
Figure 4. SECOQC Vienna QKD network.
Preprints 206890 g004
Figure 5. Reconstructed NSFNET T1 topology.
Figure 5. Reconstructed NSFNET T1 topology.
Preprints 206890 g005
Figure 6. Adapted version of GÉANT GN4-3N.
Figure 6. Adapted version of GÉANT GN4-3N.
Preprints 206890 g006
Figure 7. Synthetic graph with 99 nodes.
Figure 7. Synthetic graph with 99 nodes.
Preprints 206890 g007
Figure 8. Fraction of biconnected ( s , t ) pairs whose χ s , t (HS) is below an assumed threshold.
Figure 8. Fraction of biconnected ( s , t ) pairs whose χ s , t (HS) is below an assumed threshold.
Preprints 206890 g008
Figure 9. Worst-case exposure on synthetic graph snapshots as the network size grows.
Figure 9. Worst-case exposure on synthetic graph snapshots as the network size grows.
Preprints 206890 g009
Figure 10. Average expected hop count by graph and RW variant without loop-erasure.
Figure 10. Average expected hop count by graph and RW variant without loop-erasure.
Preprints 206890 g010
Figure 11. Average expected hop count by graph and RW variant with loop-erasure.
Figure 11. Average expected hop count by graph and RW variant with loop-erasure.
Preprints 206890 g011
Table 1. Maximum g values such that P [ # g ] > α holds for various χ (exposure) values. The table helps determine the maximum number of “good” fragments that we can guarantee will arrive safely at the target.
Table 1. Maximum g values such that P [ # g ] > α holds for various χ (exposure) values. The table helps determine the maximum number of “good” fragments that we can guarantee will arrive safely at the target.
g 99 % ( M , χ ) g 99.99 % ( M , χ )
M 95% 90% 85% 80% 75% 95% 90% 85% 80% 75%
32 0 0 1 2 3 0 0 0 0 0
64 0 2 4 6 8 0 0 1 3 5
128 1 6 10 16 21 0 2 6 10 15
256 5 15 26 37 48 2 10 19 29 39
512 15 36 59 82 106 9 28 48 70 93
1024 36 81 128 175 224 27 69 113 159 206
Table 2. Topology overview. ASP is the average shortest-path length. The biconnected core fraction is the fraction of nodes in the largest biconnected component. Max betweenness is the maximum node betweenness centrality (normalized). The 2-connected column shows the percent of ( s , t ) pairs for which no node removal would leave s and t in different components
Table 2. Topology overview. ASP is the average shortest-path length. The biconnected core fraction is the fraction of nodes in the largest biconnected component. Max betweenness is the maximum node betweenness centrality (normalized). The 2-connected column shows the percent of ( s , t ) pairs for which no node removal would leave s and t in different components
Graph Nodes Edges Diam. Avg. deg. ASP 2-connected Max betw.
GÉANT 43 59 12 2.74 4.682 83.7% 0.4150
NSFNET 14 21 3 3.00 2.143 100% 0.2201
SECOQC 6 8 3 2.67 1.533 66.7% 0.4000
Generated 99 143 10 2.89 4.784 100% 0.2896
Table 3. RW variant max s , t χ ^ values (in %) on GÉANT and corresponding intermediate vertex v.
Table 3. RW variant max s , t χ ^ values (in %) on GÉANT and corresponding intermediate vertex v.
Variant Max χ ^ s t v Avg χ ^ Median χ ^
R 99.2 TIR LIS MIL 79.4 89.7
NB 96.4 TIR LIS MIL 74.1 83.5
LRV 96.1 TIR LIS MIL 72.5 81.1
NC 93.7 POR COR PAR 71.8 80.4
HS 92.6 MAD COR PAR 69.4 77.2
Table 4. Exposure overview by graph and RW variant. For each graph and variant, we report the worst-case pair exposure max s , t χ ^ and the median χ ^ over biconnected ( s , t ) pairs.
Table 4. Exposure overview by graph and RW variant. For each graph and variant, we report the worst-case pair exposure max s , t χ ^ and the median χ ^ over biconnected ( s , t ) pairs.
Graph Max exposure χ ^ [%] Median exposure χ ^ [%]
R NB LRV NC HS R NB LRV NC HS
NSFNET 81.0 78.5 76.2 72.1 70.1 60.5 53.8 53.4 52.0 52.0
GÉANT 99.2 96.4 96.1 93.7 92.6 89.7 83.5 81.1 80.4 77.2
Generated (99) 98.5 97.0 96.4 95.2 93.3 84.8 78.5 77.2 76.7 72.8
Table 5. Estimated expected hop count by graph and RW variant. Let H s , t be the hop count in the sampled walk from s to t. We report the average of mean , median , and maximum of H s , t over all biconnected ( s , t ) pairs, and distinguish whether loop-erasure is toggled on.
Table 5. Estimated expected hop count by graph and RW variant. Let H s , t be the hop count in the sampled walk from s to t. We report the average of mean , median , and maximum of H s , t over all biconnected ( s , t ) pairs, and distinguish whether loop-erasure is toggled on.
Graph Metric Without loop-erasure With loop-erasure
R NB LRV NC HS R NB LRV NC HS
NSFNET Mean 6 4 3 4 3 3 3 3 3 3
Median 4 3 3 3 3 2 3 3 3 3
Max 41 22 9 11 10 7 7 7 7 7
GÉANT Mean 64 32 18 18 25 6 7 8 8 8
Median 41 21 15 15 16 5 6 7 7 7
Max 535 234 70 82 236 17 21 23 23 23
Generated Mean 128 68 41 42 49 10 13 16 16 18
Median 85 46 34 35 36 9 11 14 14 16
Max 1027 516 163 181 357 33 42 54 53 58
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.
Copyright: This open access article is published under a Creative Commons CC BY 4.0 license, which permit the free download, distribution, and reuse, provided that the author and preprint are cited in any reuse.
Prerpints.org logo

Preprints.org is a free preprint server supported by MDPI in Basel, Switzerland.

Subscribe

Disclaimer

Terms of Use

Privacy Policy

Privacy Settings

© 2026 MDPI (Basel, Switzerland) unless otherwise stated