Submitted:
06 April 2026
Posted:
08 April 2026
You are already at the latest version
Abstract
Keywords:
1. Introduction
- 1.
- A topology-oblivious random-flow relaying model in which fragmented key material is forwarded by stochastic rules that avoid global adjacency knowledge, link-state maintenance, and end-to-end path computation.
- 2.
- A highest-score neighbor local diversification heuristic that improves worst-case exposure without requiring global topology knowledge or even the node count.
- 3.
- A scouting-based loop-erasure mechanism that shortens realized payload routes, reduces queueing pressure, and eliminates self-induced cyclic waiting in the model.
- 4.
- A formal entropy-overhead connection based on a leftover-hash-style bound, together with a separate heuristic estimator used in the simplified evaluation model.
- 5.
- A simulation study on reconstructed and synthetic topologies that compares the evaluated random-walk variants under common exposure, hop-count, efficiency, and throughput proxies.
2. Background and Related Work
3. Random Flow
3.1. Threat Model and Objectives
- 1.
- Information-theoretic security.
- 2.
- Fail to establish a key when ITS is no longer possible.
- 3.
- Tolerance of one compromised relay for biconnected pairs.
- 4.
- Compatibility with ETSI GS QKD 014.
- 5.
- Independent fragment forwarding without global adjacency knowledge, link-state exchange, or end-to-end path computation.
3.2. Random Walk Notation
3.3. Base Random Walk Variants
- Simple random walk (). The simple random walk variant is memoryless: at node v, the token chooses the next hop uniformly at random. induces a Markov chain on V.
- Least-recently-visited walk (LRV). LRV biases the walk away from recently visited vertices. We use an LRV-vertex rule: token i maintains timestamps , where is the most recent time at which the token visited x. We initialize , and return by default. At step k with ,
3.4. Privacy Amplification
3.5. Exposure Reduced RW Variants
- One-by-one node-coloring (NC). If s and t are biconnected, we may color nodes one-by-one, effectively removing them from the graph. This requires knowledge of the global node-identifier universe. Under the paper’s terminology, NC remains topology-oblivious because it does not require global adjacency knowledge, link-state exchange, or path computation, but it is less local than R, NB, LRV, and HS. If , we can choose the vertex identifier in circular order. Otherwise, when choosing the next hop, we apply the LRV walk strategy.
- Highest-score neighbor (HS). HS is a seed-based diversification heuristic. For each fragment token i, the source s samples a fresh random seed at the start of the walk. This seed defines a deterministic per-walk score for each vertex
3.6. Efficiency and Throughput
3.7. Loop Erasure
3.8. Implementation Considerations
4. Experimental Evaluation
4.1. Simulated Topologies
- SECOQC. The metro-scale “SEcure COmmunication based on Quantum Cryptography” testbed (Figure 4) with 6 nodes. SECOQC was a major European research initiative involving 41 research and industrial organizations from the EU, Switzerland, and Russia [29]. It ran from April 2004 to October 2008 and employed heterogeneous QKD link technologies (e.g., entanglement-based, decoy-state BB84, continuous-variable), with short physical spans typical of early field deployments.
- NSFNET. The NSFNET T1 backbone from 1991 with 14 nodes [30] (Figure 5). Although NSFNET is a classical network, it serves as a medium-sized, historically relevant analog: in early wide-area optical transport, capacity was scarce and expensive, motivating sparse topologies and careful end-to-end provisioning. Similar constraints reappear in QKD networks.
- GÉANT. The GÉANT GN4 Phase 3 backbone (GN4-3N) is a large, well-connected topology. Our variant (Figure 6), after pruning links longer than 1000 km to improve topology perceptibility in the graph diagram, has 43 nodes and 59 edges. GÉANT is also engaged in Europe’s “ultra-secure” communications direction (including EuroQCI-oriented efforts that consider QKD overlays), making this backbone a plausible substrate for a future QKD overlay [31,32].
4.2. Random Walk Security
4.3. Expected Hops and Efficiency
| Graph | Metric | Mean η without loop-erasure [%] | Mean η with loop-erasure [%] | ||||||
| NB | LRV | NC | HS | NB | LRV | NC | HS | ||
| NSFNET | Assm | 0.41 | 0.39 | 0.61 | 0.74 | 0.45 | 0.40 | 0.64 | 0.75 |
| Est. | 29 | 30 | 30 | 30 | 30 | 30 | 31 | 30 | |
| GÉANT | Assm | 0.14 | 0.14 | 0.23 | 0.25 | 0.24 | 0.20 | 0.32 | 0.36 |
| Est. | 9.4 | 9.8 | 9.8 | 9.7 | 11 | 11 | 11 | 11 | |
| Generated | Assm | 0.05 | 0.06 | 0.09 | 0.10 | 0.12 | 0.09 | 0.15 | 0.16 |
| Est. | 3.5 | 3.7 | 3.7 | 3.7 | 4.6 | 4.4 | 4.4 | 4.4 |
| Metric | Graph | NB | LRV | NC | HS |
| Ts,t | NSFNET | 2.03 | 2.02 | 2.05 | 2.03 |
| GÉANT | 1.70 | 1.70 | 1.71 | 1.77 | |
| Generated | 1.97 | 1.97 | 1.97 | 2.01 | |
| NSFNET | 0.93 | 0.95 | 0.98 | 0.98 | |
| GÉANT | 0.34 | 0.37 | 0.38 | 0.43 | |
| Generated | 0.41 | 0.43 | 0.44 | 0.49 |
4.4. Throughput
5. Conclusions
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
References
- Dervisevic, E.; Tankovic, A.; Fazel, E.; Kompella, R.; Fazio, P.; Voznak, M.; Mehic, M. Quantum Key Distribution Networks – Key Management: A Survey. ACM Computing Surveys 2025, 57, 257:1–257:39. [Google Scholar] [CrossRef]
- Moy, J. OSPF Version 2. RFC 2328, 1998. [CrossRef]
- Liao, S.K.; Cai, W.Q.; Liu, W.Y.; Zhang, L.; Li, Y.; Ren, J.G.; Yin, J.; Shen, Q.; Cao, Y.; Li, Z.P.; et al. Satellite-to-ground quantum key distribution. Nature 2017, 549, 43–47. [Google Scholar] [CrossRef] [PubMed]
- Huang, D.; Huang, P.; Lin, D.; Zeng, G. Long-distance continuous-variable quantum key distribution by controlling excess noise. Scientific Reports 2016, 6, 19201. [Google Scholar] [CrossRef]
- Elliott, C. Building the quantum network*. New Journal of Physics 2002, 4, 46–46. [Google Scholar] [CrossRef]
- ETSI Industry Specification Group (ISG) Quantum Key Distribution. ETSI GS QKD 014 V1.1.1: Quantum key distribution (QKD); protocol and data format of REST-based key delivery API, 2019. tex.howpublished: Group Specification GS QKD 014 V1.1.1.
- Beals, T.R.; Sanders, B.C. Distributed Relay Protocol for Probabilistic Information-Theoretic Security in a Randomly-Compromised Network. 2008, Version Number, 2. [Google Scholar] [CrossRef]
- Wen, H.; Han, Z.; Zhao, Y.; Guo, G.; Hong, P. Multiple stochastic paths scheme on partially-trusted relay quantum key distribution network. Science in China Series F: Information Sciences 2009, 52, 18–22. [Google Scholar] [CrossRef]
- Kumar, P.; Kundu, N.K.; Kar, B. Quantum Key Distribution Routing Protocol in Quantum Networks: Overview and Challenges. arXiv preprint arXiv:2407.13156 2024. arXiv:2407.13156. [CrossRef]
- Yao, J.; Wang, Y.; Li, Q.; Mao, H.; El-Latif, A.A.A.; Chen, N. An Efficient Routing Protocol for Quantum Key Distribution Networks. Entropy 2022, 24, 911. [Google Scholar] [CrossRef]
- Drif, Y.; Bedhief, I.; Chatzinotas, S. Distributed Key Relay: OSPF for Effective QKD. IEEE Communications Standards Magazine 2026, 10, 154–161. [Google Scholar] [CrossRef]
- Álvarez Roa, M.; Stan, C.; Verschoor, S.; Tafur Monroy, I.; Rommel, S. Decentralized Key Distribution versus On-Demand Relaying for QKD Networks. Journal of Optical Communications and Networking 2025, 17, 732–742. [Google Scholar] [CrossRef]
- Kiktenko, E.O.; Tayduganov, A.; Fedorov, A.K. Routing Algorithm Within the Multiple Non-Overlapping Paths’ Approach for Quantum Key Distribution Networks. Entropy 2024, 26, 1102. [Google Scholar] [CrossRef] [PubMed]
- Wang, M.; Li, J.; Xue, K.; Li, R.; Yu, N.; Li, Y.; Liu, Y.; Sun, Q.; Lu, J. A Segment-Based Multipath Distribution Method in Partially-Trusted Relay Quantum Networks. IEEE Communications Magazine 2023, 61, 184–190. [Google Scholar] [CrossRef]
- Le, Q.C.; Bellot, P.; Demaille, A. Towards the World-Wide Quantum Network, 2008. Paper on partially compromised QKD networks and stochastic routing; introduces ADRA and discusses its experimental evaluation.
- Le, Q.C.; Bellot, P.; Demaille, A. Stochastic Routing in Large Grid Shaped Quantum Networks. In Proceedings of the Proceedings of the 5th International Conference on Computer Sciences, Research, Innovation and Vision for the Future, Hanoi, Vietnam, 2007; pp. 166–174. [Google Scholar]
- Ghourab, E.M.; Azab, M.; Gračanin, D. A Quantum Key Distribution Routing Scheme for a Zero-Trust QKD Network System: A Moving Target Defense Approach. Big Data and Cognitive Computing 2025, 9, 76. [Google Scholar] [CrossRef]
- Lydersen, L.; Wiechers, C.; Wittmann, C.; Elser, D.; Skaar, J.; Makarov, V. Hacking commercial quantum cryptography systems by tailored bright illumination. Nature Photonics 2010, 4, 686–689. [Google Scholar] [CrossRef]
- Alon, N.; Benjamini, I.; Lubetzky, E.; Sodin, S. Non-backtracking random walks mix faster. Communications in Contemporary Mathematics 2007, 09, 585–603. [Google Scholar] [CrossRef]
- Akash, A.K.; Fekete, S.; Lee, S.K.; López-Ortiz, A.; Maftuleac, D.; McLurkin, J. Lower Bounds for Graph Exploration Using Local Policies. Journal of Graph Algorithms and Applications 2017, 21, 371–387. [Google Scholar] [CrossRef]
- Renner, R.; Wolf, S. Simple and Tight Bounds for Information Reconciliation and Privacy Amplification. In Advances in Cryptology - ASIACRYPT 2005;Series Title: Lecture Notes in Computer Science; Hutchison, D., Kanade, T., Kittler, J., Kleinberg, J.M., Mattern, F., Mitchell, J.C., Naor, M., Nierstrasz, O., Pandu Rangan, C., Steffen, B., Eds.; Springer Berlin Heidelberg: Berlin, Heidelberg, 2005; Vol. 3788, pp. 199–216. [Google Scholar] [CrossRef]
- Tomamichel, M.; Schaffner, C.; Smith, A.; Renner, R. Leftover Hashing Against Quantum Side Information. IEEE Transactions on Information Theory 2011, 57, 5524–5535. [Google Scholar] [CrossRef]
- Stinson, D.R.; Paterson, M. Cryptography: Theory and Practice, 4 ed.; Chapman and Hall/CRC, 2018. [Google Scholar] [CrossRef]
- Ross, S.M. Introduction to Probability Models, 12 ed.; Academic Press, 2019. [Google Scholar]
- Lawler, G.F.; Limic, V. Random Walk: A Modern Introduction; Vol. 123, Cambridge Studies in Advanced Mathematics, Cambridge University Press, 2010. [CrossRef]
- Wilson, D.B. Generating Random Spanning Trees More Quickly than the Cover Time. In Proceedings of the Proceedings of the Twenty-Eighth Annual ACM Symposium on Theory of Computing. ACM, 1996; pp. 296–303. [Google Scholar] [CrossRef]
- Fung, C.H.F.; Ma, X.; Chau, H.F. Practical Issues in Quantum-Key-Distribution Postprocessing. Physical Review A 2010, 81, 012318. [Google Scholar] [CrossRef]
- Mehic, M.; Niemiec, M.; Rass, S.; Ma, J.; Peev, M.; Aguado, A.; Martin, V.; Schauer, S.; Poppe, A.; Pacher, C.; et al. Quantum Key Distribution: A Networking Perspective. ACM Computing Surveys 2021, 53, 1–41. [Google Scholar] [CrossRef]
- Peev, M.; Pacher, C.; Alléaume, R.; Barreiro, C.; Bouda, J.; Boxleitner, W.; Debuisschert, T.; Diamanti, E.; Dianati, M.; Dynes, J.F.; et al. The SECOQC quantum key distribution network in Vienna. New Journal of Physics 2009, 11, 075001. [Google Scholar] [CrossRef]
- Mukherjee, B.; Ramamurthy, S.; Banerjee, D.; Mukherjee, A. Some principles for designing a wide-area optical network. In Proceedings of the Proceedings of INFOCOM ’94 Conference on Computer Communications, Toronto, Ont., Canada, 1994; pp. 110–119. [Google Scholar] [CrossRef]
- GÉANT. GN4-3N. Available online: https://network.geant.org/gn4-3n/ (accessed on 2026-02-04)., 2023. Web page describing the GN4-3N project (2019–2023); topology diagram consulted to reconstruct node/edge lists (links > 1000 km removed in our processed graph). 2023).
- Xuereb, A. Towards an ultra-secure communication network for the EU. GÉANT CONNECT Available online: https://connect.geant.org/2023/12/13/towards-an-ultra-secure-communication-network-for-the-eu (accessed on 2026-02-04)., 2023. Online article discussing EuroQCI-oriented ultra-secure networking efforts including QKD.











| M | 95% | 90% | 85% | 80% | 75% | 95% | 90% | 85% | 80% | 75% |
| 32 | 0 | 0 | 1 | 2 | 3 | 0 | 0 | 0 | 0 | 0 |
| 64 | 0 | 2 | 4 | 6 | 8 | 0 | 0 | 1 | 3 | 5 |
| 128 | 1 | 6 | 10 | 16 | 21 | 0 | 2 | 6 | 10 | 15 |
| 256 | 5 | 15 | 26 | 37 | 48 | 2 | 10 | 19 | 29 | 39 |
| 512 | 15 | 36 | 59 | 82 | 106 | 9 | 28 | 48 | 70 | 93 |
| 1024 | 36 | 81 | 128 | 175 | 224 | 27 | 69 | 113 | 159 | 206 |
| Graph | Nodes | Edges | Diam. | Avg. deg. | ASP | 2-connected | Max betw. |
| GÉANT | 43 | 59 | 12 | 2.74 | 4.682 | 83.7% | 0.4150 |
| NSFNET | 14 | 21 | 3 | 3.00 | 2.143 | 100% | 0.2201 |
| SECOQC | 6 | 8 | 3 | 2.67 | 1.533 | 66.7% | 0.4000 |
| Generated | 99 | 143 | 10 | 2.89 | 4.784 | 100% | 0.2896 |
| Variant | Max | s | t | v | Avg | Median |
| R | 99.2 | TIR | LIS | MIL | 79.4 | 89.7 |
| NB | 96.4 | TIR | LIS | MIL | 74.1 | 83.5 |
| LRV | 96.1 | TIR | LIS | MIL | 72.5 | 81.1 |
| NC | 93.7 | POR | COR | PAR | 71.8 | 80.4 |
| HS | 92.6 | MAD | COR | PAR | 69.4 | 77.2 |
| Graph | Max exposure [%] | Median exposure [%] | ||||||||
| R | NB | LRV | NC | HS | R | NB | LRV | NC | HS | |
| NSFNET | 81.0 | 78.5 | 76.2 | 72.1 | 70.1 | 60.5 | 53.8 | 53.4 | 52.0 | 52.0 |
| GÉANT | 99.2 | 96.4 | 96.1 | 93.7 | 92.6 | 89.7 | 83.5 | 81.1 | 80.4 | 77.2 |
| Generated (99) | 98.5 | 97.0 | 96.4 | 95.2 | 93.3 | 84.8 | 78.5 | 77.2 | 76.7 | 72.8 |
| Graph | Metric | Without loop-erasure | With loop-erasure | ||||||||
| R | NB | LRV | NC | HS | R | NB | LRV | NC | HS | ||
| NSFNET | Mean | 6 | 4 | 3 | 4 | 3 | 3 | 3 | 3 | 3 | 3 |
| Median | 4 | 3 | 3 | 3 | 3 | 2 | 3 | 3 | 3 | 3 | |
| Max | 41 | 22 | 9 | 11 | 10 | 7 | 7 | 7 | 7 | 7 | |
| GÉANT | Mean | 64 | 32 | 18 | 18 | 25 | 6 | 7 | 8 | 8 | 8 |
| Median | 41 | 21 | 15 | 15 | 16 | 5 | 6 | 7 | 7 | 7 | |
| Max | 535 | 234 | 70 | 82 | 236 | 17 | 21 | 23 | 23 | 23 | |
| Generated | Mean | 128 | 68 | 41 | 42 | 49 | 10 | 13 | 16 | 16 | 18 |
| Median | 85 | 46 | 34 | 35 | 36 | 9 | 11 | 14 | 14 | 16 | |
| Max | 1027 | 516 | 163 | 181 | 357 | 33 | 42 | 54 | 53 | 58 | |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2026 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).