🤖 AI Summary
This work addresses the limitation of current quantum communication networks, which are predominantly confined to single-task applications such as quantum key distribution (QKD), by proposing a full-stack development framework capable of efficiently deploying heterogeneous protocols—including quantum oblivious transfer and quantum token schemes—on unified QKD hardware. The framework integrates a high-fidelity simulation backend that accurately models real-world hardware imperfections, such as loss and error characteristics. Implemented on the VeriQloud Qline platform, this approach substantially lowers the barrier to deploying and evaluating multipurpose quantum communication protocols. It further enables, for the first time, experimental validation of the security and engineering feasibility of multi-task quantum protocols on actual hardware, thereby laying a foundational groundwork for scalable, multifunctional quantum networks in industrial settings.
📝 Abstract
Most quantum communication networks around the world are used for a single task: quantum key distribution. In order to initiate the transition to multi-purpose quantum communication networks, we demonstrate the implementation of two different tasks on the same quantum key distribution hardware. Specifically, we focus on quantum oblivious transfer and quantum tokens. Our main contribution is to establish a methodology that greatly simplifies the expertise required to achieve the deployment, assess its performance, and evaluate its feasibility at a large scale.
The implementation that we present is full-stack. It is based on a development framework that allows running user-defined applications both with simulated or real quantum communication backend. The hardware used for the implementation is VeriQloud's Qline. The simulation backend reproduces exactly the inputs and outputs of the real hardware, but also its losses and errors. It can therefore be used to validate the implementation before running it on the real hardware. The sources of the software that we use are fully open, making our research reproducible.
The security of the implementations on real hardware are discussed with respect to security bounds previously known in the literature. We also discuss the engineering choices that we made in order to make the implementations feasible. By establishing a methodology to evaluate the performance and security of quantum communication protocols, we take a significant step towards industrializing and deploying large-scale, multi-purpose quantum communication networks.