A Critical Analysis of Deployed Use Cases for Quantum Key Distribution and Comparison with Post-Quantum Cryptography

📅 2025-02-06
📈 Citations: 0
Influential: 0
📄 PDF
🤖 AI Summary
Disputes persist regarding the practical security and applicability of Quantum Key Distribution (QKD) in real-world deployments, particularly amid the emergence of Post-Quantum Cryptography (PQC). Method: This work conducts a scenario-based comparative analysis of QKD and PQC, grounded in the first multi-dimensional, collaborative evaluation framework integrating security modeling, empirical validation, cross-paradigm solution comparison, and risk–cost–performance trade-off analysis—built upon authentic industrial and academic use cases worldwide. Contribution/Results: We propose the first decision-oriented QKD/PQC deployment suitability assessment model. Our findings delineate QKD’s security advantage boundary—confined to static, high-assurance dedicated links—while exposing its scalability limitations in wide-area and dynamic networks. In contrast, PQC demonstrates superior universality and migration friendliness. The study delivers empirically grounded guidance for national cryptographic infrastructure evolution toward quantum resilience, informing strategic standardization and migration pathways.

Technology Category

Application Category

📝 Abstract
Quantum Key Distribution (QKD) is currently being discussed as a technology to safeguard communication in a future where quantum computers compromise traditional public-key cryptosystems. In this paper, we conduct a comprehensive security evaluation of QKD-based solutions, focusing on real-world use cases sourced from academic literature and industry reports. We analyze these use cases, assess their security and identify the possible advantages of deploying QKD-based solutions. We further compare QKD-based solutions with Post-Quantum Cryptography (PQC), the alternative approach to achieving security when quantum computers compromise traditional public-key cryptosystems, evaluating their respective suitability for each scenario. Based on this comparative analysis, we critically discuss and comment on which use cases QKD is suited for, considering factors such as implementation complexity, scalability, and long-term security. Our findings contribute to a better understanding of the role QKD could play in future cryptographic infrastructures and offer guidance to decision-makers considering the deployment of QKD.
Problem

Research questions and friction points this paper is trying to address.

Quantum Key Distribution security evaluation
Comparison with Post-Quantum Cryptography
Real-world use case analysis
Innovation

Methods, ideas, or system contributions that make the work stand out.

Quantum Key Distribution evaluation
Comparison with Post-Quantum Cryptography
Real-world use cases analysis
🔎 Similar Papers
No similar papers found.
N
Nick Aquina
Department of Electrical Engineering, Eindhoven University of Technology, Flux Building, Eindhoven, 5612 AZ, The Netherlands; Eindhoven Quantum Hub, Eindhoven University of Technology, Qubit Building, Eindhoven, 5612 AZ, The Netherlands
Bruno Cimoli
Bruno Cimoli
Postdoctoral Researcher, Eindhoven Univerisity of Technology
TelecommunicationsPhotonicsQuantum securityMobile networksRadio over fiber
Soumya Das
Soumya Das
Post-doc,Electrical Engineering, Eindhoven University of Technology
Quantum InformationQuantum computationQuantum Cryptography
Kathrin Hövelmanns
Kathrin Hövelmanns
Eindhoven University of Technology
Quantum-resistant crypto
F
Fiona Johanna Weber
Department of Mathematics and Computer Science, Eindhoven University of Technology, MetaForum Building, Eindhoven, 5612 AZ, The Netherlands; Eindhoven Quantum Hub, Eindhoven University of Technology, Qubit Building, Eindhoven, 5612 AZ, The Netherlands
Chigo Okonkwo
Chigo Okonkwo
Professor at Eindhoven University of Technology, High Capacity Optical Transmission, Electrical Engr
Space Division MultiplexingMode Division MultiplexingOpticsPhotonicsQuantum Communications
Simon Rommel
Simon Rommel
Eindhoven University of Technology
5G/6GTelecommunicationsMicrowave photonicsQuantum key distribution
B
Boris Škorić
Department of Mathematics and Computer Science, Eindhoven University of Technology, MetaForum Building, Eindhoven, 5612 AZ, The Netherlands; Eindhoven Quantum Hub, Eindhoven University of Technology, Qubit Building, Eindhoven, 5612 AZ, The Netherlands
Idelfonso Tafur Monroy
Idelfonso Tafur Monroy
Professor Terahertz Systems, Eindhoven University of Technology (TU/e)
THzoptical communicationphotonicswireless communicationsoptical networks
Sebastian Verschoor
Sebastian Verschoor
University of Amsterdam
CryptographyQuantum Information