
n(3, v(1, r(1) + r(2) + r(4)) :
v(4, r(1) + r(2) + r(4))) ;
n(4, v(2, r(1) + r(2) + r(3)) :
v(3, r(1) + r(2) + r(3)))
Each node knows all possible routes from its neigh-
bors.
We tested several possible configurations, with
some malicious nodes. Each time the final config-
uration allowed the nodes to know all the possible
routes. You can find the Maude code as well as dif-
ferent examples at https://github.com/thomasarmel/
qkd dynamic routing protocol/.
6 CONCLUSION
Our protocol proposal responds to the problem ad-
dressed in the ETSI QKD standard regarding the
transmission of keys in a QKD network, when all
the KMEs would not be directly linked together via
a quantum link. We freed ourselves from the assump-
tion that “each Trusted Node is securely operated and
managed”, by allowing a minority of nodes on each
routing layer to be compromised by an attacker with-
out compromising confidentiality and authenticity of
the secret. If there is a bottleneck in the network, then
it is still necessary to trust the nodes that constitute
the single point of passage. It is also possible for each
node to adapt the secret sharing threshold accord-
ing to the trust it puts on the nodes of the following
layer. Since Shamir’s Secret Sharing Scheme (SSSS)
is information-theoretic safe, our protocol would re-
tain its safety properties even if the attacker had ac-
cess to quantum computation power.
Our protocol, however, has the disadvantage of in-
creasing the number of messages sent in total, espe-
cially if the trust placed in the KMEs network is low.
In the case where the network becomes too large
for its topology to be known in advance by all nodes,
we then propose an algorithm allowing nodes to dis-
cover on the fly the routes between the node wanting
to transmit the secret and the destination node. We
have also made a formal analysis of the security of
this on-the-fly route discovery algorithm.
REFERENCES
Bhatia, V. and Ramkumar, K. (2020). An efficient quantum
computing technique for cracking RSA using Shor’s
algorithm. In 2020 5th ICCCA, pages 89–94. IEEE.
Blakley, G. R. (1979). Safeguarding cryptographic keys.
In Managing Requirements Knowledge, Int. Workshop
on, pages 313–313. IEEE.
Blanchet, B. (2012). Automatic verification of security pro-
tocols in the symbolic model: The verifier proverif. In
Int. School on Foundations of Security Analysis and
Design, pages 54–87. Springer.
Blanchet, B. et al. (2016). Modeling and verifying security
protocols with the applied pi calculus and proverif.
Foundations and Trends in Privacy and Security, 1(1-
2):1–135.
Blanchet, B., Smyth, B., Cheval, V., and Sylvestre, M.
(2018). Proverif 2.00: automatic cryptographic pro-
tocol verifier, user manual and tutorial. Version from,
pages 05–16.
Choi, T., Kim, H., Kim, J., Yoon, C. S., and Lee, G. M.
(2021). Quantum key distribution networks for trusted
5g and beyond: An ITU-T standardization perspec-
tive. In 2021 ITU Kaleidoscope: Connecting Physical
and Virtual Worlds (ITU K). IEEE.
Clavel, M., Dur
´
an, F., Eker, S., Lincoln, P., Mart
´
ı-Oliet, N.,
Meseguer, J., and Talcott, C. (2003). The maude 2.0
system. In Int. Conf. on Rewriting Techniques and
Applications. Springer.
Corniaux, C. L. and Ghodosi, H. (2014). An entropy-
based demonstration of the security of Shamir’s secret
sharing scheme. In 2014 Int. Conf. on Information
Science, Electronics and Electrical Engineering, vol-
ume 1, pages 46–48. IEEE.
Dolev, D. and Yao, A. (1983). On the security of public key
protocols. IEEE Trans. on IT, 29(2):198–208.
ETSI, G. (2019). 014. Quantum Key Distribution (QKD);
protocol and data format of REST-based key delivery
API.
Kaluderovic, N. (2022). Attacks on some post-quantum
cryptographic protocols: The case of the Legendre
PRF and SIKE. Technical report, EPFL.
Mehic, M., Niemiec, M., Rass, S., Ma, J., Peev, M.,
Aguado, A., Martin, V., Schauer, S., Poppe, A.,
Pacher, C., et al. (2020). Quantum key Distribution: a
networking perspective. ACM Computing Surveys.
Pr
´
evost, T., Martin, B., and Alibart, O. (2024). Formal veri-
fication of the ETSI proposal on a standard QKD pro-
tocol. GT MFS 2024.
Salvail, L., Peev, M., Diamanti, E., All
´
eaume, R.,
L
¨
utkenhaus, N., and L
¨
anger, T. (2010). Security of
trusted repeater quantum key distribution networks.
Journal of Computer Security.
Shamir, A. (1979). How to share a secret. Communications
of the ACM, 22(11):612–613.
Vyas, N. and Mendes, P. (2024). Relaxing trust assump-
tions on Quantum Key Distribution Networks. arXiv
preprint arXiv:2402.13136.
Wang, M., Li, J., Xue, K., Li, R., Yu, N., Li, Y., Liu, Y.,
Sun, Q., and Lu, J. (2023). A segment-based multipath
distribution method in partially-trusted relay quantum
networks. IEEE Communications Magazine.
Zygelman, B. and Zygelman, B. (2018). No-cloning the-
orem, quantum teleportation and spooky correlations.
A First Introduction to Quantum Computing and In-
formation, pages 125–147.
ICISSP 2025 - 11th International Conference on Information Systems Security and Privacy
418