Computer Science > Cryptography and Security
arXiv:2510.02379 (cs)
Abstract:Since the security of post-quantum cryptography (PQC) algorithms is based on the hardness of mathematical problems, while the security of quantum key distribution (QKD) relies on the fundamental principles of quantum physics, each approach possesses distinct advantages and limitations that can complement one another. Consequently, recent studies have proposed hybrid schemes that combine QKD and PQC to establish a dual-layered security model. In response to this trend, this study proposes hybrid schemes that integrate QKD with the National Institute of Standards and Technology (NIST) standardized PQC algorithms. These hybrid schemes include two co…
Computer Science > Cryptography and Security
arXiv:2510.02379 (cs)
Abstract:Since the security of post-quantum cryptography (PQC) algorithms is based on the hardness of mathematical problems, while the security of quantum key distribution (QKD) relies on the fundamental principles of quantum physics, each approach possesses distinct advantages and limitations that can complement one another. Consequently, recent studies have proposed hybrid schemes that combine QKD and PQC to establish a dual-layered security model. In response to this trend, this study proposes hybrid schemes that integrate QKD with the National Institute of Standards and Technology (NIST) standardized PQC algorithms. These hybrid schemes include two core components: a hybrid QKD-PQC key exchange protocol and a hybrid QKD-PQC digital signature scheme. For the hybrid key exchange protocol, this study combines Module-Lattice-based Key Encapsulation Mechanisms (ML-KEM) with QKD protocols, specifically BB84 and E91, to construct a secure key exchange protocol. In the design of the hybrid digital signature scheme, this study utilizes Module-Lattice-based Digital Signature Algorithms (ML-DSA) and Stateless Hash-based Digital Signature Algorithms (SLH-DSA) to generate signature reconstruction values. These values are verified using confirmation codes transmitted via the BB84 and E91 protocols. The proposed hybrid key exchange protocol is evaluated by examining the shared secret key it produces, particularly with respect to entropy and whether the output is independent and identically distributed (IID). Furthermore, the computation time and message lengths of the proposed hybrid schemes are evaluated.
Comments: | in Chinese language |
Subjects: | Cryptography and Security (cs.CR); Performance (cs.PF); Quantum Physics (quant-ph) |
Cite as: | arXiv:2510.02379 [cs.CR] |
(or arXiv:2510.02379v1 [cs.CR] for this version) | |
https://doi.org/10.48550/arXiv.2510.02379 arXiv-issued DOI via DataCite (pending registration) |
Submission history
From: Abel C. H. Chen [view email] [v1] Tue, 30 Sep 2025 05:14:34 UTC (1,717 KB)
Current browse context:
cs.CR
Change to browse by:
export BibTeX citation