Back to News
quantum-computing

Integrity from Algebraic Manipulation Detection in Trusted-Repeater QKD Networks

arXiv Quantum Physics
Loading...
3 min read
1 views
0 likes
⚡ Quantum Brief
Researchers from the University of Amsterdam and CWI introduced the first QKD protocol guaranteeing both confidentiality and integrity in trusted-repeater networks, addressing a critical gap in long-distance quantum communication security. The protocol combines Algebraic Manipulation Detection (AMD) codes with multi-path relaying, enabling provable protection against external adversaries and compromised intermediate nodes in trusted-repeater architectures. It achieves Information Theoretic Security (ITS), formally proven through game-based cryptographic analysis, ensuring manipulation detection without computational assumptions—unlike classical cryptographic methods. Current QKD networks face distance limitations due to hardware constraints; this solution extends secure communication ranges by leveraging trusted repeaters while eliminating integrity vulnerabilities in relay protocols. The work marks a milestone for real-world QKD deployments, offering a framework for globally scalable quantum-secure networks with mathematically rigorous integrity guarantees.
Integrity from Algebraic Manipulation Detection in Trusted-Repeater QKD Networks

Summarize this article with:

Quantum Physics arXiv:2602.00069 (quant-ph) [Submitted on 20 Jan 2026] Title:Integrity from Algebraic Manipulation Detection in Trusted-Repeater QKD Networks Authors:Ailsa Robertson, Christian Schaffner, Sebastian R. Verschoor View a PDF of the paper titled Integrity from Algebraic Manipulation Detection in Trusted-Repeater QKD Networks, by Ailsa Robertson and 1 other authors View PDF HTML (experimental) Abstract:Quantum Key Distribution (QKD) allows secure communication without relying on computational assumptions, but can currently only be deployed over relatively short distances due to hardware constraints. To extend QKD over long distances, networks of trusted repeater nodes can be used, wherein QKD is executed between neighbouring nodes and messages between non-neighbouring nodes are forwarded using a relay protocol. Although these networks are being deployed worldwide, no protocol exists which provides provable guarantees of integrity against manipulation from both external adversaries and corrupted intermediates. In this work, we present the first protocol that provably provides both confidentiality and integrity. Our protocol combines an existing cryptographic technique, Algebraic Manipulation Detection (AMD) codes, with multi-path relaying over trusted repeater networks. This protocol achieves Information Theoretic Security (ITS) against the detection of manipulation, which we prove formally through a sequence of games. Subjects: Quantum Physics (quant-ph); Cryptography and Security (cs.CR) Cite as: arXiv:2602.00069 [quant-ph] (or arXiv:2602.00069v1 [quant-ph] for this version) https://doi.org/10.48550/arXiv.2602.00069 Focus to learn more arXiv-issued DOI via DataCite (pending registration) Submission history From: Ailsa Robertson [view email] [v1] Tue, 20 Jan 2026 15:44:56 UTC (42 KB) Full-text links: Access Paper: View a PDF of the paper titled Integrity from Algebraic Manipulation Detection in Trusted-Repeater QKD Networks, by Ailsa Robertson and 1 other authorsView PDFHTML (experimental)TeX Source view license Current browse context: quant-ph new | recent | 2026-02 Change to browse by: cs cs.CR References & Citations INSPIRE HEP NASA ADSGoogle Scholar Semantic Scholar export BibTeX citation Loading... BibTeX formatted citation × loading... Data provided by: Bookmark Bibliographic Tools Bibliographic and Citation Tools Bibliographic Explorer Toggle Bibliographic Explorer (What is the Explorer?) Connected Papers Toggle Connected Papers (What is Connected Papers?) Litmaps Toggle Litmaps (What is Litmaps?) scite.ai Toggle scite Smart Citations (What are Smart Citations?) Code, Data, Media Code, Data and Media Associated with this Article alphaXiv Toggle alphaXiv (What is alphaXiv?) Links to Code Toggle CatalyzeX Code Finder for Papers (What is CatalyzeX?) DagsHub Toggle DagsHub (What is DagsHub?) GotitPub Toggle Gotit.pub (What is GotitPub?) Huggingface Toggle Hugging Face (What is Huggingface?) Links to Code Toggle Papers with Code (What is Papers with Code?) ScienceCast Toggle ScienceCast (What is ScienceCast?) Demos Demos Replicate Toggle Replicate (What is Replicate?) Spaces Toggle Hugging Face Spaces (What is Spaces?) Spaces Toggle TXYZ.AI (What is TXYZ.AI?) Related Papers Recommenders and Search Tools Link to Influence Flower Influence Flower (What are Influence Flowers?) Core recommender toggle CORE Recommender (What is CORE?) Author Venue Institution Topic About arXivLabs arXivLabs: experimental projects with community collaborators arXivLabs is a framework that allows collaborators to develop and share new arXiv features directly on our website. Both individuals and organizations that work with arXivLabs have embraced and accepted our values of openness, community, excellence, and user data privacy. arXiv is committed to these values and only works with partners that adhere to them. Have an idea for a project that will add value for arXiv's community? Learn more about arXivLabs. Which authors of this paper are endorsers? | Disable MathJax (What is MathJax?)

Read Original

Tags

quantum-cryptography

Source Information

Source: arXiv Quantum Physics