Integration of Quantum Key Distribution with Classical Cryptographic Schemes: Enhancing Security in the Face of Post-Quantum Challenges
https://doi.org/10.55648/1998-6920-2025-19-2-98-111
Abstract
About the Authors
Elizar Filaretovich KustovRussian Federation
PhD student, Faculty of Information Security Technologies
Altana Felixovna Khutsaeva
Russian Federation
PhD student, Faculty of Information Security Technologies
Anastasia Pavlovna Kiryanova
Russian Federation
PhD student, Faculty of Information Security Technologies
Ivan Dmitrievich Ioganson
Russian Federation
PhD student, Faculty of Information Security Technologies
Jean-Michel Nikodemovich Dakuo
Russian Federation
PhD student, Faculty of Information Security Technologies
Sergey Valentinovich Bezzateev
Russian Federation
PhD, Professor, Head of the Department of Information Security, Institute of Cybernetic Systems, St. Petersburg University of Aerospace Instrumentation, director of Laboratory of Cryptographic methods for informationsecurity, FSIT
References
1. Lucamarini M. et al. Overcoming the rate–distance limit of quantum key distribution without quantum repeaters. Nature, 2018, vol. 557, no. 7705, pp. 400-403.
2. Lo H. K., Curty M., Qi B. Measurement-device-independent quantum key distribution. Physical review letters, 2012, vol. 108, no. 13, pp. 130503.
3. Zhang Y. et al. Long-distance continuous-variable quantum key distribution over 202.81 km of fiber. Physical review letters, 2020, vol. 125, no. 1, pp. 010502.
4. Dyer M. et al. On key storage in secure networks. Journal of Cryptology, 1995, vol. 8, pp. 189-200.
5. Mitchell C. J., Piper F. C. Key storage in secure networks. Discrete applied mathematics, 1988, vol. 21, no.3, pp. 215-228.
6. Sperner E. Ein satz über untermengen einer endlichen menge. Mathematische Zeitschrift, 1928, vol. 27,no. 1, pp. 544-548.
7. Chen S., Wei H. Constructions for key distribution patterns. Frontiers of Mathematics in China, 2017, vol. 12, pp. 301-323.
8. Adi S. How to share a secret. Commun. ACM, 1979, vol. 22, pp. 612-613.
9. Nakamoto S. Bitcoin: A peer-to-peer electronic cash system. 2008.
10. Mazur E. M. Raspredelennye sistemy hraneniya dannyh: analiz, klassifikaciya i vybor. Perspektivy razvitiya informacionnyh tekhnologij, 2015, no. 26, pp. 33-60.
11. Vashke ich A. M. Smart-kontrakty: chto, zachem i kak. М.: Simploer, 2018, vol. 89. Вестник СибГУТИ. Том 17. 2023. № 1 15
12. Wootters W. K., Zurek W. H. A single quantum cannot be cloned. Nature, 1982, vol. 299, no. 5886, pp. 802-803.
13. Ekert A. K. Quantum cryptography based on Bell’s theorem. Physical review letters, 1991, vol. 67, no. 6, pp. 661.
14. Gisin N. et al. Quantum cryptography. Reviews of modern physics, 2002, vol. 74, no. 1, pp. 145.
15. Golub G. H., Van Loan C. F. Matrix computations, 4th. Johns Hopkins, 2013.
16. Bennett C. H., Brassard G. Quantum cryptography: Public key distribution and coin tossing. Theoretical computer science, 2014, vol. 560, pp. 7-11.
17. Shannon C. E. Communication theory of secrecy systems. The Bell system technical journal, 1949, vol. 28,
18. no. 4, pp. 656-715.
Review
For citations:
Kustov E.F., Khutsaeva A.F., Kiryanova A.P., Ioganson I.D., Dakuo J.N., Bezzateev S.V. Integration of Quantum Key Distribution with Classical Cryptographic Schemes: Enhancing Security in the Face of Post-Quantum Challenges. The Herald of the Siberian State University of Telecommunications and Information Science. 2025;19(2):98-111. (In Russ.) https://doi.org/10.55648/1998-6920-2025-19-2-98-111