Preview

The Herald of the Siberian State University of Telecommunications and Information Science

Advanced search

Integration of Quantum Key Distribution with Classical Cryptographic Schemes: Enhancing Security in the Face of Post-Quantum Challenges

https://doi.org/10.55648/1998-6920-2025-19-2-98-111

Abstract

The paper explores approaches to ensuring information security using quantum key
distribution (QKD) in combination with classical cryptographic schemes: the Blom scheme,
Key Distribution Pattern (KDP), and the Lagrange scheme. It demonstrates how quantum
technologies enhance the security and efficiency of these methods. The proposed schemes
provide resilience against attacks by both classical and quantum computers, addressing
vulnerabilities in traditional key generation methods. Examples of applications in secure IoT
networks, cloud computing, and distributed systems are discussed. The results show that the
combination of QKD with cryptographic schemes is a promising solution for the post-quantum era.

About the Authors

Elizar Filaretovich Kustov
"National Research University ITMO"
Russian Federation

PhD student, Faculty of Information Security Technologies



Altana Felixovna Khutsaeva
"National Research University ITMO"
Russian Federation

PhD student, Faculty of Information Security Technologies



Anastasia Pavlovna Kiryanova
"National Research University ITMO"
Russian Federation

PhD student, Faculty of Information Security Technologies



Ivan Dmitrievich Ioganson
"National Research University ITMO"
Russian Federation

PhD student, Faculty of Information Security Technologies



Jean-Michel Nikodemovich Dakuo
"National Research University ITMO"
Russian Federation

PhD student, Faculty of Information Security Technologies



Sergey Valentinovich Bezzateev
St. Petersburg University of Aerospace Instrumentation, Federal State Autonomous Educational Institution of Higher Education ”National Research University ITMO”
Russian Federation
PhD, Professor, Head of the Department of Information Security, Institute of Cybernetic Systems, St. Petersburg University of Aerospace Instrumentation, director of Laboratory of Cryptographic methods for informationsecurity, FSIT


References

1. Lucamarini M. et al. Overcoming the rate–distance limit of quantum key distribution without quantum repeaters. Nature, 2018, vol. 557, no. 7705, pp. 400-403.

2. Lo H. K., Curty M., Qi B. Measurement-device-independent quantum key distribution. Physical review letters, 2012, vol. 108, no. 13, pp. 130503.

3. Zhang Y. et al. Long-distance continuous-variable quantum key distribution over 202.81 km of fiber. Physical review letters, 2020, vol. 125, no. 1, pp. 010502.

4. Dyer M. et al. On key storage in secure networks. Journal of Cryptology, 1995, vol. 8, pp. 189-200.

5. Mitchell C. J., Piper F. C. Key storage in secure networks. Discrete applied mathematics, 1988, vol. 21, no.3, pp. 215-228.

6. Sperner E. Ein satz über untermengen einer endlichen menge. Mathematische Zeitschrift, 1928, vol. 27,no. 1, pp. 544-548.

7. Chen S., Wei H. Constructions for key distribution patterns. Frontiers of Mathematics in China, 2017, vol. 12, pp. 301-323.

8. Adi S. How to share a secret. Commun. ACM, 1979, vol. 22, pp. 612-613.

9. Nakamoto S. Bitcoin: A peer-to-peer electronic cash system. 2008.

10. Mazur E. M. Raspredelennye sistemy hraneniya dannyh: analiz, klassifikaciya i vybor. Perspektivy razvitiya informacionnyh tekhnologij, 2015, no. 26, pp. 33-60.

11. Vashke ich A. M. Smart-kontrakty: chto, zachem i kak. М.: Simploer, 2018, vol. 89. Вестник СибГУТИ. Том 17. 2023. № 1 15

12. Wootters W. K., Zurek W. H. A single quantum cannot be cloned. Nature, 1982, vol. 299, no. 5886, pp. 802-803.

13. Ekert A. K. Quantum cryptography based on Bell’s theorem. Physical review letters, 1991, vol. 67, no. 6, pp. 661.

14. Gisin N. et al. Quantum cryptography. Reviews of modern physics, 2002, vol. 74, no. 1, pp. 145.

15. Golub G. H., Van Loan C. F. Matrix computations, 4th. Johns Hopkins, 2013.

16. Bennett C. H., Brassard G. Quantum cryptography: Public key distribution and coin tossing. Theoretical computer science, 2014, vol. 560, pp. 7-11.

17. Shannon C. E. Communication theory of secrecy systems. The Bell system technical journal, 1949, vol. 28,

18. no. 4, pp. 656-715.


Review

For citations:


Kustov E.F., Khutsaeva A.F., Kiryanova A.P., Ioganson I.D., Dakuo J.N., Bezzateev S.V. Integration of Quantum Key Distribution with Classical Cryptographic Schemes: Enhancing Security in the Face of Post-Quantum Challenges. The Herald of the Siberian State University of Telecommunications and Information Science. 2025;19(2):98-111. (In Russ.) https://doi.org/10.55648/1998-6920-2025-19-2-98-111

Views: 80


Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.


ISSN 1998-6920 (Print)