Entanglement Distribution and Routing in Quantum Networks
Secure communication and distributed computing are fundamental to the future of cybersecurity. Quantum networks, built upon the principles of quantum mechanics, enable entanglement-based quantum key distribution (QKD), providing theoretically unbreakable encryption. Beyond QKD, entanglement distribution is crucial for secure distributed quantum computing, allowing multiple quantum processors to work together securely across a network. Additionally, robust entanglement distribution supports blind quantum computing, where a client can outsource quantum computations to a remote server while preserving data privacy, and enhances quantum-enhanced sensing, which improves measurement precision in distributed quantum systems.
At CEROC, we are pioneering novel approaches to entanglement distribution and routing to enhance the security and efficiency of quantum networks. Some of our recent contributions include:
- Entanglement Routing in a Space–Air–Ground Quantum (SPARQ) Network: We developed SPARQ, a quantum network that integrates space, aerial, and ground
nodes for seamless on-demand entanglement distribution. Unlike traditional
quantum networks that assume stationary ground nodes and homogeneous functionality,
SPARQ accommodates dynamic, heterogeneous nodes, posing unique routing challenges.
To address these challenges, we proposed a deep reinforcement learning (RL) framework
using deep Q-networks (DQN) for adaptive routing and introduced a third-party entanglement
distribution (TPED) policy. Our results demonstrated a 3% improvement in entanglement
fidelity and a 50% reduction in memory consumption. Additionally, our DQN-based routing
increased the number of resolved teleportation requests by 39% and improved entanglement
fidelity by up to 9% compared to state-of-the-art benchmarks. - Efficient and Secure Entanglement Distribution in Hybrid Classical-Quantum Networks: To address the limitations of near-
term quantum processors, we proposed an efficient entanglement distribution protocol
for hybrid classical-quantum networks with limited quantum links. Our protocol leverages
entanglement swapping and classical network coding to optimize resource usage, overcoming
bottlenecks while minimizing qubit and link consumption. Experimental results showed
that for small networks, the proposed protocol used 17% fewer qubit resources, improved
accuracy by 8.8%, and reduced simulation time by 35% compared to benchmarks, with
even greater improvements for larger networks. Additionally, we introduced a secure
entanglement distribution protocol using quantum state encoding through rotation,
reducing the probability of an attacker retrieving the teleported state to 7.2% without
adding communication overhead. - Designing a Regional Quantum Network in Tennessee (QNTN): We explored the feasibility of establishing a regional
quantum network interconnecting three quantum local area networks across Tennessee.
Our study compared two architectures: a satellite-based space-ground model and an
aerial-layer model using high-altitude platforms (HAPs). While the satellite-based
approach achieved 55.17% daily coverage and handled 57.75% of entanglement distribution
requests with an average fidelity of 0.96, the HAP-based architecture provided full-day
coverage, fulfilled 100% of requests, and achieved a higher fidelity of 0.98. However,
operational limitations such as weather sensitivity and maintenance requirements pose
challenges for HAPs, highlighting the trade-offs between different network architectures.
Our research at CEROC is driving the development of secure, scalable, and efficient quantum networks to support next-generation cybersecurity applications. By addressing the challenges of entanglement distribution and routing, we are laying the groundwork for a resilient and secure quantum Internet.
Applied Quantum Cryptography
With the rise of quantum computing, classical cryptographic systems face an imminent security threat. Quantum cryptography offers a solution by leveraging the principles of quantum mechanics to enable unconditionally secure communication. This field plays a crucial role in developing quantum key distribution (QKD) protocols, ensuring secure key exchange resistant to quantum attacks. Beyond QKD, quantum identity authentication (QIA) protocols provide a means to verify the legitimacy of communicating parties while preserving quantum security principles. Additionally, applied quantum cryptography contributes to secure multi-party computation, quantum-secure digital signatures, and post-quantum cryptographic integrations, all of which are critical for safeguarding next-generation communication networks, including 6G and the quantum Internet.
At CEROC, we are actively developing novel mechanisms to strengthen the security of quantum networks. Some of our recent contributions are:
- Quantum Identity Authentication Against Malicious Entanglements. As 6G networks evolve to support applications such as the metaverse, they require
robust security mechanisms to counter threats from quantum adversaries. While the
quantum
Internet enables highly secure communications through quantum entanglement, it also
introduces vulnerabilities, particularly when malicious quantum repeaters interfere
with entanglement distribution. In this work, we propose a quantum identity authentication
protocol designed to detect and mitigate malicious entanglements. Unlike existing
protocols that rely on periodic secret key refreshment, our approach eliminates this
requirement while maintaining strong security guarantees. Our simulation results show
that the proposed protocol can detect malicious entanglements with a 100% probability
after an average of just 4 authentication rounds. It reduces the number of authentication
rounds required to detect an attack by 69% and 76.5% compared to benchmark protocols.
By significantly enhancing efficiency and security in quantum authentication, our
research contributes to the development of trustworthy and attack-resilient quantum
networks, ensuring a secure foundation for future quantum-enabled applications. - Access Control in Quantum Networks via Quantum Controlled Teleportation (QCT): Quantum Controlled Teleportation (QCT) is a fundamental technique for the quantum
Internet, enabling quantum information transfer under the supervision
of a controller (e.g., Charlie), hence, providing access control in quantum networks.
Existing research has explored enhancing Charlie’s control level by improving the
fidelity of entanglement among communicating parties (Alice, Bob, and Charlie). In
this work, we propose a unified protocol that enhances Charlie's control level in
QCT networks, regardless of the entanglement technique or fidelity level. Our protocol
adopts quantum hiding techniques to strengthen security and control in quantum access
management. We analyze scenarios where Bob is compliant or non-compliant, demonstrating
the protocol's effectiveness. Our implementation via quantum circuits shows a 175%
increase in Charlie’s control level when applied to a low-fidelity entanglement technique
such as GHZ entanglement. Simulation results using IBM Quantum's QASM simulator confirm
a low reduction (2-7%) in successful teleportation rates, even in noisy environments.
Upgrading the Classical Cyber Layer of Critical Infrastructures to Accommodate Quantum Cryptography Protocols
As cyber threats become more sophisticated, critical infrastructures such as power systems, financial networks, and transportation grids face an increasing need for quantum-secure cryptographic solutions. However, transitioning entirely to fully quantum key distribution (QKD) networks is costly and impractical due to hardware limitations. Semi-quantum key distribution (Semi-QKD) offers a practical alternative by allowing only a subset of nodes to have full quantum capabilities, while the rest operate with limited quantum functionality. This hybrid approach enables unconditionally secure key exchanges while minimizing infrastructure upgrades.
At CEROC, we have explored strategies for optimally upgrading the cyber layer of power systems to support Semi-QKD, ensuring the secure encryption and decryption of critical measurement and control data. Some of our key contributions include:
- Greedy-Based Quantum Server Allocation for Secure Key Distribution: In this work, we investigate how to upgrade the cyber layer of power systems to support semi-quantum key distribution while minimizing the number of required quantum servers (nodes with full quantum capabilities). We formulate an optimal quantum server placement problem to ensure that the required key distribution rate is met even in the presence of cyber-attacks. Due to computational complexity, we develop a greedy algorithm for quantum server allocation. Testing on the IEEE 14-bus system demonstrates that our approach effectively satisfies the required key rate under various attack scenarios.
- Genetic Algorithm-Based Optimization for Quantum Server and Fiber Link Allocation: Building on our prior work, this
study extends the optimization problem to include both quantum server placement and
fiber link allocation. We formulate a binary optimization program to determine the
minimal required upgrades to support Semi-QKD. Given the complexity of the problem,
we design an optimal allocation strategy using a genetic algorithm. Testing on the
IEEE 14-bus and IEEE 39-bus systems, our results show: (i) A 33% and 67% reduction
in quantum server deployment for the IEEE 14-bus and 39-bus systems, respectively;
(ii) A 21% and 19% reduction in fiber link deployment compared to benchmarks; (iii)
A 52.17% and 54.65% reduction in overall infrastructure upgrades compared to standard
QKD deployment. - Optimizing Source Rates and Infrastructure Upgrades for Semi-QKD: Expanding upon previous findings, this work introduces an additional layer of optimization by considering optimal source rates for Semi-QKD. We refine our genetic algorithm-based strategy to minimize both quantum servers and fiber links while maintaining key rate requirements under attack scenarios. Our results indicate: (i) A 70% and 66.67% reduction in quantum server deployment for the IEEE 14-bus and 39-bus systems, respectively; (ii) A 31% and 17% reduction in fiber link deployment compared to benchmarks; (iii) An 80% and 97% reduction in required quantum server upgrades compared to full QKD implementation.
Quantum Machine Learning for Security Applications
Machine Learning (ML) and Artificial Intelligence (AI) techniques have become integral to modern security applications, including intrusion detection, malware classification, threat intelligence, and anomaly detection. As quantum computing advances, researchers are exploring its potential to enhance ML models for security applications, promising faster processing, improved pattern recognition, and higher resilience to adversarial attacks. However, the practical limits and vulnerabilities of Quantum Machine Learning (QML) remain underexplored, particularly in dynamic security environments where data distributions change over time—a phenomenon known as concept drift.
At CEROC, we have pioneered research on the effects of concept drift in QML models, assessing their resilience and adaptability compared to classical ML models. Some of our key contributions include:
- First Study on Concept Drift in Quantum Machine Learning: While quantum computing offers potential advancements in ML, the impact of concept drift in streaming data environments had not been explored before. We investigate the effects of concept drift on Quantum Support Vector Machines (QSVMs) and Quantum Neural Networks (QNNs), benchmarking them against their classical counterparts. Our study is based on two widely used streaming datasets: KDDCUP99 (a real-world cybersecurity dataset for intrusion detection) and RandomRBFDrift (a synthetic dataset with controlled drift patterns).
- Findings on Quantum Models' Susceptibility to Concept Drift: Our results reveal that quantum models are more
susceptible to concept drift than their classical counterparts when applied to the
KDDCUP99 dataset. This is evidenced by: (i) More severe drops in the prequential Area
Under the Curve (AUC) of the Receiver Operating Characteristics (ROC) curve; (ii)
Longer recovery durations for QML models after a drift event. Conversely, in the RandomRBFDrift
dataset, quantum models perform comparably to classical models, suggesting dataset-dependent
behavior. - Mitigation Strategy – Optimized Quantum Encoding for Concept Drift: To counteract the effects of concept drift, we propose a genetic algorithm-based optimization strategy for encoding classical data into quantum states. Our approach dynamically selects: (i) Optimal encoding methods (angle, amplitude, basis encoding); (ii) Circuit depth and repetitions to balance expressiveness and stability; (iii) Adaptive quantum feature mappings tailored to dataset characteristics. Our results show that the proposed strategy improves model accuracy by up to 5% in the presence of concept drift, demonstrating enhanced adaptability of QML models in dynamic environments.
Our studies provide the first comprehensive insights into concept drift in quantum machine learning and opens the door for future research on robust, adaptive QML models for security applications. By understanding and mitigating these limitations, we move closer to harnessing the full potential of quantum computing for next-generation cybersecurity defenses.
