{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T03:22:27Z","timestamp":1772767347415,"version":"3.50.1"},"reference-count":47,"publisher":"MDPI AG","issue":"12","license":[{"start":{"date-parts":[[2024,12,16]],"date-time":"2024-12-16T00:00:00Z","timestamp":1734307200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Priority 2030 program at the National University of Science and Technology \u201cMISIS\u201d","award":["K1-2022-027"],"award-info":[{"award-number":["K1-2022-027"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Entropy"],"abstract":"<jats:p>We develop a novel key routing algorithm for quantum key distribution (QKD) networks that utilizes a distribution of keys between remote nodes, i.e., not directly connected by a QKD link, through multiple non-overlapping paths. This approach focuses on the security of a QKD network by minimizing potential vulnerabilities associated with individual trusted nodes. The algorithm ensures a balanced allocation of the workload across the QKD network links, while aiming for the target key generation rate between directly connected and remote nodes. We present the results of testing the algorithm on two QKD network models consisting of 6 and 10 nodes. The testing demonstrates the ability of the algorithm to distribute secure keys among the nodes of the network in an all-to-all manner, ensuring that the information-theoretic security of the keys between remote nodes is maintained even when one of the trusted nodes is compromised. These results highlight the potential of the algorithm to improve the performance of QKD networks.<\/jats:p>","DOI":"10.3390\/e26121102","type":"journal-article","created":{"date-parts":[[2024,12,16]],"date-time":"2024-12-16T10:08:53Z","timestamp":1734343733000},"page":"1102","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Routing Algorithm Within the Multiple Non-Overlapping Paths\u2019 Approach for Quantum Key Distribution Networks"],"prefix":"10.3390","volume":"26","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5760-441X","authenticated-orcid":false,"given":"Evgeniy O.","family":"Kiktenko","sequence":"first","affiliation":[{"name":"Laboratory of Quantum Information Technologies, National University of Science and Technology \u201cMISIS\u201d, Moscow 119049, Russia"}]},{"given":"Andrey","family":"Tayduganov","sequence":"additional","affiliation":[{"name":"Laboratory of Quantum Information Technologies, National University of Science and Technology \u201cMISIS\u201d, Moscow 119049, Russia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4722-3418","authenticated-orcid":false,"given":"Aleksey K.","family":"Fedorov","sequence":"additional","affiliation":[{"name":"Laboratory of Quantum Information Technologies, National University of Science and Technology \u201cMISIS\u201d, Moscow 119049, Russia"}]}],"member":"1968","published-online":{"date-parts":[[2024,12,16]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"145","DOI":"10.1103\/RevModPhys.74.145","article-title":"Quantum cryptography","volume":"74","author":"Gisin","year":"2002","journal-title":"Rev. Mod. Phys."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"1301","DOI":"10.1103\/RevModPhys.81.1301","article-title":"The security of practical quantum key distribution","volume":"81","author":"Scarani","year":"2009","journal-title":"Rev. Mod. Phys."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"595","DOI":"10.1038\/nphoton.2014.149","article-title":"Secure quantum key distribution","volume":"8","author":"Lo","year":"2014","journal-title":"Nat. Photonics"},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"303","DOI":"10.1137\/S0036144598347011","article-title":"Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer","volume":"41","author":"Shor","year":"1999","journal-title":"SIAM Rev."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"16025","DOI":"10.1038\/npjqi.2016.25","article-title":"Practical challenges in quantum key distribution","volume":"2","author":"Diamanti","year":"2016","journal-title":"npj Quantum Inf."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"24260","DOI":"10.1364\/OE.26.024260","article-title":"Large scale quantum key distribution: Challenges and solutions","volume":"26","author":"Zhang","year":"2018","journal-title":"Opt. Express"},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"5932","DOI":"10.1103\/PhysRevLett.81.5932","article-title":"Quantum Repeaters: The Role of Imperfect Local Operations in Quantum Communication","volume":"81","author":"Briegel","year":"1998","journal-title":"Phys. Rev. Lett."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"413","DOI":"10.1038\/35106500","article-title":"Long-distance quantum communication with atomic ensembles and linear optics","volume":"414","author":"Duan","year":"2001","journal-title":"Nature"},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1103\/RevModPhys.83.33","article-title":"Quantum repeaters based on atomic ensembles and linear optics","volume":"83","author":"Sangouard","year":"2011","journal-title":"Rev. Mod. Phys."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"60","DOI":"10.1038\/s41586-020-2103-5","article-title":"Experimental demonstration of memory-enhanced quantum communication","volume":"580","author":"Bhaskar","year":"2020","journal-title":"Nature"},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"063009","DOI":"10.1088\/1367-2630\/ab8aac","article-title":"Optical storage for 0.53 s in a solid-state atomic frequency comb memory using dynamical decoupling","volume":"22","author":"Etesse","year":"2020","journal-title":"New J. Phys."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"010303","DOI":"10.1103\/PRXQuantum.5.010303","article-title":"Telecom Networking with a Diamond Quantum Memory","volume":"5","author":"Bersin","year":"2024","journal-title":"PRX Quantum"},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"573","DOI":"10.1038\/s41586-024-07252-z","article-title":"Entanglement of nanophotonic quantum memory nodes in a telecom network","volume":"629","author":"Knaut","year":"2024","journal-title":"Nature"},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Elliott, C. (2004). The DARPA Quantum Network. arXiv.","DOI":"10.1201\/9781420026603.ch4"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"075001","DOI":"10.1088\/1367-2630\/11\/7\/075001","article-title":"The SECOQC quantum key distribution network in Vienna","volume":"11","author":"Peev","year":"2009","journal-title":"New J. Phys."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"123001","DOI":"10.1088\/1367-2630\/13\/12\/123001","article-title":"Long-term performance of the SwissQuantum quantum key distribution network in a field environment","volume":"13","author":"Stucki","year":"2011","journal-title":"New J. Phys."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"6540","DOI":"10.1364\/OE.17.006540","article-title":"Field test of a practical secure communication network with decoy-state quantum cryptography","volume":"17","author":"Chen","year":"2009","journal-title":"Opt. Express"},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"27217","DOI":"10.1364\/OE.18.027217","article-title":"Metropolitan all-pass and inter-city quantum communication network","volume":"18","author":"Chen","year":"2010","journal-title":"Opt. Express"},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"2454","DOI":"10.1364\/OL.35.002454","article-title":"Field test of wavelength-saving quantum key distribution network","volume":"35","author":"Wang","year":"2010","journal-title":"Opt. Lett."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"10387","DOI":"10.1364\/OE.19.010387","article-title":"Field test of quantum key distribution in the Tokyo QKD Network","volume":"19","author":"Sasaki","year":"2011","journal-title":"Opt. Express"},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"075002","DOI":"10.1088\/1367-2630\/11\/7\/075002","article-title":"Topological optimization of quantum key distribution networks","volume":"11","author":"Alleaume","year":"2009","journal-title":"New J. Phys."},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Tanizawa, Y., Takahashi, R., and Dixon, A.R. (2016, January 5\u20138). A routing method designed for a Quantum Key Distribution network. Proceedings of the 2016 Eighth International Conference on Ubiquitous and Future Networks (ICUFN), Vienna, Austria.","DOI":"10.1109\/ICUFN.2016.7537018"},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"22299","DOI":"10.1109\/ACCESS.2017.2763325","article-title":"Optimal Routing for Quantum Networks","volume":"5","author":"Caleffi","year":"2017","journal-title":"IEEE Access"},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"2350","DOI":"10.1080\/09500340.2017.1360956","article-title":"The QKD network: Model and routing scheme","volume":"64","author":"Yang","year":"2017","journal-title":"J. Mod. Opt."},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Ma, C., Guo, Y., and Su, J. (2017, January 25\u201326). A multiple paths scheme with labels for key distribution on quantum key distribution network. Proceedings of the 2017 IEEE 2nd Advanced Information Technology, Electronic and Automation Control Conference (IAEAC), Chongqing China.","DOI":"10.1109\/IAEAC.2017.8054476"},{"key":"ref_26","first-page":"024001","article-title":"The engineering of a scalable multi-site communications system utilizing quantum key distribution (QKD)","volume":"3","author":"Tysowski","year":"2018","journal-title":"Quantum Sci. Technol."},{"key":"ref_27","first-page":"96","article-title":"Quantum Key Distribution: A Networking Perspective","volume":"53","author":"Mehic","year":"2020","journal-title":"ACM Comput. Surv."},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Amer, O., Krawec, W.O., and Wang, B. (2020, January 12\u201316). Efficient Routing for Quantum Key Distribution Networks. Proceedings of the 2020 IEEE International Conference on Quantum Computing and Engineering (QCE), Denver, CO, USA.","DOI":"10.1109\/QCE49297.2020.00027"},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Chen, L., Zhang, Z., Zhao, M., Yu, K., and Liu, S. (2022). APR-QKDN: A Quantum Key Distribution Network Routing Scheme Based on Application Priority Ranking. Entropy, 24.","DOI":"10.3390\/e24111519"},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1007\/s11128-022-03825-x","article-title":"A quantum key distribution routing scheme for hybrid-trusted QKD network system","volume":"22","author":"Chen","year":"2023","journal-title":"Quantum Inf. Process."},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Bi, L., Miao, M., and Di, X. (2023). A Dynamic-Routing Algorithm Based on a Virtual Quantum Key Distribution Network. Appl. Sci., 13.","DOI":"10.3390\/app13158690"},{"key":"ref_32","unstructured":"Dervisevic, E., Tankovic, A., Fazel, E., Kompella, R., Fazio, P., Voznak, M., and Mehic, M. (2024). Quantum Key Distribution Networks\u2014Key Management: A Survey. arXiv."},{"key":"ref_33","first-page":"630506","article-title":"Demonstration of an active quantum key distribution network","volume":"Volume 6305","author":"Meyers","year":"2006","journal-title":"Proceedings of the Quantum Communications and Quantum Imaging IV"},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"24884","DOI":"10.1364\/OE.427804","article-title":"Optimizing the deployment of quantum key distribution switch-based networks","volume":"29","author":"Tayduganov","year":"2021","journal-title":"Opt. Express"},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"61","DOI":"10.3233\/JCS-2010-0373","article-title":"Security of trusted repeater quantum key distribution networks","volume":"18","author":"Salvail","year":"2010","journal-title":"J. Comput. Secur."},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"1328","DOI":"10.1109\/TNET.2021.3136943","article-title":"Quantum network: Security assessment and key management","volume":"30","author":"Zhou","year":"2022","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"934","DOI":"10.1364\/JOCN.457492","article-title":"Quantum network security dependent on the connection density between trusted nodes","volume":"14","author":"Gaidash","year":"2022","journal-title":"J. Opt. Commun. Netw."},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"020311","DOI":"10.1103\/PRXQuantum.3.020311","article-title":"Scalable authentication and optimal flooding in a quantum network","volume":"3","author":"Solomons","year":"2022","journal-title":"PRX Quantum"},{"key":"ref_39","first-page":"103581","article-title":"Analysis of multiple overlapping paths algorithms for secure key exchange in large-scale quantum networks","volume":"78","author":"Mielczarek","year":"2023","journal-title":"J. Inf. Secur. Appl."},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"134","DOI":"10.1038\/s41534-021-00474-3","article-title":"Implementation of a 46-node quantum metropolitan area network","volume":"7","author":"Chen","year":"2021","journal-title":"npj Quantum Inf."},{"key":"ref_41","doi-asserted-by":"crossref","unstructured":"Kirsanov, N.S., Pastushenko, V.A., Kodukhov, A.D., Yarovikov, M.V., Sagingalieva, A.B., Kronberg, D.A., Pflitsch, M., and Vinokur, V.M. (2023). Forty thousand kilometers under quantum protection. Sci. Rep., 13.","DOI":"10.1038\/s41598-023-35579-6"},{"key":"ref_42","doi-asserted-by":"crossref","unstructured":"Kirsanov, N., Pastushenko, V., Kodukhov, A., Aliev, A., Yarovikov, M., Strizhak, D., Zarubin, I., Smirnov, A., Pflitsch, M., and Vinokur, V. (2024). Loss Control-Based Key Distribution under Quantum Protection. Entropy, 26.","DOI":"10.20944\/preprints202403.0566.v1"},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"230503","DOI":"10.1103\/PhysRevLett.94.230503","article-title":"Beating the Photon-Number-Splitting Attack in Practical Quantum Cryptography","volume":"94","author":"Wang","year":"2005","journal-title":"Phys. Rev. Lett."},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"012326","DOI":"10.1103\/PhysRevA.72.012326","article-title":"Practical decoy state for quantum key distribution","volume":"72","author":"Ma","year":"2005","journal-title":"Phys. Rev. A"},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"012333","DOI":"10.1103\/PhysRevA.95.012333","article-title":"Improved key-rate bounds for practical decoy-state quantum-key-distribution systems","volume":"95","author":"Zhang","year":"2017","journal-title":"Phys. Rev. A"},{"key":"ref_46","doi-asserted-by":"crossref","first-page":"022316","DOI":"10.1103\/PhysRevA.96.022316","article-title":"Practical issues in decoy-state quantum key distribution based on the central limit theorem","volume":"96","author":"Trushechkin","year":"2017","journal-title":"Phys. Rev. A"},{"key":"ref_47","doi-asserted-by":"crossref","first-page":"88","DOI":"10.3367\/UFNe.2020.11.038882","article-title":"Security of the decoy state method for quantum key distribution","volume":"64","author":"Trushechkin","year":"2021","journal-title":"Physics-Uspekhi"}],"container-title":["Entropy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1099-4300\/26\/12\/1102\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T16:53:16Z","timestamp":1760115196000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1099-4300\/26\/12\/1102"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,16]]},"references-count":47,"journal-issue":{"issue":"12","published-online":{"date-parts":[[2024,12]]}},"alternative-id":["e26121102"],"URL":"https:\/\/doi.org\/10.3390\/e26121102","relation":{},"ISSN":["1099-4300"],"issn-type":[{"value":"1099-4300","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,12,16]]}}}