Papers
Topics
Authors
Recent
Search
2000 character limit reached

Topology-Hiding Connectivity-Assurance for QKD Inter-Networking

Published 2 Apr 2026 in cs.CR and quant-ph | (2604.01876v1)

Abstract: While QKD ensures information-theoretic security at the link level, real-world deployments depend on trusted repeaters, creating potential vulnerabilities. In this paper, we thus introduce a topology-hiding connectivity assurance protocol to enhance trust in quantum key distribution (QKD) network infrastructures. Our protocol allows network providers to jointly prove the existence of a secure connection between endpoints without revealing internal topology details. By extending graph-signature techniques to support multi-graphs and hidden endpoints, we enable zero-knowledge proofs of connectivity that ensure both soundness and topology hiding. We further discuss how our approach can certify, e.g., multiple disjoint paths, supporting multi-path QKD scenarios. This work bridges cryptographic assurance methods with the operational requirements of QKD networks, promoting verifiable and privacy-preserving inter-network connectivity.

Summary

  • The paper introduces a protocol leveraging zero-knowledge proofs and graph signatures to validate inter-network paths without revealing provider topologies.
  • The method employs Pedersen commitments and path padding to obscure node identities and actual hop counts while ensuring verifiable connectivity.
  • The protocol ensures soundness, topology hiding, and composability, offering a robust solution for secure, federated QKD inter-networking.

Topology-Hiding Connectivity Assurance for QKD Inter-Networking

Introduction and Motivation

Quantum Key Distribution (QKD) networks, despite guaranteeing information-theoretic security at the physical link layer, remain fundamentally constrained by their reliance on trusted intermediate nodes—so-called trusted repeaters. The presence of such repeaters introduces implicit trust dependencies; any compromise of a repeater along the key relay path breaks the end-to-end security semantics. As QKD infrastructure deployments expand beyond national silos to form interconnected, multi-provider, and potentially adversarial domains, the challenge emerges: users must be able to verify inter-network path availability and properties (e.g., path existence, hop count thresholds, disjointness) without learning sensitive internal topology information of competing providers.

The work "Topology-Hiding Connectivity-Assurance for QKD Inter-Networking" (2604.01876) presents a cryptographic protocol that allows independent QKD network providers to jointly, yet privately, prove the existence of an end-to-end connection. The proposed scheme extends and generalizes the committed graph signature paradigm to multigraphs with endpoint hiding and path length camouflaging, leveraging advanced zero-knowledge (ZK) proof techniques to deliver privacy-preserving connectivity attestations. Figure 1

Figure 1: Users are able to obtain cryptographic assurance about inter-network path availability without revealing the underlying network topology.

Technical Construction

Preliminaries and Building Blocks

The protocol is constructed atop the following cryptographic primitives:

  • MoniPoly-based Graph Signatures: A q-SDH–based signature scheme supporting signatures on committed graph structures, as described in [cryptoeprint:2020/1403], is extended from simple graphs to labeled, loop-augmented multigraphs.
  • Pedersen Commitments: For hiding node identities, perfectly hiding and computationally binding commitments are used, instantiated in prime order groups under the discrete log assumption.
  • Zero-Knowledge Proofs: Statements about path existence, node identifiers, and path padding are proven in ZK without revealing underlying secrets using the Camenisch-Stadler notation and efficient sigma protocols.

Topology-Hiding Protocol Overview

The proposed scheme proceeds in two major phases:

Phase 1: Network Topology Certification and Padding

Each network provider PP obtains from its respective certification authority (e.g., a governmental agency) a signature on its network topology, modeled as a multigraph GPG_P. To support path length hiding, for each boundary node, the provider computes the maximal shortest-path distance to any internal node (â„“P\ell_P) and pads each such node with â„“P\ell_P self-loops. This augmentation enables any real path of arbitrary (shorter) length to be padded with indistinguishable loops up to the certified bound, rendering the actual number of hops on the provider's internal segment information-theoretically hidden.

The resulting multigraph is signed using the q-SDH–based signature scheme, binding the committed topology to the provider's certified identity.

Phase 2: Zero-Knowledge Path Existence with Endpoint Hiding

In the online phase, to prove the existence of a path between endpoint SS (in domain AA) and DD (in domain BB):

  1. Providers locally compute per-domain shortest paths from endpoint to all boundary nodes.
  2. Providers execute a secure Multi-Party Computation (MPC) to jointly select a boundary node that minimizes total path costs, without revealing internal metrics.
  3. The selected boundary node is committed to (via Pedersen commitments), and the opening is shared under secure channels to establish consistency between providers.
  4. Each provider constructs a ZK proof that:
    • They possess a valid certified signature on their padded multigraph.
    • There exists a path from their domain's endpoint to the boundary node, of fixed (padded) length, using edges in the signed multigraph.
    • The boundary node identities used in both proofs are bound to the same commitments, ensuring a continuous path.
  5. The user (customer) verifies both ZK proofs; acceptance guarantees a connection exists as specified, without learning the internal structure, path length, or any auxiliary topology data from either provider.

Path Existence Proof in ZK

The core ZK proof employs pairing-based cryptography and encodes the existence of a path between two hidden nodes (or a public node and a hidden node) in the signed, padded multigraph. Padding with labeled loops ensures non-disclosure of exact path length. Commitment to endpoints and the use of joint openings guarantee atomicity across cross-domain paths, preventing adversaries from coupling information across multiple protocol runs.

Security Properties

The protocol achieves the following security targets:

  • Soundness: Adversarial providers cannot prove false path existence without forging a graph signature (assumed hard under q-SDH).
  • Topology Hiding: The protocol provably leaks no information on internal topology—neither the number of hops, internal node identities, nor edge labels outside what is inherent to the claim (i.e., the existence of a path of at most â„“\ell edges).
  • Unlinkability: Even across multiple sessions, providers cannot learn incremental topology information, due to the use of session-dependent pseudonyms and credentials.
  • Composability: The protocol naturally supports deployment scenarios where each provider may be certified by different authorities and does not require global naming aside from boundary nodes.

Extensions and Functionality

The construction admits nontrivial generalizations:

  • Multi-Path Guarantees: By encoding per-node random attributes and issuing session-bound pseudonyms, the protocol can be extended to give ZK proofs of kk disjoint paths for multipath QKD, increasing repeater trust robustness.
  • Quality Attribute Statements: Providers can additionally prove path properties (e.g., minimum bandwidth, certification level) if such attributes are committed per node/edge, yielding expressive path attestation policies.
  • Post-Quantum Considerations: The current protocol relies on number-theoretic hardness (q-SDH). An open problem is achieving comparable soundness with post-quantum primitives while preserving privacy and efficiency.

Practical and Theoretical Implications

This protocol realizes, for the first time, robust topology-hiding path claims across federated QKD domains. For practical QKD-as-a-service or multi-national QCI deployments, it enables network users to obtain cryptographically strong, auditor-certified assurance of service reachability without disclosing providers’ sensitive business or infrastructure data. This protects competitive interests while enabling operational transparency and trust.

From a theoretical perspective, the scheme demonstrates the applicability and flexibility of graph signature–based cryptographic certifications, and pushes the boundary of privacy-preserving, decentralized network attestation beyond conventional cloud and classical networking use cases.

Conclusion

A topology-hiding, ZK-based connectivity-assurance protocol for QKD inter-networking has been defined, analyzed, and instantiated with efficient pairing-based constructions. It achieves strong privacy and composability properties, aligning with both user security requirements and provider confidentiality. Future advancements may focus on realizing similar guarantees with quantum-secure primitives and scaling performance across realistic topologies. This work establishes a practical, deployable foundation for verifiable, privacy-preserving network assurance as QKD infrastructure matures and interconnects globally.

Paper to Video (Beta)

No one has generated a video about this paper yet.

Whiteboard

No one has generated a whiteboard explanation for this paper yet.

Collections

Sign up for free to add this paper to one or more collections.

Tweets

Sign up for free to view the 3 tweets with 0 likes about this paper.