pith. sign in

arxiv: 2604.09144 · v1 · submitted 2026-04-10 · 🪐 quant-ph · cs.NI

QuIKS: Near-Zero Latency Key Supply with Adaptive Buffering for Resource-Efficient Quantum Key Distribution Networks

Pith reviewed 2026-05-10 17:20 UTC · model grok-4.3

classification 🪐 quant-ph cs.NI
keywords quantum key distributionkey bufferinglatencyadaptive controlresource efficiencyQKD networksinstant key supply
0
0 comments X

The pith

QuIKS achieves near-zero latency quantum key supply by using an analytical model to minimize buffer sizes.

A machine-rendered reading of the paper's core claim, the machinery that carries it, and where it could break.

The paper introduces QuIKS to deliver instant keys for encryption in quantum key distribution networks without the high resource costs of prior methods. Existing buffering schemes require large key stores to avoid delays, which wastes resources and slows practical use. QuIKS creates an analytical model to calculate the smallest buffer that still ensures near-zero latency, then applies a two-phase algorithm to resize and manage the buffer based on live application demands and network state. Real testbed experiments confirm the approach keeps latency near zero while shrinking the buffer by more than ten times versus earlier designs. If the model and algorithm work as described, QKD networks could supply secure keys on demand with far less stored material.

Core claim

QuIKS is built upon a novel analytical model that determines the minimum buffer size required to guarantee near-zero-latency key supply performance. Guided by this model, QuIKS introduces a lightweight two-phase control algorithm that dynamically determines key relaying requests and adjusts the buffer size by probing real-time application patterns and network conditions. Experiments on a real QKD network testbed demonstrate that QuIKS achieves near-zero key supply latency while providing a more than 10-fold reduction in key buffer size compared to state-of-the-art schemes.

What carries the argument

The novel analytical model that calculates the minimum buffer size needed for near-zero latency key supply, combined with the lightweight two-phase control algorithm that adapts buffer size and relaying requests to real-time conditions.

If this is right

  • Applications in QKD networks can encrypt data immediately without waiting for new keys to be generated or relayed.
  • Total key resources consumed drop by more than an order of magnitude compared with heuristic buffering approaches.
  • The system continues to deliver information-theoretically secure keys while using smaller storage.
  • Dynamic adjustments respond to traffic changes without manual tuning or loss of security guarantees.
  • Network operators can support more simultaneous users or longer links with the same key-generation capacity.

Where Pith is reading between the lines

These are editorial extensions of the paper, not claims the author makes directly.

  • The same modeling approach could apply to other quantum network services that need low-latency cryptographic material.
  • Integration with traffic prediction techniques might further reduce the buffer size needed in practice.
  • Testing the scheme across larger metropolitan-scale QKD links would reveal how well the minimum-size prediction holds outside the lab.

Load-bearing premise

The analytical model correctly predicts the minimum buffer size needed to guarantee near-zero latency across real-time variations in application patterns and network conditions, and the two-phase control algorithm can adapt without adding prohibitive overhead or compromising security.

What would settle it

A measurement on the QKD testbed under changing application patterns and network loads that shows either noticeable key supply latency or a buffer size reduction well below 10 times would disprove the performance claims.

Figures

Figures reproduced from arXiv: 2604.09144 by Jian Li, Kaiping Xue, Lutong Chen, Ruidong Li, Yuxin Chen, Zhonghui Li, Zite Xia.

Figure 1
Figure 1. Figure 1: Performance of the buffer-enabled key supply schemes. [PITH_FULL_IMAGE:figures/full_fig_p003_1.png] view at source ↗
Figure 3
Figure 3. Figure 3: Implementation of the testbed and key buffering [PITH_FULL_IMAGE:figures/full_fig_p006_3.png] view at source ↗
Figure 5
Figure 5. Figure 5: Performance when application requests arrive as a [PITH_FULL_IMAGE:figures/full_fig_p007_5.png] view at source ↗
Figure 6
Figure 6. Figure 6: Buffer size per time slot when delay is 400 ms. 0 1 000 2000 3000 4000 5000 6000 0.0 1.6 3.2 4.8 6.4 8.0 9.6 0 50 1 00 1 50 200 250 300 30 40 50 60 70 80 0 50 1 00 1 50 200 250 300 350 C o u n t Buffer Size (Block) 60 70 80 90 1 00 11 0 0 50 1 00 1 50 200 250 300 350 C o u n t Buffer Size (Block) B u ffe r S i z e ( B l o c k ) B u ffe r S i z e ( K B y t e ) Time Slot 400ms (Poisson) 600ms (Poisson) [PIT… view at source ↗
Figure 9
Figure 9. Figure 9: Performance in the key-limited scenario. [PITH_FULL_IMAGE:figures/full_fig_p009_9.png] view at source ↗
read the original abstract

Quantum key distribution (QKD) networks provide information-theoretically secure keys for distant parties, emerging as a vital alternative to classical cryptography infrastructures threatened by quantum computing. In QKD networks, the immediacy of key supply service is crucial to the security and performance of applications, as their data must be encrypted before transmission. While key buffering can enable instant key supply services, existing schemes rely on heuristic solutions that incur prohibitive key resource consumption, thus significantly hindering practical deployment. To address this issue, we propose QuIKS, an instant key supply scheme based on adaptive buffering, offering the dominant advantage of near-zero key supply latency while consuming ultra-low key resources (i.e., ultra-low buffer size). Specifically, it is built upon a novel analytical model that determines the minimum buffer size required to guarantee near-zero-latency key supply performance. Guided by this model, QuIKS introduces a lightweight two-phase control algorithm that dynamically determines key relaying requests and adjusts the buffer size by probing real-time application patterns and network conditions. Experiments on a real QKD network testbed demonstrate that QuIKS achieves near-zero key supply latency while providing a more than 10-fold reduction in key buffer size compared to state-of-the-art schemes.

Editorial analysis

A structured set of objections, weighed in public.

Desk editor's note, referee report, simulated authors' rebuttal, and a circularity audit. Tearing a paper down is the easy half of reading it; the pith above is the substance, this is the friction.

Referee Report

2 major / 2 minor

Summary. The paper proposes QuIKS, a scheme for near-zero latency key supply in QKD networks via adaptive buffering. It relies on a novel analytical model to compute the minimum buffer size needed to guarantee the latency target and a lightweight two-phase control algorithm that dynamically sets key relaying requests and buffer size by probing real-time application patterns and network conditions. Testbed experiments on a real QKD network are reported to achieve near-zero latency together with more than a 10-fold reduction in buffer size relative to prior schemes.

Significance. If the analytical model is shown to be both correct and tight, and if the testbed results prove robust, the work would meaningfully lower the key-resource overhead that currently limits QKD network deployment for latency-sensitive applications while preserving information-theoretic security.

major comments (2)
  1. [Analytical Model section] The central claim rests on the novel analytical model for minimum buffer size, yet the manuscript provides no explicit derivation, list of assumptions, or proof that the computed size is both necessary and sufficient to guarantee near-zero latency under arbitrary real-time variations (see the model section and any associated equations). This is load-bearing for the performance and resource-efficiency assertions.
  2. [Experimental Results section] The experimental results section reports >10x buffer reduction and near-zero latency but supplies no error bars, number of independent trials, statistical significance tests, or explicit coverage of edge cases (e.g., sudden traffic bursts or link failures). Without these, the strength of the empirical support for the model and algorithm cannot be assessed.
minor comments (2)
  1. [Algorithm Description] Notation for the two-phase algorithm (e.g., variables denoting buffer thresholds and relaying triggers) should be defined once in a dedicated notation table or subsection to improve readability.
  2. [Abstract and Introduction] The abstract and introduction would benefit from a concise statement of the key assumptions underlying the analytical model (e.g., stationarity of traffic statistics over the adaptation window).

Simulated Author's Rebuttal

2 responses · 0 unresolved

We thank the referee for the constructive comments, which help strengthen the presentation of our analytical model and experimental validation. We address each major comment point by point below.

read point-by-point responses
  1. Referee: [Analytical Model section] The central claim rests on the novel analytical model for minimum buffer size, yet the manuscript provides no explicit derivation, list of assumptions, or proof that the computed size is both necessary and sufficient to guarantee near-zero latency under arbitrary real-time variations (see the model section and any associated equations). This is load-bearing for the performance and resource-efficiency assertions.

    Authors: We thank the referee for this observation. The model in Section 3 derives the minimum buffer size from a worst-case analysis of key consumption over the target latency window, using the relation B_min = max_rate * latency_target. However, we acknowledge that the full list of assumptions and a formal proof of necessity/sufficiency were not explicitly provided. In the revised manuscript we will add: (i) an enumerated list of assumptions (Poisson request arrivals, bounded key generation and relay delays, no correlated failures), (ii) the complete step-by-step derivation of the buffer-size formula, and (iii) a proof sketch showing necessity (via an adversarial traffic pattern that forces latency violation with any smaller buffer) and sufficiency (by demonstrating that the computed size keeps the virtual queue non-negative under the model). revision: yes

  2. Referee: [Experimental Results section] The experimental results section reports >10x buffer reduction and near-zero latency but supplies no error bars, number of independent trials, statistical significance tests, or explicit coverage of edge cases (e.g., sudden traffic bursts or link failures). Without these, the strength of the empirical support for the model and algorithm cannot be assessed.

    Authors: We agree that additional statistical rigor and edge-case coverage are needed. The original experiments were performed on the testbed, but the statistics were omitted. In the revision we will report: 15 independent trials per scenario with error bars (standard deviation), t-test p-values confirming the significance of the >10x buffer reduction, and new results for edge cases (5x sudden request-rate bursts and simulated 2-second link failures). In both edge cases the two-phase algorithm re-probes and adjusts the buffer within one control interval, preserving near-zero latency. revision: yes

Circularity Check

0 steps flagged

No significant circularity; novel model and testbed validation are self-contained

full rationale

The paper's core contribution is a newly introduced analytical model for minimum buffer size to achieve near-zero latency, plus a lightweight two-phase control algorithm that adapts based on real-time patterns. This model is presented as original rather than derived from prior fitted parameters or self-citations. Experiments on a physical QKD testbed provide independent validation of the latency and buffer-size claims. No load-bearing step reduces by construction to its own inputs, and the derivation chain does not rely on self-referential definitions or renamed known results.

Axiom & Free-Parameter Ledger

1 free parameters · 1 axioms · 0 invented entities

Only the abstract is available, so free parameters, axioms, and invented entities cannot be exhaustively listed. The work relies on standard QKD assumptions about key generation rates and network dynamics plus an ad-hoc analytical model whose parameters are tuned to observed patterns.

free parameters (1)
  • minimum buffer size parameters
    The analytical model determines minimum buffer size based on real-time patterns; specific fitted values or functional forms are not stated in the abstract.
axioms (1)
  • domain assumption Key generation and consumption rates can be modeled sufficiently accurately from observable network and application statistics
    Invoked to justify the analytical model and adaptive probing in the two-phase algorithm.

pith-pipeline@v0.9.0 · 5542 in / 1407 out tokens · 41215 ms · 2026-05-10T17:20:01.871952+00:00 · methodology

discussion (0)

Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.

Reference graph

Works this paper leans on

40 extracted references · 40 canonical work pages

  1. [1]

    Quantum cryptography: Public key distribution and coin tossing,

    C. H. Bennett and G. Brassard, “Quantum cryptography: Public key distribution and coin tossing,” inProceedings of IEEE International Conference on Computers Systems and Signal Processing, 1984, pp. 175–179

  2. [2]

    Unconditional security of quantum key distribution over arbitrarily long distances,

    H.-K. Lo and H. F. Chau, “Unconditional security of quantum key distribution over arbitrarily long distances,”Science, vol. 283, no. 5410, pp. 2050–2056, 1999

  3. [3]

    Security in quantum cryptography,

    C. Portmann and R. Renner, “Security in quantum cryptography,” Reviews of Modern Physics, vol. 94, no. 2, p. 025008, 2022

  4. [4]

    How to factor 2048 bit RSA integers in 8 hours using 20 million noisy qubits,

    C. Gidney and M. Eker ˚a, “How to factor 2048 bit RSA integers in 8 hours using 20 million noisy qubits,”Quantum, vol. 5, p. 433, 2021

  5. [5]

    Imper- sonation attack using quantum Shor’s algorithm against blockchain- based vehicular ad-hoc network,

    K. H. Shakib, M. Rahman, M. Islam, and M. Chowdhury, “Imper- sonation attack using quantum Shor’s algorithm against blockchain- based vehicular ad-hoc network,”IEEE Transactions on Intelligent Transportation Systems, 2025

  6. [6]

    Quantum cryptography in practice,

    C. Elliott, D. Pearson, and G. Troxel, “Quantum cryptography in practice,” inProceedings of ACM SIGCOMM, 2003, pp. 227–238

  7. [7]

    The SECOQC quantum key distribution network in Vienna,

    M. Peev, C. Pacher, R. All ´eaume, C. Barreiro, J. Bouda, W. Boxleitner, T. Debuisschert, E. Diamanti, M. Dianati, J. Dyneset al., “The SECOQC quantum key distribution network in Vienna,”New Journal of Physics, vol. 11, no. 7, p. 075001, 2009

  8. [8]

    Field test of quantum key distribution in the Tokyo QKD network,

    M. Sasaki, M. Fujiwara, H. Ishizuka, W. Klaus, K. Wakui, M. Takeoka, S. Miki, T. Yamashita, Z. Wang, A. Tanakaet al., “Field test of quantum key distribution in the Tokyo QKD network,”Optics Express, vol. 19, no. 11, pp. 10 387–10 409, 2011

  9. [9]

    An integrated space- to-ground quantum communication network over 4,600 kilometres,

    Y .-A. Chen, Q. Zhang, T.-Y . Chen, W.-Q. Cai, S.-K. Liao, J. Zhang, K. Chen, J. Yin, J.-G. Ren, Z. Chenet al., “An integrated space- to-ground quantum communication network over 4,600 kilometres,” Nature, vol. 589, no. 7841, pp. 214–219, 2021

  10. [10]

    Long-range QKD without trusted nodes is not possible with current technology,

    B. Huttner, R. All ´eaume, E. Diamanti, F. Fr ¨owis, P. Grangier, H. H¨ubel, V . Martin, A. Poppe, J. A. Slater, T. Spilleret al., “Long-range QKD without trusted nodes is not possible with current technology,”npj Quantum Information, vol. 8, no. 1, p. 108, 2022

  11. [11]

    The evolution of quantum key distribution networks: on the road to the Qinternet,

    Y . Cao, Y . Zhao, Q. Wang, J. Zhang, S. X. Ng, and L. Hanzo, “The evolution of quantum key distribution networks: on the road to the Qinternet,”IEEE Communications Surveys & Tutorials, vol. 24, no. 2, pp. 839–894, 2022

  12. [12]

    Entanglement-assisted quantum networks: mechanics, enabling technologies, challenges, and research directions,

    Z. Li, K. Xue, J. Li, L. Chen, R. Li, Z. Wang, N. Yu, D. S. L. Wei, Q. Sun, and J. Lu, “Entanglement-assisted quantum networks: mechanics, enabling technologies, challenges, and research directions,” IEEE Communications Surveys & Tutorials, vol. 25, no. 4, pp. 2133– 2189, 2023

  13. [13]

    In- tegration of quantum key distribution networks and classical networks: An evolution perspective,

    J. Li, P. Zheng, Z. Li, K. Xue, Z. Xie, N. Yu, Q. Sun, and J. Lu, “In- tegration of quantum key distribution networks and classical networks: An evolution perspective,”IEEE Network, vol. 39, no. 3, pp. 180–187, 2025

  14. [14]

    Experimental mode-pairing quantum key distribution surpassing the repeaterless bound,

    L. Zhang, W. Li, J. Pan, Y . Lu, W. Li, Z.-P. Li, Y . Huang, X. Ma, F. Xu, and J.-W. Pan, “Experimental mode-pairing quantum key distribution surpassing the repeaterless bound,”Physical Review X, vol. 15, no. 2, p. 021037, 2025

  15. [15]

    Figret: Fine-grained robustness- enhanced traffic engineering,

    X. Liu, S. Zhao, Y . Cui, and X. Wang, “Figret: Fine-grained robustness- enhanced traffic engineering,” inProceedings of ACM SIGCOMM, 2024, pp. 117–135

  16. [16]

    Algorithms for in-place, consistent network update,

    K. S. Namjoshi, S. Gheissi, and K. Sabnani, “Algorithms for in-place, consistent network update,” inProceedings of ACM SIGCOMM, 2024, pp. 244–257

  17. [17]

    Quantum network: Security assessment and key management,

    H. Zhou, K. Lv, L. Huang, and X. Ma, “Quantum network: Security assessment and key management,”IEEE/ACM Transactions on Network- ing, vol. 30, no. 3, pp. 1328–1339, 2022

  18. [18]

    Decentralized key management and service in quantum key distribution networks: An experimental implementation,

    J. Li, P. Zheng, Z. Li, Y . Yang, N. Yu, Q. Sun, and J. Lu, “Decentralized key management and service in quantum key distribution networks: An experimental implementation,”IEEE Journal on Selected Areas in Communications, vol. 43, no. 8, pp. 2782–2797, 2025

  19. [19]

    A novel approach to quality-of- service provisioning in trusted relay quantum key distribution networks,

    M. Mehic, P. Fazio, S. Rass, O. Maurhart, M. Peev, A. Poppe, J. Rozhon, M. Niemiec, and M. V oznak, “A novel approach to quality-of- service provisioning in trusted relay quantum key distribution networks,” IEEE/ACM Transactions on Networking, vol. 28, no. 1, pp. 168–181, 2019

  20. [20]

    Fast and secure routing algo- rithms for quantum key distribution networks,

    M. S. Akhtar, K. G, V . B, and A. Sinha, “Fast and secure routing algo- rithms for quantum key distribution networks,”IEEE/ACM Transactions on Networking, vol. 31, no. 5, pp. 2281–2296, 2023

  21. [21]

    Routing, channel, key-rate, and time-slot assignment for qkd in optical networks,

    Q. Zhang, O. Ayoub, A. Gatto, J. Wu, F. Musumeci, and M. Tornatore, “Routing, channel, key-rate, and time-slot assignment for qkd in optical networks,”IEEE Transactions on Network and Service Management, vol. 21, no. 1, pp. 148–160, 2023

  22. [22]

    An efficient and robust resource allocation method for quantum key distribution networks,

    P. Zheng, J. Li, Z. Li, K. Xue, N. Yu, R. Li, Q. Sun, and J. Lu, “An efficient and robust resource allocation method for quantum key distribution networks,”IEEE Transactions on Network and Service Management, vol. 22, no. 5, pp. 4083–4095, 2025

  23. [23]

    ROND: Rethinking overlay network design with underlay network awareness,

    Y . Zhang, H. Zhang, P. Cong, and W. Wang, “ROND: Rethinking overlay network design with underlay network awareness,”Proceedings of the ACM on Networking, vol. 2, no. CoNEXT2, pp. 1–22, 2024

  24. [24]

    KaaS: Key as a service over quantum key distribution integrated optical networks,

    Y . Cao, Y . Zhao, J. Wang, X. Yu, Z. Ma, and J. Zhang, “KaaS: Key as a service over quantum key distribution integrated optical networks,” IEEE Communications Magazine, vol. 57, no. 5, pp. 152–159, 2019

  25. [25]

    QKD key provisioning with multi-level pool slicing for end-to-end security services in optical networks,

    Q. Zhu, X. Yu, Y . Zhao, A. Nag, and J. Zhang, “QKD key provisioning with multi-level pool slicing for end-to-end security services in optical networks,”IEEE Transactions on Network Science and Engineering, vol. 11, no. 2, pp. 2153–2169, 2023

  26. [26]

    Dynamic-threshold-based pre-relaying for enhanced key allocation in quantum-secured networks,

    C. Stan, D. Verchere, J. J. V . Olmos, I. Tafur Monroy, and S. Rommel, “Dynamic-threshold-based pre-relaying for enhanced key allocation in quantum-secured networks,”Journal of Optical Communications and Networking, vol. 17, no. 3, pp. 233–248, 2025

  27. [27]

    Twin-field quantum key distribution with optical injection locking and phase encoding on-chip,

    H. Du, T. K. Paraiso, M. Pittaluga, Y . S. Lo, J. A. Dolphin, and A. J. Shields, “Twin-field quantum key distribution with optical injection locking and phase encoding on-chip,”Optica, vol. 11, no. 10, pp. 1385– 1390, 2024

  28. [28]

    Ultrabright entanglement based quantum key distribution over a 404 km optical fiber,

    S.-C. Zhuang, B. Li, M.-Y . Zheng, Y .-X. Zeng, H.-N. Wu, G.-B. Li, Q. Yao, X.-P. Xie, Y .-H. Li, H. Qinet al., “Ultrabright entanglement based quantum key distribution over a 404 km optical fiber,”Physical Review Letters, vol. 134, no. 23, p. 230801, 2025

  29. [29]

    Quantum key distribution networks - Functional architecture,

    “Quantum key distribution networks - Functional architecture,” International Telecommunication Union, 2020, Recommendation Y .3802, accessed on: Dec. 2025. [Online]. Available: https: //www.itu.int/rec/T-REC-Y .3802-202012-I/en

  30. [30]

    IPSeQ: A security-enhanced ipsec protocol integrated with quantum key distribution,

    X. Gao, K. Xue, J. Li, Z. Li, J. Wu, N. Yu, Q. Sun, and J. Lu, “IPSeQ: A security-enhanced ipsec protocol integrated with quantum key distribution,”IEEE Communications Magazine, vol. 63, no. 9, pp. 148–155, 2025

  31. [31]

    Enhanced network security protocols for the quantum era: Combining classical and post-quantum cryptography, and quantum key distribution,

    C. R. Garcia, A. C. Aguilera, C. Stan, J. J. Vegas, S. Rommel, and I. T. Monroy, “Enhanced network security protocols for the quantum era: Combining classical and post-quantum cryptography, and quantum key distribution,”IEEE Journal on Selected Areas in Communications, vol. 43, no. 8, pp. 2765–2781, 2025

  32. [32]

    Communication theory of secrecy systems,

    C. E. Shannon, “Communication theory of secrecy systems,”The Bell System Technical Journal, vol. 28, no. 4, pp. 656–715, 1949

  33. [33]

    Analysis of the public channel of quantum key distribution link,

    M. Mehic, O. Maurhart, S. Rass, D. Komosny, F. Rezac, and M. V oznak, “Analysis of the public channel of quantum key distribution link,”IEEE Journal of Quantum Electronics, vol. 53, no. 5, pp. 1–8, 2017

  34. [34]

    MadQCI: a heterogeneous and scalable SDN-QKD network deployed in production facilities,

    V . Martin, J. Brito, L. Ort ´ız, R. Mendez, J. Buruaga, R. Vicente, A. Se- basti´an-Lombra˜na, D. Rinc ´on, F. P ´erez, C. S ´anchezet al., “MadQCI: a heterogeneous and scalable SDN-QKD network deployed in production facilities,”npj Quantum Information, vol. 10, no. 1, p. 80, 2024

  35. [35]

    Quantum key distribution networks-key management: A survey,

    E. Dervisevic, A. Tankovic, E. Fazel, R. Kompella, P. Fazio, M. V oznak, and M. Mehic, “Quantum key distribution networks-key management: A survey,”ACM Computing Surveys, vol. 57, no. 10, pp. 1–36, 2025

  36. [36]

    An asynchronous key relay protocol design for large-scale quantum key distribution networks,

    Y . Chen, J. Li, Z. Li, K. Xue, N. Yu, Q. Sun, and J. Lu, “An asynchronous key relay protocol design for large-scale quantum key distribution networks,”IEEE Transactions on Networking, vol. 33, no. 6, pp. 3024– 3039, 2025

  37. [37]

    IC-QKD: An information-centric quantum key distribution network,

    Q. Zhang, O. Ayoub, J. Wu, X. Lin, and M. Tornatore, “IC-QKD: An information-centric quantum key distribution network,”IEEE Commu- nications Magazine, vol. 61, no. 12, pp. 148–154, 2023

  38. [38]

    Routing and photon source provisioning in quantum key distribution networks,

    S. Xu, Y . Zhao, L. Huang, and C. Qiao, “Routing and photon source provisioning in quantum key distribution networks,” inProceedings of IEEE Conference on Computer Communications (INFOCOM). IEEE, 2024, pp. 1411–1420

  39. [39]

    Compar- ison of distributed and centralized quantum key management systems for meshed QKD networks,

    M. Wenning, J. Berl, T. Fehenberger, and C. Mas-Machuca, “Compar- ison of distributed and centralized quantum key management systems for meshed QKD networks,”Journal of Optical Communications and Networking, vol. 17, no. 2, pp. A224–A233, 2025

  40. [40]

    Multi- path-based quasi-real-time key provisioning in quantum-key-distribution enabled optical networks (QKD-ON),

    X. Yu, X. Liu, Y . Liu, A. Nag, X. Zou, Y . Zhao, and J. Zhang, “Multi- path-based quasi-real-time key provisioning in quantum-key-distribution enabled optical networks (QKD-ON),”Optics Express, vol. 29, no. 14, pp. 21 225–21 239, 2021