Cryptographic Protocols

Quantum Cryptographic
Protocols

Quantum key distribution has dominated the public conversation, but it is only one application of quantum information to cryptography. Quantum digital signatures, oblivious transfer, coin flipping, commitment schemes, and device-independent protocols each solve distinct cryptographic problems with information-theoretic security guarantees that are impossible classically. Several of these have now been experimentally demonstrated on real networks.

Quantum Digital Signatures Oblivious Transfer Coin Flipping Bit Commitment Device Independence Conjugate Coding Impossibility Results

The Broader Landscape of Quantum Cryptographic Protocols

The term “quantum cryptography” is often used as a synonym for QKD, but the field encompasses a far richer set of primitives. QKD addresses one problem: securely distributing a shared secret key between two parties who trust each other but distrust the channel. Many cryptographic tasks involve parties who partially distrust each other, operate in multi-party settings, or need security guarantees beyond confidentiality.

Two types of quantum advantage: Quantum protocols can improve on classical alternatives in two distinct ways. First, they can achieve information-theoretic (unconditional) security for tasks where only computational security is classically achievable — such as digital signatures. Second, they can achieve tasks that are provably impossible with any classical protocol, even with computational assumptions — such as certain coin-flipping protocols with bounded bias.

The conjugate coding root: Most quantum cryptographic constructions trace back to Stephen Wiesner's 1968 manuscript on conjugate coding — the idea of encoding classical bits in non-orthogonal quantum states drawn from two conjugate bases. No-cloning prevents an adversary from copying these states; measurement in the wrong basis disturbs them. Conjugate coding underlies QKD, quantum money, quantum oblivious transfer reductions, and the first quantum digital signature proposals.

QUANTUM CRYPTOGRAPHIC PROTOCOL LANDSCAPE Information-theoretic Computational ←————— SECURITY TYPE —————→ Deployed Experimental Theoretical FEASIBILITY QKD BB84, E91 Global networks Quantum Digital Sigs 8-user network demo (2022) MDI-QDS over 200km Coin Flipping Bias ≥ 1/√2−1 (classical) Quantum: bounded below Oblivious Transfer Secure under bounded quantum storage model Bit Commitment Impossible (plain model) Device- Independent Protocols Bell inequality based Loophole-free expts (2015+) Quantum Money Original Wiesner (1968) No practical scheme yet Delegated QC / VBQC Verifiable blind quantum computation; near-term Deployed Experimental Theoretical Impossible (plain model)
The quantum cryptographic protocol landscape mapped by security type (horizontal: information-theoretic to computational) and feasibility (vertical: deployed to theoretical). QKD and quantum digital signatures have been experimentally deployed. Oblivious transfer is achievable under bounded-storage assumptions. Bit commitment is provably impossible in the plain model without setup. Device-independent protocols require the most demanding experimental conditions but offer the strongest security guarantees.
Star-topology chip-based quantum digital signature network schematic showing end-users with transmitter chips connected via optical switch to integrated measurement units
Schematic of a chip-based quantum digital signature (QDS) network with star topology (Du et al., Light: Science & Applications, 2025). Each user holds a compact photonic transmitter chip; quantum states route through an optical switch to shared integrated measurement units (IMUs). This architecture achieved QDS over 200 km of fibre with a signature rate of 0.04 signed bits per second for 1 Mbit messages — the current state-of-the-art for chip-integrated QDS. The star topology dramatically reduces the number of quantum links required compared to fully connected networks. Source: Du et al. — Chip-integrated quantum signature network over 200 km, Light: Science & Applications (2025)

How Quantum Digital Signatures Work

Classical digital signatures (RSA, ECDSA) derive their security from computational hardness assumptions: forgery requires factoring or solving discrete logarithms, which is computationally infeasible classically but not quantum-mechanically. Quantum digital signatures (QDS) derive security from physical principles: the no-cloning theorem and the indistinguishability of non-orthogonal quantum states prevent forgery regardless of computational power.

Core design principle: The original Gottesman-Chuang QDS scheme (2001) had the signer distribute quantum public keys — many copies of a fixed quantum state — to all recipients. No-cloning prevented forgery. However, this required long-term quantum memory to store the public keys, which was the main barrier to practicality. The breakthrough was the realisation (Dunjko, Wallden, Kent, Andersson, 2014) that the quantum exchange phase and the signing phase could be separated, with authentication using classical symmetric keys derived from the quantum channel — eliminating the quantum memory requirement entirely.

Security guarantees: A QDS scheme provides: (1) unforgeability — no third party can forge a valid signature; (2) non-repudiation — the signer cannot deny having signed a message; (3) transferability — a verified signature can be forwarded to a third party who can also verify it. All three hold information-theoretically — no assumptions about computational hardness are needed.

Field test: A measurement-device-independent QDS (MDI-QDS) protocol was demonstrated over a 200-square-kilometre metropolitan network (Yin et al. 2017), signing binary messages with security level ~10⁻⁷. MDI protocols are immune to detector side-channel attacks — a major vulnerability class in QKD implementations — by routing all measurements through an untrusted relay.

Quantum oblivious transfer protocol: Alice sends two messages, Bob receives exactly one without Alice learning which
1-out-of-2 Oblivious Transfer (OT): Alice holds two messages M0 and M1. Bob chooses a bit b and receives Mb, while (a) Alice learns nothing about b, and (b) Bob learns nothing about M1−b. OT is a universal primitive for two-party and multi-party computation: any secure computation protocol can be constructed from OT. Quantum OT achieves information-theoretic security under bounded quantum storage assumptions. Protocol steps adapted from: Gonçalves et al. — Quantum Oblivious Transfer: A Short Review, Entropy (2022)

Why OT Matters and How Quantum Helps

Oblivious transfer is the most important primitive in secure multi-party computation: Kilian (1988) proved that any two-party secure computation can be implemented given a single OT oracle. If OT is secure, then general secure computation — private set intersection, private voting, genome analysis on encrypted data, secure auctions — becomes achievable. Classical OT requires computational hardness assumptions (e.g., RSA or DH). A computationally unbounded adversary (or a future quantum computer) breaks all classical OT constructions.

The quantum impossibility: Naively one might hope for information-theoretically secure quantum OT, but this is impossible in the plain model. The same mathematical argument that rules out quantum bit commitment (Mayers 1996, Lo-Chau 1997) implies that quantum OT is also impossible information-theoretically without setup assumptions. This is one of the fundamental impossibility results of quantum cryptography.

The bounded quantum storage model: Damgård, Fehr, Salvail, and Schaffner (2005) showed that OT becomes information-theoretically secure if the adversary's quantum memory is bounded — specifically, if the adversary cannot store more than some fraction of the transmitted qubits. This assumption is physically motivated: quantum memories decohere rapidly, and adversaries cannot store billions of qubits. Under this assumption, simple protocols transmitting n qubits achieve security if the adversary can store fewer than n/2 qubits. No computational hardness is required.

Conjugate coding reduction: In the quantum world, bit commitment and OT are information-theoretically equivalent (BC ⇒ OT), which is a strictly quantum phenomenon — classically, bit commitment does not imply OT. This equivalence means that any commitment scheme constructed from quantum mechanics directly yields an OT protocol, and vice versa.

Quantum Coin Flipping — A Bounded But Not Perfect Advantage

Coin flipping allows two mistrustful parties to agree on a random bit without a trusted third party. In the classical setting, it is impossible to construct a fair coin-flipping protocol with information-theoretic security: a dishonest party can always bias the outcome toward their preferred result with probability greater than 1/2.

The quantum situation: Quantum coin flipping cannot achieve perfect fairness either — a result proven by Lo and Chau (1998) using teleportation. However, quantum protocols can guarantee that no party can bias the outcome with probability greater than 1/√2 ≈ 0.707. This is a strict improvement over the classical bound of 1/2 + some advantage. Quantum coin flipping protocols achieving bias exactly 1/√2 − 1 ≈ 0.207 exist but are difficult to implement practically.

Practical realisation: The bounded bias translates to partial but meaningful protection: even a cheating party cannot guarantee their preferred outcome. This has applications in secure protocol initiation and fair scheduling. Experimental demonstrations have been performed over fibre channels in controlled settings.

Quantum Bit Commitment — The Canonical Impossibility

Bit commitment requires a committer to “lock in” a bit value that they reveal later, while (1) the receiver cannot learn the bit before reveal (hiding), and (2) the committer cannot change the bit after committing (binding). Both properties together make commitment a building block for zero-knowledge proofs, secure two-party computation, and e-voting.

The impossibility: Mayers (1996) and Lo and Chau (1997) independently proved that unconditionally secure quantum bit commitment is impossible in the plain model — without trusted setup. Any protocol that is perfectly hiding can be made non-binding by the committer, because the committer can use quantum entanglement to maintain a superposition over committed values and retroactively choose which bit to reveal. This result — often called the Mayers-Lo-Chau impossibility — was a significant setback for early quantum cryptography.

Workarounds: Commitment becomes achievable with: (a) computational assumptions (one-way functions suffice classically; quantum one-way functions suffice in QROM), (b) bounded quantum storage — if the receiver cannot store too many qubits, their ability to distinguish between committed values is limited, (c) trusted setup (common reference string), or (d) relativistic constraints — exploiting the speed-of-light to prevent the committer from signalling between commit and reveal phases. Relativistic bit commitment has been experimentally demonstrated over intercontinental distances.

Bell Inequalities as a Security Foundation

Standard quantum cryptographic protocols assume the parties trust their own devices: the source produces the states it claims, the detectors measure correctly, and the random number generators are unbiased. Device-independent (DI) protocols replace all these assumptions with a single testable condition: that the observed measurement statistics violate a Bell inequality, which is impossible for any local hidden variable theory.

Why this matters for QKD: In device-independent QKD (DI-QKD), Alice and Bob share entangled states from an untrusted source and perform measurements using untrusted detectors. The only assumption is that their labs are causally isolated (no side-channel from one lab to the other) and that quantum mechanics holds. A loophole-free Bell test certifies that genuine entanglement was shared, which in turn certifies randomness and security of the key. This closes the gap between theoretical security proofs (which assume ideal devices) and real implementations (which may have exploitable physical imperfections).

Experimental status: The three loophole-free Bell tests of 2015 (Delft, NIST, Vienna) were milestones. DI-QKD was experimentally demonstrated in 2022 by three independent groups, achieving modest but positive key rates over short distances. The primary challenge is efficiency: DI-QKD requires very high detection efficiencies (~90%+) to close the detection loophole, and current experiments achieve key generation at rates of bits per second over short distances — far from commercially viable.

PROTOCOL EVALUATION — EFFICIENCY, FEASIBILITY, SECURITY PROTOCOL SECURITY BASIS EXPERIMENTAL STATUS RATE / EFFICIENCY KEY LIMITATION READINESS QKD (BB84/E91) Reference baseline Info-theoretic ✓ Commercially deployed Toshiba, ID Quantique, QCN5-100 kbps–Mbps over 100–500 km Trusted nodes; authentication ✓ Mature Quantum Digital Sigs No-cloning + QKD Info-theoretic ✓ 8-user network (2022) MDI-QDS over 200km (2017) Tied to QKD rate bits/second (short msg) Low rate; authentication key needed ~ Near-term Quantum OT Bounded storage model Info-theoretic (bounded mem) Lab demonstrations No field deployment yet O(n) qubits transmitted for n-bit string OT Requires adversary mem. assumption ~ Research Quantum Coin Flipping Entanglement / no-clone Info-theoretic (bounded bias) Fibre experiments demonstrated km scale Modest comm. overhead Cannot achieve perfect fairness ~ Research DI-QKD Bell violation only Info-theoretic + device-independent 3 demonstrations (2022) bits/s, very short distance Extremely low rate Requires ≥90% detector efficiency ⚠ Early Rate/efficiency comparisons are approximate; highly dependent on channel distance, hardware platform, and error rate
A comparison of five major quantum cryptographic protocols by their security basis, experimental maturity, achievable rates, and primary limitations. QKD and QDS are the most deployment-ready. Quantum OT and coin flipping are experimentally demonstrated but not commercially available. DI-QKD has been demonstrated but faces severe efficiency challenges before it can scale.
📡

Channel Requirements

QDS and quantum OT inherit QKD's infrastructure needs: low-loss fibre or free-space channels, single-photon sources and detectors, authenticated classical channels. MDI protocols relax device trust assumptions but require an untrusted relay with very high-performance detectors. DI protocols require channel-independent Bell tests, demanding near-perfect detectors that are currently only achievable in lab settings over short distances.

🔄

Rate vs. Security Trade-off

All quantum cryptographic protocols face a fundamental trade-off: stronger security assumptions yield lower communication rates. Fully device-independent protocols achieve bits per second. Standard QKD achieves megabits per second. QDS rates are tied to the QKD rate of the slowest link. For practical deployment, QDS signatures are viable for short messages (contracts, authentication tokens); high-bandwidth secure communication remains the domain of QKD combined with symmetric encryption.

🧱

Network Architecture

Moving from two-party to multi-party protocols introduces significant overhead. The 8-user QDS demonstration required a fully connected network with O(n²) quantum links. Scalable architectures use untrusted relays (star topology) or trusted nodes. Measurement-device-independent protocols allow the relay to be completely untrusted, but each additional party increases the classical post-processing complexity. Quantum networks at city scale are currently operational in Tokyo, Beijing, Geneva, and Cambridge (UK), providing the infrastructure needed for QDS deployment.

🔧

The Authentication Bootstrap

A subtle but fundamental requirement: all quantum cryptographic protocols — including QKD — require an authenticated classical channel to prevent man-in-the-middle attacks. Authentication requires a pre-shared secret key. QKD can refresh this key, but cannot create it from nothing. This creates a bootstrapping problem that must be solved through trusted initial key exchange (physically secure courier, pre-shared secrets) before the quantum protocol begins. Device-independent protocols relax this requirement, but not completely.

The quantum-classical divide in practice: The protocols described here offer information-theoretic security — unconditional guarantees that hold regardless of adversarial computational power, including future quantum computers. This is categorically stronger than the computational security offered by post-quantum cryptographic algorithms like Kyber and Dilithium. However, PQC algorithms are vastly more efficient and compatible with existing network infrastructure. The practical path is not to choose one over the other: QDS and QKD address long-term data integrity and key distribution; PQC handles the asymmetric cryptography that protects 99% of today's internet. A robust quantum-safe architecture will combine both.