https://doi.org/10.1140/epjqt/s40507-025-00350-5
Research
A critical analysis of deployed use cases for quantum key distribution and comparison with post-quantum cryptography
1
Department of Electrical Engineering, Eindhoven University of Technology, Flux Building, 5612 AZ, Eindhoven, The Netherlands
2
Department of Mathematics and Computer Science, Eindhoven University of Technology, MetaForum Building, 5612 AZ, Eindhoven, The Netherlands
3
Eindhoven Quantum Hub, Eindhoven University of Technology, Qubit Building, 5612 AZ, Eindhoven, The Netherlands
4
Informatics Institute, University of Amsterdam, Science Park 904, 1098 XH, Amsterdam, The Netherlands
Received:
31
January
2025
Accepted:
9
April
2025
Published online:
6
May
2025
Quantum Key Distribution (QKD) is currently being discussed as a technology to safeguard communication in a future where quantum computers compromise traditional public-key cryptosystems. In this paper, we conduct a comprehensive security evaluation of QKD-based solutions, focusing on real-world use cases sourced from academic literature and industry reports. We analyze these use cases, assess their security and identify the possible advantages of deploying QKD-based solutions. We further compare QKD-based solutions with Post-Quantum Cryptography (PQC), the alternative approach to achieving security when quantum computers compromise traditional public-key cryptosystems, evaluating their respective suitability for each scenario. Based on this comparative analysis, we critically discuss and comment on which use cases QKD is suited for, considering factors such as implementation complexity, scalability, and long-term security. Our findings contribute to a better understanding of the role QKD could play in future cryptographic infrastructures and offer guidance to decision-makers considering the deployment of QKD.
Key words: Quantum Key Distribution / Quantum communications / Quantum cryptography / Quantum Network / Use-cases / Post-Quantum Cryptography / Harvest-Now-Decrypt-Later attack
© The Author(s) 2025
Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article’s Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/.