{"id":"https://openalex.org/W4417086686","doi":"https://doi.org/10.48550/arxiv.2512.04429","title":"Combined Quantum and Post-Quantum Security Performance Under Finite Keys","display_name":"Combined Quantum and Post-Quantum Security Performance Under Finite Keys","publication_year":2025,"publication_date":"2025-12-04","ids":{"openalex":"https://openalex.org/W4417086686","doi":"https://doi.org/10.48550/arxiv.2512.04429"},"language":null,"primary_location":{"id":"pmh:oai:arXiv.org:2512.04429","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2512.04429","pdf_url":"https://arxiv.org/pdf/2512.04429","source":{"id":"https://openalex.org/S4393918464","display_name":"ArXiv.org","issn_l":"2331-8422","issn":["2331-8422"],"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},"type":"preprint","indexed_in":["arxiv","datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/2512.04429","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5030741117","display_name":"Aman Gupta","orcid":"https://orcid.org/0000-0001-7323-296X"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Gupta, Aman","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5016396942","display_name":"R.S. Adhikari","orcid":"https://orcid.org/0000-0001-9022-5833"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Adhikari, Ravi Singh","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102978926","display_name":"Anju Rani","orcid":"https://orcid.org/0000-0001-7834-6894"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Rani, Anju","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5040065448","display_name":"Xiaoyu Ai","orcid":"https://orcid.org/0000-0001-9970-0290"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Ai, Xiaoyu","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5024845170","display_name":"Robert Malaney","orcid":"https://orcid.org/0000-0001-9672-5601"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Malaney, Robert","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5030741117"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10020","display_name":"Quantum Information and Cryptography","score":0.7626000046730042,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10020","display_name":"Quantum Information and Cryptography","score":0.7626000046730042,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10682","display_name":"Quantum Computing Algorithms and Architecture","score":0.0340999998152256,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.029600000008940697,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/quantum-key-distribution","display_name":"Quantum key distribution","score":0.6898000240325928},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5601999759674072},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5245000123977661},{"id":"https://openalex.org/keywords/novelty","display_name":"Novelty","score":0.4593999981880188},{"id":"https://openalex.org/keywords/sequence","display_name":"Sequence (biology)","score":0.4278999865055084},{"id":"https://openalex.org/keywords/limit","display_name":"Limit (mathematics)","score":0.41530001163482666},{"id":"https://openalex.org/keywords/hybrid-system","display_name":"Hybrid system","score":0.41119998693466187},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.38929998874664307},{"id":"https://openalex.org/keywords/cryptographic-primitive","display_name":"Cryptographic primitive","score":0.3799999952316284}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7360000014305115},{"id":"https://openalex.org/C95466800","wikidata":"https://www.wikidata.org/wiki/Q1027298","display_name":"Quantum key distribution","level":3,"score":0.6898000240325928},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5601999759674072},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5245000123977661},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.47929999232292175},{"id":"https://openalex.org/C2778738651","wikidata":"https://www.wikidata.org/wiki/Q16546687","display_name":"Novelty","level":2,"score":0.4593999981880188},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.44209998846054077},{"id":"https://openalex.org/C2778112365","wikidata":"https://www.wikidata.org/wiki/Q3511065","display_name":"Sequence (biology)","level":2,"score":0.4278999865055084},{"id":"https://openalex.org/C151201525","wikidata":"https://www.wikidata.org/wiki/Q177239","display_name":"Limit (mathematics)","level":2,"score":0.41530001163482666},{"id":"https://openalex.org/C50897621","wikidata":"https://www.wikidata.org/wiki/Q2665508","display_name":"Hybrid system","level":2,"score":0.41119998693466187},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.38929998874664307},{"id":"https://openalex.org/C15927051","wikidata":"https://www.wikidata.org/wiki/Q246593","display_name":"Cryptographic primitive","level":4,"score":0.3799999952316284},{"id":"https://openalex.org/C71745522","wikidata":"https://www.wikidata.org/wiki/Q2476929","display_name":"Confidentiality","level":2,"score":0.3783000111579895},{"id":"https://openalex.org/C144901912","wikidata":"https://www.wikidata.org/wiki/Q471906","display_name":"Quantum cryptography","level":4,"score":0.35929998755455017},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3346000015735626},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.32989999651908875},{"id":"https://openalex.org/C47191418","wikidata":"https://www.wikidata.org/wiki/Q3510462","display_name":"Information-theoretic security","level":3,"score":0.32850000262260437},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.31130000948905945},{"id":"https://openalex.org/C84114770","wikidata":"https://www.wikidata.org/wiki/Q46344","display_name":"Quantum","level":2,"score":0.30869999527931213},{"id":"https://openalex.org/C125411270","wikidata":"https://www.wikidata.org/wiki/Q18653","display_name":"Encoding (memory)","level":2,"score":0.29319998621940613},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.2896000146865845},{"id":"https://openalex.org/C147343967","wikidata":"https://www.wikidata.org/wiki/Q5159078","display_name":"Concrete security","level":3,"score":0.2890999913215637},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.2775000035762787},{"id":"https://openalex.org/C73468433","wikidata":"https://www.wikidata.org/wiki/Q1639918","display_name":"Hybrid cryptosystem","level":4,"score":0.27250000834465027},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.26510000228881836},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.25540000200271606},{"id":"https://openalex.org/C121822524","wikidata":"https://www.wikidata.org/wiki/Q5157582","display_name":"Computer security model","level":2,"score":0.25049999356269836}],"mesh":[],"locations_count":3,"locations":[{"id":"pmh:oai:arXiv.org:2512.04429","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2512.04429","pdf_url":"https://arxiv.org/pdf/2512.04429","source":{"id":"https://openalex.org/S4393918464","display_name":"ArXiv.org","issn_l":"2331-8422","issn":["2331-8422"],"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},{"id":"pmh:doi:10.48550/arxiv.2512.04429","is_oa":true,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4406922384","display_name":"Open MIND","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"publisher-specific-oa","license_id":"https://openalex.org/licenses/publisher-specific-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Article"},{"id":"doi:10.48550/arxiv.2512.04429","is_oa":true,"landing_page_url":"https://doi.org/10.48550/arxiv.2512.04429","pdf_url":null,"source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"pmh:oai:arXiv.org:2512.04429","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2512.04429","pdf_url":"https://arxiv.org/pdf/2512.04429","source":{"id":"https://openalex.org/S4393918464","display_name":"ArXiv.org","issn_l":"2331-8422","issn":["2331-8422"],"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320308204","display_name":"Northrop Grumman","ror":"https://ror.org/05kewds18"},{"id":"https://openalex.org/F4320315885","display_name":"Australian Government","ror":"https://ror.org/0314h5y94"},{"id":"https://openalex.org/F4320320965","display_name":"University of New South Wales","ror":"https://ror.org/03r8z3t63"}],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W4417086686.pdf"},"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Recent":[0],"advances":[1],"in":[2,61,126,130,148],"quantum-secure":[3],"communication":[4],"have":[5],"highlighted":[6],"the":[7,56,82,87,103,116,119,131,134,141,145,149,152,157,163],"value":[8],"of":[9,58,105,133,151,165],"hybrid":[10,25,59,73,93,153],"schemes":[11],"that":[12,101,155],"combine":[13],"Quantum":[14],"Key":[15],"Distribution":[16],"(QKD)":[17],"with":[18,162],"Post-Quantum":[19],"Cryptography":[20],"(PQC).":[21],"Yet":[22],"most":[23],"existing":[24],"designs":[26],"omit":[27],"realistic":[28],"finite-key":[29,79,136],"effects":[30],"on":[31],"QKD":[32,45,83,117],"key":[33],"rates":[34],"and":[35,46,85,108,118,144],"do":[36],"not":[37],"specify":[38],"how":[39],"to":[40,81,138],"maintain":[41],"security":[42,80,137],"when":[43,114],"both":[44,115],"PQC":[47,120],"primitives":[48,107,121,150],"leak":[49],"information":[50],"through":[51],"side-channels.":[52],"These":[53],"gaps":[54],"limit":[55],"applicability":[57],"systems":[60],"practical,":[62],"deployed":[63],"networks.":[64],"In":[65],"this":[66],"work,":[67],"we":[68],"advance":[69],"a":[70],"recently":[71],"proposed":[72],"QKD-PQC":[74],"system":[75,94,154],"by":[76],"integrating":[77],"tight":[78],"primitive":[84],"improving":[86],"design":[88,146],"for":[89,140],"better":[90],"scalability.":[91],"This":[92],"employs":[95],"an":[96],"information-theoretically":[97],"secure":[98],"instruction":[99],"sequence":[100],"determines":[102],"configurations":[104],"different":[106],"thus":[109],"ensures":[110],"message":[111],"confidentiality":[112],"even":[113],"are":[122],"compromised.":[123],"The":[124],"novelty":[125],"our":[127],"work":[128],"lies":[129],"implementation":[132],"tightest":[135],"date":[139],"BBM92":[142],"protocol":[143],"improvements":[147],"ensure":[156],"processing":[158],"time":[159],"scales":[160],"linearly":[161],"size":[164],"secret":[166],"instructions.":[167]},"counts_by_year":[],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-12-06T00:00:00"}
