Committed to connecting the world

  •  
Submarine cables

ITU-T work programme

[2025-2028] : [SG13] : [Q16/13]

[Declared patent(s)]  - [Associated work]

Work item: Y.QKDN-pkpe-fr
Subject/title: Quantum key distribution networks - Framework for proactive end-to-end key pre-establishment
Status: Under study 
Approval process: AAP
Type of work item: Recommendation
Version: New
Equivalent number: -
Timing: 2028-Q1 (Medium priority)
Liaison: ITU-T SG11, SG17
Supporting members: Beijing University of Posts and Telecommunications (BUPT); China Telecom; Nanjing University of Posts and Telecommunications (NJUPT); China Academy of Information and Communications Technology (CAICT).
Summary: QKD enables point-to-point key generation with information-theoretic security, however, due to fibre attenuation and device-related constraints, the distance over which QKD can stably generate keys is typically limited, making it difficult to directly satisfy the long-distance end-to-end key distribution requirements in cross-domain and cross-metropolitan scenarios. To enable large-scale deployment of QKDNs, current implementations commonly rely on mechanisms such as trusted relays, which perform hop-by-hop key relaying across multiple links to provide end-to-end key for services between non-adjacent nodes. On-demand key establishment approach may incur relatively high latency. Therefore, in certain special scenarios, such as time-sensitive networking, a proactive key pre-establishment approach is needed. Proactive key pre-establishment can apply different strategies to pre-establish keys between non-adjacent end-to-end nodes in the network in advance. When a service request arrives, if usable keys already exist between the source and destination nodes, they can be used immediately. This not only reduces the latency of establishing and delivering keys for the service, but also lowers the risk of single-point failures. To enable proactive key pre-established in QKDNs, this Recommendation specifies the overview, conceptual model, requirements, and operational procedures for proactive end-to-end key pre-establishment. Security considerations are not the scope of this Recommendation.
Comment: -
Reference(s):
  Historic references:
-
Contact(s):
Jingjing LIU, Editor
Xiaosong YU, Editor
Weiwen KONG, Editor
Yuan CAO, Editor
Yazi WANG, Editor
Yongli ZHAO, Editor
ITU-T A.5 justification(s):
Generate A.5 drat TD
-
[Submit new A.5 justification ]
See guidelines for creating & submitting ITU-T A.5 justifications
First registration in the WP: 2026-03-10 13:57:05
Last update: 2026-03-10 14:00:07