Table of Contents

 1     Scope          
 2     References
 3     Definitions
        3.1     Terms defined elsewhere       
        3.2     Terms defined in this Recommendation           
 4     Abbreviations and acronyms             
 5     Conventions            
 6     Roles in QKDN for security application services         
        6.1     Security application service user          
        6.2     Security application service provider  
        6.3     QKDN provider            
        6.4     QKDN management provider
        6.5     User network provider             
        6.6     International scenarios            
 7     Role-based models and service scenarios    
        7.1     Model 1          
        7.2     Model 2          
        7.3     Model 3          
        7.4     Model 4          
        7.5     Model 5          
        7.6     Model 6          
        7.7     Model 7          
 8     Security considerations       
Appendix I – Implementation description of QKDN roles    
        I.1     Introduction  
        I.2     Existing structure         
        I.3     Mapping process         
Bibliography