Open Access
ARTICLE
Hash-Based Signature Authentication for Scalable and Security-Consistent QKD Post-Processing
1 Department of Cyberspace Security, Beijing Electronic Science and Technology Institute, Beijing, China
2 Institute of Information Security, Beijing Electronic Science and Technology Institute, Beijing, China
* Corresponding Author: Sijiang Xie. Email:
(This article belongs to the Special Issue: Next-Generation Cybersecurity: AI, Post-Quantum Cryptography, and Chaotic Innovations)
Computers, Materials & Continua 2026, 88(1), 55 https://doi.org/10.32604/cmc.2026.077994
Received 21 December 2025; Accepted 29 January 2026; Issue published 08 May 2026
Abstract
Quantum Key Distribution (QKD) ensures secure key establishment through the principles of quantum mechanics; however, its effectiveness in practice hinges on dependable identity verification via classical channels during the post-processing phase. Current QKD implementations typically depend on pre-existing symmetric-key authentication, which suffers from limited scalability and complicated key management in extensive networks. Authentication methods utilizing post-quantum cryptography (PQC) signatures, based on complex mathematical assumptions, introduce extra and uncertain security dependencies, potentially compromising the security model integrity that QKD aims to maintain. This paper explores the application of hash-based signatures (HBS) for identity verification in the post-processing of QKD. HBS methods derive their security from cryptographic hash functions, which are integral to QKD protocols, allowing for scalable public-key-style authentication without the need for new computational assumptions. A detailed authentication framework is proposed, incorporating HBS-based verification into all essential phases of QKD post-processing, such as mutual certificate validation, basis sifting, parameter estimation, error correction verification, and privacy amplification. Security assessments indicate that the suggested framework maintains the security model integrity of QKD by relying cryptographically solely on the collision resistance of hash functions—without introducing new computational assumptions. At the system deployment level, it adheres to standard PKI trust assumptions which are necessary for public-key-style authentication and consistent with practical QKD network operations. Additionally, system-level evaluations affirm the scalability and practical applicability of HBS-based authentication, while also addressing the operational trade-offs among various HBS approaches in realistic QKD deployment contexts.Keywords
In light of the challenges posed by quantum computing, numerous traditional cryptographic methods have shown weaknesses, prompting the need for the creation of cryptographic strategies that can withstand quantum threats [1]. While traditional symmetric algorithms, such as hash functions, can enhance their quantum resilience by increasing security parameters—usually by ex-tending key lengths or output sizes—asymmetric algorithms like RSA and SM2 are inherently at risk and require replacement [2]. Presently, there are two viable quantum-resistant solutions: Post-Quantum Cryptography (PQC) and Quantum Key Distribution (QKD) [3]. PQC is based on mathematical challenges or hash functions that are believed to be secure against known quantum threats, although their long-term effectiveness is still in question [4]. On the other hand, QKD, which is rooted in the principles of quantum physics, provides theoretically unconditional security [5]; however, due to practical engineering limitations, it must be combined with traditional cryptographic techniques to ensure effective quantum security. Overall, QKD is generally viewed as more expensive to implement compared to PQC [6].
QKD allows two entities to securely create a shared secret key. This process necessitates two types of channels: a quantum channel for the transmission of quantum states and a classical channel for subsequent processing [5]. The QKD procedure unfolds in two stages: the first involves the transmission of qubits, which are then measured, while the second entails the exchange of classical messages for tasks such as basis sifting, parameter estimation, error correction, and privacy amplification, culminating in the creation of a secure symmetric key [7]. To safeguard against man-in-the-middle attacks, it is essential to authenticate all classical communications [8]. Many current QKD systems rely on authentication methods that utilize pre-shared symmetric keys, resulting in considerable key management challenges and limited scalability in extensive networks [9]. Recent research has suggested the use of PQC for authentication to mitigate these problems, though it remains uncertain which PQC algorithm is the most effective [5].
This study posits that hash-based signature (HBS) methods are the sole appropriate choice for authenticating QKD. HBS is fundamentally dependent on the robustness of cryptographic hash functions, a concept that is both established and widely accepted [10]. Recent developments in post-quantum standardization strengthen the practical case for HBS. In August 2024, NIST finalized several PQC FIPS standards and published the Stateless Hash-Based Digital Signature Standard (FIPS-205) [10], which is based on SLH-DSA. This official recognition highlights HBS as a standardized option for quantum-resistant digital signatures and motivates its consideration for QKD post-processing authentication. Utilizing HBS allows QKD frameworks to sidestep the creation of additional mathematical security dependencies [10], while also addressing the key management issues linked to symmetric pre-shared keys.
The objectives of this study are as follows:
• This study aims to evaluate the shortcomings of current QKD authentication techniques, such as those relying on pre-shared symmetric keys and mathematical problem-oriented post-quantum cryptography methods, while also emphasizing the benefits of HBS during the post-processing phase of QKD.
• To create a practical framework for implementing HBS-based authentication in the post-processing of QKD data, which includes basis sifting, estimating parameters, verifying error correction, and enhancing privacy.
• To assess the overall effects and appropriateness of various HBS strategies when incorporated into QKD post-processing, taking into account factors such as scalability, communication costs, and practical limitations.
2 Comparative Analysis of Existing Authentication Schemes for QKD
2.1 Introduction to QKD Post-Processing and the Authentication Requirement
QKD enables two remote parties, conventionally named Alice and Bob, to establish a shared secret key [11]. Its implementation relies on two channels: a quantum channel for transmitting quantum states and a classical channel for post-processing [12]. The QKD process consists of two phases: the quantum transmission phase and the post-processing phase. The latter, conducted over the classical channel, is essential for distilling a secure, shared symmetric key from the raw quantum transmission data and involves the following sequential stages:
Basis Sifting: In the key selection phase of QKD, after receiving the qubits, Alice and Bob need to disclose the measurement bases they use. This process is carried out through a classical channel, where both parties compare their measurement results and select the bits measured under the same measurement base for subsequent processing [13]. For example, if Alice uses the X basis for measurement and Bob uses the same X basis, they will retain these matching bits for use in subsequent steps.
Parameter Estimation: Alice and Bob sacrifice a random sample of their sifted keys to estimate the Quantum Bit Error Rate (QBER), which indicates potential eavesdropping.
Error Correction: Alice and Bob utilize an error correction protocol to rectify erroneous bits arising from noise or other disturbances [14]. Both parties will transmit error correction information via a classical channel, employing algorithms such as concatenated codes or Low-Density Parity-Check (LDPC) codes, which can rectify discrepancies in the remaining filtered keys to achieve an identical string.
Privacy amplification: They apply a universal hash function to the error-corrected key and shorten it to eliminate any partial information that a potential eavesdropper (Eve) may obtain, thereby ensuring the security of the final key [15]. By generating a shorter output as the final key, the design of the hash function needs to have good collision resistance to ensure that even if some information is eavesdropped, the attacker cannot deduce the final key.
All messages exchanged during these stages must be authenticated to prevent man-in-the-middle (MitM) attacks. If Eve can impersonate either party during post-processing, she can compromise the final key without detection. Therefore, the choice of authentication scheme is paramount to the overall security of the QKD system [16].
2.2 Authentication Based on Pre-Shared Symmetric Keys
As illustrated in Fig. 1, once the participants in QKD communication exchange quantum bit strings through the quantum channel, they must subsequently process this data via the classical channel. Taking the QKD receiver as the message sender in this context, the process begins with the sender generating a hash digest of the transmitted message [5]. This digest is then encrypted with a pre-shared symmetric key before being sent to the other participant. Upon receiving the ciphertext, the receiver (acting as the QKD sender) decrypts it using the same symmetric key, computes a hash digest for the original message with the identical hash function, and checks it against the decrypted data [9]. A match between the two digests confirms that both parties have successfully verified each other’s identities, as the correct encryption and decryption rely on the shared symmetric key [5]. Conversely, if the digests do not match, it signifies a failure in authentication.

Figure 1: QKD authentication based on a pre-shared symmetric key.
Pre-shared symmetric keys are extensively utilized for identity verification because of their efficient computation and straightforward authentication process [9]. Generally, these keys are embedded in the QKD device by the manufacturer prior to shipping [16]. Once the devices are in the hands of the communicating parties, they utilize these embedded keys for authentication purposes. It is essential to maintain the physical security of the device throughout this process to avoid any potential key exposure.
However, when the number of QKD network users is large, this method is not easy to operate [5]. If the number of users is
This results in considerable logistical challenges. Additionally, onboarding a new user necessitates the secure creation of keys with all current users, and these keys need to be updated regularly, adding to the operational complexity.
Fig. 2 depicts the creation and utilization of QKD keys, which includes the quantum transmission stage, the post-processing stage, and the application stage [7]. In QKD systems that utilize pre-existing symmetric keys, the security during the quantum transmission stage is grounded in the fundamental characteristics of quantum mechanics; the integrity of the post-processing stage is determined by the attributes of hash functions; and the safety of the application stage is contingent upon the robustness of symmetric cryptography [9].

Figure 2: Cryptographic security dependencies of QKD with pre-shared symmetric key authentication.
2.3 Authentication Based on Mathematical-Problem PQC Signatures
To address the key management issue, digital signatures based on PQC have been suggested [5]. These methods, including those based on lattices (like Dilithium) or codes, operate under a public-key framework. Illustrated in Fig. 3, every participant possesses a validated pair of public and private keys. The sender uses their private key to sign a message, while the recipient checks the signature using the sender’s public key [9].

Figure 3: QKD authentication based on mathematical-problem PQC signatures.
While this solves the scalability problem, it introduces a critical new concern: an additional security dependency. As illustrated in Fig. 4, the security of the entire system now depends on both the information-theoretic security of the quantum channel and the computational complexity of a particular mathematical problem [5]. This situation creates a dilemma: if the PQC algorithm is considered entirely resistant to quantum attacks, it could be utilized independently for key exchange, rendering QKD unnecessary. Conversely, if QKD is employed due to the uncertainty surrounding the long-term security of PQC, then incorporating the same PQC for authentication introduces that uncertainty into the QKD framework, thus compromising its security by introducing a possible vulnerability. This method effectively diminishes the unconditional security aimed for by QKD, transforming it into a conditional security that hinges on the computational challenges posed by the PQC algorithm. Consequently, employing such PQC algorithms for identity verification in the post-processing of QKD data not only complicates security dependencies but also creates a potential weak point, ultimately jeopardizing the overall security integrity of QKD.

Figure 4: Cryptographic security dependencies of QKD with mathematical-problem PQC authentication.
Based on the above analysis, we can draw a clear conclusion: using the PQC algorithm based on mathematical problems (such as lattice, encoding, multivariable, etc.) for identity authentication in QKD systems, although it achieves scalable key management in operation, the hybridization of its security model constitutes a fundamental flaw. This scheme not only fails to strengthen QKD, but also weakens the information theory security foundation pursued by QKD by introducing an independent and potentially fragile computational security assumption.
2.4 Authentication Based on Hash-Based Signatures
HBS, such as XMSS or SLH-DSA, derive their security exclusively from the cryptographic properties of the underlying hash function (e.g., collision resistance) [10]. The operational model is similar to other PQC signatures (Fig. 5), but the security foundation is fundamentally different and perfectly congruent with QKD.

Figure 5: QKD authentication based on HBS.
The core advantage of HBS for QKD is that it introduces no new security assumptions [10]. The hash function is already a trusted component in the QKD protocol’s privacy amplification stage [17]. Therefore, as shown in Fig. 6, using HBS for authentication does not create an additional security dependency layer. It simultaneously solves the key management complexity of symmetric schemes and avoids the security-model contamination of mathematical-problem-based PQC, achieving an optimal balance of scalability and aligned, long-term quantum resistance.

Figure 6: Cryptographic security dependencies of QKD with HBS authentication.
3 Design of an HBS-Based Authentication Framework for QKD
3.1 System Model, Assumptions, and Design Objectives
Following the comparative study outlined in Section 2, which identified HBS as the most suitable authentication method for QKD, this chapter introduces a comprehensive and cohesive implementation framework. The main goal is to create a thorough, sequential protocol derived from the BB84 protocol [18] that incorporates HBS-based authentication at each phase of the QKD post-processing, ensuring scalable and quantum-resistant authentication while avoiding the addition of new security vulnerabilities.
3.1.1 System Model and Entities
The framework involves the following entities operating within a standard QKD network model:
• Participants in Communication: Alice, who transmits the information, and Bob, the one receiving it, both seek to create a common secret key.
• Trusted Certificate Authority, CA: A trusted third party responsible for verifying the identities of Alice and Bob and issuing digital certificates. The CA itself uses an HBS scheme for signing certificates.
• Quantum Channel: This is utilized for sending quantum states, such as photons, in line with the BB84 protocol. While it is presumed to experience loss and interference, the principles of quantum mechanics safeguard it from undetected interception.
• Classical Channel: This is utilized for all communication related to post-processing. It is presumed that Eve has complete control over it [17], necessitating that any information shared through this channel be authenticated.
3.1.2 Core Security and Operational Assumptions
The design rests on the following foundational assumptions:
1. Cryptographic Security Consistency: The security dependencies of the authentication process are consistent with those of the native BB84 protocol [17]. No additional Cryptographic security assumptions (such as the hardness of mathematical problems) are introduced, ensuring that the theoretical unconditional security of QKD is not compromised.
2. System-Level Trust Assumptions: These are standard operational assumptions for PKI-based authentication in practical networks (not cryptographic dependencies), including that the Certificate Authority is honest and correctly verifies the real-world identities of participants (Alice/Bob) before issuing HBS-signed certificates, the channel for submitting CSR and receiving CA-issued certificates is physically secure or pre-authenticated to prevent CSR tampering or fake certificate injection, and the identity information provided by participants to the CA is genuine and uniquely identifies the communicating entity.
3. End-to-End Authentication: Every critical message exchanged during the classical post-processing phase must be authenticated to prevent MitM and replay attacks [9].
4. Explicit Operability: Provide a clear, sequential specification of actions for Alice and Bob at each stage, including what to sign, what to transmit, and what to verify.
3.1.3 Symbol and Term Definition
Key symbols and terms used in this chapter are defined in Table 1:

3.2 System Initialization and HBS-Based Certificate Issuance
Prior to initiating any QKD session, it is essential for all in-volved parties to create a reliable identity within the network using a Public Key Infrastructure (PKI) that relies solely on HBS. This initial setup phase is vital for establishing trust and involves three main steps: generating an HBS key pair, registering with a trusted Certificate Authority (CA), and obtaining a digital certificate signed with HBS.
Every participant, such as Alice and Bob, is required to create their individual long-term cryptographic identities by employing a standardized HBS algorithm. In this framework, we designate a stateless HBS method (SLH-DSA-SHAKE256-256s, chosen by NIST for standardization) [10] that is appropriate for long-term key distribution and eliminates the management complexities associated with stateful methods (stateless indicates that there is no requirement to keep track of signature counters or the states of tree nodes).
The process for an entity
1. Algorithm and parameter selection: Entity
2. Key generation:
3.2.2 Registration and Identity Verification with the CA
With the HBS key pair generated, entity
1. Construct CSR:
• Its HBS public key
• Its claimed identity information
• A digital signature over the CSR content (
2. Submission and Verification:
• Format and integrity check: Verifies the CSR structure and the attached signature using
• Identity verification: Validates the provided
3.2.3 HBS-Based Certificate Issuance
If the verification is successful, the CA issues a digital certificate for
The CA computes the digest
The CA sends the signed
Upon completion of this phase, each legitimate participant (Alice, Bob) possesses:
• A securely stored HBS private key
• A corresponding, CA-issued digital certificate
• The trusted root public key
This establishes the foundational trust infrastructure. In any subsequent QKD session, presenting
3.3 Mutual Certificate Verification and Parameter Negotiation with HBS Authentication
The core objectives of this phase are twofold: 1) to perform mutual identity authentication, ensuring that each party is a legitimate entity holding a valid certificate; 2) to negotiate the parameters and algorithms required for subsequent post-processing. This framework employs one-time session nonces and HBS signatures to achieve strong identity verification and prevent replay attacks, thereby establishing a secure and trusted foundation for the entire session [5].
3.3.1 Phase Objectives and Design Rationale
Following quantum transmission, Alice and Bob have not yet verified each other’s identities. Serving as the starting point for all subsequent classical communication, this phase must accomplish:
• Identity-Binding Authentication: Confirm that the other party possesses the private key corresponding to the public key in their certificate, thereby proving their claimed identity [9].
• Session Initialization: Generate and exchange session-specific random numbers (
• Capability Negotiation: Exchange and confirm the algorithms (e.g., error-correction code type, hash function) and parameters supported by both parties to ensure compatibility for post-processing.
3.3.2 Detailed Interaction Protocol
Assuming the quantum transmission is complete and Bob acts as the initiator of this phase (this role is interchangeable), the detailed steps are as follows:
Step 1: Bob Initiates Authentication and Negotiation:
1. Generate Session Nonce: Bob generates a high-entropy random number
2. Prepare Capability List: Based on his device’s capabilities, Bob creates a structured list
• HBS algorithm: SLH-DSA-SHAKE256-256s.
• Error-correction code:
• Hash function: SHA-3-256 [19].
• QBER threshold: 0.05 (5%) [17].
• PA seed
• Maximum LDPC decoding iterations:
3. Construct Message for Signing: Bob constructs the message to be authenticated as
4. Send Initial Message: Bob sends (
Step 2: Alice Verifies and Responds:
1. Verify Bob’s Certificate: Alice uses
2. Verify Bob’s Signature: Alice uses
3. Generate Own Nonce and Parameters: Alice generates a session nonce
4. Construct Response Signature: Alice constructs her response message
5. Send Response Message: Alice sends (
Step 3: Bob Completes Mutual Authentication:
1. Verify Alice’s Certificate and Signature: Bob verifies
2. Confirm Parameters: Bob confirms
The mutual certificate verification and parameter negotiation phase is successfully completed. The interaction flow is depicted in Fig. 7.

Figure 7: HBS authentication flow during the mutual certificate verification and parameter negotiation phase.
3.4 HBS Authentication in the Basis Sifting Phase
This part outlines how HBS-based authentication is incorporated into the basis sifting phase of QKD post-processing. Once a mutually authenticated session is set up, this stage focuses on the secure transmission of basis information necessary for sifting through raw quantum measurement data. The main goal of security here is to maintain the authenticity and integrity of the basis vectors [17] being exchanged, thereby thwarting any attempts by MitM attackers to interfere with the sifting process.
3.4.1 Purpose of Basis Sifting and Associated Risks
The initial stage of basis sifting involves the classical communication that processes the out-comes of quantum transmissions. During this phase, Alice and Bob disclose their measurement bases (either X or Z) [9] and keep only the bits that correspond to matching bases to create sifted keys. A significant threat arises from Eve, who might manipulate the basis announcements, leading Alice and Bob to either discard valid bits or keep invalid ones, thereby compromising key information without any noticeable errors. Therefore, it is essential to authenticate the received basis sequence.
3.4.2 Integrated Authentication Protocol for Basis Sifting
Leveraging the authenticated session context, the authenticated sifting protocol is designed as follows:
Step 1: Bob Sends and Authenticates His Measurement Bases
1. Prepare Message: Bob retrieves his measurement basis sequence
2. Generate Signature: Bob constructs
3. Transmit: Bob sends the tuple (
Step 2: Alice Verifies and Sends Her Generation Bases
1. Verify Bob’s Message: Alice uses
2. Prepare & Sign Her Message: Alice retrieves her generation basis sequence
3. Transmit: Alice sends the tuple
Step 3: Bob Verifies Alice’s Message
Bob uses
Following these steps, the authenticated basis sifting process is illustrated in Fig. 8.

Figure 8: HBS authentication flow during the basis sifting phase.
After mutual verification, both parties locally perform the sifting operation: they compare
3.5 HBS Authentication in the Parameter Estimation Phase
This section details the integration of HBS-based authentication into the Parameter Estimation stage. Following the generation of sifted keys (
3.5.1 Purpose of Parameter Estimation and Associated Threats
The stage of estimating parameters is essential for identifying eavesdropping activities [17]. Alice and Bob share a random selection of sifted key bits openly, with the Quantum Bit Error Rate (QBER) indicating possible information exposure to Eve. If the QBER exceeds a certain limit, the protocol must be terminated [9]. The main risk involves tampering with data: Eve might change the indices or bits of the samples to reduce the QBER deceptively, concealing her involvement. Therefore, it is crucial to verify both the positions of the samples and the values of the bits.
3.5.2 Integrated Authentication Protocol for Parameter Estimation
Leveraging the authenticated session state, the protocol involves two rounds of signed communication:
Step 1: Bob Prepares and Authenticates His Sample Data
1. Generate Random Sample Set: Bob generates a random sequence
2. Extract Sample Bit Values: Bob extracts the bit values from his sifted key
3. Generate Signature: Bob constructs the authentication message as
4. Transmit: Bob sends the tuple (
Step 2: Alice Verifies, Computes QBER and Responds
1. Verify Bob’s Data: Alice uses
2. Compute QBER: Alice extracts
She checks if
3. Prepare and Generate Signature: Alice generates
4. Transmit: Alice sends the tuple (
Step 3: Bob Verifies and Independently Computes QBER
1. Verify Alice’s Data: Bob use
2. Compute QBER and Finalize: Bob computes
Step 4: Sample Deletion
Both parties securely delete bits at indices

Figure 9: HBS authentication flow during the parameter estimation phase.
3.6 HBS Authentication in the Error Correction and Verification Phase
This section details the integration of HBS-based authentication into the error correction (reconciliation) and verification stage. Following parameter estimation, Alice and Bob hold raw keys
3.6.1 The LDPC Reconciliation Process
We employ LDPC code-based reconciliation scheme [21] (consistent with negotiated parameters
As illustrated in Fig. 10. The core idea is for Alice to send Bob a syndrome (or compressed error correction information) of her key, which Bob uses along with his own key to decode and correct errors through an iterative belief propagation algorithm. A hash commitment of Alice’s key is also sent for final verification [21].

Figure 10: LDPC-based error correction process in QKD post-processing.
3.6.2 Integrated Authentication Protocol for LDPC Reconciliation
Step 1: Initial Syndrome and Commitment Exchange
1. Alice Prepares Correction Data:
• Computes the syndrome of her raw key:
• Computes the hash digest of her key:
2. Alice Signs and Sends:
• Constructs
• Generates the signature:
• Sends the tuple
Step 2: Bob Verifies, Decodes Locally, and Reports Result
Bob uses Alice’s public key
1. Verify Alice’s Message: Bob uses
2. LDPC Decoding: Bob uses his raw key
3. Report Result:
• Success: If
•
• Failure: If
4. Transmit Result: Bob sends the tuple (
Step 3: Alice Acknowledges
Alice verifies using

Figure 11: HBS authentication flow during the LDPC-based error correction and verification phase.
3.7 Considerations for the Privacy Amplification Phase
This section addresses the final stage of the QKD post-processing chain: Privacy Amplification (PA) [22]. The primary objective of PA is to distill a shorter, information-theoretically secure final key [23] from
3.7.1 Purpose and Input Security Guarantees
Following successful error correction,
Since the parameters determining the PA compression [23] (the total estimated leakage
3.7.2 Implementation Based on Toeplitz Matrix Hashing
The PA is executed locally and identically by Alice and Bob using a Toeplitz matrix-based universal hash family [23], which is efficient and provably secure. The procedure [23] is as follows:
1. Determine Final Key Length: Based on total estimated leakage
2. Generate Random Seed: Alice generates a random seed
3. Construct Hash Matrix: Both parties construct a binary Toeplitz matrix
4. Compute Final Key: The reconciled key
This process ensures that both parties derive the same
4 Performance Evaluation and System-Level Analysis
4.1 Experimental Objectives and Design Principles
This chapter aims to assess how various authentication methods influence the functioning of QKD systems, rather than merely comparing cryptographic primitives on their own. It specifically emphasizes aspects such as scalability, overall system overhead, and alignment with the security framework of QKD.
Drawing from the insights presented in Section 2 and 3, the subsequent design principles will direct the assessment of the experiment:
1. System-Oriented Evaluation.
Authentication methods are assessed as part of the overall QKD post-processing system, in-stead of being considered independent cryptographic techniques.
2. Model-Consistency Awareness.
The studies differentiate between the performance of operations and the framework of security dependencies. Specifically, the assessment does not aim to experimentally validate information-theoretic security [18]; rather, it emphasizes whether the authentication system adds extra security assumptions.
3. Scenario-Driven Comparison.
Tests are performed in practical QKD operational conditions, encompassing the scaling of multi-user networks and the authentication of brief messages multiple times, reflecting real-world QKD implementations.
Accordingly, three complementary experiments are designed:
• Experiment I: Scalability analysis of authentication schemes in QKD networks
• Experiment II: Impact of authentication overhead on QKD post-processing performance
• Experiment III: Comparative evaluation of different HBS schemes in QKD environments
4.2 Experimental Setup and Common Parameters
4.2.1 QKD Protocol and Post-Processing Configuration
All experiments utilize a QKD protocol grounded in BB84, incorporating classical post-processing steps as outlined in Section 3. The parameters listed in Table 2 remain constant throughout all experiments unless stated otherwise.

Authentication is applied to all classical messages exchanged during:
• Mutual certificate verification and parameter negotiation
• Basis sifting
• Parameter estimation
• Error correction verification
4.2.2 Authentication Schemes under Comparison
Three categories of authentication schemes evaluated in this work are summarized in Table 3:

For symmetric-key authentication, pairwise pre-shared keys are assumed.
A certificate-oriented PKI framework is presumed for the PQC and HBS schemes, as out-lined in Section 3.2.
4.3 Experiment I: Scalability Analysis in Multi-User QKD Networks
This study examines the impact of user count on the overhead associated with authentication in a QKD network, emphasizing the intricacies of key management and the expenses of communication.
The objective is to show that although symmetric-key authentication works well for smaller systems, it becomes unfeasible as the network expands [5]. In contrast, HBS-based authentication offers scalability without the need for additional security assumptions.
We consider a QKD network consisting of
The total number of potential QKD links in the network is:
Three authentication paradigms are considered:
1. Pre-shared symmetric-key authentication, where each pair of users shares a unique long-term secret key.
2. Mathematical-problem-based PQC signature authentication, using a PKI model.
3. HBS authentication, also using a PKI model.
4.3.3 Key Management Complexity
In authentication systems that utilize symmetric keys, every user pair is required to keep a unique pre-shared secret key. Consequently, the overall quantity of long-term authentication keys needed within the network is:
Conversely, authentication methods based on PQC and HBS utilize a public-key framework, where every user possesses a single pair of public and private keys along with an associated certificate:
This disparity results in a quadratic increase in the complexity of key management for symmetric-key authentication, whereas public-key authentication systems experience a linear growth in this aspect.
4.3.4 User Join and Maintenance Operations
Scalability is further affected by the operational cost of adding new users and maintaining authentication material.
When a new user joins a QKD network with
• Symmetric-key authentication: requires secure key establishment with all existing users:
• PQC- and HBS-based authentication require only a single registration operation with the CA:
Similarly, key updates or revocation events in symmetric-key systems require re-distribution of keys across multiple user pairs, whereas public-key-based schemes confine such operations to certificate updates.
To illustrate the scalability trends, we evaluate the above metrics for different network sizes, as detailed in Table 4.

(1) Number of Long-Term Authentication Materials
The Fig. 12 illustrates the quantity of long-term authentication resources needed in a multiuser QKD network, contrasting symmetric-key authentication with public-key methods (PQC and HBS). While symmetric-key authentication shows a quadratic increase as the user count rises, public-key authentication demonstrates a linear scaling.

Figure 12: Growth of long-term authentication materials vs. number of QKD users.
(2) User Join Operations
Table 5 lists the number of secure operations required when a new user joins a QKD network of varying sizes.

The Fig. 13 depicts the quantity of authentication processes needed when a new participant enters an established QKD network. In the case of symmetric-key authentication, secure key establishment with all current users is necessary, resulting in a linear increase relative to the size of the network. In contrast, public-key authentication necessitates merely one registration action.

Figure 13: User join overhead vs. QKD network size.
The findings distinctly show that the constraints on scalability for symmetric-key authentication stem from the exponential increase in the complexity of key management and operations [5], not from the costs associated with cryptographic computations. With a rising number of QKD users, the practicality of symmetric-key authentication diminishes significantly due to the overwhelming demands for key provisioning, updates, and ongoing maintenance [9].
Authentication methods utilizing PQC and HBS effectively resolve scalability issues by implementing a public-key framework, resulting in proportional increases in authentication resources and fixed-time user integration processes. Therefore, scalability by itself does not adequately differentiate PQC from HBS approaches, prompting a deeper analysis focused on the consistency of security models and their operational effectiveness [17], which will be explored in later tests.
4.4 Experiment II: Impact of Authentication on QKD Post-Processing Performance
This experiment aims to assess how authentication affects the performance of QKD post-processing by examining the protocol workflow [24]. Since dedicated QKD hardware is unavailable, the focus is not on determining the exact execution time. Rather, it investigates if the inclusion of authentication creates a structural performance limitation [17] in the QKD post-processing phase.
The QuTiP library [25] is utilized to model quantum communication and measurement techniques. This simulation generates the classical data necessary for the post-processing of QKD, which encompasses basis details, error metrics, and confirmation messages. The evaluation of authentication overhead is conducted through an analytical timing framework [8] based on the patterns and frequency of these classical message interactions.
A prepare-and-measure QKD protocol is utilized as a key simulation framework [26]. This selection is driven by the observation that the classical post-processing steps involved in this study—such as basis sifting, parameter estimation, verification of error correction, and privacy amplification—are applicable to both prepare-and-measure and entanglement-based QKD protocols [5]. Since authentication is solely implemented for classical control messages during the post-processing phase, the assessed feasibility and overhead aspects in this study are not influenced by the particular method of quantum-state generation [17]. Consequently, the findings derived from the prepare-and-measure approach can be readily extended to other families of QKD protocols at the post-processing stage.
4.4.3 QKD Post-Processing Model
Authentication is applied to classical messages exchanged at each stage. Let
4.4.4 Authentication Overhead Model
The authentication overhead is modeled as:
where
The total post-processing time for one QKD session is denoted by
Table 6 summarizes the representative authentication overhead ratios for different raw key block sizes.

4.4.6 Results and Overhead Analysis
Table 7 summarizes the representative authentication overhead ratios for different raw key block sizes under three authentication paradigms: symmetric-key authentication, PQC-based authentication, and HBS-based authentication. Rather than targeting precise execution times, the values are intended to capture comparative overhead trends at the system level.

Specifically, the overhead ratios reported in Table 7 are derived from an analytical performance model that combines the classical message flow counts obtained from our QuTiP-based QKD post-processing simulation with representative signing and verification latencies for each authentication primitive, as reported in prior benchmarking studies.
As shown in Table 7 and Fig. 14, the authentication overhead ratio decreases rapidly with increasing raw key block size [28]. This trend occurs because the authentication process is linked to a constant number of classical control messages, while the computational demands of error correction and privacy amplification grow with the volume of key material being processed [17]. The overhead for symmetric-key authentication is minimal across all block sizes. In contrast, authentication based on PQC does present a higher overhead, yet it stays under a few tenths of a percent for practical block sizes. Although HBS-based authentication has a greater cost per operation, its relative overhead remains under one percent for feasible QKD setups and continues to decline as the block size increases.

Figure 14: Authentication overhead ratio vs. raw key block size (logarithmic scale).
The findings suggest that, although HBS-based authentication involves greater computational demands, it does not hinder the efficiency of QKD post-processing [17]. The observed overhead traits affirm the practicality of incorporating HBS methods into QKD systems regarding performance. Alongside the scalability benefits shown in Experiment I, these results endorse HBS-based authentication as a legitimate and secure substitute for current QKD authentication methods.
4.5 Experiment III: Comparative Evaluation of Different HBS Schemes in QKD Environments
Experiments I and II have demonstrated the scalability advantages and protocol-level feasibility of integrating HBS into QKD post-processing. However, HBS encompasses multiple constructions with significantly different performance characteristics [10]. For practical deployment in QKD systems, it is therefore necessary to identify which HBS schemes are more suitable under realistic post-processing constraints.
This experiment aims to assess various HBS schemes within QKD settings, emphasizing their authentication burdens and practical applicability, while offering clear recommendations for choosing appropriate HBS schemes for QKD authentication. Although SLH-DSA is used as a representative stateless HBS construction in the protocol design for its security and robustness, the proposed authentication framework is agnostic to specific HBS instantiations. In Experiment III, we further evaluate multiple HBS schemes to identify the most suitable choices for practical QKD deployments.
Three representative HBS schemes are selected, covering both stateful and stateless designs:
• LMS (Leighton–Micali Signature) [29]
A stateful Merkle-tree-based signature scheme standardized in RFC 8554 and NIST SP 800–208. LMS offers compact signatures and efficient verification, making it a strong candidate for high-frequency authentication scenarios.
• HSS (Hierarchical Signature System) [30]
A hierarchical extension of LMS that supports a large number of signatures by stacking multiple LMS trees. HSS trades increased signature size and verification cost for improved scalability in long-lived systems.
• SLH-DSA (FIPS-205) [10]
A stateless hash-based signature scheme standardized through the NIST PQC process. SLH-DSA eliminates state management requirements at the cost of significantly larger signatures and higher computational overhead.
These frameworks embody unique design principles within the HBS lineage and are commonly viewed as standard models in the realm of post-quantum cryptography.
To evaluate the suitability of different HBS schemes in QKD environments, the following metrics are considered.
1. Signature size (
The size of a digital signature directly determines the classical communication overhead incurred during authentication. Larger signatures increase the transmission time of authenticated messages and contribute to the overall authentication delay.
2. Verification cost (
3. State management requirement
Indicates whether the signature scheme requires strict state synchronization, which may introduce operational constraints in long-running QKD systems.
4. Authentication overhead ratio (
To capture the combined impact of communication and computation overhead, the authentication overhead ratio is defined as:
where the total authentication time
here,
All metrics are evaluated at the protocol level using analytical modeling informed by standardized parameter sets and published performance evaluations. The analysis focuses on relative overhead trends rather than implementation-specific absolute timing.
4.5.4 Experimental Setup and Scheme Parameters
The QKD post-processing workflow follows the prepare-and-measure model described in Experiment II. Authentication is applied to all classical control messages exchanged during basis sifting, parameter estimation, error correction verification, and privacy amplification [17]. For each QKD session, the number of authenticated classical messages is fixed and independent of the raw key block size. The raw key block size is set to
Three representative HBS schemes—LMS, HSS, and SLH-DSA—are evaluated at approximately NIST security level 1 [10]. This security level is sufficient for long-term post-quantum security in QKD applications while avoiding unnecessary overhead introduced by higher parameter sets. Their representative characteristics, derived from standardized parameter selections and published performance evaluations, are summarized in Table 8.

The reported values are representative and intended to illustrate relative performance trends rather than implementation-specific execution time.
4.5.5 Authentication Overhead in QKD Post-Processing
Using the characteristics summarized in Table 8, the authentication overhead ratio


Figure 15: Authentication overhead in QKD post-processing for different HBS schemes.
While SLH-DSA presents the greatest overhead, its cost for authentication is still under one percent of the total time required for QKD post-processing. In contrast, stateful methods like LMS have significantly reduced overhead, making them better suited for regular authentication tasks within QKD systems.
The findings indicate distinct trade-offs among the assessed HBS methods. LMS stands out for its minimal authentication burden, thanks to its small signatures and streamlined verification, making it ideal for QKD post-processing that requires frequent authentication. HSS enhances scalability by accommodating more signatures, albeit with a slight increase in overhead. On the other hand, SLH-DSA, despite its appealing stateless architecture, results in considerably higher communication and computational expenses. While its overhead is manageable from a practical standpoint, it is not as efficient as stateful options for frequent authentication in QKD settings.
This study conducts a comparative analysis of various hash-based signature methods utilized in the post-processing phase of QKD. The findings reveal that, although all the methods assessed provide security against quantum attacks and are viable in terms of performance, there are notable differences in their authentication overhead [30]. Among these, stateful methods, especially LMS, present the least overhead, making them ideal for regular authentication in QKD frameworks. HSS enhances scalability but comes with a moderate increase in overhead, while SLH-DSA removes the need for state management, resulting in significantly higher communication and computational demands [10]. These results underscore the importance of choosing the right scheme for effective HBS-based QKD authentication, with stateful designs offering a more advantageous balance between performance and complexity in standard QKD settings.
4.6 Parameter Sensitivity Analysis and Rationality of Experimental Settings
To justify the rationality of experimental parameters used in this work, a sensitivity analysis was conducted with respect to three key factors: QBER, raw key block length, and
Table 10 illustrates the effect of raw key block length on authentication efficiency under a fixed QBER of 5%. While the absolute authentication time remains nearly constant, increasing the raw key length significantly reduces the authentication cost per final secret bit. When the raw key length increases from 1 × 105 to 1 × 106 bits, the authentication time per bit decreases by nearly one order of magnitude.

This result indicates that larger raw key blocks effectively amortize the fixed authentication overhead, making 106 bits a practical choice for achieving both high efficiency and stable security in QKD post-processing.
Table 11 summarizes the influence of QBER on the final secret key yield and authentication overhead. As expected, the final key length decreases monotonically as QBER increases, due to higher error correction leakage and stronger privacy amplification requirements. When QBER increases from 2% to 10%, the final key yield ratio drops from 0.452 to 0.207.

Notably, the absolute authentication time remains nearly constant across different QBER levels, since the number of authenticated control messages in the post-processing stage is largely independent of channel noise. As a result, the relative authentication overhead slightly decreases at higher QBER values, demonstrating that the proposed HBS-based authentication framework maintains stable performance even under noisy channel conditions.
Table 12 compares different

The
This study examined the issue of identity verification within QKD systems, focusing on the consistency of security models, scalability, and overall system practicality. Through a thorough evaluation of current authentication methods, we demonstrated that pre-shared symmetric-key authentication faces inherent scalability challenges [5] in multi-user QKD environments. Additionally, authentication methods that rely on mathematical problems in PQC introduce extra and uncertain security assumptions [9], which can undermine the information-theoretic security goals of QKD. To overcome these challenges, we introduced a new authentication framework for QKD post-processing utilizing HBS. This framework incorporates HBS authentication at all essential phases of QKD post-processing, such as mutual certificate validation, basis sifting, parameter estimation, error correction verification, and privacy amplification. The proposed solution enables scalable public-key-style authentication while depending solely on cryptographic hash functions, which are integral to QKD protocols. Consequently, this framework maintains the security model consistency of QKD without adding new computational assumptions [17].
We conducted a series of experiments focused on system performance to assess the scalability, efficiency, and real-world applicability of HBS-based authentication within QKD frame-works. The findings indicate that HBS-based authentication successfully resolves the key management challenges [5] associated with symmetric-key methods and does not introduce any performance limitations in the post-processing phase of QKD. Additionally, a comparative analysis of various HBS models reveals that stateful designs, especially LMS, provide the best balance be-tween performance and complexity for regular authentication in QKD systems, whereas stateless options like SLH-DSA are still practical when ease of use is a priority.
Overall, this study establishes hash-based signatures as a natural and well-aligned authentication primitive for QKD systems. By unifying scalability, post-quantum security, and security-model consistency, the proposed framework provides a practical and principled foundation for authentication in future large-scale QKD deployments. Future work should explicitly evaluate HBS hardware accelerators integrated with QKD devices and characterize real-world metrics such as power consumption, FPGA/ASIC area and throughput [4]. Such hardware-level studies will complement our system-level model and are needed to fully quantify implementation trade-offs in deployed QKD networks.
Acknowledgement: The authors would like to express their sincere gratitude to Prof. Sijiang Xie for his valuable guidance on the research framework and technical routes. We also appreciate the constructive suggestions from Yalong Yan and Hong Zhao during the experiment design and manuscript revision. Additionally, thanks are extended to the Department of Cyberspace Security and Institute of Information Security at Beijing Electronic Science and Technology Institute for providing the necessary research support.
Funding Statement: This work was supported by the Quantum Science and Technology-National Science and Technology Major Project (QNMP) under Grant Nos. 2021ZD0301301, 2021ZD0300705 and the Yunnan Provincial Key Area Science and Technology Program Project under Grant No. 202502AD080015.
Author Contributions: The authors confirm contribution to the paper as follows: Conceptualization, Chaokun Wang and Sijiang Xie; methodology, Chaokun Wang; software, Chaokun Wang; validation, Chaokun Wang, Yalong Yan and Hong Zhao; formal analysis, Chaokun Wang; investigation, Chaokun Wang; resources, Sijiang Xie; data curation, Chaokun Wang; writing—original draft preparation, Chaokun Wang; writing—review and editing, Sijiang Xie, Yalong Yan and Hong Zhao; visualization, Chaokun Wang; supervision, Sijiang Xie; project administration, Sijiang Xie. All authors reviewed and approved the final version of the manuscript.
Availability of Data and Materials: Not applicable.
Ethics Approval: Not applicable.
Conflicts of Interest: The authors declare no conflicts of interest.
References
1. Hossain Faruk MJ, Tahora S, Tasnim M, Shahriar H, Sakib N. A review of quantum cybersecurity: threats, risks and opportunities. In: Proceedings of the 2022 1st International Conference on AI in Cybersecurity (ICAIC); 2022 May 24–26; Victoria, TX, USA. doi:10.1109/ICAIC53980.2022.9896970. [Google Scholar] [CrossRef]
2. Hafiz MW, Hwang SO. A probabilistic model of quantum states for classical data security. Front Phys. 2023;18(5):51304. doi:10.1007/s11467-023-1293-3. [Google Scholar] [CrossRef]
3. Ahn J, Kwon HY, Ahn B, Park K, Kim T, Lee MK, et al. Toward quantum secured distributed energy resources: adoption of post-quantum cryptography (PQC) and quantum key distribution (QKD). Energies. 2022;15(3):714. doi:10.3390/en15030714. [Google Scholar] [CrossRef]
4. Basu K, Soni D, Nabeel M, Karri R. NIST post-quantum cryptography—a hardware evaluation study. Cryptology EPrint Archive. 2019. [Google Scholar]
5. Wang LJ, Zhang KY, Wang JY, Cheng J, Yang YH, Tang SB, et al. Experimental authentication of quantum key distribution with post-quantum cryptography. npj Quantum Inf. 2021;7(1):67. doi:10.1038/s41534-021-00400-7. [Google Scholar] [CrossRef]
6. Xu G, Mao J, Sakk E, Wang SP. An overview of quantum-safe approaches: quantum key distribution and post-quantum cryptography. In: Proceedings of the 2023 57th Annual Conference on Information Sciences and Systems (CISS); 2023 Mar 22–24; Baltimore, MD, USA. doi:10.1109/ciss56502.2023.10089619. [Google Scholar] [CrossRef]
7. Yang YH, Li PY, Ma SZ, Qian XC, Zhang KY, Wang LJ, et al. All optical metropolitan quantum key distribution network with post-quantum cryptography authentication. Opt Express. 2021;29(16):25859–67. doi:10.1364/OE.432944. [Google Scholar] [PubMed] [CrossRef]
8. Prakasan A, Jain K, Krishnan P. Authenticated-encryption in the quantum key distribution classical channel using post-quantum cryptography. In: Proceedings of the 2022 6th International Conference on Intelligent Computing and Control Systems (ICICCS); 2022 May 25–27; Madurai, India. doi:10.1109/ICICCS53718.2022.9788239. [Google Scholar] [CrossRef]
9. Mosca M, Stebila D, Ustaoğlu B. Quantum key distribution in the classical authenticated key exchange framework. In: Proceedings of the 6th International Workshop on Post-Quantum Cryptography (PQCrypto 2013); 2013 Jun 4–7; Berlin, Germany. p. 136–54. [Google Scholar]
10. National Institute of Standards and Technology. Stateless hash-based digital signature standard. Gaithersburg, MD, USA: National Institute of Standards and Technology; 2024. Report No.: FIPS 205. [Google Scholar]
11. Zeng G, Wang X. Quantum key distribution with authentication. arXiv:quant-ph/9812022. 1998. [Google Scholar]
12. Zheng X, Zhao Z. Quantum key distribution with two-way authentication. Opt Quantum Electron. 2021;53(6):304. doi:10.1007/s11082-021-02845-8. [Google Scholar] [CrossRef]
13. Ranganathan S, Karthikeyan S, Chavan CP, Shanthala PT. Integrating quantum key distribution (QKD) with post-quantum cryptography (PQCcombining BB84 protocol with lattice-based cryptographic techniques. In: Proceedings of the 2024 IEEE 4th International Conference on ICT in Business Industry & Government (ICTBIG); 2024 Dec 13–14; Indore, India. doi:10.1109/ICTBIG64922.2024.10911719. [Google Scholar] [CrossRef]
14. Tarable A, Paganelli RP, Ferrari M. Rateless protograph LDPC codes for quantum key distribution. IEEE Trans Quantum Eng. 2024;5:4100311. doi:10.1109/TQE.2024.3361810. [Google Scholar] [CrossRef]
15. Bennett CH, Brassard G, Crepeau C, Maurer UM. Generalized privacy amplification. IEEE Trans Inf Theory. 1995;41(6):1915–23. doi:10.1109/18.476316. [Google Scholar] [CrossRef]
16. Nath A, Maity S, Banerjee S, Roy R. Quantum key distribution (QKD) for symmetric key transfer. Int J Sci Res Comput Sci Eng Inf Technol. 2024;10(3):270–80. doi:10.32628/cseit24103105. [Google Scholar] [CrossRef]
17. Fung CF, Ma X, Chau HF. Practical issues in quantum-key-distribution postprocessing. Phys Rev A. 2010;81(1):012318. doi:10.1103/physreva.81.012318. [Google Scholar] [CrossRef]
18. Prestridge SA, Dunham JG, Rajan D. Information-theoretic security in BB84 QKD. In: Proceedings of the 2023 33rd International Telecommunication Networks and Applications Conference; 2023 Nov 29–Dec 1; Melbourne, Australia. doi:10.1109/ITNAC59571.2023.10368530. [Google Scholar] [CrossRef]
19. Luo P, Fei Y, Zhang L, Ding AA. Differential fault analysis of SHA3-224 and SHA3-256. Cryptology EPrint Archive. 2016. doi:10.1109/fdtc.2016.17. [Google Scholar] [CrossRef]
20. Nakassis A, Mink A. LDPC error correction in the context of quantum key distribution. In: Proceedings of the SPIE Defense, Security, and Sensing; 2012 Apr 23–27; Baltimore, MD, USA. doi:10.1117/12.919117. [Google Scholar] [CrossRef]
21. Mink A, Nakassis A. LDPC for QKD reconciliation. arXiv:1205.4977. 2012. [Google Scholar]
22. Bennett CH, Brassard G, Robert JM. Privacy amplification by public discussion. SIAM J Comput. 1988;17(2):210–29. doi:10.1137/0217014. [Google Scholar] [CrossRef]
23. Tang BY, Liu B, Zhai YP, Wu CQ, Yu WR. High-speed and large-scale privacy amplification scheme for quantum key distribution. Sci Rep. 2019;9(1):15733. doi:10.1038/s41598-019-50290-1. [Google Scholar] [PubMed] [CrossRef]
24. Engle RD, Mailloux LO, Grimaila MR, Hodson DD, McLaughlin CV, Baumgartner G. Implementing the decoy state protocol in a practically oriented Quantum Key Distribution system-level model. J Def Model Simul Appl Methodol Technol. 2019;16(1):27–44. doi:10.1177/1548512917698053. [Google Scholar] [CrossRef]
25. Lambert N, Giguère E, Menczel P, Li B, Hopf P, Suárez G, et al. QuTiP 5: the quantum toolbox in Python. Phys Rep. 2026;1153:1–62. doi:10.1016/j.physrep.2025.10.001. [Google Scholar] [CrossRef]
26. Mailloux LO, Morris JD, Grimaila MR, Hodson DD, Jacques DR, Colombi JM, et al. A modeling framework for studying quantum key distribution system implementation nonidealities. IEEE Access. 2015;3:110–30. doi:10.1109/ACCESS.2015.2399101. [Google Scholar] [CrossRef]
27. Amiet D, Leuenberger L, Curiger A, Zbinden P. FPGA-based SLH-DSA implementations: mind the glitch. In: Proceedings of the 2020 23rd Euromicro Conference on Digital System Design (DSD); 2020 Aug 26–28; Kranj, Slovenia. doi:10.1109/DSD51259.2020.00046. [Google Scholar] [CrossRef]
28. Lim CCW, Xu FH, Pan JW, Ekert A. Security analysis of quantum key distribution with small block length and its application to quantum space communications. Phys Rev Lett. 2021;126(10):100501. doi:10.1103/PhysRevLett.126.100501. [Google Scholar] [PubMed] [CrossRef]
29. McGrew D, Curcio M, Fluhrer S. RFC 8554: Leighton-Micali hash-based signatures. New York, NY, USA: ACM Digital Library; 2019. doi:10.17487/RFC8554. [Google Scholar] [CrossRef]
30. Sun S, Liu T, Guan Z, He Y, Jing J, Hu L, et al. LMS-SM3 and HSS-SM3: instantiating hash-based post-quantum signature schemes with SM3. Cryptology EPrint Archive. 2022. [Google Scholar]
Cite This Article
Copyright © 2026 The Author(s). Published by Tech Science Press.This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.


Submit a Paper
Propose a Special lssue
View Full Text
Download PDF
Downloads
Citation Tools