<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.30 (Ruby 4.0.0) -->


<!DOCTYPE rfc  [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">

]>


<rfc ipr="trust200902" docName="draft-li-ipsecme-qkd-multipath-secret-sharing-01" category="std" consensus="true" tocInclude="true" sortRefs="true" symRefs="true">
  <front>
    <title>Multi-Path Secret Sharing for QKD Key Relay in IP Networks</title>

    <author fullname="Jinming Li">
      <organization>China Mobile</organization>
      <address>
        <email>lijinming1836@163.com</email>
      </address>
    </author>
    <author fullname="MengMeng Li">
      <organization>China Mobile</organization>
      <address>
        <email>limengmeng@chinamobile.com</email>
      </address>
    </author>

    <date year="2026" month="February" day="27"/>

    <area>Routing</area>
    <workgroup>IPSECME</workgroup>
    <keyword>QKD,SRv6,secret sharing</keyword>

    <abstract>


<?line 32?>
<t>Trusted relay is currently the most practical deployment model for Quantum Key Distribution (QKD) networks. However, trusted relay nodes pose inherent security vulnerabilities, as intermediate nodes can access the plaintext random number used to derive the end-to-end QKD key, leading to complete key exposure if any single relay node is compromised. To mitigate this risk, this document proposes a Multi-Path Secret Sharing (MPSS) mechanism for QKD key relay. The core idea is to split the random number into multiple shares using a threshold secret sharing scheme, distribute each share through independent QKD relay paths planned by the Key Management Plane (KMP), and reconstruct the complete random number only at the destination node. This mechanism transforms the security model from "all-or-nothing" to "threshold security". Notably, this mechanism leverages an extended IPv6 Destination Option Header (DOH) to carry key share-related metadata and utilizes Segment Routing over IPv6 (SRv6) to enforce strict path isolation.</t>



    </abstract>



  </front>

  <middle>


<?line 34?>

<section anchor="introduction"><name>Introduction</name>

<t>The integration of Quantum Key Distribution (QKD) with classical IP networks, specifically for securing IPsec tunnels, is an active area of standardization within the IETF.</t>

<t>However, a critical challenge remains in large-scale QKD networks: the reliance on Trusted Relay Nodes. In current deployments, if a QKD link exceeds the physical distance limit, keys are decrypted, stored, and re-encrypted at intermediate nodes. If any single trusted node is compromised (physically or logically), the end-to-end secrecy of the key is completely broken. Taking an operational "QKD trunk line" as an example, 32 trusted relay nodes are distributed along a 2,000-kilometer path, and an attacker only needs to breach one node to undermine the end-to-end security of QKD.</t>

<t>This document proposes a Multi-Path Secret Sharing (MPSS) scheme to address this vulnerability. Instead of transmitting the raw key through a single path of trusted nodes, the scheme adopts a (t, n)-threshold secret sharing mechanism, splits the key material into n shares, and utilizes the physical isolation capability of network forwarding paths provided by Segment Routing over IPv6 (SRv6) <xref target="RFC8754"></xref> to transmit the shares simultaneously over n physically disjoint paths. The original key can only be reconstructed if the receiver successfully obtains at least t shares, ensuring that even if fewer than t nodes are compromised, the attacker cannot obtain any valid information about the key.</t>

<t>This mechanism can serve as a security enhancement layer for the QKD-IPsec integration architecture, effectively defending against insider threats and node compromise risks in the relay network. The scheme is designed to be compatible with the key management interfaces defined in [I-D.nagayama-ipsecme-ipsec-with-qkd] and supports various secret sharing algorithms.</t>

<section anchor="requirements-language"><name>Requirements Language</name>
<t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
"OPTIONAL" in this document are to be interpreted as described in
[RFC2119] (Bradner, S., "Key words for use in RFCs to Indicate Requirement 
Levels", BCP 14, RFC 2119, March 1997) and [RFC8174] (Leiba, B., 
"Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words", BCP 14, 
RFC 8174, DOI 10.17487/RFC8174, May 2017).</t>

</section>
<section anchor="terminology"><name>Terminology</name>

<t><list style="symbols">
  <t>QKD: Quantum Key Distribution.</t>
  <t>Trusted Node (TN): An intermediate node in a QKD network that temporarily holds the key material in plaintext during the relay process.</t>
  <t>Threshold Secret Sharing Scheme (SSS): A cryptographic method for distributing a secret among a group of participants, where the secret can only be reconstructed when a specific threshold number of shares are combined. Examples include Shamir's Secret Sharing and Blakley's scheme.</t>
  <t>(t, n)-Threshold Scheme: A scheme where the secret can be reconstructed only if at least $t$ out of $n$ shares are combined.</t>
  <t>SRv6: Segment Routing over IPv6.</t>
  <t>KMP: Key Management Plane, the logical entity responsible for coordinating QKD key generation, distribution, path calculation, and SRv6 policy enforcement.</t>
  <t>Disjoint Paths: Network paths that do not share any common intermediate nodes (node-disjoint) or links (link-disjoint).</t>
  <t>QKD-DOH: A proposed IPv6 Destination Option Header extension for carrying QKD share metadata.</t>
</list></t>

</section>
</section>
<section anchor="motivation"><name>Motivation</name>

<t>In traditional QKD relay networks, the security model assumes that all intermediate nodes are fully trusted. The key flow is typically:
Alice --(QKD)--&gt; TN_1 --(Classical)--&gt; TN_2 --(...)--&gt; Bob</t>

<t>If an attacker compromises TN_i, they can access the plaintext key material being relayed. As the network scales, the probability of at least one node being compromised increases, creating a significant bottleneck for high-security applications.</t>

</section>
<section anchor="proposed-architecture-mpss-over-srv6"><name>Proposed Architecture: MPSS over SRv6</name>

<section anchor="key-splitting-and-share-generation"><name>Key Splitting and Share Generation</name>

<t>Upon generation of a QKD key seed R at the source node, the KMP invokes a Threshold Secret Sharing algorithm.</t>

<t><list style="symbols">
  <t>Input: Seed R, Threshold t, Total Shares n, Algorithm Identifier.</t>
  <t>Output: Set of shares S_1, S_2, S_n.</t>
  <t>Property: Any subset of shares with size &lt; t provides no information about R.</t>
</list></t>

</section>
<section anchor="multi-path-enforcement-via-srv6"><name>Multi-Path Enforcement via SRv6</name>

<t>To ensure that the compromise of intermediate nodes does not lead to key leakage, the n shares shall be forwarded through disjoint paths as much as possible. This document leveragesSRv6 to explicitly encode these paths in the packet header.</t>

<t>The source node constructs n IPv6 packets, each carrying one share S_i, and encapsulates information such as the sharing algorithm and share sequence number into the DOH header. Each share S_i is mapped to a different SRv6 Policy through the information in the DOH header. By utilizing the SRv6 Policy mechanism, the source can ensure:</t>

<t><list style="numbers" type="1">
  <t>No two paths share a common intermediate Trusted Node</t>
  <t>Minimizing latency differences to facilitate timely reconstruction</t>
  <t>Comprehensively considering parameters such as the link quality and trust level of quantum links</t>
</list></t>

</section>
<section anchor="key-reconstruction-at-the-destination"><name>Key Reconstruction at the Destination</name>

<t>The destination node collects the incoming shares. Once t valid shares are received, the KMP reconstructs the original seed R using the corresponding inverse algorithm. The reconstructed seed is then processed to generate the final key, which is used for IPsec/IKEv2 as defined in <xref target="RFC8784"></xref> and [I-D.nagayama-ipsecme-ipsec-with-qkd].</t>

</section>
</section>
<section anchor="protocol-details"><name>Protocol Details</name>

<section anchor="ipv6-destination-option-for-qkd-metadata-qkddoh"><name>IPv6 Destination Option for QKD Metadata (QKD‑DOH)</name>

<t>To carry necessary metadata without modifying the upper-layer protocol, this document defines a new IPv6 Destination Option, which is used to map SRv6 Policies and enable the receiver to identify the sharing algorithm and parameters required for reconstruction.</t>

<figure title="QKD-DOH" anchor="block"><artwork><![CDATA[
0                   1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|  Next Header  |  Hdr Ext Len  |  Option Type  |Option Data Len|
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|  Algorithm ID |  Total Shares |   Threshold   |  Share Index  |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
|                            Key ID                             |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
]]></artwork></figure>

<t><list style="symbols">
  <t>Option Type: To be assigned by IANA (TBD)</t>
  <t>Option Data Format:  <list style="symbols">
      <t>Key ID (4 bytes): Identifies the QKD session</t>
      <t>Share Index (1 byte): Indicates which share (1…n) this packet carries</t>
      <t>Total Shares (1 byte): Value n</t>
      <t>Threshold (1 byte): Value t</t>
      <t>Algorithm ID (1 byte): Identifies the secret sharing algorithm used (e.g., 0x01 for Shamir, 0x02 for Blakley, etc.), ensuring extensibility</t>
    </list></t>
</list></t>

<t>This option is primarily processed by the source node and the destination node.</t>

</section>
<section anchor="integration-with-key-management-plane-kmp"><name>Integration with Key Management Plane (KMP)</name>

<t>The MPSS mechanism is transparent to the IPsec stack. The KMP interacts with the following modules:</t>

<t><list style="numbers" type="1">
  <t>QKD Quantum Layer: To fetch raw key seeds</t>
  <t>SDN Controller/PCE: To compute n disjoint paths and generate SIDs</t>
  <t>Application Layer (IPsec/IKE Daemon): To deliver the reconstructed key for use as a PPK, in accordance with <xref target="RFC8784"></xref></t>
</list></t>

<t>The KMP is responsible for synchronizing the state of share transmission, negotiating the Algorithm ID during session setup, and triggering retransmission if fewer than t shares arrive within a timeout window.</t>

</section>
</section>
<section anchor="security-analysis"><name>Security Analysis</name>

<section anchor="traditional-single-path-model"><name>Traditional Single-Path Model</name>
<t>The random number R is transmitted through a single path, and any compromised intermediate node can obtain the plaintext R, leading to the complete exposure of Key_AB. The security risk is 1/N_node (N_node is the number of intermediate nodes in the path), and the attack success rate is 100% for a single node compromise.</t>

</section>
<section anchor="mpss-mechanism"><name>MPSS Mechanism</name>
<t>R is split into N shares through (k, N) threshold secret sharing, and each share is transmitted through a completely non-overlapping path. An attacker needs to compromise at least k paths (i.e., at least one node in each of k paths) to obtain k valid shares and reconstruct R. The security improvement is reflected in two aspects:</t>

<t><list style="symbols">
  <t>Threshold Security: The attack threshold is raised from "compromise 1 node" to "compromise k paths (at least k nodes)". For (2,3) configuration, the attacker needs to compromise at least 2 non-overlapping paths (2 nodes) to reconstruct R, and the attack success rate is significantly reduced.</t>
  <t>Isolation of Shares: Since the paths are completely non-overlapping, compromising a single node only exposes a single share, and the attacker cannot obtain any information about R from a single share (due to the perfect secrecy of the threshold secret sharing algorithm).</t>
</list></t>

</section>
<section anchor="quantitative-analysis"><name>Quantitative Analysis</name>
<t>Assume that the probability of a single QKD node being compromised is P, and the MPSS mechanism uses (k, N) threshold sharing with completely non-overlapping paths (each path has m intermediate nodes). The probability of the attacker successfully reconstructing R is:</t>

<t><list style="symbols">
  <t>P_{MPSS} = C_N^k * (P^m)^k</t>
</list></t>

<t>For the traditional single-path model (1 path, m nodes), the probability of successful attack is:</t>

<t><list style="symbols">
  <t>P_{Traditional} = 1 - (1-P)^m</t>
</list></t>

<t>Example: If P=0.01 (1% compromise probability per node), m=3 (3 intermediate nodes per path), (k=2, N=3) for MPSS:</t>

<t><list style="symbols">
  <t>P_{MPSS} = C_3^2 * (0.01^3)^2 = 3 * 10^(-12)</t>
  <t>P_{Traditional} = 1 - (1-0.01)^3 ≈ 0.0297</t>
</list></t>

<t>The attack success probability of MPSS is reduced by 9 orders of magnitude compared with the traditional model, which significantly improves security.</t>

</section>
</section>
<section anchor="iana-considerations"><name>IANA Considerations</name>

<t>This document requests IANA to assign:
   1. A new IPv6 Destination Option type under the "IPv6 Extension Header Types" registry for the QKD‑DOH defined in Section 5.1.
   2. A new "QKD Secret Sharing Algorithm IDs" registry to manage the Algorithm ID field, initially populated with:
  - 0x01: Shamir's Secret Sharing
  - 0x02: Blakley's Scheme
  - 0x03‑0xFF: Unassigned / Experimental
# Security Considerations
TBD.</t>

</section>
<section numbered="false" anchor="acknowledgments"><name>Acknowledgments</name>
<t>The authors would like to thank the following for their valuable contributions 
of this document:
TBD</t>

</section>


  </middle>

  <back>



    <references title='Normative References' anchor="sec-normative-references">



<reference anchor="RFC8784">
  <front>
    <title>Mixing Preshared Keys in the Internet Key Exchange Protocol Version 2 (IKEv2) for Post-quantum Security</title>
    <author fullname="S. Fluhrer" initials="S." surname="Fluhrer"/>
    <author fullname="P. Kampanakis" initials="P." surname="Kampanakis"/>
    <author fullname="D. McGrew" initials="D." surname="McGrew"/>
    <author fullname="V. Smyslov" initials="V." surname="Smyslov"/>
    <date month="June" year="2020"/>
    <abstract>
      <t>The possibility of quantum computers poses a serious challenge to cryptographic algorithms deployed widely today. The Internet Key Exchange Protocol Version 2 (IKEv2) is one example of a cryptosystem that could be broken; someone storing VPN communications today could decrypt them at a later time when a quantum computer is available. It is anticipated that IKEv2 will be extended to support quantum-secure key exchange algorithms; however, that is not likely to happen in the near term. To address this problem before then, this document describes an extension of IKEv2 to allow it to be resistant to a quantum computer by using preshared keys.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8784"/>
  <seriesInfo name="DOI" value="10.17487/RFC8784"/>
</reference>
<reference anchor="RFC8200">
  <front>
    <title>Internet Protocol, Version 6 (IPv6) Specification</title>
    <author fullname="S. Deering" initials="S." surname="Deering"/>
    <author fullname="R. Hinden" initials="R." surname="Hinden"/>
    <date month="July" year="2017"/>
    <abstract>
      <t>This document specifies version 6 of the Internet Protocol (IPv6). It obsoletes RFC 2460.</t>
    </abstract>
  </front>
  <seriesInfo name="STD" value="86"/>
  <seriesInfo name="RFC" value="8200"/>
  <seriesInfo name="DOI" value="10.17487/RFC8200"/>
</reference>
<reference anchor="RFC8754">
  <front>
    <title>IPv6 Segment Routing Header (SRH)</title>
    <author fullname="C. Filsfils" initials="C." role="editor" surname="Filsfils"/>
    <author fullname="D. Dukes" initials="D." role="editor" surname="Dukes"/>
    <author fullname="S. Previdi" initials="S." surname="Previdi"/>
    <author fullname="J. Leddy" initials="J." surname="Leddy"/>
    <author fullname="S. Matsushima" initials="S." surname="Matsushima"/>
    <author fullname="D. Voyer" initials="D." surname="Voyer"/>
    <date month="March" year="2020"/>
    <abstract>
      <t>Segment Routing can be applied to the IPv6 data plane using a new type of Routing Extension Header called the Segment Routing Header (SRH). This document describes the SRH and how it is used by nodes that are Segment Routing (SR) capable.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8754"/>
  <seriesInfo name="DOI" value="10.17487/RFC8754"/>
</reference>
<reference anchor="RFC8986">
  <front>
    <title>Segment Routing over IPv6 (SRv6) Network Programming</title>
    <author fullname="C. Filsfils" initials="C." role="editor" surname="Filsfils"/>
    <author fullname="P. Camarillo" initials="P." role="editor" surname="Camarillo"/>
    <author fullname="J. Leddy" initials="J." surname="Leddy"/>
    <author fullname="D. Voyer" initials="D." surname="Voyer"/>
    <author fullname="S. Matsushima" initials="S." surname="Matsushima"/>
    <author fullname="Z. Li" initials="Z." surname="Li"/>
    <date month="February" year="2021"/>
    <abstract>
      <t>The Segment Routing over IPv6 (SRv6) Network Programming framework enables a network operator or an application to specify a packet processing program by encoding a sequence of instructions in the IPv6 packet header.</t>
      <t>Each instruction is implemented on one or several nodes in the network and identified by an SRv6 Segment Identifier in the packet.</t>
      <t>This document defines the SRv6 Network Programming concept and specifies the base set of SRv6 behaviors that enables the creation of interoperable overlays with underlay optimization.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8986"/>
  <seriesInfo name="DOI" value="10.17487/RFC8986"/>
</reference>



    </references>





  </back>

<!-- ##markdown-source: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-->

</rfc>

