Skip to main content

Thank you for visiting nature.com. You are using a browser version with limited support for CSS. To obtain the best experience, we recommend you use a more up to date browser (or turn off compatibility mode in Internet Explorer). In the meantime, to ensure continued support, we are displaying the site without styles and JavaScript.

Advertisement

Scientific Reports
  • View all journals
  • Search
  • My Account Login
  • Content Explore content
  • About the journal
  • Publish with us
  • Sign up for alerts
  • RSS feed
  1. nature
  2. scientific reports
  3. articles
  4. article
Hybrid quantum–chaotic key expansion enhances QKD rates using the Lorenz system
Download PDF
Download PDF
  • Article
  • Open access
  • Published: 05 February 2026

Hybrid quantum–chaotic key expansion enhances QKD rates using the Lorenz system

  • Pobporn Danvirutai1,
  • Sartra Wongthanavasu1,
  • Trong-Minh Hoang2 &
  • …
  • Chavis Srichan3 

Scientific Reports , Article number:  (2026) Cite this article

  • 1007 Accesses

  • 1 Altmetric

  • Metrics details

We are providing an unedited version of this manuscript to give early access to its findings. Before final publication, the manuscript will undergo further editing. Please note there may be errors present which affect the content, and all legal disclaimers apply.

Subjects

  • Engineering
  • Mathematics and computing
  • Physics

Abstract

Quantum key distribution (QKD) provides a foundation for information-theoretic security based on quantum mechanics, yet its practical deployment is often constrained by intrinsically low secure key generation rates, particularly in high-bandwidth or low-latency settings. This work introduces a hybrid cryptographic technique that integrates conventional QKD with deterministic chaos, modeled using the Lorenz attractor, to provide a software-based enhancement of the effective key expansion rate. From a short 20-bit QKD seed, the system generates long bitstreams within milliseconds; although these streams exhibit high empirical randomness, their fundamental entropy remains bounded by the seed, consistent with standard cryptographic principles. The method employs the exponential divergence of chaotic trajectories, such that even minute uncertainties in an adversary’s estimate of the initial state lead to rapid desynchronization and, as established in Appendix A, an exponential decay of Eve’s mutual information with respect to the expanded key. Simulation results confirm this theoretical behavior and demonstrate an effective rate amplification exceeding two orders of magnitude over the baseline QKD seed rate. The proposed chaotic expansion operates entirely in software and requires no modifications to existing QKD hardware, offering a practical pathway to enhance throughput for applications ranging from secure video communication to low-latency IoT and edge-computing environments.

Similar content being viewed by others

Forty thousand kilometers under quantum protection

Article Open access 30 May 2023

Practical high-dimensional quantum key distribution protocol over deployed multicore fiber

Article Open access 23 February 2024

Phase encoded quantum key distribution up to 380 km in standard telecom grade fiber enabled by baseline error optimization

Article Open access 22 September 2023

Data availability

The original contributions presented in this study are included in the article.

References

  1. Bennett, C. H. & Brassard, G. Quantum cryptography: Public key distribution and coin tossing. Theoret. Comput. Sci. 560, 7–11 (2014).

    Google Scholar 

  2. Pirandola, S. et al. Advances in quantum cryptography. Adv. Opt. Photonics 12(4), 1012–1236 (2020).

    Google Scholar 

  3. Yang, J. et al. High-rate intercity quantum key distribution with a semiconductor single-photon source. Light Sci. Appl. 13(1), 150 (2024).

    Google Scholar 

  4. Alessa, A. S. Hammoudeh, M. & Singh, H. A peek into the post- quantum era—PQA PQC: What will happen in 2030. In Quantum Technology Applications, Impact, and Future Challenges, 163–180 (CRC Press, 2025).

  5. Cacciapuoti, A. S. et al. Quantum internet: Networking challenges in distributed quantum computing. IEEE Netw. 34(1), 137–143 (2019).

    Google Scholar 

  6. Okey, O. D. et al. Quantum key distribution protocol selector based on machine learning for next-generation networks. Sustainability 14(23), 15901 (2022).

    Google Scholar 

  7. Shannon, C. E. Communication theory of secrecy systems. Bell Syst Tech. J. 28(4), 656–715 (1949).

    Google Scholar 

  8. Wang, Z. H. et al. Tight finite-key analysis for mode-pairing quantum key distribution. Commun. Phy. 6(1), 265 (2023).

    Google Scholar 

  9. Boaron, A. et al. Secure quantum key distribution over 421 km of optical fiber. Phys. Rev. Lett. 121(19), 190502 (2018).

    Google Scholar 

  10. Clivati, C. et al. Coherent phase transfer for real-world twin-field quantum key distribution. Nat. Commun. 13(1), 157 (2022).

    Google Scholar 

  11. Zhang, L. et al. Experimental mode-pairing quantum key distribution surpassing the repeaterless bound. Phys. Rev. X 15(2), 021037 (2025).

    Google Scholar 

  12. Wang, H. et al. High-efficiency multiphoton boson sampling. Nat. Photonics 11(6), 361–365 (2017).

    Google Scholar 

  13. Takeoka, M., Guha, S. & Wilde, M. M. Fundamental rate-loss tradeoff for optical quantum key distribution. Nat. Commun. 5(1), 5235 (2014).

    Google Scholar 

  14. Lorenz, E. N. Deterministic nonperiodic flow. In Universality in Chaos, 2nd ed., pp. 367–378 (Routledge, 2017).

  15. Cowper, N., Shaw, H. & Thayer, D. Chaotic quantum key distribution. Cryptography 4(3), 24 (2020).

    Google Scholar 

  16. Keuninckx, L. et al. Encryption key distribution via chaos synchroniza- tion. Sci. Rep. 7(1), 43428 (2017).

    Google Scholar 

  17. Sykot, A. et al. Multi-layered security system: Integrating quantum key distribution with classical cryptography to enhance steganographic security. Alex. Eng. J. 121, 167–182 (2025).

    Google Scholar 

  18. Cho, K. & Miyano, T. Chaotic cryptography using augmented Lorenz equations aided by quantum key distribution. IEEE Trans. Circuits Syst. I Regul. Pap. 62(2), 478–487 (2014).

    Google Scholar 

  19. Kotangale, A., Kumar, M. S. & Bhagat, A. P. Improved big data security using quantum chaotic map of key sequence. Computers 14(6), 214 (2025).

    Google Scholar 

  20. Purohit, K. & Vyas, A. K. Quantum key distribution through quantum machine learning: A research review. Front. Quantum Sci. Technol. 4, 1575498 (2025).

    Google Scholar 

  21. Rahmanpour, M. et al. A new quantum key distribution protocol to reduce afterpulse and dark counts effects. Res. Opt. 16, 100718 (2024).

    Google Scholar 

  22. Zahidy, M. et al. Practical high-dimensional quantum key distribution protocol over deployed multicore fiber. Nat. Commun. 15(1), 1651 (2024).

    Google Scholar 

  23. Du, Z. et al. Advantage distillation for quantum key distribution. Quantum Sci. Technol. 10(1), 015050 (2024).

    Google Scholar 

  24. Song, K. Imran, N. Chen, J. Y. & Dobbins, A. C. A hybrid chaos- based cryptographic framework for post-quantum secure communica- tions. Preprint at https://arxiv.org/abs/2504.08618, 2025.

  25. Shor, P. W. & Preskill, J. Simple proof of security of the BB84 quantum key distribution protocol. Phys. Rev. Lett. 85(2), 441–444 (2000).

    Google Scholar 

  26. Begimbayeva, Y. & Zhaxalykov, T. Research of quantum key dis- tribution protocols: BB84, B92, E91. Sci. J. Astana IT Univ. 2022.

  27. Yin, H.-L. et al. Tight security bounds for decoy-state quantum key distribution. Sci. Rep. 10, 14312. https://doi.org/10.1038/s41598-020-71107-6 (2020).

    Google Scholar 

Download references

Acknowledgements

The authors acknowledge support from Khon Kaen University.

Author information

Authors and Affiliations

  1. Department of Computer Science, College of Computing, Khon Kaen University, Khon Kaen, 40002, Thailand

    Pobporn Danvirutai & Sartra Wongthanavasu

  2. Telecommunications Faculty No.1, Posts and Telecommunications Institute of Technology, Hanoi, Vietnam

    Trong-Minh Hoang

  3. Department of Computer Engineering, Khon Kaen University, Khon Kaen, 40002, Thailand

    Chavis Srichan

Authors
  1. Pobporn Danvirutai
    View author publications

    Search author on:PubMed Google Scholar

  2. Sartra Wongthanavasu
    View author publications

    Search author on:PubMed Google Scholar

  3. Trong-Minh Hoang
    View author publications

    Search author on:PubMed Google Scholar

  4. Chavis Srichan
    View author publications

    Search author on:PubMed Google Scholar

Contributions

Conceptualization, P.D., S.W., H.T.M. and C.S.; Methodology, P.D. and C.S.; Formal Analysis, P.D., S.W., and C.S.; writing—original draft, P.D.; supervision, S.W.; writing—review and editing, C.S., H.T.M. All authors have read and agreed to the published version of the manuscript.

Corresponding author

Correspondence to Chavis Srichan.

Ethics declarations

Competing interests

The authors declare no competing interests.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Appendices

Appendix A: proof of mutual information decay for discrete chaotic maps

Theorem statement

Let \(f:M\to M\) be a discrete-time chaotic map on a compact metric space \(M\), preserving an ergodic invariant probability measure \(\mu\).

Assume \(f\) exhibits exponential decay of correlations for Hölder-continuous observables:

$$\left| {\smallint g\left( {f^{t} \left( x \right)} \right)\,h\left( x \right)\,d\mu \left( x \right) - \left( { g\,d\mu } \right)\left( { h\,d\mu } \right)} \right| \le C\left\| g \right\|_{\alpha } \,\left\| h \right\|_{\alpha } \,e^{ - \gamma t} .$$
(8)

Let \({x}_{0}\) be a random variable with density \({p}_{0}\). Define the trajectories

$$X_{t} = f^{t} \left( {x_{0} } \right),Y_{t} = f^{t} \left( {x_{0} + \delta } \right),$$
(9)

with \(\delta >0\). Then the mutual information satisfies

$$I\left( {X_{t} ;Y_{t} } \right) \le K\,e^{{ - 2\gamma^{\prime}t}} .$$
(10)

Spectral properties of the Perron–Frobenius operator

Let \(\mathcal{P}\) denote the Perron–Frobenius operator, defined by

$$\smallint \left( {{\mathcal{P}}\varphi } \right)\,\psi \,d\mu = \smallint \varphi \,\left( {\psi \circ f} \right)\,d\mu .$$
(11)

For a broad class of chaotic dynamical systems, this operator exhibits a spectral gap: the eigenvalue \(1\) corresponding to the invariant density is simple, and all remaining eigenvalues lie strictly inside the unit disk, satisfying \(\mid \lambda \mid <1\). As a consequence, for any observable \(\varphi\) with zero mean (\(\int \varphi \text{\hspace{0.17em}}d\mu =0\)), iterates under the operator contract exponentially, obeying

$$\parallel {\mathcal{P}}^{t} \varphi \parallel \le C^{\prime}r^{t} \parallel \varphi \parallel ,$$
(12)

for some constants \(C^{\prime} > 0\) and \(0<r<1\). This exponential contraction reflects the strong mixing properties essential for the decay-of-correlation estimates used throughout the proof.

Evolution of the joint distribution

Let \(\text{f}:\text{M}\to \text{M}\) be the chaotic map under study, and define the product map

$$F\left( {x,y} \right) = \left( {f\left( x \right),\,f\left( y \right)} \right),$$
(13)

acting on the product space \(\text{M}\times \text{M}\). Let \({\text{p}}_{0}(\text{x})\) denote the initial density of the random variable \({\text{X}}_{0}\), and let \(\updelta >0\) denote the initial offset between Alice’s and Eve’s trajectories. The corresponding joint initial density is

$$\begin{array}{*{20}c} {} & {p_{0} \left( {x,y} \right) = \delta \left( {y - \left( {x + \delta } \right)} \right)\,p_{0} \left( x \right),} & {} & {} \\ \end{array}$$
(14)

where \(\updelta (\cdot )\) is the Dirac delta. After a single iteration under the smooth map \(\text{F}\), this singular distribution becomes regular (absolutely continuous). Let \({\mathcal{P}}_{\text{F}}\) be the Perron–Frobenius operator associated with the product map. For chaotic systems with exponential mixing, this operator satisfies

$$\begin{array}{*{20}c} {} & {\parallel \,{\mathcal{P}}_{F}^{t} q - \rho_{F} \,\parallel \le C_{F} \,r_{F}^{\,t} \parallel q\parallel ,} & {} & {} \\ \end{array}$$
(15)

for any density \(\text{q}\), where \(0<{\text{r}}_{\text{F}}<1\), \({\text{C}}_{\text{F}}>0\), and

$$\rho_{F} \left( {x,y} \right) = \rho \left( x \right)\,\rho \left( y \right)$$

denotes the product invariant density of the marginals. Consequently, the joint density \({p}_{t}(x,y)\) at time \(t\ge 1\) satisfies

$$\parallel \,p_{t} - \rho_{F} \,\parallel \le C_{F}{\prime} \,r_{F}^{\,t} ,$$
(16)

showing that the joint distribution is attracted exponentially toward the product of marginals.

Convergence of marginals

The marginal distributions of \({\text{X}}_{\text{t}}\) and \({\text{Y}}_{\text{t}}\) are given by

$$p_{t}^{\left( X \right)} \left( x \right) = \smallint p_{t} \left( {x,y} \right)\,dy,p_{t}^{\left( Y \right)} \left( y \right) = \smallint p_{t} \left( {x,y} \right)\,dx.$$
(17)

Both marginals converge exponentially to the invariant density \(\uprho\). Specifically, for constants \({\text{C}}_{\text{M}}>0\) and \(0<\text{r}<1\),

$$\parallel \,p_{t}^{\left( X \right)} - \rho \,\parallel \le C_{M} \,r^{t} ,\parallel \,p_{t}^{\left( Y \right)} - \rho \,\parallel \le C_{M} \,r^{t} .$$
(18)

Thus, regardless of the initial mismatch \(\updelta\), the marginals relax toward equilibrium at an exponential rate.

Total variation convergence

Since the Banach-space norm used above dominates the \({\text{L}}^{1}\) norm, there exists a constant \({\text{K}}_{\text{B}}>0\) such that

$$\parallel \,p_{t} - \rho_{F} \,\parallel_{1} \le K_{B} \,C_{F}{\prime} \,r_{F}^{\,t} .$$

Combining this with the marginal convergence, we obtain

$$\parallel \,p_{t} - p_{t}^{\left( X \right)} p_{t}^{\left( Y \right)} \,\parallel_{1} \le K_{1} \,max(r_{F} ,\,r)^{\,t} ,$$

where \({\text{K}}_{1}>0\). This shows that the joint distribution becomes indistinguishable from the product of the marginals at an exponential rate.

Mutual information decay

The mutual information between the trajectories \({X}_{t}\) and \({Y}_{t}\) is defined as

$$I\left( {X_{t} ;Y_{t} } \right) = D_{{{\text{KL}}}} \,\left( {p_{t} \parallel p_{t}^{\left( X \right)} p_{t}^{\left( Y \right)} } \right),$$

where \({D}_{\text{KL}}\) denotes the Kullback–Leibler divergence, \({p}_{t}\) is the joint density of \(\left({X}_{t},{Y}_{t}\right)\), and \({p}_{t}^{\left(X\right)},{p}_{t}^{\left(Y\right)}\) are the marginal densities.

Using Pinsker’s inequality, the mutual information is bounded in terms of the total variation distance (TV)

$${\text{TV}}\left( {p_{t} ,\,p_{t}^{\left( X \right)} p_{t}^{\left( Y \right)} } \right) = \frac{1}{2}\,\parallel \,p_{t} - p_{t}^{\left( X \right)} p_{t}^{\left( Y \right)} \,\parallel_{1} ,$$

where \(\parallel \cdot {\parallel }_{1}\) denotes the \({L}^{1}\)-norm. Thus,

$$I\left( {X_{t} ;Y_{t} } \right) \le \frac{1}{2}\,{\text{TV}}^{2} = \frac{1}{8}\,\parallel \,p_{t} - p_{t}^{\left( X \right)} p_{t}^{\left( Y \right)} \,\parallel_{1}^{2} .$$

Substituting the exponential \({L}^{1}\)-convergence bound derived in Sections A.2–A.4 yields

$$I\left( {X_{t} ;Y_{t} } \right) \le K_{2} \,e^{{ - 2\gamma^{\prime}t}} ,$$

for constants \({K}_{2}>0\) and \(\gamma^{\prime} > 0\), establishing that the mutual information decays exponentially and approaches zero as \(t\to \infty\).

Applicability to standard chaotic systems

The assumptions underlying the proof—namely the existence of an ergodic invariant measure, a spectral gap for the Perron–Frobenius operator, and exponential decay of correlations—are satisfied by a broad class of well-studied chaotic dynamical systems. These include uniformly expanding maps, Anosov diffeomorphisms, and piecewise expanding systems, all of which admit the functional-analytic structure required for the convergence bounds established above. Although the Lorenz system is a continuous-time flow rather than a discrete map, the same reasoning applies to its time-\(\tau\) discretization \({\Phi }_{\tau }\). For any fixed sampling interval \(\tau >0\), the map \({\Phi }_{\tau }\) inherits exponential mixing properties on appropriate anisotropic Banach spaces, ensuring that the mutual-information decay proven in this appendix holds for the Lorenz attractor as well.

Conclusion

$$I\left( {X_{t} ;Y_{t} } \right) \le K\,e^{{ - 2\gamma^{\prime}t}} \to 0\;{\text{as}}\;t \to \infty .$$

For continuous-time flows (such as the Lorenz system), apply the argument to the time-\(\tau\) map \({\Phi }_{\tau }\), giving

$$I\left( t \right) \le K\,e^{{ - 2\gamma^{\prime}\left( {t/\tau } \right)}} .$$

Appendix B: entropy bound for deterministic post-processing of an \({\varvec{N}}\)-Bit Seed

Let

$$K \in \{ 0,1\}^{N}$$

denote the initial \(N\)-bit seed with probability mass function \({P}_{K}\). Its Shannon entropy is

$$H\left( K \right) = - \mathop \sum \limits_{{k \in \{ 0,1\}^{N} }} P_{K} \left( k \right)\,{\text{log}}P_{K} \left( k \right),$$

and satisfies \(H(K)\le N\), with equality when \(K\) is uniformly distributed.

Let the entire key–generation pipeline—mapping to a chaotic system, evolving the trajectory, sampling, quantizing, and producing the final key—be represented as a deterministic function

$$f:\{ 0,1\}^{N} \to {\mathcal{Y}},$$

and define the output random variable

$$Y = f\left( K \right).$$

The following theorem establishes that the output entropy cannot exceed the seed entropy.

Theorem B.1

(Deterministic Post-Processing Cannot Increase Entropy). If \(Y=f(K)\) for a deterministic function \(f\), then

$$H\left( Y \right) \le H\left( K \right) \le N.$$

Proof

Because \(Y\) is a deterministic function of \(K\), the conditional entropy vanishes:

$$H\left( {Y|K} \right) = 0.$$

Using the chain rule for entropy in two equivalent ways gives

$$H\left( {K,Y} \right) = H\left( K \right) + H\left( {Y|K} \right) = H\left( K \right),$$

and also

$$H\left( {K,Y} \right) = H\left( Y \right) + H\left( {K|Y} \right).$$

Equating the expressions yields

$$H\left( K \right) = H\left( Y \right) + H\left( {K|Y} \right).$$

Since conditional entropy is non-negative,

$$H\left( {K|Y} \right) \ge 0,$$

we obtain the bound

$$H\left( Y \right) \le H\left( K \right).$$

Because \(H(K)\le N\) for any \(N\)-bit seed, the result follows.

Corollary B.2.

For a uniformly random \(N\)-bit seed, the entropy of any derived key obtained through deterministic chaotic evolution and bit extraction satisfies.

$$H\left( Y \right) \le N.$$

Thus, no deterministic expansion procedure—including those based on chaotic dynamics—can increase the entropy beyond that already present in the initial \(N\)-bit seed.

Rights and permissions

Open Access This article is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License, which permits any non-commercial use, sharing, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if you modified the licensed material. You do not have permission under this licence to share adapted material derived from this article or parts of it. The images or other third party material in this article are included in the article’s Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by-nc-nd/4.0/.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Danvirutai, P., Wongthanavasu, S., Hoang, TM. et al. Hybrid quantum–chaotic key expansion enhances QKD rates using the Lorenz system. Sci Rep (2026). https://doi.org/10.1038/s41598-026-37470-6

Download citation

  • Received: 09 October 2025

  • Accepted: 22 January 2026

  • Published: 05 February 2026

  • DOI: https://doi.org/10.1038/s41598-026-37470-6

Share this article

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

Keywords

  • Secret key sharing
  • Quantum cryptography
  • Chaotic systems
  • Quantum key distribution
  • Deterministic chaos
  • Key-rate enhancement
Download PDF

Advertisement

Explore content

  • Research articles
  • News & Comment
  • Collections
  • Subjects
  • Follow us on Facebook
  • Follow us on X
  • Sign up for alerts
  • RSS feed

About the journal

  • About Scientific Reports
  • Contact
  • Journal policies
  • Guide to referees
  • Calls for Papers
  • Editor's Choice
  • Journal highlights
  • Open Access Fees and Funding

Publish with us

  • For authors
  • Language editing services
  • Open access funding
  • Submit manuscript

Search

Advanced search

Quick links

  • Explore articles by subject
  • Find a job
  • Guide to authors
  • Editorial policies

Scientific Reports (Sci Rep)

ISSN 2045-2322 (online)

nature.com sitemap

About Nature Portfolio

  • About us
  • Press releases
  • Press office
  • Contact us

Discover content

  • Journals A-Z
  • Articles by subject
  • protocols.io
  • Nature Index

Publishing policies

  • Nature portfolio policies
  • Open access

Author & Researcher services

  • Reprints & permissions
  • Research data
  • Language editing
  • Scientific editing
  • Nature Masterclasses
  • Research Solutions

Libraries & institutions

  • Librarian service & tools
  • Librarian portal
  • Open research
  • Recommend to library

Advertising & partnerships

  • Advertising
  • Partnerships & Services
  • Media kits
  • Branded content

Professional development

  • Nature Awards
  • Nature Careers
  • Nature Conferences

Regional websites

  • Nature Africa
  • Nature China
  • Nature India
  • Nature Japan
  • Nature Middle East
  • Privacy Policy
  • Use of cookies
  • Legal notice
  • Accessibility statement
  • Terms & Conditions
  • Your US state privacy rights
Springer Nature

© 2026 Springer Nature Limited

Nature Briefing AI and Robotics

Sign up for the Nature Briefing: AI and Robotics newsletter — what matters in AI and robotics research, free to your inbox weekly.

Get the most important science stories of the day, free in your inbox. Sign up for Nature Briefing: AI and Robotics