Search papers, labs, and topics across Lattice.
This paper presents a comprehensive review of multiparty quantum key agreement (MQKA) protocols, framing them as a design space defined by network architecture, quantum resources, and security models. It classifies existing MQKA protocols into structural families, maps them to underlying quantum resources, and analyzes the impact of different security models on fairness and collusion resistance. The authors identify open challenges in composable security, network integration, and device-independent implementations, proposing a roadmap for future MQKA development.
MQKA protocols are not isolated solutions, but a rich design space with trade-offs between network architecture, quantum resources, and security models that demands a more holistic approach.
Multiparty quantum key agreement (MQKA) enables $n \geq 3$ mutually distrustful users to establish a shared secret key through collaborative quantum protocols. In this paper, we provide a comprehensive review where we argue that MQKA is best understood as a design space organized along three orthogonal but tightly coupled axes: (1) network architecture, which determines how quantum states flow between participants; (2) quantum resources, which encode the physical degrees of freedom used for implementation; and (3) security model, which defines trust assumptions about devices and infrastructure. Rather than treating MQKA as a linear sequence of isolated protocols, we develop this three-axis perspective to reveal recurrent patterns, sharp trade-offs, and unexplored design spaces. We classify MQKA protocols into structural families, map them to underlying quantum resources, and analyze how different security models shape fairness and collusion resistance. We further identify open challenges in composable security frameworks, network native integration, device-independent implementations, and propose a research roadmap toward hybrid-resource, bosonic-code-encoded, and fairness-aware MQKA suitable for the future quantum internet deployments in the post-NISQ era.