
1
Privacy-preserving Intelligent Resource Allocation
for Federated Edge Learning in Quantum Internet
Minrui Xu, Dusit Niyato, Fellow, IEEE, Zhaohui Yang, Zehui Xiong, Jiawen Kang*,
Dong In Kim, Fellow, IEEE, and Xuemin (Sherman) Shen, Fellow, IEEE
Abstract—Federated edge learning (FEL) is a promising
paradigm of distributed machine learning that can preserve data
privacy while training the global model collaboratively. However,
FEL is still facing model confidentiality issues due to eavesdrop-
ping risks of exchanging cryptographic keys through traditional
encryption schemes. Therefore, in this paper, we propose a
hierarchical architecture for quantum-secured FEL systems with
ideal security based on the quantum key distribution (QKD) to
facilitate public key and model encryption against eavesdropping
attacks. Specifically, we propose a stochastic resource allocation
model for efficient QKD to encrypt FEL keys and models. In
FEL systems, remote FEL workers are connected to cluster
heads via quantum-secured channels to train an aggregated
global model collaboratively. However, due to the unpredictable
number of workers at each location, the demand for secret-
key rates to support secure model transmission to the server is
unpredictable. The proposed systems need to efficiently allocate
limited QKD resources (i.e., wavelengths) such that the total cost
is minimized in the presence of stochastic demand by formulating
the optimization problem for the proposed architecture as a
stochastic programming model. To this end, we propose a fed-
erated reinforcement learning-based resource allocation scheme
to solve the proposed model without complete state information.
The proposed scheme enables QKD managers and controllers to
train a global QKD resource allocation policy while keeping their
private experiences local. Numerical results demonstrate that the
proposed schemes can successfully achieve the cost-minimizing
objective under uncertain demand while improving the training
efficiency by about 50% compared to state-of-the-art schemes.
Index Terms—Federated edge learning, quantum key distri-
bution (QKD), resource allocation, deep reinforcement learning
I. INTRODUCTION
ARTIFICIAL Intelligence (AI) enables a wide range of
computing and networking applications in edge net-
works, e.g., smart cities [1], [2], [3], Internet of Vehicles [4],
Minrui Xu and Dusit Niyato are with the School of Computer Science
and Engineering, Nanyang Technological University, Singapore (e-mail: min-
rui001@e.ntu.edu.sg; dniyato@ntu.edu.sg); Zhaohui Yang is with the College
of Information Science and Electronic Engineering, Zhejiang University,
Hangzhou 310007, China, and Zhejiang Provincial Key Lab of Information
Processing, Communication and Networking (IPCAN), Hangzhou 310007,
China, and also with Zhejiang Laboratory, Hangzhou 31121, China. (e-mail:
zhaohuiyang92@gmail.com); Zehui Xiong is with the Pillar of Information
Systems Technology and Design, Singapore University of Technology and
Design, Singapore 487372, Singapore (e-mail: zehui xiong@sutd.edu.sg);
Jiawen Kang is with the School of Automation, Guangdong University of
Technology, China (e-mail: kavinkang@gdut.edu.cn). Dong In Kim is with the
Department of Electrical and Computer Engineering, Sungkyunkwan Univer-
sity, Suwon 16419, South Korea (e-mail: dikim@skku.ac.kr); Xuemin (Sher-
man) Shen is with the Department of Electrical and Computer Engineer-
ing, University of Waterloo, Waterloo, ON, Canada, N2L 3G1 (e-mail:
sshen@uwaterloo.ca). (*Corresponding author: Jiawen Kang)
[5], and Metaverses [6], [7], [8]. As one of the critical
technologies in AI, federated edge learning (FEL) is a novel
paradigm of privacy-preserving machine learning (ML) for
intelligent edge networks [9]. In FEL, multiple data owners
(a.k.a., FEL workers) can train a global model collaboratively
for a model owner without exposing their sensitive raw data.
To ensure the security of data and models in FEL systems,
many modern cryptographic schemes are applied [10], such
as secure multi-party computation (MPC), trusted execution
environment (TEE), and safe key distribution. For instance,
a secure and trusted collaborative edge learning framework
is proposed in [11], where homomorphic encryption (HE)
and blockchain are leveraged to track and choke malicious
behaviors. With the rapidly increasing computation power of
quantum computers [12], novel techniques will be brought
to empower FEL systems, including large-scale searching,
optimization and semantic communication. However, the FEL
systems based on existing schemes are under serious security
threats. For example, traditional key distribution schemes
based on the hardness in computing of certain mathematical
problems are no longer considered to be safe in the post-
quantum era [10]. Fortunately, based on the quantum no-
cloning theorem [13] and the Heisenberg’s uncertainty prin-
ciple [14], quantum key distribution (QKD) [15] is promis-
ing for providing proven secure key distribution schemes
for collaborative training between FEL workers and model
owners by facilitating public key and model encryption against
eavesdropping attacks.
Originated from classical QKD schemes such as Bennett-
Brassard-1984 (BB84) [16] and Grosshans-Grangier-2002
(GG02) [17], some modern QKD schemes have paved the way
for the Quantum Internet [18] in recent years. For example,
the measurement device-independent QKD (MDI-QKD) [19]
provides one of the practical QKD solutions by increasing the
range of secure communications and filling the detection gaps
with an untrusted relay by avoiding any eavesdropping attacks
on the Quantum Internet. Although several existing works fo-
cus on the theoretical and experimental aspects of the deploy-
ments of MDI-QKD, the problems of QKD resource allocation
in the Quantum Internet have been largely overlooked [20].
For example, in [21], a deterministic programming model and
a heuristic approach based on the shortest path algorithm are
proposed to optimize the deployment cost of QKD resources.
However, the problem of optimal allocation of QKD resources
for quantum-secured FEL systems with heterogeneous data
and model owners remains open. In particular, the number of
participating FEL workers at different locations and times is
arXiv:2210.04308v1 [cs.NI] 9 Oct 2022