{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,23]],"date-time":"2026-02-23T11:13:37Z","timestamp":1771845217707,"version":"3.50.1"},"reference-count":47,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2026,2,12]],"date-time":"2026-02-12T00:00:00Z","timestamp":1770854400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2026,2,12]],"date-time":"2026-02-12T00:00:00Z","timestamp":1770854400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"name":"Ministry of Science, Higher Education and Youth of Canton Sarajevo, Bosnia and Herzegovina","award":["Post-Quantum Crypto Agile Solution for Protection by Encryption Resilience (PQcasper)"],"award-info":[{"award-number":["Post-Quantum Crypto Agile Solution for Protection by Encryption Resilience (PQcasper)"]}]},{"DOI":"10.13039\/501100004504","name":"Research Council of Lithuania","doi-asserted-by":"crossref","award":["P-ITP-24-9"],"award-info":[{"award-number":["P-ITP-24-9"]}],"id":[{"id":"10.13039\/501100004504","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Technical University of Ostrava"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"abstract":"<jats:title>Abstract<\/jats:title>\n                  <jats:p>The integration of quantum key distribution (QKD) into data centers represents a promising advance in secure communications. As cyber threats evolve and the volume of sensitive information grows, strengthening intra-data center security has become a strategic necessity for ensuring confidentiality and operational resilience. This paper explores the application of an entanglement-based QKD method for securing intra-connectivity within data centers, focusing on deploying the BBM92 protocol in a controlled environment. We detail the system architecture, technical requirements, and operational considerations, and we report simulation results from a 100-block BBM92 run: an average sifted key of 1224 bits per block, with 25% used for QBER estimation, reconciliation disclosures of 352 bits, and privacy amplification removing an additional 13 bits, yielding a final secure key of 554 bits per block at an average rate of 52 bps. Across the run, 86 keys were delivered to applications, enabling 43 IKEv2\/IPsec sessions, with an initial ramp-up before reaching steady, near-linear key service. These findings indicate that entanglement-based QKD can provide robust, quantum-safe key distribution for data center environments while highlighting practical integration challenges and performance trade-offs.<\/jats:p>","DOI":"10.1007\/s11128-026-05055-x","type":"journal-article","created":{"date-parts":[[2026,2,12]],"date-time":"2026-02-12T10:27:46Z","timestamp":1770892066000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Design and simulation of secure data center intra-connectivity using entangled quantum key distribution"],"prefix":"10.1007","volume":"25","author":[{"given":"Miralem","family":"Mehic","sequence":"first","affiliation":[]},{"given":"Peppino","family":"Fazio","sequence":"additional","affiliation":[]},{"given":"Stefan","family":"Rass","sequence":"additional","affiliation":[]},{"given":"Sergej","family":"Jakovlev","sequence":"additional","affiliation":[]},{"given":"Miroslav","family":"Voznak","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,2,12]]},"reference":[{"issue":"1","key":"5055_CR1","doi-asserted-by":"publisher","first-page":"302","DOI":"10.1109\/COMST.2023.3309051","volume":"26","author":"M Mehic","year":"2023","unstructured":"Mehic, M., Michalek, L., Dervisevic, E., Burdiak, P., Plakalovic, M., Rozhon, J., Mahovac, N., Richter, F., Kaljic, E., Lauterbach, F., et al.: Quantum cryptography in 5G networks: a comprehensive overview. IEEE Commun. Surv. Tutor. 26(1), 302\u2013346 (2023)","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"5","key":"5055_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3402192","volume":"53","author":"M Mehic","year":"2020","unstructured":"Mehic, M., Niemiec, M., Rass, S., Ma, J., Peev, M., Aguado, A., Martin, V., Schauer, S., Poppe, A., Pacher, C., et al.: Quantum key distribution: a networking perspective. ACM Comput. Surv. 53(5), 1\u201341 (2020). https:\/\/doi.org\/10.1145\/3402192","journal-title":"ACM Comput. Surv."},{"key":"5055_CR3","unstructured":"Dervisevic, E., Mehic, M.: Overview of quantum key distribution technique within IPsec architecture (2021). arXiv preprint arXiv:2112.13105"},{"key":"5055_CR4","doi-asserted-by":"crossref","unstructured":"Bennett, C.H., Brassard, G.: An update on quantum cryptography. In: Workshop on the Theory and Application of Cryptographic Techniques, pp. 475\u2013480. Springer (1984)","DOI":"10.1007\/3-540-39568-7_39"},{"key":"5055_CR5","unstructured":"Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. In: Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, vol. 175, p. 8 (1984)"},{"issue":"3\u20134","key":"5055_CR6","first-page":"172","volume":"43","author":"W Heisenberg","year":"1927","unstructured":"Heisenberg, W.: \u00dcber den anschaulichen inhalt der quantentheoretischen kinematik und mechanik. Z. Angew. Phys. 43(3\u20134), 172\u2013198 (1927)","journal-title":"Z. Angew. Phys."},{"issue":"5886","key":"5055_CR7","doi-asserted-by":"publisher","first-page":"802","DOI":"10.1038\/299802a0","volume":"299","author":"WK Wootters","year":"1982","unstructured":"Wootters, W.K., Zurek, W.H.: A single quantum cannot be cloned. Nature 299(5886), 802\u2013803 (1982)","journal-title":"Nature"},{"issue":"4","key":"5055_CR8","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1145\/74074.74087","volume":"20","author":"CH Bennett","year":"1989","unstructured":"Bennett, C.H., Brassard, G.: Experimental quantum cryptography: the dawn of a new era for quantum cryptography: the experimental prototype is working. ACM SIGACT News 20(4), 78\u201380 (1989)","journal-title":"ACM SIGACT News"},{"key":"5055_CR9","doi-asserted-by":"crossref","unstructured":"Mehic, M., Rass, S., Fazio, P., Voznak, M.: Fundamentals of quantum key distribution. In: Quantum Key Distribution Networks, pp. 1\u201328. Springer, Cham (2022)","DOI":"10.1007\/978-3-031-06608-5_1"},{"issue":"21","key":"5055_CR10","doi-asserted-by":"publisher","first-page":"3121","DOI":"10.1103\/PhysRevLett.68.3121","volume":"68","author":"CH Bennett","year":"1992","unstructured":"Bennett, C.H.: Quantum cryptography using any two nonorthogonal states. Phys. Rev. Lett. 68(21), 3121 (1992). https:\/\/doi.org\/10.1103\/PhysRevLett.68.3121","journal-title":"Phys. Rev. Lett."},{"issue":"7","key":"5055_CR11","doi-asserted-by":"publisher","DOI":"10.1007\/s11433-024-2618-y","volume":"68","author":"Z Tian","year":"2025","unstructured":"Tian, Z., Xie, Z., Chen, Y., Fan, X., Huang, J., Mu, T., Guo, J., Wei, K., Sun, S.: Reference-frame-independent quantum key distribution based on machine-learning-enhanced qubit-based synchronization. Sci. China Phys. Mech. Astron. 68(7), 270312 (2025)","journal-title":"Sci. China Phys. Mech. Astron."},{"issue":"7","key":"5055_CR12","doi-asserted-by":"publisher","DOI":"10.1007\/s11433-024-2378-1","volume":"67","author":"H-W Li","year":"2024","unstructured":"Li, H.-W., Hao, C.-P., Chen, Z.-J., Gong, L., Lu, Y.-F., Wang, Y., Li, J.-J., Zhang, C.-M., Wang, R., Yin, Z.-Q., et al.: Security of quantum key distribution with virtual mutually unbiased bases. Sci. China Phys. Mech. Astron. 67(7), 270313 (2024)","journal-title":"Sci. China Phys. Mech. Astron."},{"issue":"6","key":"5055_CR13","doi-asserted-by":"publisher","first-page":"162","DOI":"10.1007\/s11128-025-04780-z","volume":"24","author":"Z-J Chen","year":"2025","unstructured":"Chen, Z.-J., Hao, C.-P., Gong, L., Guo, J.-S., Wang, Y., Zhang, C.-M., Li, H.-W.: Improving the performance of quantum key distribution with weak-randomness basis selection: Z. J. Chen et al. Quantum Inf. Process. 24(6), 162 (2025)","journal-title":"Quantum Inf. Process."},{"issue":"1","key":"5055_CR14","doi-asserted-by":"publisher","DOI":"10.1016\/j.heliyon.2023.e23578","volume":"10","author":"E Dervisevic","year":"2024","unstructured":"Dervisevic, E., Voznak, M., Mehic, M.: Bases selection with pseudo-random functions in BB84 scheme. Heliyon 10(1), e23578 (2024). https:\/\/doi.org\/10.1016\/j.heliyon.2023.e23578","journal-title":"Heliyon"},{"issue":"7705","key":"5055_CR15","doi-asserted-by":"publisher","first-page":"400","DOI":"10.1038\/s41586-018-0066-6","volume":"557","author":"M Lucamarini","year":"2018","unstructured":"Lucamarini, M., Yuan, Z.L., Dynes, J.F., Shields, A.J.: Overcoming the rate-distance limit of quantum key distribution without quantum repeaters. Nature 557(7705), 400\u2013403 (2018)","journal-title":"Nature"},{"issue":"13","key":"5055_CR16","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.108.130503","volume":"108","author":"H-K Lo","year":"2012","unstructured":"Lo, H.-K., Curty, M., Qi, B.: Measurement-device-independent quantum key distribution. Phys. Rev. Lett. 108(13), 130503 (2012). https:\/\/doi.org\/10.1103\/PhysRevLett.108.130503","journal-title":"Phys. Rev. Lett."},{"key":"5055_CR17","doi-asserted-by":"publisher","unstructured":"Tamaki, K., Lo, H.K., Fung, C.H.F., Qi, B.: Phase encoding schemes for measurement-device-independent quantum key distribution with basis-dependent flaw. Phys. Rev. A At. Mol. Opt. Phys. 85(4), 1\u201317 (2012). https:\/\/doi.org\/10.1103\/PhysRevA.85.042307. arXiv:1111.3413","DOI":"10.1103\/PhysRevA.85.042307"},{"issue":"2","key":"5055_CR18","doi-asserted-by":"publisher","DOI":"10.1103\/PRXQuantum.3.020315","volume":"3","author":"Y-M Xie","year":"2022","unstructured":"Xie, Y.-M., Lu, Y.-S., Weng, C.-X., Cao, X.-Y., Jia, Z.-Y., Bao, Y., Wang, Y., Fu, Y., Yin, H.-L., Chen, Z.-B.: Breaking the rate-loss bound of quantum key distribution with asynchronous two-photon interference. Prx Quantum 3(2), 020315 (2022)","journal-title":"Prx Quantum"},{"issue":"2","key":"5055_CR19","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1038\/s41566-021-00928-2","volume":"16","author":"S Wang","year":"2022","unstructured":"Wang, S., Yin, Z.-Q., He, D.-Y., Wang, R.-Q., Ye, P., Zhou, Y., Fan-Yuan, G.-J., Wang, F.-X., Chen, W., Chen, W., et al.: Twin-field quantum key distribution over 830-km fibre. Nat. Photon. 16(2), 154\u2013161 (2022)","journal-title":"Nat. Photon."},{"issue":"2","key":"5055_CR20","doi-asserted-by":"publisher","first-page":"822","DOI":"10.1103\/PhysRevA.57.822","volume":"57","author":"S Bose","year":"1998","unstructured":"Bose, S., Vedral, V., Knight, P.L.: Multiparticle generalization of entanglement swapping. Phys. Rev. A 57(2), 822 (1998)","journal-title":"Phys. Rev. A"},{"issue":"23","key":"5055_CR21","doi-asserted-by":"publisher","first-page":"0395","DOI":"10.1126\/sciadv.abe0395","volume":"7","author":"M Proietti","year":"2021","unstructured":"Proietti, M., Ho, J., Grasselli, F., Barrow, P., Malik, M., Fedrizzi, A.: Experimental quantum conference key agreement. Sci. Adv. 7(23), 0395 (2021)","journal-title":"Sci. Adv."},{"issue":"2","key":"5055_CR22","doi-asserted-by":"publisher","first-page":"777","DOI":"10.1103\/RevModPhys.84.777","volume":"84","author":"J-W Pan","year":"2012","unstructured":"Pan, J.-W., Chen, Z.-B., Lu, C.-Y., Weinfurter, H., Zeilinger, A., \u017bukowski, M.: Multiphoton entanglement and interferometry. Rev. Mod. Phys. 84(2), 777\u2013838 (2012)","journal-title":"Rev. Mod. Phys."},{"issue":"6","key":"5055_CR23","doi-asserted-by":"publisher","DOI":"10.1088\/1361-6633\/addeec","volume":"88","author":"Y-S Lu","year":"2025","unstructured":"Lu, Y.-S., Yin, H.-L., Xie, Y.-M., Fu, Y., Chen, Z.-B.: Repeater-like asynchronous measurement-device-independent quantum conference key agreement. Rep. Prog. Phys. 88(6), 067901 (2025)","journal-title":"Rep. Prog. Phys."},{"key":"5055_CR24","doi-asserted-by":"publisher","unstructured":"Beige, A., Englert, B.-G.G., Kurtsiefer, C., Weinfurter, H.: Secure communication with a publicly known key. Acta Phys. Pol. A 101(3), 357\u2013368 (2002) https:\/\/doi.org\/10.12693\/APhysPolA.101.357. arXiv:0111106 [quant-ph]","DOI":"10.12693\/APhysPolA.101.357"},{"issue":"22","key":"5055_CR25","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.118.220501","volume":"118","author":"W Zhang","year":"2017","unstructured":"Zhang, W., Ding, D.-S., Sheng, Y.-B., Zhou, L., Shi, B.-S., Guo, G.-C.: Quantum secure direct communication with quantum memory. Phys. Rev. Lett. 118(22), 220501 (2017)","journal-title":"Phys. Rev. Lett."},{"issue":"4","key":"5055_CR26","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.68.042317","volume":"68","author":"F-G Deng","year":"2003","unstructured":"Deng, F.-G., Long, G.L., Liu, X.-S.: Two-step quantum direct communication protocol using the Einstein\u2013Podolsky\u2013Rosen pair block. Phys. Rev. A 68(4), 042317 (2003)","journal-title":"Phys. Rev. A"},{"issue":"3","key":"5055_CR27","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1109\/MNET.108.2100375","volume":"36","author":"G-L Long","year":"2022","unstructured":"Long, G.-L., Pan, D., Sheng, Y.-B., Xue, Q., Lu, J., Hanzo, L.: An evolutionary pathway for the quantum internet relying on secure classical repeaters. IEEE Netw. 36(3), 82\u201388 (2022)","journal-title":"IEEE Netw."},{"issue":"5","key":"5055_CR28","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.69.052319","volume":"69","author":"F-G Deng","year":"2004","unstructured":"Deng, F.-G., Long, G.L.: Secure direct communication with a quantum one-time pad. Phys. Rev. A At. Mol. Opt. Phys. 69(5), 052319 (2004)","journal-title":"Phys. Rev. A At. Mol. Opt. Phys."},{"issue":"9","key":"5055_CR29","doi-asserted-by":"publisher","first-page":"16144","DOI":"10.1038\/lsa.2016.144","volume":"5","author":"J-Y Hu","year":"2016","unstructured":"Hu, J.-Y., Yu, B., Jing, M.-Y., Xiao, L.-T., Jia, S.-T., Qin, G.-Q., Long, G.-L.: Experimental quantum secure direct communication with single photons. Light Sci. Appl. 5(9), 16144 (2016)","journal-title":"Light Sci. Appl."},{"issue":"14","key":"5055_CR30","doi-asserted-by":"publisher","first-page":"28917","DOI":"10.1364\/OE.538593","volume":"33","author":"I Paparelle","year":"2025","unstructured":"Paparelle, I., Mousavi, F., Scazza, F., Bassi, A., Paris, M., Zavatta, A.: Experimental direct quantum communication with squeezed states. Opt. Express 33(14), 28917\u201328934 (2025)","journal-title":"Opt. Express"},{"issue":"4","key":"5055_CR31","doi-asserted-by":"publisher","first-page":"367","DOI":"10.1016\/j.scib.2021.11.002","volume":"67","author":"Y-B Sheng","year":"2022","unstructured":"Sheng, Y.-B., Zhou, L., Long, G.-L.: One-step quantum secure direct communication. Sci. Bull. 67(4), 367\u2013374 (2022)","journal-title":"Sci. Bull."},{"key":"5055_CR32","doi-asserted-by":"publisher","first-page":"1445","DOI":"10.1016\/j.scib.2025.02.038","volume":"70","author":"Y Yang","year":"2025","unstructured":"Yang, Y., Li, Y., Li, H., Wu, C., Zheng, Y., Chen, X.: A 300-km fully-connected quantum secure direct communication network. Sci. Bull. 70, 1445\u20131451 (2025)","journal-title":"Sci. Bull."},{"key":"5055_CR33","doi-asserted-by":"crossref","unstructured":"Mehic, M., Rass, S., Dervisevic, E., Fazio, P., Jakovlev, S., Voznak, M.: Overview of quantum key distribution network key-delivery specifications. In: 2025 International Conference on Quantum Communications, Networking, and Computing (QCNC), pp. 83\u201390. IEEE (2025)","DOI":"10.1109\/QCNC64685.2025.00021"},{"key":"5055_CR34","doi-asserted-by":"publisher","DOI":"10.1364\/JOCN.577670","author":"E Dervisevic","year":"2025","unstructured":"Dervisevic, E., Tankovic, A., Kaljic, E., Voznak, M., Mehic, M.: Design of a key management system for efficient key supply in quantum key distribution networks. J. Opt. Commun. Netw. (2025). https:\/\/doi.org\/10.1364\/JOCN.577670","journal-title":"J. Opt. Commun. Netw."},{"issue":"10","key":"5055_CR35","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3730575","volume":"57","author":"E Dervisevic","year":"2025","unstructured":"Dervisevic, E., Tankovic, A., Fazel, E., Kompella, R., Fazio, P., Voznak, M., Mehic, M.: Quantum key distribution networks-key management: a survey. ACM Comput. Surv. 57(10), 1\u201336 (2025). https:\/\/doi.org\/10.1145\/3730575","journal-title":"ACM Comput. Surv."},{"issue":"1","key":"5055_CR36","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.62.012313","volume":"62","author":"H-K Lo","year":"2000","unstructured":"Lo, H.-K.: Classical-communication cost in distributed quantum-information processing: a generalization of quantum-communication complexity. Phys. Rev. A 62(1), 012313 (2000). https:\/\/doi.org\/10.1103\/PhysRevA.62.012313","journal-title":"Phys. Rev. A"},{"issue":"4","key":"5055_CR37","doi-asserted-by":"publisher","first-page":"3004","DOI":"10.1364\/OE.19.003004","volume":"19","author":"A Scherer","year":"2011","unstructured":"Scherer, A., Sanders, B.C., Tittel, W.: Long-distance practical quantum key distribution by entanglement swapping. Opt. Express 19(4), 3004\u20133018 (2011). https:\/\/doi.org\/10.1364\/OE.19.003004","journal-title":"Opt. Express"},{"key":"5055_CR38","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-06608-5","volume-title":"Quantum Key Distribution Networks: A Quality of Service Perspective","author":"M Mehic","year":"2022","unstructured":"Mehic, M., Rass, S., Fazio, P., Voznak, M.: Quantum Key Distribution Networks: A Quality of Service Perspective. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-06608-5"},{"issue":"1 & 2","key":"5055_CR39","first-page":"2016","volume":"9","author":"S Rass","year":"2016","unstructured":"Rass, S., K\u00f6nig, S., Schauer, S., Maurhart, O.: Implementation and evaluation of intrinsic authentication in quantum key distribution protocols. Int. J. Adv. Secur. 9(1 & 2), 2016 (2016)","journal-title":"Int. J. Adv. Secur."},{"issue":"4","key":"5055_CR40","doi-asserted-by":"publisher","first-page":"449","DOI":"10.1364\/JOCN.503356","volume":"16","author":"E Dervisevic","year":"2024","unstructured":"Dervisevic, E., Mehic, M., Voznak, M.: Large-scale quantum key distribution network simulator. J. Opt. Commun. Netw. 16(4), 449\u2013462 (2024). https:\/\/doi.org\/10.1364\/JOCN.503356","journal-title":"J. Opt. Commun. Netw."},{"key":"5055_CR41","doi-asserted-by":"crossref","unstructured":"Dervisevic, E., Lauterbach, F., Burdiak, P., Rozhon, J., Sl\u00edvov\u00e1, M., Plakalovic, M., Hamza, M., Fazio, P., Voznak, M., Mehic, M.: Simulations of denial of service attacks in quantum key distribution networks. In: 2022 XXVIII International Conference on Information, Communication and Automation Technologies (ICAT), pp. 1\u20135. IEEE (2022)","DOI":"10.1109\/ICAT54566.2022.9811238"},{"issue":"1","key":"5055_CR42","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1109\/MNET.2024.3398404","volume":"39","author":"M Mehic","year":"2025","unstructured":"Mehic, M., Dervisevic, E., Burdiak, P., Lipovac, V., Fazio, P., Voznak, M.: Emulation of quantum key distribution networks. IEEE Netw. 39(1), 116\u2013123 (2025). https:\/\/doi.org\/10.1109\/MNET.2024.3398404","journal-title":"IEEE Netw."},{"key":"5055_CR43","unstructured":"Bartlett, B.: A distributed simulation framework for quantum networks and channels (2018). arXiv preprint arXiv:1808.07047"},{"issue":"16","key":"5055_CR44","doi-asserted-by":"publisher","first-page":"3865","DOI":"10.1364\/OPEX.12.003865","volume":"12","author":"A Poppe","year":"2004","unstructured":"Poppe, A., Fedrizzi, A., Ursin, R., B\u00f6hm, H., Lor\u00fcnser, T., Maurhardt, O., Peev, M., Suda, M., Kurtsiefer, C., Weinfurter, H., et al.: Practical quantum key distribution with polarization entangled photons. Opt. Express 12(16), 3865\u20133871 (2004). https:\/\/doi.org\/10.1364\/OPEX.12.003865","journal-title":"Opt. Express"},{"key":"5055_CR45","doi-asserted-by":"publisher","DOI":"10.1177\/15485129231154929","author":"DL Vitullo","year":"2023","unstructured":"Vitullo, D.L., Cook, T., Jones, D.E., Scott, L.M., Toth, A., Kirby, B.T.: Simulating quantum key distribution in fiber-based quantum networks. J. Defense Model. Simul. (2023). https:\/\/doi.org\/10.1177\/15485129231154929","journal-title":"J. Defense Model. Simul."},{"issue":"1","key":"5055_CR46","doi-asserted-by":"publisher","first-page":"2301026","DOI":"10.1002\/lpor.202301026","volume":"19","author":"Y Huang","year":"2025","unstructured":"Huang, Y., Qi, Z., Yang, Y., Zhang, Y., Li, Y., Zheng, Y., Chen, X.: A sixteen-user time-bin entangled quantum communication network with fully connected topology. Laser Photon. Rev. 19(1), 2301026 (2025)","journal-title":"Laser Photon. Rev."},{"issue":"15","key":"5055_CR47","doi-asserted-by":"publisher","DOI":"10.1103\/7wrk-p6gl","volume":"135","author":"Y-R Xiao","year":"2025","unstructured":"Xiao, Y.-R., Yin, H.-L., Hua, W.-J., Cao, X.-Y., Chen, Z.-B.: Experimental efficient source-independent quantum secret sharing against coherent attacks. Phys. Rev. Lett. 135(15), 150801 (2025)","journal-title":"Phys. Rev. Lett."}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-026-05055-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11128-026-05055-x","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-026-05055-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,23]],"date-time":"2026-02-23T10:51:57Z","timestamp":1771843917000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11128-026-05055-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,2,12]]},"references-count":47,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2026,2]]}},"alternative-id":["5055"],"URL":"https:\/\/doi.org\/10.1007\/s11128-026-05055-x","relation":{},"ISSN":["1573-1332"],"issn-type":[{"value":"1573-1332","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,2,12]]},"assertion":[{"value":"10 October 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 January 2026","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 February 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"65"}}