{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,2]],"date-time":"2026-04-02T09:02:09Z","timestamp":1775120529467,"version":"3.50.1"},"reference-count":39,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2026,4,2]],"date-time":"2026-04-02T00:00:00Z","timestamp":1775088000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,4,2]],"date-time":"2026-04-02T00:00:00Z","timestamp":1775088000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62471161"],"award-info":[{"award-number":["62471161"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National Cryptography Science Fund","award":["2025NCSF02051"],"award-info":[{"award-number":["2025NCSF02051"]}]},{"name":"Innovation Program for Quantum Science and Technology","award":["2021ZD0300701"],"award-info":[{"award-number":["2021ZD0300701"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"DOI":"10.1007\/s11128-026-05128-x","type":"journal-article","created":{"date-parts":[[2026,4,2]],"date-time":"2026-04-02T07:53:46Z","timestamp":1775116426000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A routing protocol robust to link state fluctuations for quantum key distribution networks"],"prefix":"10.1007","volume":"25","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-1340-3439","authenticated-orcid":false,"given":"Jia-Meng","family":"Yao","sequence":"first","affiliation":[]},{"given":"Xiao-Feng","family":"Xue","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2783-821X","authenticated-orcid":false,"given":"Hao-Kun","family":"Mao","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8627-4066","authenticated-orcid":false,"given":"Qiong","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,4,2]]},"reference":[{"issue":"2","key":"5128_CR1","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1137\/S0036144598347011","volume":"41","author":"PW Shor","year":"1999","unstructured":"Shor, P.W.: Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer. SIAM Rev. 41(2), 303\u2013332 (1999). https:\/\/doi.org\/10.1137\/S0036144598347011","journal-title":"SIAM Rev."},{"issue":"2","key":"5128_CR2","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1103\/PhysRevLett.79.325","volume":"79","author":"LK Grover","year":"1997","unstructured":"Grover, L.K.: Quantum Mechanics Helps in Searching for a Needle in a Haystack. Phys. Rev. Lett. 79(2), 325\u2013328 (1997). https:\/\/doi.org\/10.1103\/PhysRevLett.79.325","journal-title":"Phys. Rev. Lett."},{"issue":"1","key":"5128_CR3","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1103\/RevModPhys.74.145","volume":"74","author":"N Gisin","year":"2002","unstructured":"Gisin, N., Ribordy, G., Tittel, W.: Quantum cryptography. Rev. Modern Phys. 74(1), 145\u2013195 (2002). https:\/\/doi.org\/10.1103\/RevModPhys.74.145","journal-title":"Rev. Modern Phys."},{"issue":"3\u20134","key":"5128_CR4","doi-asserted-by":"publisher","first-page":"172","DOI":"10.1007\/BF01397280","volume":"43","author":"W Heisenberg","year":"1927","unstructured":"Heisenberg, W.: \u00dcber den anschaulichen Inhalt der quantentheoretischen Kinematik und Mechanik. Z. Angew. Phys. 43(3\u20134), 172\u2013198 (1927). https:\/\/doi.org\/10.1007\/BF01397280","journal-title":"Z. Angew. Phys."},{"issue":"5886","key":"5128_CR5","doi-asserted-by":"publisher","first-page":"802","DOI":"10.1038\/299802a0","volume":"299","author":"WK Wootters","year":"1982","unstructured":"Wootters, W.K., Zurek, W.H.: A single quantum cannot be cloned. Nature 299(5886), 802\u2013803 (1982). https:\/\/doi.org\/10.1038\/299802a0","journal-title":"Nature"},{"issue":"4","key":"5128_CR6","doi-asserted-by":"publisher","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","volume":"28","author":"CE Shannon","year":"1949","unstructured":"Shannon, C.E.: Communication theory of secrecy systems. Bell Syst. Tech. J. 28(4), 656\u2013715 (1949). https:\/\/doi.org\/10.1002\/j.1538-7305.1949.tb00928.x","journal-title":"Bell Syst. Tech. J."},{"issue":"7841","key":"5128_CR7","doi-asserted-by":"publisher","first-page":"214","DOI":"10.1038\/s41586-020-03093-8","volume":"589","author":"Y-A Chen","year":"2021","unstructured":"Chen, Y.-A., Zhang, Q., Chen, T.-Y.: An integrated space-to-ground quantum communication network over 4,600 kilometres. Nature 589(7841), 214\u2013219 (2021). https:\/\/doi.org\/10.1038\/s41586-020-03093-8","journal-title":"Nature"},{"issue":"8","key":"5128_CR8","doi-asserted-by":"publisher","first-page":"570","DOI":"10.1038\/s41566-021-00828-5","volume":"15","author":"J-P Chen","year":"2021","unstructured":"Chen, J.-P., Zhang, C., Liu, Y.: Twin-field quantum key distribution over a 511 km optical fibre linking two distant metropolitan areas. Nat. Photonics 15(8), 570\u2013575 (2021). https:\/\/doi.org\/10.1038\/s41566-021-00828-5","journal-title":"Nat. Photonics"},{"issue":"2","key":"5128_CR9","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1038\/s41566-021-00928-2","volume":"16","author":"S Wang","year":"2022","unstructured":"Wang, S., Yin, Z.-Q., He, D.-Y.: Twin-field quantum key distribution over 830-km fibre. Nat. Photonics 16(2), 154\u2013161 (2022). https:\/\/doi.org\/10.1038\/s41566-021-00928-2","journal-title":"Nat. Photonics"},{"key":"5128_CR10","doi-asserted-by":"publisher","DOI":"10.1088\/978-1-6817-4653-1","volume-title":"An Introduction to Quantum Communications Networks: Or, How Shall We Communicate in the Quantum Era?","author":"M Razavi","year":"2018","unstructured":"Razavi, M.: An Introduction to Quantum Communications Networks: Or, How Shall We Communicate in the Quantum Era? Morgan & Claypool Publishers, San Rafael (2018)"},{"issue":"4","key":"5128_CR11","doi-asserted-by":"publisher","DOI":"10.1088\/2058-9565\/ab4bea","volume":"4","author":"Q Zhang","year":"2019","unstructured":"Zhang, Q., Xu, F., Li, L.: Quantum information research in China. Quantum Sci. Technol. 4(4), 040503 (2019). https:\/\/doi.org\/10.1088\/2058-9565\/ab4bea","journal-title":"Quantum Sci. Technol."},{"issue":"7","key":"5128_CR12","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.124.070501","volume":"124","author":"J-P Chen","year":"2020","unstructured":"Chen, J.-P., Zhang, C., Liu, Y.: Sending-or-Not-Sending with Independent Lasers: Secure Twin-Field Quantum Key Distribution over 509 km. Phys. Rev. Lett. 124(7), 070501 (2020). https:\/\/doi.org\/10.1103\/PhysRevLett.124.070501","journal-title":"Phys. Rev. Lett."},{"issue":"1","key":"5128_CR13","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.82.012304","volume":"82","author":"A Laing","year":"2010","unstructured":"Laing, A., Scarani, V., Rarity, J.G., O\u2019Brien, J.L.: Reference-frame-independent quantum key distribution. Phys. Rev. A 82(1), 012304 (2010). https:\/\/doi.org\/10.1103\/PhysRevA.82.012304","journal-title":"Phys. Rev. A"},{"issue":"5","key":"5128_CR14","doi-asserted-by":"publisher","first-page":"1237","DOI":"10.1007\/s11128-013-0726-2","volume":"13","author":"Z-Q Yin","year":"2014","unstructured":"Yin, Z.-Q., Wang, S., Chen, W., Li, H.-W., Guo, G.-C., Han, Z.-F.: Reference-free-independent quantum key distribution immune to detector side channel attacks. Quantum Inf. Process. 13(5), 1237\u20131244 (2014). https:\/\/doi.org\/10.1007\/s11128-013-0726-2","journal-title":"Quantum Inf. Process."},{"issue":"16","key":"5128_CR15","doi-asserted-by":"publisher","first-page":"4219","DOI":"10.1364\/OL.470558","volume":"47","author":"J-R Zhu","year":"2022","unstructured":"Zhu, J.-R., Wang, R., Zhang, C.-M.: Improved reference-frame-independent quantum key distribution. Opt. Lett. 47(16), 4219 (2022). https:\/\/doi.org\/10.1364\/OL.470558","journal-title":"Opt. Lett."},{"issue":"3","key":"5128_CR16","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.120.030501","volume":"120","author":"S-K Liao","year":"2018","unstructured":"Liao, S.-K., Cai, W.-Q., Handsteiner, J.: Satellite-Relayed Intercontinental Quantum Network. Phys. Rev. Lett. 120(3), 030501 (2018). https:\/\/doi.org\/10.1103\/PhysRevLett.120.030501","journal-title":"Phys. Rev. Lett."},{"key":"5128_CR17","doi-asserted-by":"publisher","unstructured":"Elliott, C., Colvin, A., Pearson, D., : Current status of the DARPA quantum network. In: Donkor, E.J., Pirich, A.R., Brandt, H.E. (eds.) Quantum Information and Computation III, vol. 5815, pp. 138\u2013149 (2005). https:\/\/doi.org\/10.1117\/12.606489","DOI":"10.1117\/12.606489"},{"key":"5128_CR18","doi-asserted-by":"publisher","unstructured":"Tanizawa, Y., Takahashi, R., Dixon, A.R.: A routing method designed for a quantum key distribution network. In: 2016 Eighth International Conference on Ubiquitous and Future Networks (ICUFN), pp. 208\u2013214 (2016). https:\/\/doi.org\/10.1109\/ICUFN.2016.7537018","DOI":"10.1109\/ICUFN.2016.7537018"},{"issue":"10","key":"5128_CR19","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1007\/s11128-017-1702-z","volume":"16","author":"M Mehic","year":"2017","unstructured":"Mehic, M., Maurhart, O., Rass, S.: Implementation of quantum key distribution network simulation module in the network simulator NS-3. Quantum Inf. Process. 16(10), 253 (2017). https:\/\/doi.org\/10.1007\/s11128-017-1702-z","journal-title":"Quantum Inf. Process."},{"issue":"7","key":"5128_CR20","doi-asserted-by":"publisher","first-page":"911","DOI":"10.3390\/e24070911","volume":"24","author":"J Yao","year":"2022","unstructured":"Yao, J., Wang, Y., Li, Q.: An Efficient Routing Protocol for Quantum Key Distribution Networks. Entropy 24(7), 911 (2022). https:\/\/doi.org\/10.3390\/e24070911","journal-title":"Entropy"},{"issue":"5","key":"5128_CR21","doi-asserted-by":"publisher","first-page":"6892","DOI":"10.1364\/OE.27.006892","volume":"27","author":"Y Cao","year":"2019","unstructured":"Cao, Y., Zhao, Y., Wang, J.: SDQaaS: Software defined networking for quantum key distribution as a service. Opt. Express 27(5), 6892 (2019). https:\/\/doi.org\/10.1364\/OE.27.006892","journal-title":"Opt. Express"},{"issue":"14","key":"5128_CR22","doi-asserted-by":"publisher","first-page":"21225","DOI":"10.1364\/OE.425562","volume":"29","author":"X Yu","year":"2021","unstructured":"Yu, X., Liu, X., Liu, Y.: Multi-path-based quasi-real-time key provisioning in quantum-key-distribution enabled optical networks (QKD-ON). Opt. Express 29(14), 21225 (2021). https:\/\/doi.org\/10.1364\/OE.425562","journal-title":"Opt. Express"},{"issue":"9","key":"5128_CR23","doi-asserted-by":"publisher","first-page":"15219","DOI":"10.1109\/JIOT.2024.3349476","volume":"11","author":"P-Y Kong","year":"2024","unstructured":"Kong, P.-Y.: Routing with minimum activated trusted nodes in quantum key distribution networks for secure communications. IEEE Internet Things J. 11(9), 15219\u201315228 (2024). https:\/\/doi.org\/10.1109\/JIOT.2024.3349476","journal-title":"IEEE Internet Things J."},{"key":"5128_CR24","doi-asserted-by":"publisher","unstructured":"Li, S., Yu, X., Zhao, Y., : Routing and wavelength allocation in spatial division multiplexing based quantum key distribution optical networks. In: 2020 International Conference on Computing, Networking and Communications (ICNC), pp. 268\u2013272 (2020). https:\/\/doi.org\/10.1109\/ICNC47757.2020.9049698","DOI":"10.1109\/ICNC47757.2020.9049698"},{"issue":"5","key":"5128_CR25","doi-asserted-by":"publisher","first-page":"732","DOI":"10.3390\/e25050732","volume":"25","author":"T Zhao","year":"2023","unstructured":"Zhao, T., Fan, X., Dong, B.: A Resource-Adaptive Routing Scheme with Wavelength Conflicts in Quantum Key Distribution Optical Networks. Entropy 25(5), 732 (2023). https:\/\/doi.org\/10.3390\/e25050732","journal-title":"Entropy"},{"issue":"11","key":"5128_CR26","doi-asserted-by":"publisher","first-page":"1519","DOI":"10.3390\/e24111519","volume":"24","author":"L Chen","year":"2022","unstructured":"Chen, L., Zhang, Z., Zhao, M.: APR-QKDN: A Quantum Key Distribution Network Routing Scheme Based on Application Priority Ranking. Entropy 24(11), 1519 (2022). https:\/\/doi.org\/10.3390\/e24111519","journal-title":"Entropy"},{"issue":"9","key":"5128_CR27","doi-asserted-by":"publisher","first-page":"309","DOI":"10.1007\/s11128-021-03246-2","volume":"20","author":"L-Q Chen","year":"2021","unstructured":"Chen, L.-Q., Zhao, M.-N., Yu, K.-L.: ADA-QKDN: A new quantum key distribution network routing scheme based on application demand adaptation. Quantum Inf. Process. 20(9), 309 (2021). https:\/\/doi.org\/10.1007\/s11128-021-03246-2","journal-title":"Quantum Inf. Process."},{"issue":"3","key":"5128_CR28","doi-asserted-by":"publisher","first-page":"382","DOI":"10.1364\/JOCN.509269","volume":"16","author":"T Johann","year":"2024","unstructured":"Johann, T., Wenning, M., Giemsa, D.: Comparison and optimization of different routing methods for meshed QKD networks using trusted nodes. J. Opt. Commun. Netw. 16(3), 382 (2024). https:\/\/doi.org\/10.1364\/JOCN.509269","journal-title":"J. Opt. Commun. Netw."},{"issue":"9","key":"5128_CR29","doi-asserted-by":"publisher","first-page":"278","DOI":"10.1007\/s11128-019-2394-3","volume":"18","author":"Y Wang","year":"2019","unstructured":"Wang, Y., Li, Q., Han, Q.: Modeling and simulation of practical quantum secure communication network. Quantum Inf. Process. 18(9), 278 (2019). https:\/\/doi.org\/10.1007\/s11128-019-2394-3","journal-title":"Quantum Inf. Process."},{"issue":"15","key":"5128_CR30","doi-asserted-by":"publisher","first-page":"2805","DOI":"10.1016\/j.comnet.2005.03.005","volume":"50","author":"K Kowalik","year":"2006","unstructured":"Kowalik, K., Collier, M.: Reducing traffic fluctuations of link state QoS routing algorithms in virtual circuit networks. Comm. Com. Inf. Sc. 50(15), 2805\u20132819 (2006). https:\/\/doi.org\/10.1016\/j.comnet.2005.03.005","journal-title":"Comm. Com. Inf. Sc."},{"issue":"4","key":"5128_CR31","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1145\/316194.316225","volume":"29","author":"A Shaikh","year":"1999","unstructured":"Shaikh, A., Rexford, J., Shin, K.G.: Load-sensitive routing of long-lived IP flows. ACM SIGCOMM Comput. Commun. Rev. 29(4), 215\u2013226 (1999). https:\/\/doi.org\/10.1145\/316194.316225","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"issue":"7","key":"5128_CR32","doi-asserted-by":"publisher","first-page":"812","DOI":"10.1364\/OPTICA.458937","volume":"9","author":"G-J Fan-Yuan","year":"2022","unstructured":"Fan-Yuan, G.-J., Lu, F.-Y., Wang, S., Yin, Z.-Q., He, D.-Y., Chen, W., Zhou, Z., Wang, Z.-H., Teng, J., Guo, G.-C., Han, Z.-F.: Robust and adaptable quantum key distribution network without trusted nodes. Optica 9(7), 812 (2022). https:\/\/doi.org\/10.1364\/OPTICA.458937","journal-title":"Optica"},{"key":"5128_CR33","doi-asserted-by":"publisher","first-page":"1","DOI":"10.5802\/ojmo.15","volume":"3","author":"H Rahimian","year":"2022","unstructured":"Rahimian, H., Mehrotra, S.: Frameworks and Results in Distributionally Robust Optimization. Open J. Math. Optimization 3, 1\u201385 (2022). https:\/\/doi.org\/10.5802\/ojmo.15","journal-title":"Open J. Math. Optimization"},{"issue":"3","key":"5128_CR34","doi-asserted-by":"publisher","first-page":"21","DOI":"10.21314\/JOR.2000.038","volume":"2","author":"RT Rockafellar","year":"2000","unstructured":"Rockafellar, R.T., Uryasev, S.: Optimization of conditional value-at-risk. J. Risk 2(3), 21\u201341 (2000)","journal-title":"Risk"},{"key":"5128_CR35","doi-asserted-by":"publisher","unstructured":"Fernique, X., Millar, P.W., Stroock, D.W., : The minimax principle in asymptotic statistical theory. In: Ecole D\u2019Et\u00e9 de Probabilit\u00e9s de Saint-Flour XI \u2014 1981, vol.976, pp. 75\u2013265. Springer, Berlin, Heidelberg (1983). https:\/\/doi.org\/10.1007\/BFb0067986","DOI":"10.1007\/BFb0067986"},{"issue":"1","key":"5128_CR36","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1016\/j.ejor.2018.10.053","volume":"285","author":"F Manseur","year":"2020","unstructured":"Manseur, F., Farhi, N., Van Phu, C.N.: Robust routing, its price, and the tradeoff between routing robustness and travel time reliability in road networks. Eur. J. Oper. Res. 285(1), 159\u2013171 (2020). https:\/\/doi.org\/10.1016\/j.ejor.2018.10.053","journal-title":"Eur. J. Oper. Res."},{"issue":"4","key":"5128_CR37","doi-asserted-by":"publisher","first-page":"1080","DOI":"10.1109\/TITS.2017.2709798","volume":"19","author":"Y Zhang","year":"2018","unstructured":"Zhang, Y., Song, S., Shen, Z.-J.M.: Robust Shortest Path Problem With Distributional Uncertainty. IEEE Trans. Intell. Transp. Syst. 19(4), 1080\u20131090 (2018). https:\/\/doi.org\/10.1109\/TITS.2017.2709798","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"issue":"12","key":"5128_CR38","doi-asserted-by":"publisher","first-page":"14490","DOI":"10.1109\/TITS.2023.3300769","volume":"24","author":"X Zhang","year":"2023","unstructured":"Zhang, X., Wu, P., Chu, C.: A Distributionally Robust Optimization for Reliability-Based Lane Reservation and Route Design Under Uncertainty. IEEE Trans. Intell. Transp. Syst. 24(12), 14490\u201314505 (2023). https:\/\/doi.org\/10.1109\/TITS.2023.3300769","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"issue":"2","key":"5128_CR39","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1007\/s11067-012-9175-1","volume":"13","author":"BY Chen","year":"2013","unstructured":"Chen, B.Y., Lam, W.H.K., Sumalee, A.: Finding Reliable Shortest Paths in Road Networks Under Uncertainty. Netw. Spat. Econ. 13(2), 123\u2013148 (2013). https:\/\/doi.org\/10.1007\/s11067-012-9175-1","journal-title":"Netw. Spat. Econ."}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-026-05128-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11128-026-05128-x","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-026-05128-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,2]],"date-time":"2026-04-02T07:53:49Z","timestamp":1775116429000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11128-026-05128-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,4,2]]},"references-count":39,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2026,4]]}},"alternative-id":["5128"],"URL":"https:\/\/doi.org\/10.1007\/s11128-026-05128-x","relation":{},"ISSN":["1573-1332"],"issn-type":[{"value":"1573-1332","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,4,2]]},"assertion":[{"value":"9 October 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 February 2026","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 April 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}],"article-number":"129"}}