{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,26]],"date-time":"2026-04-26T06:46:43Z","timestamp":1777186003514,"version":"3.51.4"},"reference-count":68,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/100006228","name":"Oak Ridge National Laboratory, operated by UT-Battelle for the U.S. Department of Energy","doi-asserted-by":"publisher","award":["DE-AC05-00OR22725"],"award-info":[{"award-number":["DE-AC05-00OR22725"]}],"id":[{"id":"10.13039\/100006228","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000015","name":"U.S. Department of Energy, Office of Cybersecurity Energy Security and Emergency Response (CESER) through the Cybersecurity for Energy Delivery Systems (CEDS) Program","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100000015","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2021]]},"DOI":"10.1109\/access.2021.3070222","type":"journal-article","created":{"date-parts":[[2021,4,16]],"date-time":"2021-04-16T04:39:08Z","timestamp":1618547948000},"page":"105220-105229","source":"Crossref","is-referenced-by-count":20,"title":["Trusted Node QKD at an Electrical Utility"],"prefix":"10.1109","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9612-2031","authenticated-orcid":false,"given":"Philip G.","family":"Evans","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6429-3450","authenticated-orcid":false,"given":"Muneer","family":"Alshowkan","sequence":"additional","affiliation":[]},{"given":"Duncan","family":"Earl","sequence":"additional","affiliation":[]},{"given":"Daniel D.","family":"Mulkey","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5989-5951","authenticated-orcid":false,"given":"Raymond","family":"Newell","sequence":"additional","affiliation":[]},{"given":"Glen","family":"Peterson","sequence":"additional","affiliation":[]},{"given":"Claira","family":"Safi","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0255-3210","authenticated-orcid":false,"given":"Justin L.","family":"Tripp","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7215-9630","authenticated-orcid":false,"given":"Nicholas A.","family":"Peters","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","year":"0","journal-title":"Qubitekk Inc"},{"key":"ref38","year":"0","journal-title":"Id Quantique SA"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1088\/1367-2630\/11\/4\/045007"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1364\/OE.16.016840"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1088\/1367-2630\/4\/1\/343"},{"key":"ref30","article-title":"Experimental passive-state preparation for continuous-variable quantum communications","volume":"13","author":"qi","year":"2020","journal-title":"Phys Rev A Gen Phys"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1038\/s41586-020-03093-8"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1038\/nature23655"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1038\/nphoton.2017.116"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.115.040502"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1364\/OE.22.021739"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1038\/s41534-019-0221-4"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1364\/OE.26.006010"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/IPCon.2019.8908470"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1038\/nphoton.2013.63"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.68.557"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1364\/JOSAB.24.000324"},{"key":"ref65","article-title":"Great circle solution to polarization-based quantum communication (QC) in optical fiber","author":"nordholt","year":"2016"},{"key":"ref66","article-title":"Quantum key distribution using card, base station and trusted authority","author":"nordholt","year":"2016"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.86.022318"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.92.057901"},{"key":"ref68","article-title":"High performance information reconciliation for QKD with CASCADE","author":"pedersen","year":"2013","journal-title":"arXiv 1307 7829"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2012.2218253"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1002\/bltj.20450"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1088\/1367-2630\/6\/1\/092"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1038\/srep14383"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1063\/1.2799756"},{"key":"ref24","article-title":"Free-space quantum key distribution with entangled photons","volume":"89","author":"marcikic","year":"2006","journal-title":"Phys Rev A Gen Phys"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.90.062331"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.61.010303"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.76.012307"},{"key":"ref50","year":"0","journal-title":"Security"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2012.2197229"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1364\/OE.18.027217"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1364\/OE.19.010387"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1088\/1367-2630\/13\/12\/123001"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1364\/OFC.2009.OThL2"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1088\/1367-2630\/4\/1\/346"},{"key":"ref54","article-title":"Network-centric quantum communications with application to critical infrastructure protection","author":"hughes","year":"2013","journal-title":"arXiv 1305 0305"},{"key":"ref53","year":"0","journal-title":"Homeland Infrastructure Foundation-Level Data (HIFLD)"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1948.tb01338.x"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1126\/science.283.5410.2050"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.85.1330"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1038\/ncomms6235"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.85.441"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1103\/RevModPhys.74.145"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1103\/RevModPhys.92.025002"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1088\/1367-2630\/aade06"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.84.5652"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1088\/1367-2630\/4\/1\/341"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.72.012326"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1038\/nphoton.2014.327"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2005.847249"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2011.2165269"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2012.2225851"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.rser.2015.11.050"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2011.07.010"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2010.2046347"},{"key":"ref49","year":"0","journal-title":"Future of Networks"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2014.05.025"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.93.032316"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.99.062311"},{"key":"ref48","year":"0","journal-title":"Quantum safe crypto"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1364\/OL.44.000139"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.63.042301"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1038\/ncomms15043"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.100.022339"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1364\/OE.23.007300"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"https:\/\/ieeexplore.ieee.org\/ielam\/6287639\/9312710\/9405393-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/9312710\/09405393.pdf?arnumber=9405393","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,8]],"date-time":"2022-04-08T18:53:40Z","timestamp":1649444020000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9405393\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"references-count":68,"URL":"https:\/\/doi.org\/10.1109\/access.2021.3070222","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]}}}