{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T12:30:03Z","timestamp":1742387403276,"version":"3.37.3"},"reference-count":31,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"name":"Ministry of Internal Affairs and Communications, Japan, through the ICT Priority Technology Research and Development Project","award":["JPMI00316"],"award-info":[{"award-number":["JPMI00316"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2024]]},"DOI":"10.1109\/access.2024.3468442","type":"journal-article","created":{"date-parts":[[2024,9,26]],"date-time":"2024-09-26T17:48:56Z","timestamp":1727372936000},"page":"141167-141178","source":"Crossref","is-referenced-by-count":2,"title":["Information Theoretically Secure Data Relay Using QKD Network"],"prefix":"10.1109","volume":"12","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1553-0154","authenticated-orcid":false,"given":"Mikio","family":"Fujiwara","sequence":"first","affiliation":[{"name":"National Institute of Information and Communications Technology, Koganei, Tokyo, Japan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5030-5230","authenticated-orcid":false,"given":"Go","family":"Kato","sequence":"additional","affiliation":[{"name":"National Institute of Information and Communications Technology, Koganei, Tokyo, Japan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9508-570X","authenticated-orcid":false,"given":"Masahide","family":"Sasaki","sequence":"additional","affiliation":[{"name":"National Institute of Information and Communications Technology, Koganei, Tokyo, Japan"}]}],"member":"263","reference":[{"volume-title":"IBM","year":"2024","key":"ref1"},{"volume-title":"AWS","year":"2024","key":"ref2"},{"volume-title":"Asahi","year":"2024","key":"ref3"},{"volume-title":"Freedom Lab","year":"2022","key":"ref4"},{"volume-title":"NIST","year":"2024","key":"ref5"},{"volume-title":"An Efficient Key Recovery Attack on SIDH","year":"2024","author":"Castryck","key":"ref6"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1103\/revmodphys.74.145"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/18.256484"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1103\/physreva.73.022320"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-06608-5"},{"key":"ref11","first-page":"175","article-title":"Quantum cryptography: Public-key distribution and coin tossing","volume-title":"Proc. IEEE Int. Conf. Comput., Syst. Signal Process.","author":"Bennett"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1364\/oe.20.016339"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1364\/oe.21.031395"},{"volume-title":"The University of Chicago","year":"2024","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1038\/s41534-021-00474-3"},{"volume-title":"Quantum Key Distribution Networks: Quantum Key Distribution Networks\u2014Key Management","year":"2020","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1364\/jocn.474487"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1038\/srep28988"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/tqe.2021.3135077"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-022-22804-x"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1038\/s41534-021-00400-7"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2023.3280561"},{"key":"ref24","article-title":"Distributed information-theoretical secure protocols for quantum key distribution networks against malicious nodes","author":"Luo","year":"2023","journal-title":"arXiv:2302.07688"},{"volume-title":"Quantum Key Distribution Network: Functional Architecture","year":"2020","key":"ref25"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/T-AIEE.1926.5061224"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1364\/OE.19.010387"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/0022-0000(81)90033-7"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1038\/s41586-018-0066-6"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.130.210801"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1126\/science.aan3211"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6287639\/10380310\/10695081.pdf?arnumber=10695081","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,10]],"date-time":"2024-10-10T13:13:32Z","timestamp":1728566012000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10695081\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/access.2024.3468442","relation":{},"ISSN":["2169-3536"],"issn-type":[{"type":"electronic","value":"2169-3536"}],"subject":[],"published":{"date-parts":[[2024]]}}}