{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,8]],"date-time":"2026-03-08T02:51:20Z","timestamp":1772938280614,"version":"3.50.1"},"reference-count":345,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100010790","name":"Erasmus+ KA107 Programme (ICM)","doi-asserted-by":"publisher","award":["2018-1-IT02-KA107-047412"],"award-info":[{"award-number":["2018-1-IT02-KA107-047412"]}],"id":[{"id":"10.13039\/501100010790","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001602","name":"Science Foundation Ireland","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001602","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100008530","name":"European Regional Development Fund","doi-asserted-by":"publisher","award":["13\/RC\/2077"],"award-info":[{"award-number":["13\/RC\/2077"]}],"id":[{"id":"10.13039\/501100008530","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100008530","name":"European Regional Development Fund","doi-asserted-by":"publisher","award":["13\/RC\/2077_P2"],"award-info":[{"award-number":["13\/RC\/2077_P2"]}],"id":[{"id":"10.13039\/501100008530","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Commun. Surv. Tutorials"],"published-print":{"date-parts":[[2021]]},"DOI":"10.1109\/comst.2021.3109944","type":"journal-article","created":{"date-parts":[[2021,9,3]],"date-time":"2021-09-03T20:06:05Z","timestamp":1630699565000},"page":"2218-2247","source":"Crossref","is-referenced-by-count":131,"title":["Quantum Internet\u2014Applications, Functionalities, Enabling Technologies, Challenges, and Research Directions"],"prefix":"10.1109","volume":"23","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8626-8133","authenticated-orcid":false,"given":"Amoldeep","family":"Singh","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1262-8594","authenticated-orcid":false,"given":"Kapal","family":"Dev","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1371-2683","authenticated-orcid":false,"given":"Harun","family":"Siljak","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7893-4941","authenticated-orcid":false,"given":"Hem Dutt","family":"Joshi","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9288-0452","authenticated-orcid":false,"given":"Maurizio","family":"Magarini","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref275","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.71.044305"},{"key":"ref274","doi-asserted-by":"publisher","DOI":"10.1016\/j.physleta.2005.05.049"},{"key":"ref277","doi-asserted-by":"publisher","DOI":"10.1007\/s11128-013-0546-4"},{"key":"ref276","doi-asserted-by":"crossref","first-page":"831","DOI":"10.1088\/0253-6102\/56\/5\/08","article-title":"Quantum secure direct communication by using three-dimensional hyperentanglement","volume":"56","author":"jin","year":"2011","journal-title":"Commun Theor Phys"},{"key":"ref271","doi-asserted-by":"publisher","DOI":"10.1088\/0031-8949\/90\/1\/015103"},{"key":"ref270","doi-asserted-by":"publisher","DOI":"10.1007\/s10773-013-1949-9"},{"key":"ref273","doi-asserted-by":"publisher","DOI":"10.1007\/s11433-014-5461-x"},{"key":"ref170","doi-asserted-by":"publisher","DOI":"10.1038\/nature01714"},{"key":"ref272","doi-asserted-by":"publisher","DOI":"10.1016\/j.optcom.2010.01.022"},{"key":"ref172","doi-asserted-by":"publisher","DOI":"10.1038\/nature04353"},{"key":"ref171","doi-asserted-by":"publisher","DOI":"10.1126\/science.1103346"},{"key":"ref174","doi-asserted-by":"publisher","DOI":"10.1038\/nature07241"},{"key":"ref173","doi-asserted-by":"publisher","DOI":"10.1126\/science.1140300"},{"key":"ref176","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2014.033014.132816"},{"key":"ref175","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.57.1619"},{"key":"ref178","doi-asserted-by":"publisher","DOI":"10.1088\/1367-2630\/4\/1\/343"},{"key":"ref177","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2738781"},{"key":"ref168","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.92.213601"},{"key":"ref169","doi-asserted-by":"publisher","DOI":"10.1126\/science.1085946"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1038\/nature.2016.19796"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ISSCC19947.2020.9062918"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1038\/nature.2017.21585"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1038\/532169a"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2020.2984871"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/MSPEC.2016.7607012"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/MSPEC.2017.8093785"},{"key":"ref267","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.124.070501"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1021\/acs.chemrev.8b00803"},{"key":"ref268","author":"fang","year":"2019","journal-title":"Surpassing the rate-transmittance linear bound of quantum key distribution"},{"key":"ref35","author":"preskill","year":"2012","journal-title":"Quantum computing and the entanglement frontier"},{"key":"ref269","doi-asserted-by":"publisher","DOI":"10.1007\/s11467-007-0050-3"},{"key":"ref34","article-title":"Operating and characterizing of a 72 superconducting qubit processor &#x2018;Bristlecone&#x2019;: Part 1","volume":"2019","author":"kelly","year":"2019","journal-title":"Proc APS Meeting Abstracts"},{"key":"ref288","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2958788"},{"key":"ref287","author":"mosca","year":"2000","journal-title":"Private quantum channels and the cost of randomizing quantum information"},{"key":"ref286","doi-asserted-by":"publisher","DOI":"10.1145\/237814.237866"},{"key":"ref285","author":"kerry","year":"2013","journal-title":"Digital Signature Standard (DSS)"},{"key":"ref284","doi-asserted-by":"publisher","DOI":"10.1080\/00107514.2016.1148333"},{"key":"ref181","doi-asserted-by":"publisher","DOI":"10.1088\/1367-2630\/11\/4\/045007"},{"key":"ref283","doi-asserted-by":"publisher","DOI":"10.3390\/s18072052"},{"key":"ref180","doi-asserted-by":"publisher","DOI":"10.1016\/j.optcom.2009.10.039"},{"key":"ref282","doi-asserted-by":"publisher","DOI":"10.3390\/s16101595"},{"key":"ref281","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2953364"},{"key":"ref280","article-title":"High-capacity quantum secure direct communication based on quantum hyperdense coding with hyperentanglement","volume":"28","author":"tie-jun","year":"2011","journal-title":"Chin Phys Lett"},{"key":"ref185","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2329501"},{"key":"ref184","doi-asserted-by":"publisher","DOI":"10.1038\/nphys1255"},{"key":"ref183","first-page":"138","article-title":"Current status of the DARPA quantum network","volume":"5815","author":"elliott","year":"2005","journal-title":"Proc Quantum Inf Comput III"},{"key":"ref182","doi-asserted-by":"publisher","DOI":"10.1117\/12.864271"},{"key":"ref189","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.113.060503"},{"key":"ref188","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.88.032305"},{"key":"ref187","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.45.8185"},{"key":"ref186","doi-asserted-by":"publisher","DOI":"10.1088\/1367-2630\/10\/3\/033038"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1088\/1367-2630\/13\/12\/123001"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1364\/OE.19.010387"},{"key":"ref179","doi-asserted-by":"publisher","DOI":"10.1038\/419450a"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1364\/OE.22.021739"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.112.250501"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.2976075"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.3025995"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1038\/npjqi.2016.25"},{"key":"ref344","doi-asserted-by":"publisher","DOI":"10.1038\/s41586-019-0980-2"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.68.3121"},{"key":"ref345","doi-asserted-by":"publisher","DOI":"10.1038\/ncomms5213"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1088\/1367-2630\/11\/7\/075001"},{"key":"ref278","doi-asserted-by":"publisher","DOI":"10.1016\/j.optcom.2005.04.048"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1364\/OE.21.023241"},{"key":"ref279","doi-asserted-by":"publisher","DOI":"10.1007\/s10773-011-1072-8"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1103\/RevModPhys.81.1301"},{"key":"ref293","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.87.050301"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1088\/1751-8113\/40\/28\/S01"},{"key":"ref292","doi-asserted-by":"publisher","DOI":"10.1142\/S0219749906002171"},{"key":"ref295","doi-asserted-by":"publisher","DOI":"10.1007\/s10773-020-04536-8"},{"key":"ref294","doi-asserted-by":"publisher","DOI":"10.1016\/0022-0000(89)90018-4"},{"key":"ref297","author":"childs","year":"2001","journal-title":"Secure Assisted Quantum Computation"},{"key":"ref296","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-0602-4_18"},{"key":"ref299","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.86.5188"},{"key":"ref298","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24587-2_1"},{"key":"ref154","doi-asserted-by":"publisher","DOI":"10.1109\/JSTQE.2015.2392076"},{"key":"ref153","doi-asserted-by":"publisher","DOI":"10.1016\/0375-9601(82)90084-6"},{"key":"ref156","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.126.010503"},{"key":"ref155","doi-asserted-by":"crossref","first-page":"722","DOI":"10.1103\/PhysRevLett.76.722","article-title":"Purification of noisy entanglement and faithful teleportation via noisy channels","volume":"76","author":"bennett","year":"1996","journal-title":"Phys Rev Lett"},{"key":"ref150","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.121.090503"},{"key":"ref291","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2015.2437951"},{"key":"ref152","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.81.5932"},{"key":"ref290","doi-asserted-by":"publisher","DOI":"10.3390\/s17061457"},{"key":"ref151","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.124.030502"},{"key":"ref146","doi-asserted-by":"publisher","DOI":"10.1038\/ncomms2076"},{"key":"ref147","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.117.100502"},{"key":"ref148","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.99.062317"},{"key":"ref149","doi-asserted-by":"publisher","DOI":"10.1088\/1367-2630\/abe7a0"},{"key":"ref59","first-page":"227","article-title":"A short survey on quantum computers","volume":"28","author":"kanamori","year":"2006","journal-title":"Int J Comput Appl"},{"key":"ref289","doi-asserted-by":"publisher","DOI":"10.3390\/s16101644"},{"key":"ref58","first-page":"109","article-title":"Cipher printing telegraph systems for secret wire and radio telegraphic communications","volume":"45","author":"vernam","year":"1926","journal-title":"J Am Inst Elec Eng"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1038\/lsa.2016.144"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2861361"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1364\/AOP.361502"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1038\/nphoton.2014.149"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2864557"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1038\/s41534-017-0031-5"},{"key":"ref40","author":"cartlidge","year":"2018","journal-title":"Europe&#x2019;s Euro1 Billion Quantum Flagship Announces Grants"},{"key":"ref167","doi-asserted-by":"publisher","DOI":"10.1038\/35106500"},{"key":"ref166","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.98.032335"},{"key":"ref165","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.95.022312"},{"key":"ref164","doi-asserted-by":"publisher","DOI":"10.1103\/RevModPhys.83.33"},{"key":"ref163","doi-asserted-by":"publisher","DOI":"10.1038\/srep20463"},{"key":"ref162","doi-asserted-by":"publisher","DOI":"10.1038\/s41534-019-0186-3"},{"key":"ref161","doi-asserted-by":"publisher","DOI":"10.1088\/1367-2630\/ab2a45"},{"key":"ref160","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.99.052330"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1119\/1.1463744"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2012.6246754"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1038\/nphys3000"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1038\/299802a0"},{"key":"ref8","first-page":"53","article-title":"Quantum positioning system","author":"bahder","year":"2004","journal-title":"Proc 36th Annu Precise Time Time Interval Syst Appl Meeting"},{"key":"ref159","doi-asserted-by":"publisher","DOI":"10.1038\/ncomms7787"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1103\/RevModPhys.92.025002"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1038\/s41567-020-0892-y"},{"key":"ref157","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.79.032325"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.67.661"},{"key":"ref158","doi-asserted-by":"publisher","DOI":"10.1038\/nphoton.2010.213"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1038\/nphoton.2015.154"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1134\/S1054660X06100057"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2786748"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2020.2978071"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1126\/science.aax0578"},{"key":"ref41","year":"2018","journal-title":"Quantum Internet Alliance"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2018.11.002"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1126\/science.aan3211"},{"key":"ref320","doi-asserted-by":"publisher","DOI":"10.1038\/s41586-018-0195-y"},{"key":"ref321","doi-asserted-by":"publisher","DOI":"10.1088\/0305-4470\/1\/6\/301"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.49.1804"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.28.938"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRev.85.166"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1038\/nature07127"},{"key":"ref318","doi-asserted-by":"publisher","DOI":"10.1088\/0034-4885\/60\/8\/001"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.115.250401"},{"key":"ref317","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1109\/MC.2016.291","article-title":"The path to scalable distributed quantum computing","volume":"49","author":"van meter","year":"2016","journal-title":"Computer"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.115.250402"},{"key":"ref316","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139034807"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.61.50"},{"key":"ref315","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.115.040502"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1038\/nature15759"},{"key":"ref314","doi-asserted-by":"publisher","DOI":"10.1016\/S0031-8914(38)80203-2"},{"key":"ref313","author":"lawson","year":"2000","journal-title":"Principles of Long Baseline Stellar Interferometry"},{"key":"ref312","doi-asserted-by":"publisher","DOI":"10.1088\/0034-4885\/66\/5\/203"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-017-0849-4_10"},{"key":"ref311","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.85.2006"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.52.R2493"},{"key":"ref319","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2784417"},{"key":"ref310","doi-asserted-by":"publisher","DOI":"10.1088\/0034-4885\/76\/9\/096001"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.63.014302"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1142\/1691"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70626-7_211"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.001.1900092"},{"key":"ref305","first-page":"19","article-title":"GPS spoofing countermeasures","volume":"25","author":"warner","year":"2003","journal-title":"Journal of Homeland Security"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1007\/BF01491914"},{"key":"ref304","first-page":"2314","article-title":"Assessing the spoofing threat: Development of a portable GPS civilian spoofer","author":"humphreys","year":"2008","journal-title":"Proc 21st Int Tech Meeting Satellite Div Inst Navigation (ION GNSS)"},{"key":"ref307","doi-asserted-by":"publisher","DOI":"10.1126\/science.1240420"},{"key":"ref65","first-page":"175","article-title":"Quantum cryptography: Public key distribution and coin tossing","author":"bennett","year":"1984","journal-title":"Proc Int Conf Comput Syst Signal Process"},{"key":"ref306","doi-asserted-by":"publisher","DOI":"10.1038\/nature12941"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRev.47.777"},{"key":"ref301","doi-asserted-by":"publisher","DOI":"10.1126\/science.1214707"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1103\/PhysicsPhysiqueFizika.1.195"},{"key":"ref300","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2009.36"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.79.1"},{"key":"ref303","doi-asserted-by":"publisher","DOI":"10.1080\/02286203.2020.1738035"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.70.1895"},{"key":"ref302","doi-asserted-by":"publisher","DOI":"10.1145\/2518037.2491245"},{"key":"ref309","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.78.3221"},{"key":"ref308","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.109.230801"},{"key":"ref197","doi-asserted-by":"publisher","DOI":"10.1007\/s11128-019-2182-0"},{"key":"ref198","doi-asserted-by":"publisher","DOI":"10.1364\/OE.16.018675"},{"key":"ref199","doi-asserted-by":"publisher","DOI":"10.1016\/j.optcom.2010.02.001"},{"key":"ref193","doi-asserted-by":"publisher","DOI":"10.1088\/1367-2630\/15\/6\/063005"},{"key":"ref194","article-title":"Protecting orbital-angular-momentum photons from decoherence in a turbulent atmosphere","volume":"88","author":"alonso","year":"2013","journal-title":"Phys Rev A"},{"key":"ref195","doi-asserted-by":"publisher","DOI":"10.1126\/science.1085593"},{"key":"ref196","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-31903-2_18"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.75.3788"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevB.68.155311"},{"key":"ref190","doi-asserted-by":"publisher","DOI":"10.1088\/2040-8978\/18\/6\/064002"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.88.148301"},{"key":"ref191","doi-asserted-by":"publisher","DOI":"10.1364\/OE.20.000452"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2763325"},{"key":"ref192","doi-asserted-by":"publisher","DOI":"10.1364\/AOP.7.000066"},{"key":"ref342","author":"grosshans","year":"2002","journal-title":"Reverse reconciliation protocols for quantum cryptography with continuous variables"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1038\/nphoton.2014.53"},{"key":"ref343","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.117.100503"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1119\/1.3369921"},{"key":"ref340","doi-asserted-by":"publisher","DOI":"10.1103\/RevModPhys.77.513"},{"key":"ref341","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.61.010303"},{"key":"ref336","doi-asserted-by":"publisher","DOI":"10.1103\/RevModPhys.88.041001"},{"key":"ref335","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.81.2594"},{"key":"ref334","first-page":"610","article-title":"Quantum network coding","author":"hayashi","year":"2007","journal-title":"Proc Annu Symp Theor Aspects Comput Sci"},{"key":"ref333","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-018-35507-z"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.75.4337"},{"key":"ref339","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.58.2733"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1103\/RevModPhys.74.145"},{"key":"ref338","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.82.2417"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.79.5178"},{"key":"ref337","doi-asserted-by":"publisher","DOI":"10.1088\/0953-8984\/28\/21\/213001"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.61.2921"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.58.4373"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1002\/9781118648919"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.83.5158"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.59.1025"},{"key":"ref330","doi-asserted-by":"publisher","DOI":"10.1063\/5.0002595"},{"key":"ref331","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.108.130503"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1038\/s42254-020-0193-5"},{"key":"ref332","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevX.6.011024"},{"key":"ref323","doi-asserted-by":"publisher","DOI":"10.1145\/1064413.1064423"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.71.4287"},{"key":"ref322","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2013.6576340"},{"key":"ref325","doi-asserted-by":"publisher","DOI":"10.1080\/09500340412331283633"},{"key":"ref324","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-42664-4"},{"key":"ref327","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2014.09.018"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.50.5122"},{"key":"ref326","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.59.169"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1038\/nature11023"},{"key":"ref329","doi-asserted-by":"publisher","DOI":"10.1126\/sciadv.aba0959"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevX.8.011018"},{"key":"ref328","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-2010-0373"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.59.2044"},{"key":"ref200","doi-asserted-by":"publisher","DOI":"10.1002\/qute.201900038"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.80.3891"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1038\/37539"},{"key":"ref209","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-7476-9_6"},{"key":"ref203","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.117.190501"},{"key":"ref204","doi-asserted-by":"publisher","DOI":"10.6028\/jres.125.002"},{"key":"ref201","doi-asserted-by":"publisher","DOI":"10.1038\/nphoton.2007.75"},{"key":"ref202","doi-asserted-by":"publisher","DOI":"10.1038\/srep19201"},{"key":"ref207","doi-asserted-by":"publisher","DOI":"10.1103\/RevModPhys.82.1209"},{"key":"ref208","doi-asserted-by":"publisher","DOI":"10.1038\/35096524"},{"key":"ref205","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2882385"},{"key":"ref206","doi-asserted-by":"publisher","DOI":"10.1140\/epjd\/e2010-00103-y"},{"key":"ref211","doi-asserted-by":"publisher","DOI":"10.1038\/nphoton.2012.34"},{"key":"ref210","doi-asserted-by":"publisher","DOI":"10.1038\/nature06670"},{"key":"ref212","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.115.070502"},{"key":"ref213","doi-asserted-by":"publisher","DOI":"10.1038\/nphys1819"},{"key":"ref214","doi-asserted-by":"publisher","DOI":"10.1038\/s41467-017-00809-9"},{"key":"ref215","doi-asserted-by":"publisher","DOI":"10.1038\/s41467-017-02775-8"},{"key":"ref216","doi-asserted-by":"publisher","DOI":"10.1038\/s41566-019-0368-8"},{"key":"ref217","first-page":"35","article-title":"Private-key algebraic-coded cryptosystems","author":"rao","year":"1986","journal-title":"Proc Conf Theory Appl Cryptograph Techn"},{"key":"ref218","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44598-6_9"},{"key":"ref219","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1976.1055638"},{"key":"ref220","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"ref222","author":"zeng","year":"2000","journal-title":"Quantum authentication protocol"},{"key":"ref221","article-title":"Hybrid cryptography","author":"dent","year":"2004"},{"key":"ref229","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.94.150501"},{"key":"ref228","doi-asserted-by":"publisher","DOI":"10.1088\/1367-2630\/4\/1\/382"},{"key":"ref227","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2020.2964003"},{"key":"ref226","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2019.1701375"},{"key":"ref225","doi-asserted-by":"publisher","DOI":"10.1145\/74074.74087"},{"key":"ref224","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.60.149"},{"key":"ref223","author":"barnum","year":"1999","journal-title":"Quantum Secure Identification Using Entanglement and Catalysis"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1038\/nature01376"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1038\/nature12422"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1038\/s41534-020-00289-8"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1063\/1.5089550"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1038\/nature02608"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1364\/JOSAB.24.000398"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1038\/430849a"},{"key":"ref133","doi-asserted-by":"crossref","first-page":"869","DOI":"10.1103\/PhysRevLett.80.869","article-title":"Teleportation of continuous quantum variables","volume":"80","author":"braunstein","year":"1998","journal-title":"Phys Rev Lett"},{"key":"ref134","first-page":"1036","article-title":"Quantum teleportation of Einstein-Podolsky-Rosen pair with the help of crossroads three particle state","volume":"118","author":"gorbachev","year":"2000","journal-title":"Zhurnal Teoreticheskoj Fiziki"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1038\/nature11332"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1038\/nphys629"},{"key":"ref232","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.120.030501"},{"key":"ref233","doi-asserted-by":"crossref","first-page":"214","DOI":"10.1038\/s41586-020-03093-8","article-title":"An integrated space-to-ground quantum communication network over 4,600 kilometres","volume":"589","author":"chen","year":"2021","journal-title":"Nature"},{"key":"ref230","doi-asserted-by":"publisher","DOI":"10.1038\/nphoton.2013.89"},{"key":"ref231","doi-asserted-by":"publisher","DOI":"10.1038\/nphoton.2013.46"},{"key":"ref239","doi-asserted-by":"crossref","first-page":"501","DOI":"10.1038\/s41586-020-2401-y","article-title":"Entanglement-based secure quantum cryptography over 1,120 kilometres","volume":"582","author":"yin","year":"2020","journal-title":"Nature"},{"key":"ref238","doi-asserted-by":"publisher","DOI":"10.1145\/1008908.1008920"},{"key":"ref235","doi-asserted-by":"publisher","DOI":"10.1080\/01611194.2011.583711"},{"key":"ref234","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1949.tb00928.x"},{"key":"ref237","doi-asserted-by":"publisher","DOI":"10.1109\/ISSC49989.2020.9180218"},{"key":"ref236","doi-asserted-by":"publisher","DOI":"10.26421\/QIC2.1-2"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.62.022307"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.84.4236"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.1016\/j.physleta.2006.01.038"},{"key":"ref137","doi-asserted-by":"publisher","DOI":"10.1016\/S0375-9601(00)00174-2"},{"key":"ref139","author":"salek","year":"2018","journal-title":"Quantum communication in a superposition of causal orders"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.88.022318"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2020.2969035"},{"key":"ref142","doi-asserted-by":"publisher","DOI":"10.1098\/rspa.2018.0903"},{"key":"ref143","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1948.tb01338.x"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1126\/science.aam9288"},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.86.040301"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2012.2189788"},{"key":"ref145","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.92.052326"},{"key":"ref241","doi-asserted-by":"publisher","DOI":"10.26421\/QIC5.3-1"},{"key":"ref242","doi-asserted-by":"crossref","first-page":"2818","DOI":"10.1103\/PhysRevLett.77.2818","article-title":"Quantum privacy amplification and the security of quantum cryptography over noisy channels","volume":"77","author":"deutsch","year":"1996","journal-title":"Phys Rev Lett"},{"key":"ref243","doi-asserted-by":"publisher","DOI":"10.1038\/18296"},{"key":"ref244","first-page":"410","article-title":"Secret-key reconciliation by public discussion","author":"brassard","year":"1993","journal-title":"Proc Workshop Theory Appl Cryptogr Techn"},{"key":"ref240","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.82.1345"},{"key":"ref248","doi-asserted-by":"publisher","DOI":"10.1137\/0217014"},{"key":"ref247","doi-asserted-by":"publisher","DOI":"10.1109\/18.476316"},{"key":"ref246","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-47361-7_11"},{"key":"ref245","doi-asserted-by":"publisher","DOI":"10.1080\/0161-119991887739"},{"key":"ref249","doi-asserted-by":"publisher","DOI":"10.1109\/ICWT.2018.8527822"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1126\/science.1231298"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.101.052328"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1126\/science.1253742"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1049\/iet-qtc.2020.0002"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1126\/science.abe8770"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1126\/science.282.5389.706"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.80.1121"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.86.4435"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.74.4091"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.113.220501"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.92.023420"},{"key":"ref250","doi-asserted-by":"publisher","DOI":"10.1142\/S0129054104002649"},{"key":"ref251","author":"jensen","year":"2000","journal-title":"Quantum Authentication and Key Distribution Using Catalysis"},{"key":"ref254","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.48.1581"},{"key":"ref255","doi-asserted-by":"publisher","DOI":"10.1098\/rspa.1985.0070"},{"key":"ref252","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.62.022305"},{"key":"ref253","doi-asserted-by":"publisher","DOI":"10.1007\/BF02650179"},{"key":"ref257","doi-asserted-by":"publisher","DOI":"10.1126\/science.261.5128.1569"},{"key":"ref256","doi-asserted-by":"publisher","DOI":"10.1098\/rspa.1992.0167"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/509907.510000"},{"key":"ref259","doi-asserted-by":"publisher","DOI":"10.1145\/238168.238182"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.96.012303"},{"key":"ref258","doi-asserted-by":"publisher","DOI":"10.1137\/S0036144598347011"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1126\/science.1104149"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.109.070503"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/S0079-6727(99)00003-8"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1038\/nphoton.2016.180"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"70","DOI":"10.1038\/nature23675","article-title":"Ground-to-satellite quantum teleportation","volume":"549","author":"ren","year":"2017","journal-title":"Nature"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.57.120"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.55.900"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1038\/nature08812"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.104.180503"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1038\/nphoton.2012.243"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1146\/annurev-conmatphys-031119-050605"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.117.060504"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.117.060505"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1126\/science.270.5234.255"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1038\/nature18648"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1038\/ncomms3744"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1038\/nphoton.2014.215"},{"key":"ref122","doi-asserted-by":"crossref","first-page":"505","DOI":"10.1038\/s41586-019-1666-5","article-title":"Quantum supremacy using a programmable superconducting processor","volume":"574","author":"arute","year":"2019","journal-title":"Nature"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1038\/d41586-019-03173-4"},{"key":"ref260","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2865107"},{"key":"ref261","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2916180"},{"key":"ref262","first-page":"95","article-title":"The RSA cryptography processor","author":"sedlak","year":"1987","journal-title":"Proc Workshop Theory Appl Cryptogr Techn"},{"key":"ref263","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.59.1829"},{"key":"ref264","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.65.032302"},{"key":"ref265","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.69.2881"},{"key":"ref266","doi-asserted-by":"publisher","DOI":"10.1038\/nphoton.2014.327"}],"container-title":["IEEE Communications Surveys &amp; Tutorials"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9739\/9621320\/09528843.pdf?arnumber=9528843","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,2,7]],"date-time":"2022-02-07T20:51:19Z","timestamp":1644267079000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9528843\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"references-count":345,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/comst.2021.3109944","relation":{},"ISSN":["1553-877X","2373-745X"],"issn-type":[{"value":"1553-877X","type":"electronic"},{"value":"2373-745X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]}}}