{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,23]],"date-time":"2025-12-23T05:25:37Z","timestamp":1766467537119,"version":"3.37.3"},"reference-count":102,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"DFG"},{"name":"DFG research fellowship","award":["GU 1859\/1-1"],"award-info":[{"award-number":["GU 1859\/1-1"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Sustain. Comput."],"published-print":{"date-parts":[[2021,1,1]]},"DOI":"10.1109\/tsusc.2019.2913948","type":"journal-article","created":{"date-parts":[[2019,4,30]],"date-time":"2019-04-30T20:09:46Z","timestamp":1556654986000},"page":"19-29","source":"Crossref","is-referenced-by-count":25,"title":["The Status of Quantum-Key-Distribution-Based Long-Term Secure Internet Communication"],"prefix":"10.1109","volume":"6","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7031-8298","authenticated-orcid":false,"given":"Matthias","family":"Geihs","sequence":"first","affiliation":[]},{"given":"Oleg","family":"Nikiforov","sequence":"additional","affiliation":[]},{"given":"Denise","family":"Demirel","sequence":"additional","affiliation":[]},{"given":"Alexander","family":"Sauer","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7461-1918","authenticated-orcid":false,"given":"Denis","family":"Butin","sequence":"additional","affiliation":[]},{"given":"Felix","family":"Gunther","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4676-0024","authenticated-orcid":false,"given":"Gernot","family":"Alber","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8114-1785","authenticated-orcid":false,"given":"Thomas","family":"Walther","sequence":"additional","affiliation":[]},{"given":"Johannes","family":"Buchmann","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref39","DOI":"10.1103\/PhysRevA.61.010303"},{"doi-asserted-by":"publisher","key":"ref38","DOI":"10.1103\/PhysRevLett.88.057902"},{"doi-asserted-by":"publisher","key":"ref33","DOI":"10.1103\/PhysicsPhysiqueFizika.1.195"},{"doi-asserted-by":"publisher","key":"ref32","DOI":"10.1063\/1.2126792"},{"key":"ref31","article-title":"Quantum cryptography protocols robust against photon number splitting attacks for weak laser pulses implementations","volume":"92","author":"scarani","year":"2002","journal-title":"Phys Rev Lett"},{"key":"ref30","first-page":"175","article-title":"Quantum cryptography: Public key distribution and coin tossing","volume":"175","author":"bennett","year":"1984","journal-title":"Proc Int Conf Circuits Syst Signal Process"},{"doi-asserted-by":"publisher","key":"ref37","DOI":"10.3390\/e17096072"},{"doi-asserted-by":"publisher","key":"ref36","DOI":"10.1103\/PhysRevLett.68.557"},{"doi-asserted-by":"publisher","key":"ref35","DOI":"10.1103\/PhysRevLett.67.661"},{"doi-asserted-by":"publisher","key":"ref34","DOI":"10.1103\/PhysRevLett.87.117901"},{"doi-asserted-by":"publisher","key":"ref28","DOI":"10.1364\/OE.16.019118"},{"doi-asserted-by":"publisher","key":"ref27","DOI":"10.1038\/srep19201"},{"doi-asserted-by":"publisher","key":"ref29","DOI":"10.1038\/nphoton.2013.63"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1038\/srep46047"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1103\/PhysRevLett.117.190501"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1103\/PhysRevLett.121.190502"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.1364\/OL.37.001008"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1038\/nphoton.2014.327"},{"year":"2019","key":"ref101"},{"doi-asserted-by":"publisher","key":"ref26","DOI":"10.1063\/1.5016931"},{"year":"2019","key":"ref100"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.1088\/1367-2630\/11\/7\/075003"},{"doi-asserted-by":"publisher","key":"ref50","DOI":"10.1103\/RevModPhys.74.145"},{"doi-asserted-by":"publisher","key":"ref51","DOI":"10.1103\/PhysRevA.72.012332"},{"doi-asserted-by":"publisher","key":"ref59","DOI":"10.1109\/SFCS.1998.743501"},{"doi-asserted-by":"publisher","key":"ref58","DOI":"10.1038\/nphoton.2010.214"},{"doi-asserted-by":"publisher","key":"ref57","DOI":"10.1103\/PhysRevA.73.022320"},{"doi-asserted-by":"publisher","key":"ref56","DOI":"10.1103\/PhysRevLett.94.230504"},{"doi-asserted-by":"publisher","key":"ref55","DOI":"10.1103\/PhysRevLett.109.260501"},{"doi-asserted-by":"publisher","key":"ref54","DOI":"10.1103\/PhysRevA.95.012315"},{"doi-asserted-by":"publisher","key":"ref53","DOI":"10.1103\/PhysRevLett.85.441"},{"doi-asserted-by":"publisher","key":"ref52","DOI":"10.1126\/science.283.5410.2050"},{"doi-asserted-by":"publisher","key":"ref40","DOI":"10.1103\/PhysRevA.68.022317"},{"key":"ref4","first-page":"327","article-title":"Post-quantum key exchange&#x2014;A new hope","author":"alkim","year":"2016","journal-title":"Proc 25th USENIX Conf Secur Symp"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1137\/S0097539795293172"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1145\/996943.996945"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1145\/2976749.2978425"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1007\/BF00191321"},{"doi-asserted-by":"publisher","key":"ref49","DOI":"10.1364\/OE.22.023121"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1002\/j.1538-7305.1949.tb00928.x"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1002\/j.1538-7305.1975.tb02040.x"},{"doi-asserted-by":"publisher","key":"ref46","DOI":"10.1364\/OPTICA.4.000611"},{"doi-asserted-by":"publisher","key":"ref45","DOI":"10.1103\/PhysRevLett.120.030501"},{"doi-asserted-by":"publisher","key":"ref48","DOI":"10.1364\/OE.26.006010"},{"key":"ref47","article-title":"Continuous-variable quantum key distribution with Gaussian modulation&#x2014;The theory of practical implementations","author":"laudenbach","year":"2017","journal-title":"arXiv preprint quant-ph\/ 1703 09278"},{"doi-asserted-by":"publisher","key":"ref42","DOI":"10.1038\/ncomms6235"},{"doi-asserted-by":"publisher","key":"ref41","DOI":"10.1038\/srep36756"},{"doi-asserted-by":"publisher","key":"ref44","DOI":"10.1038\/nature23655"},{"doi-asserted-by":"publisher","key":"ref43","DOI":"10.1038\/ncomms15043"},{"doi-asserted-by":"publisher","key":"ref73","DOI":"10.1364\/OE.18.027217"},{"doi-asserted-by":"publisher","key":"ref72","DOI":"10.1109\/LPT.2009.2015058"},{"doi-asserted-by":"publisher","key":"ref71","DOI":"10.1109\/68.992616"},{"doi-asserted-by":"publisher","key":"ref70","DOI":"10.1088\/1367-2630\/18\/8\/083015"},{"doi-asserted-by":"publisher","key":"ref76","DOI":"10.1364\/OL.38.000034"},{"doi-asserted-by":"publisher","key":"ref77","DOI":"10.1007\/s11434-015-0801-4"},{"doi-asserted-by":"publisher","key":"ref74","DOI":"10.1038\/srep29453"},{"doi-asserted-by":"publisher","key":"ref75","DOI":"10.1364\/OE.21.029013"},{"doi-asserted-by":"publisher","key":"ref78","DOI":"10.1364\/OE.26.012912"},{"doi-asserted-by":"publisher","key":"ref79","DOI":"10.1103\/PhysRevLett.81.5932"},{"doi-asserted-by":"publisher","key":"ref60","DOI":"10.1103\/PhysRevLett.113.140501"},{"doi-asserted-by":"publisher","key":"ref62","DOI":"10.1103\/PhysRevLett.113.190501"},{"doi-asserted-by":"publisher","key":"ref61","DOI":"10.1103\/PhysRevLett.108.130503"},{"doi-asserted-by":"publisher","key":"ref63","DOI":"10.17487\/rfc4271"},{"year":"2017","key":"ref64"},{"year":"2017","key":"ref65"},{"doi-asserted-by":"publisher","key":"ref66","DOI":"10.1109\/ICUFN.2016.7537018"},{"key":"ref67","article-title":"A novel approach to quality of service provisioning in trusted relay quantum key distribution networks","author":"mehic","year":"2018","journal-title":"arXiv 1810 03857"},{"key":"ref68","article-title":"The engineering of a scalable multi-site communications system utilizing quantum key distribution (QKD)","volume":"3","author":"tysowski","year":"2018","journal-title":"Quantum Sci Technol"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1109\/TIT.1976.1055638"},{"doi-asserted-by":"publisher","key":"ref69","DOI":"10.3233\/JCS-2010-0373"},{"year":"2018","author":"rescorla","key":"ref1"},{"year":"2019","key":"ref95"},{"year":"2019","key":"ref94"},{"year":"2018","key":"ref93"},{"year":"2019","key":"ref92"},{"doi-asserted-by":"publisher","key":"ref91","DOI":"10.1109\/GLOCOMW.2014.7063507"},{"doi-asserted-by":"publisher","key":"ref90","DOI":"10.1088\/1367-2630\/11\/5\/055051"},{"year":"2017","key":"ref102"},{"year":"2019","key":"ref98"},{"year":"2019","key":"ref99"},{"doi-asserted-by":"publisher","key":"ref96","DOI":"10.1088\/1367-2630\/4\/1\/346"},{"doi-asserted-by":"publisher","key":"ref97","DOI":"10.1145\/3052973.3053043"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1007\/s10623-012-9747-6"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1088\/1367-2630\/11\/10\/105001"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1088\/1367-2630\/11\/7\/075001"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1364\/OE.19.010387"},{"key":"ref14","volume":"3","author":"bouwmeester","year":"2000","journal-title":"The Physics of Quantum Information Quantum Cryptography Quantum Teleportation Quantum Computation"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1103\/RevModPhys.81.1301"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1109\/TIT.1962.1057683"},{"doi-asserted-by":"publisher","key":"ref82","DOI":"10.1103\/RevModPhys.87.307"},{"key":"ref17","first-page":"410","article-title":"Secret-key reconciliation by public discussion","volume":"765","author":"brassard","year":"1993","journal-title":"Proc Workshop Theory Appl Cryptographic Techn"},{"doi-asserted-by":"publisher","key":"ref81","DOI":"10.1038\/s41467-017-02366-7"},{"key":"ref18","first-page":"329","article-title":"High performance error correction for quantum key distribution using polar codes","volume":"14","author":"jouguet","year":"2014","journal-title":"Quantum Inf Comput"},{"doi-asserted-by":"publisher","key":"ref84","DOI":"10.1103\/PhysRevA.92.022357"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1364\/OPTICA.1.000421"},{"doi-asserted-by":"publisher","key":"ref83","DOI":"10.1038\/ncomms13523"},{"doi-asserted-by":"publisher","key":"ref80","DOI":"10.1103\/PhysRevA.98.032335"},{"doi-asserted-by":"publisher","key":"ref89","DOI":"10.1103\/PhysRevLett.120.020504"},{"year":"2018","key":"ref85"},{"doi-asserted-by":"publisher","key":"ref86","DOI":"10.1038\/nphoton.2014.53"},{"doi-asserted-by":"publisher","key":"ref87","DOI":"10.1109\/JSTQE.2015.2392076"},{"doi-asserted-by":"publisher","key":"ref88","DOI":"10.1109\/ARES.2009.84"}],"container-title":["IEEE Transactions on Sustainable Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7274860\/9371478\/08703121.pdf?arnumber=8703121","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T14:54:21Z","timestamp":1652194461000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8703121\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1,1]]},"references-count":102,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/tsusc.2019.2913948","relation":{},"ISSN":["2377-3782","2377-3790"],"issn-type":[{"type":"electronic","value":"2377-3782"},{"type":"electronic","value":"2377-3790"}],"subject":[],"published":{"date-parts":[[2021,1,1]]}}}