{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T13:07:09Z","timestamp":1772888829612,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":52,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,8,29]],"date-time":"2023-08-29T00:00:00Z","timestamp":1693267200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,8,29]]},"DOI":"10.1145\/3600160.3605050","type":"proceedings-article","created":{"date-parts":[[2023,8,9]],"date-time":"2023-08-09T22:54:41Z","timestamp":1691621681000},"page":"1-9","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":19,"title":["Key Management Systems for Large-Scale Quantum Key Distribution Networks"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0008-7046-2151","authenticated-orcid":false,"given":"Paul","family":"James","sequence":"first","affiliation":[{"name":"AIT Austrian Institute of Technology, Austria"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-1142-8870","authenticated-orcid":false,"given":"Stephan","family":"Laschet","sequence":"additional","affiliation":[{"name":"AIT Austrian Institute of Technology, Austria"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1957-3725","authenticated-orcid":false,"given":"Sebastian","family":"Ramacher","sequence":"additional","affiliation":[{"name":"AIT Austrian Institute of Technology, Austria"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-1257-061X","authenticated-orcid":false,"given":"Luca","family":"Torresetti","sequence":"additional","affiliation":[{"name":"AIT Austrian Insititute of Technology, Austria"}]}],"member":"320","published-online":{"date-parts":[[2023,8,29]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2014.09.018"},{"key":"e_1_3_2_1_2_1","volume-title":"Quantum cryptography using any two nonorthogonal states. Physical review letters 68, 21","author":"Bennett H","year":"1992","unstructured":"Charles\u00a0H Bennett. 1992. Quantum cryptography using any two nonorthogonal states. Physical review letters 68, 21 (1992), 3121."},{"key":"e_1_3_2_1_3_1","volume-title":"Bennett and Gilles Brassard","author":"H.","year":"1984","unstructured":"Charles\u00a0H. Bennett and Gilles Brassard. 1984. An Update on Quantum Cryptography (Impromptu Talk). In CRYPTO\u201984(LNCS), G.\u00a0R. Blakley and David Chaum (Eds.). Vol.\u00a0196. Springer, Heidelberg, 475\u2013480."},{"key":"e_1_3_2_1_4_1","volume-title":"Bennett and Gilles Brassard","author":"H.","year":"2014","unstructured":"Charles\u00a0H. Bennett and Gilles Brassard. 2014. Quantum cryptography: Public key distribution and coin tossing. Theoretical Computer Science 560 (dec 2014), 7\u201311."},{"key":"e_1_3_2_1_5_1","unstructured":"Olaf Bergmann. 2015\u20142022. C-Implementation of CoAP. https:\/\/libcoap.net\/"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/11502760_3"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48405-1_14"},{"key":"e_1_3_2_1_8_1","first-page":"1","article-title":"CoAP (Constrained Application Protocol) over TCP, TLS, and WebSockets","volume":"8323","author":"Bormann Carsten","year":"2018","unstructured":"Carsten Bormann, Simon Lemay, Hannes Tschofenig, Klaus Hartke, Bilhanan Silverajan, and Brian Raymor. 2018. CoAP (Constrained Application Protocol) over TCP, TLS, and WebSockets. RFC 8323 (2018), 1\u201354.","journal-title":"RFC"},{"key":"e_1_3_2_1_9_1","volume-title":"PQCrypto(Lecture Notes in Computer Science)","author":"Bruckner Sonja","unstructured":"Sonja Bruckner, Sebastian Ramacher, and Christoph Striecks. 2023. Muckle+: End-to-End Hybrid Authenticated Key Exchanges. In PQCrypto(Lecture Notes in Computer Science). Springer. to appear."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","unstructured":"Larry Carter and Mark\u00a0N. Wegman. 1977. Universal Classes of Hash Functions (Extended Abstract). In STOC. ACM 106\u2013112.","DOI":"10.1145\/800105.803400"},{"key":"e_1_3_2_1_11_1","unstructured":"CCMB-2017-04-001 2017. Common Criteria for Information Technology Security Evaluation. Publication 3.1 Rev. 5. Common Criteria (CC)."},{"key":"e_1_3_2_1_12_1","unstructured":"European Commission. 2023. The European Quantum Communication Infrastructure (EuroQCI) Initiative. http:\/\/web.archive.org\/web\/20230419230756\/https:\/\/digital-strategy.ec.europa.eu\/en\/policies\/european-quantum-communication-infrastructure-euroqci"},{"key":"e_1_3_2_1_13_1","unstructured":"Airbus\u00a0Secure Communications. 2023. Towards a better approach for Quantum-Key-Distribution (QKD) Networks keymanagement. https:\/\/web.archive.org\/web\/20230504083700\/https:\/\/securecommunications.airbus.com\/en\/news\/quantum-key-distribution-qkd-networks-key-management"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/0375-9601(82)90084-6"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-44223-1_26"},{"key":"e_1_3_2_1_17_1","unstructured":"eoPortal. 2023. QUESS (Quantum Experiments at Space Scale) \/ Micius. https:\/\/web.archive.org\/web\/20230218065358\/https:\/\/www.eoportal.org\/satellite-missions\/quess"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1287624.1287660"},{"key":"e_1_3_2_1_19_1","unstructured":"Olaf\u00a0Bergmann et al.2010\u20142023. A CoAP (RFC 7252) implementation in C. https:\/\/github.com\/obgm\/libcoap"},{"key":"e_1_3_2_1_20_1","volume-title":"Quantum Key Distribution (QKD)","author":"ETSI GS QKD","unstructured":"ETSI GS QKD 004 2020. Quantum Key Distribution (QKD); Application Interface. Group Specification v2.1.1. European Telecommunications Standards Institute (ETSI), Industry Specification Groups(ISG)."},{"key":"e_1_3_2_1_21_1","volume-title":"Quantum Key Distribution (QKD)","author":"ETSI GS QKD","unstructured":"ETSI GS QKD 014 2019. Quantum Key Distribution (QKD); Protocol and data format of REST-based key delivery API. Group Specification v1.1.1. European Telecommunications Standards Institute (ETSI), Industry Specification Groups(ISG)."},{"key":"e_1_3_2_1_22_1","volume-title":"Control Interface for Software Defined Networks","author":"ETSI GS QKD","unstructured":"ETSI GS QKD 015 2022. Control Interface for Software Defined Networks. Group Specification v2.1.1. European Telecommunications Standards Institute (ETSI), Industry Specification Groups (ISG)."},{"key":"e_1_3_2_1_23_1","volume-title":"Common Criteria Protection Profile Pair of Prepare and Measure Quantum Key Distribution Modules","author":"ETSI GS QKD","unstructured":"ETSI GS QKD 016 2021. Common Criteria Protection Profile Pair of Prepare and Measure Quantum Key Distribution Modules. Group Specification Draft v0.6.2. European Telecommunications Standards Institute (ETSI), Industry Specification Groups(ISG)."},{"key":"e_1_3_2_1_24_1","volume-title":"Protocol and data format of REST-based Interoperable Key Management System API","author":"ETSI GS QKD","unstructured":"ETSI GS QKD 020 2023. Protocol and data format of REST-based Interoperable Key Management System API. Group Specification Draft v0.2.1. European Telecommunications Standards Institute (ETSI), Industry Specification Groups (ISG)."},{"key":"e_1_3_2_1_26_1","first-page":"1","article-title":"HTTP Semantics","volume":"9110","author":"Fielding T.","year":"2022","unstructured":"Roy\u00a0T. Fielding, Mark Nottingham, and Julian\u00a0F. Reschke. 2022. HTTP Semantics. RFC 9110 (2022), 1\u2013194.","journal-title":"RFC"},{"key":"e_1_3_2_1_27_1","volume-title":"Security requirements for cryptographic modules. Standards Publication","author":"FIPS PUB","unstructured":"FIPS PUB 140-2 2001. Security requirements for cryptographic modules. Standards Publication. National Institute of Standards and Technology (NIST) Federal Information Processing Standards (FIPS)."},{"key":"e_1_3_2_1_28_1","unstructured":"Federal\u00a0Office for Information Security\u00a0(BSI). 2021. Quantum-safe cryptography \u2013 fundamentals current developments and recommendations. (2021). https:\/\/www.bsi.bund.de\/SharedDocs\/Downloads\/EN\/BSI\/Publications\/Brochure\/quantum-safe-cryptography.pdf?__blob=publicationFile&v=4"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-76578-5_7"},{"key":"e_1_3_2_1_30_1","volume-title":"Continuous variable quantum cryptography using coherent states. Physical review letters 88, 5","author":"Grosshans Fr\u00e9d\u00e9ric","year":"2002","unstructured":"Fr\u00e9d\u00e9ric Grosshans and Philippe Grangier. 2002. Continuous variable quantum cryptography using coherent states. Physical review letters 88, 5 (2002), 057902."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/237814.237866"},{"key":"e_1_3_2_1_32_1","volume-title":"Vicente Martin, Andreas Poppe, Joshua\u00a0A. Slater, Tim Spiller, Wolfgang Tittel, Benoit Tranier, Adrian Wonfor, and Hugo Zbinden.","author":"Huttner Bruno","year":"2022","unstructured":"Bruno Huttner, Romain All\u00e9aume, Eleni Diamanti, Florian Fr\u00f6wis, Philippe Grangierand\u00a0Hannes H\u00fcbel, Vicente Martin, Andreas Poppe, Joshua\u00a0A. Slater, Tim Spiller, Wolfgang Tittel, Benoit Tranier, Adrian Wonfor, and Hugo Zbinden. 2022. Long-range QKD without trusted nodes is not possible with current technology. npj Quantum Information 8, 1 (2022), 1\u20135."},{"key":"e_1_3_2_1_33_1","volume-title":"International Standard","author":"IEC","unstructured":"ISO\/IEC 27000-family 1995-2023. Information security management systems. International Standard. International Organization for Standardization (ISO)."},{"key":"e_1_3_2_1_34_1","volume-title":"Overview on networks supporting quantum key distribution. Recommendation v1.0","author":"ITU-T","unstructured":"ITU-T Y.3800 2019. Overview on networks supporting quantum key distribution. Recommendation v1.0. International Telecommunication Union (ITU) Telecommunication Standardization Sector (ITU-T)."},{"key":"e_1_3_2_1_35_1","volume-title":"Quantum key distribution networks \u2013 Key management. Recommendation v1.0","author":"ITU-T","unstructured":"ITU-T Y.3803 2020. Quantum key distribution networks \u2013 Key management. Recommendation v1.0. International Telecommunication Union (ITU) Telecommunication Standardization Sector (ITU-T)."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/357172.357176"},{"key":"e_1_3_2_1_37_1","volume-title":"Madrid Quantum Communication Infrastructure: a testbed for assessing QKD technologies into real production networks","author":"L\u00f3pez R.","unstructured":"Diego\u00a0R. L\u00f3pez, Juan\u00a0Pedro Brito, Antonio Pastor, Vicente Mart\u00edn, C. S\u00e1nchez, D. Rincon, and V\u00edctor L\u00f3pez. 2021. Madrid Quantum Communication Infrastructure: a testbed for assessing QKD technologies into real production networks. In OFC. IEEE, 1\u20134."},{"key":"e_1_3_2_1_38_1","volume-title":"Quantum Key Distribution: A Networking Perspective. ACM Comput. Surv. 53, 5","author":"Mehic Miralem","year":"2020","unstructured":"Miralem Mehic, Marcin Niemiec, Stefan Rass, Jiajun Ma, Momtchil Peev, Alejandro Aguado, Vicente Mart\u00edn, Stefan Schauer, Andreas Poppe, Christoph Pacher, and Miroslav Vozn\u00e1k. 2020. Quantum Key Distribution: A Networking Perspective. ACM Comput. Surv. 53, 5 (2020), 96:1\u201396:41."},{"key":"e_1_3_2_1_39_1","volume-title":"Re-visiting the One-Time Pad. arXiv preprint cs\/0508079","author":"Nagaraj Nithin","year":"2005","unstructured":"Nithin Nagaraj, Vivek Vaidya, and Prabhakar\u00a0G Vaidya. 2005. Re-visiting the One-Time Pad. arXiv preprint cs\/0508079 (2005)."},{"key":"e_1_3_2_1_40_1","volume-title":"A Framework for Designing Cryptographic Key Management Systems. Special Publication Revision 5","author":"NIST SP","unstructured":"NIST SP 800-130 2013. A Framework for Designing Cryptographic Key Management Systems. Special Publication Revision 5. National Institute of Standards and Technology (NIST)."},{"key":"e_1_3_2_1_41_1","volume-title":"Security and Privacy Controls for Information Systems and Organizations. Special Publication Revision 5","author":"NIST SP","unstructured":"NIST SP 800-130 2020. Security and Privacy Controls for Information Systems and Organizations. Special Publication Revision 5. National Institute of Standards and Technology (NIST)."},{"key":"e_1_3_2_1_42_1","volume-title":"Secure Software Development Framework (SSDF). Special Publication Version 1.1","author":"NIST SP","unstructured":"NIST SP 800-218 2022. Secure Software Development Framework (SSDF). Special Publication Version 1.1. National Institute of Standards and Technology (NIST)."},{"key":"e_1_3_2_1_43_1","volume-title":"Revision 5","author":"NIST SP","unstructured":"NIST SP 800-57 2020. Recommendation for Key Management. Special Publication Part 1, Revision 5. National Institute of Standards and Technology (NIST)."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.61.010303"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"crossref","unstructured":"Eric Rescorla. 2018. The Transport Layer Security (TLS) Protocol Version 1.3. RFC 8446.","DOI":"10.17487\/RFC8446"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"crossref","unstructured":"Eric Rescorla Hannes Tschofenig and Nagendra Modadugu. 2022. The Datagram Transport Layer Security (DTLS) Protocol Version 1.3. RFC 9147.","DOI":"10.17487\/RFC9147"},{"key":"e_1_3_2_1_47_1","volume-title":"Field test of quantum key distribution in the Tokyo QKD Network. Optics express 19, 11","author":"Sasaki Masahide","year":"2011","unstructured":"Masahide Sasaki, Mikio Fujiwara, H Ishizuka, W Klaus, K Wakui, M Takeoka, S Miki, T Yamashita, Z Wang, A Tanaka, 2011. Field test of quantum key distribution in the Tokyo QKD Network. Optics express 19, 11 (2011), 10387\u201310409."},{"key":"e_1_3_2_1_48_1","first-page":"1","article-title":"The Constrained Application Protocol (CoAP)","volume":"7252","author":"Shelby Zach","year":"2014","unstructured":"Zach Shelby, Klaus Hartke, and Carsten Bormann. 2014. The Constrained Application Protocol (CoAP). RFC 7252 (2014), 1\u2013112.","journal-title":"RFC"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1994.365700"},{"key":"e_1_3_2_1_50_1","volume-title":"Continuous variable quantum cryptography: Beating the 3 dB loss limit. Physical review letters 89, 16","author":"Silberhorn Ch","year":"2002","unstructured":"Ch Silberhorn, Timothy\u00a0C Ralph, Norbert L\u00fctkenhaus, and Gerd Leuchs. 2002. Continuous variable quantum cryptography: Beating the 3 dB loss limit. Physical review letters 89, 16 (2002), 167901."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1016\/0022-0000(81)90033-7"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1016\/0022-0000(81)90033-7"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1038\/299802a0"},{"key":"e_1_3_2_1_54_1","volume-title":"Entanglement-based secure quantum cryptography over 1,120 kilometres. Nature 582 (06","author":"Yin Juan","year":"2020","unstructured":"Juan Yin, Yu-Huai Li, Liao Shengkai, Meng Yang, Yuan Cao, Liang Zhang, Jianyu Wang, Wen-Qi Cai, Wei-Yue Liu, Shuang-Lin Li, Rong Shu, Yong-Mei Huang, Lei Deng, Li Li, Qiang Zhang, Nai-Le Liu, Yu-Ao Chen, Chao-Yang Lu, Xiang-Bin Wang, and Jian-Wei Pan. 2020. Entanglement-based secure quantum cryptography over 1,120 kilometres. Nature 582 (06 2020), 1\u20135."}],"event":{"name":"ARES 2023: The 18th International Conference on Availability, Reliability and Security","location":"Benevento Italy","acronym":"ARES 2023"},"container-title":["Proceedings of the 18th International Conference on Availability, Reliability and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3600160.3605050","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3600160.3605050","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:49:16Z","timestamp":1750182556000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3600160.3605050"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8,29]]},"references-count":52,"alternative-id":["10.1145\/3600160.3605050","10.1145\/3600160"],"URL":"https:\/\/doi.org\/10.1145\/3600160.3605050","relation":{},"subject":[],"published":{"date-parts":[[2023,8,29]]},"assertion":[{"value":"2023-08-29","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}