{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,2]],"date-time":"2025-11-02T15:29:16Z","timestamp":1762097356066,"version":"build-2065373602"},"reference-count":126,"publisher":"Wiley","license":[{"start":{"date-parts":[[2023,12,23]],"date-time":"2023-12-23T00:00:00Z","timestamp":1703289600000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"NATO Allied Command Transformation"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Quantum Engineering"],"published-print":{"date-parts":[[2023,12,23]]},"abstract":"<jats:p>The growing importance of underwater networks (UNs) in mission-critical activities at sea enforces the need for secure underwater communications (UCs). Classical encryption techniques can be used to achieve secure data exchange in UNs. However, the advent of quantum computing will pose threats to classical cryptography, thus challenging UCs. Currently, underwater cryptosystems mostly adopt symmetric ciphers, which are considered computationally quantum robust but pose the challenge of distributing the secret key upfront. Post-quantum public-key (PQPK) protocols promise to overcome the key distribution problem. The security of PQPK protocols, however, only relies on the assumed computational complexity of some underlying mathematical problems. Moreover, the use of resource-hungry PQPK algorithms in resource-constrained environments such as UNs can require nontrivial hardware\/software optimization efforts. An alternative approach is underwater quantum key distribution (QKD), which promises unconditional security built upon the physical principles of quantum mechanics (QM). This tutorial provides a basic introduction to free-space underwater QKD (UQKD). At first, the basic concepts of QKD are presented, based on a fully worked out QKD example. A thorough state-of-the-art analysis of UQKD is carried out. The paper subsequently provides a theoretical analysis of the QKD performance through free-space underwater channels and its dependence on the key optical parameters of the system and seawater. Finally, open challenges, points of strength, and perspectives of UQKD are identified and discussed.<\/jats:p>","DOI":"10.1155\/2023\/7185329","type":"journal-article","created":{"date-parts":[[2023,12,23]],"date-time":"2023-12-23T21:05:05Z","timestamp":1703365505000},"page":"1-26","source":"Crossref","is-referenced-by-count":7,"title":["A Primer on Underwater Quantum Key Distribution"],"prefix":"10.1155","volume":"2023","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7786-0848","authenticated-orcid":true,"given":"Pietro","family":"Paglierani","sequence":"first","affiliation":[{"name":"NATO STO Centre for Maritime Research and Experimentation, La Spezia 19126, Italy"}]},{"given":"Amir Hossein","family":"Fahim Raouf","sequence":"additional","affiliation":[{"name":"Department of Electrical and Electronics Engineering, Ozyegin University, Istanbul 34794, T\u00fcrkiye"},{"name":"Department of Electrical & Computer Engineering, North Carolina State University, Raleigh, NC 27695, USA"}]},{"given":"Konstantinos","family":"Pelekanakis","sequence":"additional","affiliation":[{"name":"NATO STO Centre for Maritime Research and Experimentation, La Spezia 19126, Italy"}]},{"given":"Roberto","family":"Petroccia","sequence":"additional","affiliation":[{"name":"NATO STO Centre for Maritime Research and Experimentation, La Spezia 19126, Italy"}]},{"given":"Jo\u00e3o","family":"Alves","sequence":"additional","affiliation":[{"name":"NATO STO Centre for Maritime Research and Experimentation, La Spezia 19126, Italy"}]},{"given":"Murat","family":"Uysal","sequence":"additional","affiliation":[{"name":"Engineering Division, New York University Abu Dhabi (NYUAD), Abu Dhabi 129188, UAE"}]}],"member":"311","reference":[{"issue":"4","key":"1","doi-asserted-by":"crossref","first-page":"1075","DOI":"10.1109\/JOE.2017.2716599","article-title":"Toward the development of secure underwater acoustic networks","volume":"42","author":"C. Lal","year":"2017","journal-title":"IEEE Journal of Oceanic Engineering"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/mcom.2015.7180508"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.3390\/s21248262"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/comst.2018.2864127"},{"article-title":"Securing underwater communications: key agreement based on fully hashed MQV","author":"A. T. Capossele","key":"5","doi-asserted-by":"crossref","DOI":"10.1145\/3148675.3152760"},{"first-page":"1","article-title":"SecFun: security frameworkfor underwater acoustic sensor networks","author":"G. Ateniese","key":"6"},{"volume-title":"Quantum Computation and Quantum Information","year":"2010","author":"M. A. Nielsen","key":"7"},{"key":"8","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511617744","volume-title":"Quantum Cryptography and Secret-Key Distillation","author":"G. Van Assche","year":"2006"},{"first-page":"124","article-title":"Algorithms for quantum computation: discrete logarithms and factoring","author":"P. Shor","key":"9"},{"article-title":"Preparing for quantum-safe cryptography","year":"2020","author":"National Cyber Security Center","key":"10"},{"article-title":"Post-quantum cryptography","year":"2020","author":"National Institute of Standards and Technology","key":"11"},{"article-title":"ARM whitepaper: post-quantum cryptography","year":"2020","author":"H. Becker","key":"12"},{"key":"13","unstructured":"InstituteE. T. S.Quantum-safe cryptography (QSC); limits to quantum computing applied to symmetric key sizes2017ETSI GR QSC 006 v1.1.1"},{"article-title":"A fast quantum mechanical algorithm for database search","year":"1996","author":"L. K. Grover","key":"14"},{"article-title":"Status report on the third round of the NIST post-quantum cryptography standardization process","year":"2022","author":"G. Alagic","key":"15"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-30589-4_15"},{"key":"17","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-031-15979-4_16","volume-title":"Breaking Rainbow Takes a Weekend on a Laptop","author":"W. Beullens","year":"2022"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1364\/aop.361502"},{"key":"19","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-030-68487-7_3","article-title":"Classic McEliece implementation with low memory footprint","volume-title":"Smart Card Research and Advanced Applications","author":"J. Roth","year":"2021"},{"article-title":"Lightweight cryptography","year":"2002","author":"National Institute of Standards and Technology","key":"20"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/mwc.2011.5999759"},{"first-page":"1","article-title":"Physical layer security against an informed eavesdropper in underwater acoustic channels: feature extraction and quantization","author":"K. Pelekanakis","key":"22"},{"first-page":"1","article-title":"Physical layer security against an informed eavesdropper in underwater acoustic channels: reconciliation and privacy amplification","author":"G. Sklivanitis","key":"23"},{"volume-title":"Handbook of Applied Cryptography","year":"1996","author":"A. Menezes","key":"24"},{"author":"C. H. Bennet","key":"25","article-title":"Public-key distribution and coin tossing"},{"article-title":"Quantum key distribution (QKD) and quantum cryptography (QC)","year":"2018","author":"National Security Agency\/Central Security Service","key":"26"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.3390\/quantum2010007"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1364\/oe.25.019795"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1364\/josaa.36.000883"},{"key":"30","unstructured":"RaoufA. H. F.Performance analysis of quantum key distribution in underwater channels2021Istanbul, T\u00fcrkiye\u00d6zye\u011fin UniversityM.Sc. thesis"},{"article-title":"Advances in entanglement-based QKD for space applications","year":"2022","author":"S. Ecker","key":"31"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1103\/physrevlett.67.661"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1103\/physrevlett.68.3121"},{"key":"34","doi-asserted-by":"publisher","DOI":"10.1103\/physrevlett.81.3018"},{"key":"35","doi-asserted-by":"publisher","DOI":"10.1103\/physrevlett.91.057901"},{"key":"36","doi-asserted-by":"publisher","DOI":"10.1103\/physrevlett.92.057901"},{"key":"37","doi-asserted-by":"crossref","first-page":"413","DOI":"10.1007\/978-1-4615-3386-3_34","article-title":"Quantum cryptography and Bell\u2019s theorem","volume-title":"Quantum Measurements in Optics","author":"A. K. Ekert","year":"1992"},{"key":"38","doi-asserted-by":"publisher","DOI":"10.1103\/physrevlett.68.557"},{"key":"39","doi-asserted-by":"publisher","DOI":"10.1103\/physrevlett.108.130503"},{"key":"40","doi-asserted-by":"publisher","DOI":"10.1038\/s41586-018-0066-6"},{"key":"41","doi-asserted-by":"publisher","DOI":"10.1103\/physrevx.8.031043"},{"key":"42","doi-asserted-by":"publisher","DOI":"10.1145\/1008908.1008920"},{"key":"43","doi-asserted-by":"publisher","DOI":"10.1364\/josab.451237"},{"key":"44","doi-asserted-by":"publisher","DOI":"10.1007\/s11434-011-4570-4"},{"key":"45","doi-asserted-by":"publisher","DOI":"10.1103\/revmodphys.81.1301"},{"key":"46","doi-asserted-by":"publisher","DOI":"10.1103\/physreva.72.012326"},{"key":"47","doi-asserted-by":"publisher","DOI":"10.1103\/physrevlett.94.230504"},{"key":"48","doi-asserted-by":"publisher","DOI":"10.1364\/oe.418323"},{"key":"49","doi-asserted-by":"publisher","DOI":"10.1103\/physrevlett.90.167904"},{"key":"50","doi-asserted-by":"publisher","DOI":"10.1103\/physreva.69.032316"},{"key":"51","doi-asserted-by":"publisher","DOI":"10.1103\/physrevlett.93.120501"},{"first-page":"75","article-title":"Modelling of quantum key distribution protocols in communicating quantum processes language with verification and analysis in PRISM","author":"S. Kuppam","key":"52"},{"article-title":"Security of quantum key distribution with discrete rotational symmetry","year":"2005","author":"M. Koashi","key":"53"},{"key":"54","doi-asserted-by":"publisher","DOI":"10.26421\/qic1.2-4"},{"key":"55","doi-asserted-by":"publisher","DOI":"10.1103\/physreva.65.052310"},{"key":"56","first-page":"22","article-title":"The Ekert protocol","volume":"334","author":"N. Ilic","year":"2007","journal-title":"Journal of Physics"},{"key":"57","doi-asserted-by":"publisher","DOI":"10.1088\/1367-2630\/8\/8\/126"},{"key":"58","doi-asserted-by":"publisher","DOI":"10.1038\/ncomms15043"},{"key":"59","doi-asserted-by":"publisher","DOI":"10.1016\/j.scib.2022.10.010"},{"key":"60","doi-asserted-by":"publisher","DOI":"10.1103\/physrevlett.130.030801"},{"key":"61","doi-asserted-by":"publisher","DOI":"10.1103\/physrevlett.130.250801"},{"key":"62","doi-asserted-by":"publisher","DOI":"10.1103\/physrevapplied.19.054070"},{"key":"63","doi-asserted-by":"publisher","DOI":"10.1103\/prxquantum.3.020315"},{"key":"64","doi-asserted-by":"publisher","DOI":"10.1038\/s41467-022-31534-7"},{"key":"65","doi-asserted-by":"publisher","DOI":"10.1103\/physreva.62.062306"},{"key":"66","doi-asserted-by":"publisher","DOI":"10.1103\/physreva.61.022309"},{"article-title":"Continuous-variable quantum key distribution protocols with a discrete modulation","year":"2010","author":"A. Leverrier","key":"67"},{"key":"68","doi-asserted-by":"publisher","DOI":"10.1103\/physreva.97.022310"},{"key":"69","doi-asserted-by":"publisher","DOI":"10.1103\/physreva.79.012307"},{"key":"70","doi-asserted-by":"publisher","DOI":"10.1016\/j.physleta.2017.12.011"},{"key":"71","doi-asserted-by":"publisher","DOI":"10.1103\/physrevresearch.3.013047"},{"key":"72","doi-asserted-by":"publisher","DOI":"10.1103\/prxquantum.2.040334"},{"key":"73","doi-asserted-by":"publisher","DOI":"10.1088\/1367-2630\/8\/5\/075"},{"key":"74","doi-asserted-by":"publisher","DOI":"10.1088\/1367-2630\/17\/3\/033033"},{"key":"75","doi-asserted-by":"publisher","DOI":"10.1038\/npjqi.2016.25"},{"key":"76","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-04831-9","volume-title":"Applied Quantum Cryptography","author":"C. Kollmitzer","year":"2010"},{"key":"77","doi-asserted-by":"publisher","DOI":"10.1103\/physreva.67.022309"},{"key":"78","doi-asserted-by":"publisher","DOI":"10.1109\/jlt.2009.2024554"},{"first-page":"1879","article-title":"Efficient reconciliation protocol for discrete-variable quantum key distribution","author":"D. Elkouss","key":"79"},{"key":"80","doi-asserted-by":"publisher","DOI":"10.26421\/qic12.9-10-5"},{"key":"81","doi-asserted-by":"publisher","DOI":"10.1364\/josab.376267"},{"key":"82","doi-asserted-by":"publisher","DOI":"10.1364\/josab.404245"},{"volume-title":"Introduction to Fourier Optics","year":"2005","author":"J. W. Goodman","key":"83"},{"key":"84","doi-asserted-by":"publisher","DOI":"10.1364\/aop.11.000679"},{"key":"85","doi-asserted-by":"crossref","DOI":"10.1117\/3.626196","volume-title":"Laser Beam Propagation through Random Media","author":"L. C. Andrews","year":"2005","edition":"second"},{"key":"86","doi-asserted-by":"publisher","DOI":"10.1364\/josab.451242"},{"volume-title":"Marine Optics","year":"1976","author":"N. G. Jerlov","key":"87"},{"volume-title":"Light and Water: Radiative Transfer in Natural Waters","year":"1994","author":"D. Mobley","key":"88"},{"key":"89","doi-asserted-by":"publisher","DOI":"10.1109\/tcomm.2018.2867498"},{"key":"90","doi-asserted-by":"publisher","DOI":"10.1364\/ao.54.005392"},{"key":"91","doi-asserted-by":"publisher","DOI":"10.5697\/oc.55-2.471"},{"key":"92","doi-asserted-by":"publisher","DOI":"10.1109\/joe.2008.2005341"},{"key":"93","doi-asserted-by":"publisher","DOI":"10.1364\/jocn.5.000001"},{"key":"94","doi-asserted-by":"publisher","DOI":"10.1364\/ao.47.000277"},{"volume-title":"Underwater Communications","year":"2012","author":"M. Lanzagorta","key":"95"},{"volume-title":"Ocean Optics Web Book","year":"2010","author":"C. Mobley","key":"96"},{"key":"97","doi-asserted-by":"publisher","DOI":"10.1364\/josa.55.001110"},{"key":"98","doi-asserted-by":"publisher","DOI":"10.1109\/joe.2019.2894477"},{"key":"99","first-page":"296","article-title":"Free-space quantum cryptography in the H-alpha Fraunhofer window","volume":"6304","author":"D. Rogers","year":"2006","journal-title":"Free-Space Laser Communications VI"},{"issue":"3","key":"100","doi-asserted-by":"crossref","first-page":"349","DOI":"10.1364\/JOSAA.32.000349","article-title":"Channel analysis for single photon underwater free space quantum key distribution","volume":"32","author":"P. Shi","year":"2015","journal-title":"Journal of the Optical Society of America"},{"key":"101","doi-asserted-by":"crossref","first-page":"149","DOI":"10.1007\/s11801-015-5004-3","article-title":"Performance analysis of quantum key distribution based on air-water channel","volume":"11","author":"Y. Zhou","year":"2015","journal-title":"Optoelectronics Letters"},{"key":"102","doi-asserted-by":"crossref","DOI":"10.1142\/S0219749918500193","article-title":"Optimized decoy state QKD for underwater free space communication","volume":"16","author":"M. Lopes","year":"2018","journal-title":"International Journal of Quantum Information"},{"key":"103","doi-asserted-by":"publisher","DOI":"10.1364\/oe.27.003055"},{"key":"104","doi-asserted-by":"publisher","DOI":"10.1364\/oe.26.022563"},{"key":"105","doi-asserted-by":"publisher","DOI":"10.1364\/oe.27.026346"},{"key":"106","doi-asserted-by":"publisher","DOI":"10.1088\/1367-2630\/abb688"},{"key":"107","doi-asserted-by":"publisher","DOI":"10.1364\/prj.7.000a40"},{"key":"108","doi-asserted-by":"publisher","DOI":"10.1186\/s43074-020-0002-5"},{"key":"109","doi-asserted-by":"publisher","DOI":"10.1364\/ao.58.003902"},{"issue":"2","key":"110","article-title":"Decoy-state quantum key distribution over a long-distance high-loss air-water channel","volume":"15","author":"C.-Q. Hu","year":"2021","journal-title":"Physical Review Applied"},{"issue":"19","key":"111","doi-asserted-by":"crossref","first-page":"30 506","DOI":"10.1364\/OE.435079","article-title":"Experimental demonstration of underwater decoy-state quantum key distribution with all-optical transmission","volume":"29","author":"Y. Yu","year":"2021","journal-title":"Optics Express"},{"first-page":"1","article-title":"Real-time implementation of an underwater quantum key distribution system","author":"B. Kebapci","key":"112"},{"issue":"4","key":"113","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/JPHOT.2023.3287493","article-title":"Fpga-based implementation of an underwater quantum key distribution system with bb84 protocol","volume":"15","author":"B. Kebapci","year":"2023","journal-title":"IEEE Photonics Journal"},{"key":"114","doi-asserted-by":"publisher","DOI":"10.3390\/app10175744"},{"key":"115","doi-asserted-by":"publisher","DOI":"10.3390\/e22050571"},{"key":"116","doi-asserted-by":"publisher","DOI":"10.1140\/epjqt\/s40507-021-00113-y"},{"key":"117","doi-asserted-by":"publisher","DOI":"10.1038\/nature23655"},{"key":"118","doi-asserted-by":"publisher","DOI":"10.1109\/joe.2022.3165805"},{"key":"119","doi-asserted-by":"publisher","DOI":"10.1038\/s41534-021-00400-7"},{"first-page":"299","article-title":"End-to-end authentication in under-water sensor networks","author":"E. Souza","key":"120"},{"article-title":"Authentication of quantum key distribution with post-quantum cryptography and replay attacks","year":"2022","author":"L.-J. Wang","key":"121"},{"key":"122","article-title":"A quantum safe user authentication protocol for the internet of things","volume":"10","author":"K. S. Roy","year":"2019","journal-title":"International Journal of Next-Generation Computing"},{"key":"123","doi-asserted-by":"publisher","DOI":"10.1093\/nsr\/nwac228"},{"key":"124","doi-asserted-by":"publisher","DOI":"10.36227\/techrxiv.22299160.v1"},{"key":"125","doi-asserted-by":"publisher","DOI":"10.36227\/techrxiv.22299160.v2"},{"key":"126","doi-asserted-by":"publisher","DOI":"10.36227\/techrxiv.22299160.v3"}],"container-title":["Quantum Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/que\/2023\/7185329.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/que\/2023\/7185329.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/que\/2023\/7185329.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,12,23]],"date-time":"2023-12-23T21:05:22Z","timestamp":1703365522000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/que\/2023\/7185329\/"}},"subtitle":[],"editor":[{"given":"YuBo","family":"Sheng","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2023,12,23]]},"references-count":126,"alternative-id":["7185329","7185329"],"URL":"https:\/\/doi.org\/10.1155\/2023\/7185329","relation":{},"ISSN":["2577-0470"],"issn-type":[{"type":"electronic","value":"2577-0470"}],"subject":[],"published":{"date-parts":[[2023,12,23]]}}}