{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,20]],"date-time":"2026-02-20T21:03:57Z","timestamp":1771621437489,"version":"3.50.1"},"reference-count":97,"publisher":"MDPI AG","issue":"4","license":[{"start":{"date-parts":[[2023,4,6]],"date-time":"2023-04-06T00:00:00Z","timestamp":1680739200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"National Key Research and Development Program of China","award":["2022YFB2903200"],"award-info":[{"award-number":["2022YFB2903200"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Entropy"],"abstract":"<jats:p>Quantum key distribution (QKD) protocols have unique advantages of enabling symmetric key sharing with information-theoretic security (ITS) between remote locations, which ensure the long-term security even in the era of quantum computation. QKD-based quantum secure communication (QSC) enhancing the security of key generation and update rate of keys, which could be integrated with a variety of cryptographic applications and communication protocols, has become one of the important solutions to improve information security. In recent years, the research on QKD has been active and productive, the performance of novel protocol systems has been improved significantly, and the feasibility of satellite-based QKD has been experimentally verified. QKD network construction, application exploration, and standardization have been carried out in China as well as other countries and regions around the world. Although QKD-based QSC applications and industrialization are still in the initial stage, the research and exploration momentum is positive and more achievements could be expected in the future.<\/jats:p>","DOI":"10.3390\/e25040627","type":"journal-article","created":{"date-parts":[[2023,4,6]],"date-time":"2023-04-06T08:41:52Z","timestamp":1680770512000},"page":"627","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":20,"title":["Application and Development of QKD-Based Quantum Secure Communication"],"prefix":"10.3390","volume":"25","author":[{"given":"Junsen","family":"Lai","sequence":"first","affiliation":[{"name":"China Academy of Information and Communication Technology (CAICT), Beijing 100191, China"}]},{"given":"Fei","family":"Yao","sequence":"additional","affiliation":[{"name":"China Academy of Information and Communication Technology (CAICT), Beijing 100191, China"}]},{"given":"Jing","family":"Wang","sequence":"additional","affiliation":[{"name":"China Academy of Information and Communication Technology (CAICT), Beijing 100191, China"}]},{"given":"Meng","family":"Zhang","sequence":"additional","affiliation":[{"name":"China Academy of Information and Communication Technology (CAICT), Beijing 100191, China"}]},{"given":"Fang","family":"Li","sequence":"additional","affiliation":[{"name":"China Academy of Information and Communication Technology (CAICT), Beijing 100191, China"}]},{"given":"Wenyu","family":"Zhao","sequence":"additional","affiliation":[{"name":"China Academy of Information and Communication Technology (CAICT), Beijing 100191, China"}]},{"given":"Haiyi","family":"Zhang","sequence":"additional","affiliation":[{"name":"China Academy of Information and Communication Technology (CAICT), Beijing 100191, China"}]}],"member":"1968","published-online":{"date-parts":[[2023,4,6]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1140\/epjqt\/s40507-021-00108-9","article-title":"Quantum technologies in the telecommunications industry","volume":"8","author":"Martin","year":"2021","journal-title":"EPJ Quantum Technol."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"020101","DOI":"10.1103\/PRXQuantum.1.020101","article-title":"Harnessing the Power of the Second Quantum Revolution","volume":"1","author":"Deutsch","year":"2020","journal-title":"PRX Quantum"},{"key":"ref_3","unstructured":"NSTC (2023, February 20). National Strategic Overview for Quantum Information Science, Available online: https:\/\/www.quantum.gov\/wp-content\/uploads\/2020\/10\/2018_NSTC_National_Strategic_Overview_QIS.pdf."},{"key":"ref_4","unstructured":"(2023, February 20). European Quantum Flagship, Strategic Research and Industry Agenda. Available online: https:\/\/qt.eu\/about-quantum-flagship\/introduction-to-the-quantum-flagship\/sab-strategic-advisory-board\/."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"165","DOI":"10.1038\/nphoton.2007.22","article-title":"Quantum communication","volume":"1","author":"Gisin","year":"2007","journal-title":"Nat. Photonics"},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"575","DOI":"10.1038\/37539","article-title":"Experimental quantum teleportation","volume":"390","author":"Bouwmeester","year":"1997","journal-title":"Nature"},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1016\/j.tcs.2014.05.025","article-title":"Quantum cryptography: Public key distribution and coin tossing","volume":"560","author":"Bennett","year":"2014","journal-title":"Theor. Comput. Sci."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"1829","DOI":"10.1103\/PhysRevA.59.1829","article-title":"Quantum secret sharing","volume":"59","author":"Hillery","year":"1999","journal-title":"Phys. Rev. A"},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"4656","DOI":"10.1103\/PhysRevLett.76.4656","article-title":"Dense Coding in Experimental Quantum Communication","volume":"76","author":"Mattle","year":"1996","journal-title":"Phys. Rev. Lett."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"251","DOI":"10.1007\/s11467-007-0050-3","article-title":"Quantum secure direct communication and deterministic secure quantum communication","volume":"2","author":"Long","year":"2007","journal-title":"Front. Phys. China"},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"1023","DOI":"10.1038\/nature07127","article-title":"The quantum internet","volume":"453","author":"Kimble","year":"2008","journal-title":"Nature"},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Martin, V., Martinez-Mateo, J., and Peev, M. (2017). Introduction to Quantum Key Distribution, Wiley Online Library.","DOI":"10.1002\/047134608X.W8354"},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Vermeer, M.J.D., and Peet, E.D. (2020). Securing Communications in the Quantum Computing Age: Managing the Risks to Encryption, RAND Corporation.","DOI":"10.7249\/RR3102"},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Alagic, G., Cooper, D., Dang, Q., Dang, T., Kelsey, J.M., Lichtinger, J., Liu, Y.K., Miller, C.A., Moody, D., and Peralta, R. (2022). Status Report on the Third Round of the NIST Post-Quantum Cryptography Standardization Process.","DOI":"10.6028\/NIST.IR.8413"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"012332","DOI":"10.1103\/PhysRevA.72.012332","article-title":"Information-theoretic security proof for quantum-key-distribution protocols","volume":"72","author":"Renner","year":"2005","journal-title":"Phys. Rev. A"},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"9288","DOI":"10.1126\/science.aam9288","article-title":"Quantum internet: A vision for the road ahead","volume":"362","author":"Wehner","year":"2018","journal-title":"Science"},{"key":"ref_17","unstructured":"Nicholas, P., van Dam Kleese, K., Inder, M., and Thomas, S. (2020). From Long-Distance Entanglement to Building a Nationwide Quantum Internet: Report of the DOE Quantum Internet Blueprint Workshop."},{"key":"ref_18","unstructured":"Lewis, A.M., and Travagnin, M. (2022). A Secure Quantum Communications Infrastructure for Europe: Technical Background for a Policy Vision, Publications Office of the European Union."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"154","DOI":"10.1038\/s41566-021-00928-2","article-title":"Twin-field quantum key distribution over 830-km fibre","volume":"16","author":"Wang","year":"2022","journal-title":"Nat. Photonics"},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"3427","DOI":"10.1109\/JLT.2018.2843136","article-title":"10-Mb\/s Quantum Key Distribution","volume":"36","author":"Yuan","year":"2018","journal-title":"J. Light. Technol."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1109\/MCOM.2019.1800763","article-title":"The Engineering of Software-Defined Quantum Key Distribution Networks","volume":"57","author":"Aguado","year":"2019","journal-title":"IEEE Commun. Mag."},{"key":"ref_22","unstructured":"(2021). Standardization Outlook and Technology Maturity: Quantum Key Distribution Network (Standard No. FG-QIT4N)."},{"key":"ref_23","unstructured":"Lewis, A.M., and Travagnin, M. (2019). Quantum Key Distribution In-Field Implementations, Publications Office of the European Union."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"025002","DOI":"10.1103\/RevModPhys.92.025002","article-title":"Secure quantum key distribution with realistic devices","volume":"92","author":"Xu","year":"2020","journal-title":"Rev. Mod. Phys."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"661","DOI":"10.1103\/PhysRevLett.67.661","article-title":"Quantum cryptography based on Bell\u2019s theorem","volume":"67","author":"Ekert","year":"1991","journal-title":"Phys. Rev. Lett."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"010505","DOI":"10.1103\/PhysRevLett.98.010505","article-title":"Experimental Long-Distance Decoy-State Quantum Key Distribution Based on Polarization Encoding","volume":"98","author":"Peng","year":"2007","journal-title":"Phys. Rev. Lett."},{"key":"ref_27","unstructured":"Hiroki, T., Honjo, T., Tamaki, K., and Tokura, Y. (2008, January 12\u201313). Differential phase shift quantum key distribution. Proceedings of the 2008 First ITU-T Kaleidoscope Academic Conference\u2014Innovations in NGN: Future Network and Services, Geneva, Switzerland."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"36756","DOI":"10.1038\/srep36756","article-title":"Two-dimensional distributed-phase-reference protocol for quantum key distribution","volume":"6","author":"Bacco","year":"2016","journal-title":"Sci. Rep."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"190502","DOI":"10.1103\/PhysRevLett.121.190502","article-title":"Secure Quantum Key Distribution over 421 km of Optical Fiber","volume":"121","author":"Boaron","year":"2018","journal-title":"Phys. Rev. Lett."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"400","DOI":"10.1038\/s41586-018-0066-6","article-title":"Overcoming the rate-distance limit of quantum key distribution without quantum repeaters","volume":"557","author":"Lucamarini","year":"2018","journal-title":"Nature"},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"334","DOI":"10.1038\/s41566-019-0377-7","article-title":"Experimental quantum key distribution beyond the repeaterless secret key capacity","volume":"13","author":"Minder","year":"2019","journal-title":"Nat. Photonics"},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"062323","DOI":"10.1103\/PhysRevA.98.062323","article-title":"Twin-field quantum key distribution with large misalignment error","volume":"98","author":"Wang","year":"2018","journal-title":"Phys. Rev. A"},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"042330","DOI":"10.1103\/PhysRevA.101.042330","article-title":"Sending-or-not-sending twin-field quantum key distribution: Breaking the direct transmission key rate","volume":"101","author":"Xu","year":"2020","journal-title":"Phys. Rev. A"},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"024061","DOI":"10.1103\/PhysRevApplied.12.024061","article-title":"Unconditional Security of Sending or Not Sending Twin-Field Quantum Key Distribution with Finite Pulses","volume":"12","author":"Jiang","year":"2019","journal-title":"Phys. Rev. Appl."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"422","DOI":"10.1038\/s41566-020-0599-8","article-title":"Implementation of quantum key distribution surpassing the linear rate-transmittance bound","volume":"14","author":"Fang","year":"2020","journal-title":"Nat. Photonics"},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"070501","DOI":"10.1103\/PhysRevLett.124.070501","article-title":"Sending-Or-Not-Sending with Independent Lasers: Secure Twin-Field Quantum Key Distribution over 509 km","volume":"124","author":"Chen","year":"2020","journal-title":"Phys. Rev. Lett."},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"530","DOI":"10.1038\/s41566-021-00811-0","article-title":"600-km repeater-like quantum communications with dual-band stabilization","volume":"15","author":"Pittaluga","year":"2021","journal-title":"Nat. Photonics"},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"570","DOI":"10.1038\/s41566-021-00828-5","article-title":"Twin-field quantum key distribution over a 511 km optical fibre linking two distant metropolitan areas","volume":"15","author":"Chen","year":"2021","journal-title":"Nat. Photonics"},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"180502","DOI":"10.1103\/PhysRevLett.128.180502","article-title":"Quantum Key Distribution over 658 km Fiber with Distributed Vibration Sensing","volume":"128","author":"Chen","year":"2022","journal-title":"Phys. Rev. Lett."},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"1357","DOI":"10.1109\/JLT.2016.2646921","article-title":"Secure NFV Orchestration over an SDN-Controlled Optical Network with Time-Shared Quantum Key Distribution Resources","volume":"35","author":"Aguado","year":"2017","journal-title":"J. Light. Technol."},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"2214","DOI":"10.1109\/JLT.2020.2970179","article-title":"Wavelength Division Multiplexing of 194 Continuous Variable Quantum Key Distribution Channels","volume":"38","author":"Eriksson","year":"2020","journal-title":"J. Light. Technol."},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1038\/s42005-019-0269-7","article-title":"Quantum information processing with space-division multiplexing optical fibres","volume":"3","author":"Xavier","year":"2020","journal-title":"Commun. Phys."},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"1800011","DOI":"10.1002\/qute.201800011","article-title":"Continuous-Variable Quantum Key Distribution with Gaussian Modulation\u2014The Theory of Practical Implementations","volume":"1","author":"Laudenbach","year":"2018","journal-title":"Adv. Quantum Technol."},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"057902","DOI":"10.1103\/PhysRevLett.88.057902","article-title":"Continuous Variable Quantum Cryptography Using Coherent States","volume":"88","author":"Grosshans","year":"2002","journal-title":"Phys. Rev. Lett."},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"170504","DOI":"10.1103\/PhysRevLett.93.170504","article-title":"Quantum Cryptography without Switching","volume":"93","author":"Weedbrook","year":"2004","journal-title":"Phys. Rev. Lett."},{"key":"ref_46","doi-asserted-by":"crossref","first-page":"180504","DOI":"10.1103\/PhysRevLett.102.180504","article-title":"Unconditional Security Proof of Long-Distance Continuous-Variable Quantum Key Distribution with Discrete Modulation","volume":"102","author":"Leverrier","year":"2009","journal-title":"Phys. Rev. Lett."},{"key":"ref_47","doi-asserted-by":"crossref","first-page":"4740","DOI":"10.1038\/s41467-022-32161-y","article-title":"Practical continuous-variable quantum key distribution with composable security","volume":"13","author":"Jain","year":"2022","journal-title":"Nat. Commun."},{"key":"ref_48","doi-asserted-by":"crossref","first-page":"162","DOI":"10.1038\/s42005-022-00941-z","article-title":"Sub-Gbps key rate four-state continuous-variable quantum key distribution within metropolitan area","volume":"5","author":"Wang","year":"2022","journal-title":"Commun. Phys."},{"key":"ref_49","doi-asserted-by":"crossref","first-page":"3307","DOI":"10.1364\/OL.456978","article-title":"Experimental demonstration of high-rate discrete-modulated continuous-variable quantum key distribution system","volume":"47","author":"Pan","year":"2022","journal-title":"Opt. Lett."},{"key":"ref_50","doi-asserted-by":"crossref","first-page":"1900038","DOI":"10.1002\/qute.201900038","article-title":"High-Dimensional Quantum Communication: Benefits, Progress, and Future Challenges","volume":"2","author":"Cozzolino","year":"2019","journal-title":"Adv. Quantum Technol."},{"key":"ref_51","doi-asserted-by":"crossref","first-page":"365","DOI":"10.1038\/s42254-020-0193-5","article-title":"Advances in high-dimensional quantum entanglement","volume":"2","author":"Erhard","year":"2020","journal-title":"Nat. Rev. Phys."},{"key":"ref_52","doi-asserted-by":"crossref","first-page":"014051","DOI":"10.1103\/PhysRevApplied.14.014051","article-title":"Efficient Time-Bin Encoding for Practical High-Dimensional Quantum Key Distribution","volume":"14","author":"Vagniluca","year":"2020","journal-title":"Phys. Rev. Appl."},{"key":"ref_53","doi-asserted-by":"crossref","first-page":"15971","DOI":"10.1038\/ncomms15971","article-title":"Distribution of high-dimensional entanglement via an intra-city free-space link","volume":"8","author":"Steinlechner","year":"2017","journal-title":"Nat. Commun."},{"key":"ref_54","doi-asserted-by":"crossref","first-page":"22563","DOI":"10.1364\/OE.26.022563","article-title":"Quantum cryptography with twisted photons through an outdoor underwater channel","volume":"26","author":"Bouchard","year":"2018","journal-title":"Opt. Express"},{"key":"ref_55","doi-asserted-by":"crossref","first-page":"1229","DOI":"10.1038\/s41598-023-28382-w","article-title":"High-dimensional quantum key distribution implemented with biphotons","volume":"13","author":"Sekga","year":"2023","journal-title":"Sci. Rep."},{"key":"ref_56","doi-asserted-by":"crossref","first-page":"035001","DOI":"10.1103\/RevModPhys.94.035001","article-title":"Micius quantum experiments in space","volume":"94","author":"Lu","year":"2022","journal-title":"Rev. Mod. Phys."},{"key":"ref_57","doi-asserted-by":"crossref","first-page":"387","DOI":"10.1038\/nphoton.2013.89","article-title":"Direct and full-scale experimental verifications towards ground-satellite quantum key distribution","volume":"7","author":"Wang","year":"2013","journal-title":"Nat. Photonics"},{"key":"ref_58","doi-asserted-by":"crossref","first-page":"024009","DOI":"10.1088\/2058-9565\/aa701f","article-title":"Airborne demonstration of a quantum key distribution receiver payload","volume":"2","author":"Pugh","year":"2017","journal-title":"Quantum Sci. Technol."},{"key":"ref_59","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1140\/epjqt\/s40507-017-0060-1","article-title":"CubeSat quantum communications mission","volume":"4","author":"Oi","year":"2017","journal-title":"EPJ Quantum Technol."},{"key":"ref_60","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1140\/epjqt\/s40507-018-0070-7","article-title":"Nanobob: A CubeSat mission concept for quantum communication experiments in an uplink configuration","volume":"5","author":"Kerstel","year":"2018","journal-title":"EPJ Quantum Technol."},{"key":"ref_61","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1038\/nature23655","article-title":"Satellite-to-ground quantum key distribution","volume":"549","author":"Liao","year":"2017","journal-title":"Nature"},{"key":"ref_62","doi-asserted-by":"crossref","first-page":"200501","DOI":"10.1103\/PhysRevLett.119.200501","article-title":"Satellite-To-Ground Entanglement-Based Quantum Key Distribution","volume":"119","author":"Yin","year":"2017","journal-title":"Phys. Rev. Lett."},{"key":"ref_63","doi-asserted-by":"crossref","first-page":"030501","DOI":"10.1103\/PhysRevLett.120.030501","article-title":"Satellite-Relayed Intercontinental Quantum Network","volume":"120","author":"Liao","year":"2018","journal-title":"Phys. Rev. Lett."},{"key":"ref_64","doi-asserted-by":"crossref","first-page":"501","DOI":"10.1038\/s41586-020-2401-y","article-title":"Entanglement-based secure quantum cryptography over 1120 kilometres","volume":"582","author":"Yin","year":"2020","journal-title":"Nature"},{"key":"ref_65","doi-asserted-by":"crossref","first-page":"214","DOI":"10.1038\/s41586-020-03093-8","article-title":"An integrated space-to-ground quantum communication network over 4600 kilometres","volume":"589","author":"Chen","year":"2021","journal-title":"Nature"},{"key":"ref_66","doi-asserted-by":"crossref","first-page":"1140","DOI":"10.1126\/science.aan3211","article-title":"Satellite-based entanglement distribution over 1200 kilometers","volume":"356","author":"Yin","year":"2017","journal-title":"Science"},{"key":"ref_67","doi-asserted-by":"crossref","first-page":"70","DOI":"10.1038\/nature23675","article-title":"Ground-to-satellite quantum teleportation","volume":"549","author":"Ren","year":"2017","journal-title":"Nature"},{"key":"ref_68","doi-asserted-by":"crossref","first-page":"170501","DOI":"10.1103\/PhysRevLett.128.170501","article-title":"Quantum State Transfer over 1200 km Assisted by Prior Distributed Entanglement","volume":"128","author":"Li","year":"2022","journal-title":"Phys. Rev. Lett."},{"key":"ref_69","doi-asserted-by":"crossref","first-page":"132","DOI":"10.1126\/science.aay5820","article-title":"Satellite testing of a gravitationally induced quantum decoherence model","volume":"366","author":"Xu","year":"2019","journal-title":"Science"},{"key":"ref_70","doi-asserted-by":"crossref","first-page":"848","DOI":"10.1038\/s41567-020-0892-y","article-title":"Towards satellite-based quantum-secure time transfer","volume":"16","author":"Dai","year":"2020","journal-title":"Nat. Phys."},{"key":"ref_71","doi-asserted-by":"crossref","first-page":"10387","DOI":"10.1364\/OE.19.010387","article-title":"Field test of quantum key distribution in the Tokyo QKD Network","volume":"19","author":"Sasaki","year":"2011","journal-title":"Opt. Express"},{"key":"ref_72","doi-asserted-by":"crossref","unstructured":"Peters, N.A., Alshowkan, M., Chapman, J.C., Evans, P.G., Hooper, D.A., Grice, W.P., Lu, H.-H., Lukens, J.M., Pooser, R.C., and Marvinney, C.E. (2022, January 2\u20135). Quantum Networking and Communications at Oak Ridge National Laboratory. Proceedings of the IEEE INFOCOM 2022\u2014IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), New York, NY, USA.","DOI":"10.1109\/INFOCOMWKSHPS54753.2022.9797980"},{"key":"ref_73","first-page":"128","article-title":"Information security risks management framework\u2014A step towards mitigating security risks in university network","volume":"35","author":"Joshi","year":"2017","journal-title":"J. Inf. Secur. Appl."},{"key":"ref_74","doi-asserted-by":"crossref","first-page":"16108","DOI":"10.1038\/s41598-021-95388-7","article-title":"Quantum generators of random numbers","volume":"11","author":"Jacak","year":"2021","journal-title":"Sci. Rep."},{"key":"ref_75","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1140\/epjqt\/s40507-021-00104-z","article-title":"Towards security recommendations for public-key infrastructures for production environments in the post-quantum era","volume":"8","author":"Yunakovsky","year":"2021","journal-title":"EPJ Quantum Technol."},{"key":"ref_76","doi-asserted-by":"crossref","first-page":"237","DOI":"10.1038\/s41586-022-04623-2","article-title":"Transitioning organizations to post-quantum cryptography","volume":"605","author":"Joseph","year":"2022","journal-title":"Nature"},{"key":"ref_77","doi-asserted-by":"crossref","unstructured":"Mohammad, O.K.J., Abbas, S., El-Horbaty, E.-S.M., and Salem, A.-B.M. (2014, January 8\u201310). Advanced encryption standard development based quantum key distribution. Proceedings of the 9th International Conference for Internet Technology and Secured Transactions, London, UK.","DOI":"10.1109\/ICITST.2014.7038845"},{"key":"ref_78","unstructured":"Xin, H. (2021, January 07). China Realizes Secure, Stable Quantum Communication Network Spanning 4600 km. Available online: http:\/\/www.china.org.cn\/china\/2021-01\/07\/content_77088150.htm."},{"key":"ref_79","unstructured":"Feng, C. (The Star, 2021). China Telecom launches quantum encrypted phone calls on smartphones in a new pilot programme, The Star."},{"key":"ref_80","unstructured":"Xinhua (China Daily, 2022). China Launches Quantum-Secured, \u2018Unhackable\u2019 Smartphone, China Daily."},{"key":"ref_81","doi-asserted-by":"crossref","first-page":"2632","DOI":"10.1364\/OL.30.002632","article-title":"Faraday\u2014Michelson system for quantum cryptography","volume":"30","author":"Mo","year":"2005","journal-title":"Opt. Lett."},{"key":"ref_82","doi-asserted-by":"crossref","first-page":"575","DOI":"10.1109\/LPT.2009.2015058","article-title":"Field Experiment on a \u201cStar Type\u201d Metropolitan Quantum Key Distribution Network","volume":"21","author":"Chen","year":"2009","journal-title":"IEEE Photonics Technol. Lett."},{"key":"ref_83","doi-asserted-by":"crossref","first-page":"2991","DOI":"10.1007\/s11434-009-0526-3","article-title":"Field experiment on a robust hierarchical metropolitan quantum cryptography network","volume":"54","author":"Xu","year":"2009","journal-title":"Chin. Sci. Bull."},{"key":"ref_84","doi-asserted-by":"crossref","unstructured":"Zhou, S., Zhai, G., and Shi, Y. (2018). What Drives the Rise of Metro Developments in China? Evidence from Nantong. Sustainability, 10.","DOI":"10.3390\/su10082931"},{"key":"ref_85","doi-asserted-by":"crossref","first-page":"134","DOI":"10.1038\/s41534-021-00474-3","article-title":"Implementation of a 46-node quantum metropolitan area network","volume":"7","author":"Chen","year":"2021","journal-title":"NPJ Quantum Inf."},{"key":"ref_86","doi-asserted-by":"crossref","first-page":"2200061","DOI":"10.1002\/qute.202200061","article-title":"Deploying an Inter-European Quantum Network","volume":"6","author":"Ribezzo","year":"2023","journal-title":"Adv. Quantum Technol."},{"key":"ref_87","doi-asserted-by":"crossref","first-page":"012301","DOI":"10.1103\/PhysRevA.95.012301","article-title":"Long-distance copropagation of quantum key distribution and terabit classical optical data channels","volume":"95","author":"Wang","year":"2017","journal-title":"Phys. Rev. A"},{"key":"ref_88","unstructured":"Ren, J.-G., Abulizi, M., Yong, H.-L., and Yin, J. (2022). Portable ground stations for space-to-ground quantum key distribution. arXiv."},{"key":"ref_89","doi-asserted-by":"crossref","first-page":"509","DOI":"10.1038\/nphoton.2017.116","article-title":"Long-distance free-space quantum key distribution in daylight towards inter-satellite communication","volume":"11","author":"Liao","year":"2017","journal-title":"Nat. Photonics"},{"key":"ref_90","unstructured":"Satnews (Satnews, 2022). China Launches New Satellite in Important Step Towards Global Quantum Communications Network, Satnews."},{"key":"ref_91","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1140\/epjqt\/s40507-022-00150-1","article-title":"Towards European standards for quantum technologies","volume":"9","author":"Spethmann","year":"2022","journal-title":"EPJ Quantum Technol."},{"key":"ref_92","unstructured":"CCSA (2023, February 20). China Communications Standards Association. Available online: https:\/\/www.ccsa.org.cn\/english\/."},{"key":"ref_93","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1038\/s41534-021-00442-x","article-title":"Quantum random number cloud platform","volume":"7","author":"Huang","year":"2021","journal-title":"NPJ Quantum Inf."},{"key":"ref_94","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3402192","article-title":"Quantum Key Distribution: A Networking Perspective","volume":"53","author":"Mehic","year":"2020","journal-title":"ACM Comput. Surv."},{"key":"ref_95","doi-asserted-by":"crossref","first-page":"012001","DOI":"10.1088\/1742-6596\/2416\/1\/012001","article-title":"Recent Progress in Quantum Key Distribution Network Deployments and Standards","volume":"2416","author":"Stanley","year":"2022","journal-title":"J. Phys. Conf. Ser."},{"key":"ref_96","doi-asserted-by":"crossref","unstructured":"Sun, S., and Huang, A. (2022). A Review of Security Evaluation of Practical Quantum Key Distribution System. Entropy, 24.","DOI":"10.3390\/e24020260"},{"key":"ref_97","unstructured":"(2019). Overview on Networks Supporting Quantum Key Distribution (Standard No. ITU-T, Y.3800)."}],"container-title":["Entropy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1099-4300\/25\/4\/627\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T19:11:12Z","timestamp":1760123472000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1099-4300\/25\/4\/627"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4,6]]},"references-count":97,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2023,4]]}},"alternative-id":["e25040627"],"URL":"https:\/\/doi.org\/10.3390\/e25040627","relation":{},"ISSN":["1099-4300"],"issn-type":[{"value":"1099-4300","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,4,6]]}}}