{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T13:02:35Z","timestamp":1772283755697,"version":"3.50.1"},"reference-count":25,"publisher":"MDPI AG","issue":"11","license":[{"start":{"date-parts":[[2023,11,16]],"date-time":"2023-11-16T00:00:00Z","timestamp":1700092800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Young Elite Scientists Sponsorship Program by the China Association for Science and Technology","award":["2022QNRC001"],"award-info":[{"award-number":["2022QNRC001"]}]},{"name":"Young Elite Scientists Sponsorship Program by the China Association for Science and Technology","award":["62131002"],"award-info":[{"award-number":["62131002"]}]},{"name":"Young Elite Scientists Sponsorship Program by the China Association for Science and Technology","award":["2022M710401"],"award-info":[{"award-number":["2022M710401"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["2022QNRC001"],"award-info":[{"award-number":["2022QNRC001"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62131002"],"award-info":[{"award-number":["62131002"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["2022M710401"],"award-info":[{"award-number":["2022M710401"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002858","name":"China Postdoctoral Science Foundation","doi-asserted-by":"publisher","award":["2022QNRC001"],"award-info":[{"award-number":["2022QNRC001"]}],"id":[{"id":"10.13039\/501100002858","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002858","name":"China Postdoctoral Science Foundation","doi-asserted-by":"publisher","award":["62131002"],"award-info":[{"award-number":["62131002"]}],"id":[{"id":"10.13039\/501100002858","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002858","name":"China Postdoctoral Science Foundation","doi-asserted-by":"publisher","award":["2022M710401"],"award-info":[{"award-number":["2022M710401"]}],"id":[{"id":"10.13039\/501100002858","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Entropy"],"abstract":"<jats:p>Quantum secure direct communication (QSDC) offers a practical way to realize a quantum network which can transmit information securely and reliably. Practical quantum networks are hindered by the unavailability of quantum relays. To overcome this limitation, a proposal has been made to transmit the messages encrypted with classical cryptography, such as post-quantum algorithms, between intermediate nodes of the network, where encrypted messages in quantum states are read out in classical bits, and sent to the next node using QSDC. In this paper, we report a real-time demonstration of a computationally secure relay for a quantum secure direct communication network. We have chosen CRYSTALS-KYBER which has been standardized by the National Institute of Standards and Technology to encrypt the messages for transmission of the QSDC system. The quantum bit error rate of the relay system is typically below the security threshold. Our relay can support a QSDC communication rate of 2.5 kb\/s within a 4 ms time delay. The experimental demonstration shows the feasibility of constructing a large-scale quantum network in the near future.<\/jats:p>","DOI":"10.3390\/e25111548","type":"journal-article","created":{"date-parts":[[2023,11,16]],"date-time":"2023-11-16T07:11:27Z","timestamp":1700118687000},"page":"1548","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["Experimental Demonstration of Secure Relay in Quantum Secure Direct Communication Network"],"prefix":"10.3390","volume":"25","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5321-3323","authenticated-orcid":false,"given":"Min","family":"Wang","sequence":"first","affiliation":[{"name":"Beijing Academy of Quantum Information Sciences, Beijing 100193, China"}]},{"given":"Wei","family":"Zhang","sequence":"additional","affiliation":[{"name":"Beijing Academy of Quantum Information Sciences, Beijing 100193, China"}]},{"given":"Jianxing","family":"Guo","sequence":"additional","affiliation":[{"name":"Beijing Academy of Quantum Information Sciences, Beijing 100193, China"}]},{"given":"Xiaotian","family":"Song","sequence":"additional","affiliation":[{"name":"Beijing Academy of Quantum Information Sciences, Beijing 100193, China"}]},{"given":"Guilu","family":"Long","sequence":"additional","affiliation":[{"name":"Beijing Academy of Quantum Information Sciences, Beijing 100193, China"},{"name":"State Key Laboratory of Low-Dimensional Quantum Physics and Department of Physics, Tsinghua University, Beijing 100084, China"},{"name":"Frontier Science Center for Quantum Information, Beijing 100084, China"},{"name":"Beijing National Research Center for Information Science and Technology, Beijing 100084, China"}]}],"member":"1968","published-online":{"date-parts":[[2023,11,16]]},"reference":[{"key":"ref_1","unstructured":"Shor, P.W. (1994, January 20\u201322). Algorithms for Quantum Computation: Discrete Logarithms and Factoring. Proceedings of the 35th Annual Symposium on Foundations of Computer Science, Santa Fe, NM, USA."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"325","DOI":"10.1103\/PhysRevLett.79.325","article-title":"Quantum Mechanics Helps in Searching for a Needle in Haystack","volume":"79","author":"Grover","year":"1997","journal-title":"Phys. Rev. Lett."},{"key":"ref_3","unstructured":"Bennett, C.H., and Brassard, G. (1984, January 9\u201312). Quantum cryptography: Public key dectribution and coin tossing. Proceedings of the IEEE International Conference on Computers, Systems, and Signal Processing, Bangalore, India."},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Alagic, G., Apon, D., Cooper, D., Dang, Q., Dang, T., Kelsey, J., Lichtinger, J., Miller, C., Moody, D., and Peralta, R. (2022). Status Report on the Third Round of the Nist Post-Quantum Cryptography Standardization Process, National Institute of Standards and Technology.","DOI":"10.6028\/NIST.IR.8413-upd1"},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"120301","DOI":"10.1088\/0256-307X\/33\/12\/120301","article-title":"Time-Bin Phase-Encoding Measurement-Device-Independent Quantum Key Distribution with Four Single-Photon Detectors","volume":"33","author":"Tang","year":"2016","journal-title":"Chin. Phys. Lett."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1007\/s43673-021-00017-0","article-title":"Chip-based quantum key distribution","volume":"31","author":"Kwek","year":"2021","journal-title":"AAPPS Bull."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"1829","DOI":"10.1103\/PhysRevA.59.1829","article-title":"Quantum secret sharing","volume":"59","author":"Hillery","year":"1999","journal-title":"Phys. Rev. A"},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"032302","DOI":"10.1103\/PhysRevA.65.032302","article-title":"Theoretically efficient high-capacity quantum-key-distribution scheme","volume":"65","author":"Long","year":"2002","journal-title":"Phys. Rev. A"},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"052319","DOI":"10.1103\/PhysRevA.69.052319","article-title":"Secure direct communication with a quantum one-time pad","volume":"69","author":"Deng","year":"2004","journal-title":"Phys. Rev. A"},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"1570","DOI":"10.1109\/JSTQE.2009.2021147","article-title":"Confidential direct communications: A quantum approach using continuous variables","volume":"15","author":"Pirandola","year":"2009","journal-title":"IEEE J. Sel. Top. Quantum Electron."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"16144","DOI":"10.1038\/lsa.2016.144","article-title":"Experimental quantum secure direct communication with single photons","volume":"5","author":"Hu","year":"2016","journal-title":"Light. Sci. Appl."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"220501","DOI":"10.1103\/PhysRevLett.118.220501","article-title":"Quantum Secure Direct Communication with Quantum Memory","volume":"118","author":"Zhang","year":"2017","journal-title":"Phys. Rev. Lett."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"1519","DOI":"10.1016\/j.scib.2017.10.023","article-title":"Experimental long-distance quantum secure direct communication","volume":"62","author":"Zhu","year":"2017","journal-title":"Sci. Bull."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1038\/s41377-019-0132-3","article-title":"Implementation and security analysis of practical quantum secure direct communication","volume":"8","author":"Qi","year":"2019","journal-title":"Light. Sci. Appl."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"095207","DOI":"10.1088\/1612-202X\/ab3a2b","article-title":"Novel continuous-variable quantum secure direct communication and its security analysis","volume":"16","author":"Chai","year":"2019","journal-title":"Laser Phys. Lett."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"024012","DOI":"10.1103\/PhysRevApplied.16.024012","article-title":"Continuous-Variable Quantum Secure Direct Communication Based on Gaussian Mapping","volume":"16","author":"Cao","year":"2021","journal-title":"Phys. Rev. Appl."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1016\/j.fmre.2021.01.002","article-title":"Quantum secure direct communication: Intersection of communication and cryptography","volume":"1","author":"Wang","year":"2021","journal-title":"Fundam. Res."},{"key":"ref_18","first-page":"1","article-title":"Realization of quantum secure direct communication over 100 km fiber with time-bin and phase quantum states","volume":"11","author":"Zhang","year":"2022","journal-title":"Light. Sci. Appl."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"0004","DOI":"10.34133\/adi.0004","article-title":"Free-space quantum secure direct communication: Basics, progress, and outlook","volume":"4","author":"Pan","year":"2023","journal-title":"Adv. Devices Instrum."},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Bos, J., Ducas, L., Kiltz, E., Lepoint, T., Lyubashevsky, V., Schanck, J.M., Schwabe, P., Seiler, G., and Stehl\u00e9, D. (2018, January 24\u201326). CRYSTALS-Kyber: A CCA-Secure Module-Lattice-Based KEM. Proceedings of the 2018 IEEE European Symposium on Security and Privacy, London, UK.","DOI":"10.1109\/EuroSP.2018.00032"},{"key":"ref_21","unstructured":"Avanzi, R., Bos, J., Ducas, L., Kiltz, E., Lepoint, T., Lyubashevsky, V., Schanck, J.M., Schwabe, P., Seiler, G., and Stehl\u00e9, D. (2020). CRYSTALS-KYBER Algorithm Specifications and Supporting Documentation, 3rd Round Submission to the NIST\u2019s Post-Quantum Cryptography Standardization Process, National Institute of Standards and Technology."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"070301","DOI":"10.1088\/0256-307X\/36\/7\/070301","article-title":"Experimental Point-to-Multipoint Plug-and-Play Measurement-Device-Independent Quantum Key Distribution Network","volume":"7","author":"Tang","year":"2019","journal-title":"Chin. Phys. Lett."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"183","DOI":"10.1038\/s41377-021-00634-2","article-title":"A 15-user quantum secure direct communication network","volume":"10","author":"Qi","year":"2021","journal-title":"Light. Sci. Appl."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"82","DOI":"10.1109\/MNET.108.2100375","article-title":"An Evolutionary Pathway for the Quantum Internet Relying on Secure Classical Repeaters","volume":"36","author":"Long","year":"2022","journal-title":"IEEE Netw."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"237","DOI":"10.1038\/s41586-022-04623-2","article-title":"Transitioning organizations to post-quantum cryptography","volume":"605","author":"Joseph","year":"2022","journal-title":"Nature"}],"container-title":["Entropy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1099-4300\/25\/11\/1548\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T21:24:08Z","timestamp":1760131448000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1099-4300\/25\/11\/1548"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,16]]},"references-count":25,"journal-issue":{"issue":"11","published-online":{"date-parts":[[2023,11]]}},"alternative-id":["e25111548"],"URL":"https:\/\/doi.org\/10.3390\/e25111548","relation":{},"ISSN":["1099-4300"],"issn-type":[{"value":"1099-4300","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,11,16]]}}}