{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T19:16:53Z","timestamp":1772911013494,"version":"3.50.1"},"reference-count":161,"publisher":"MDPI AG","issue":"3","license":[{"start":{"date-parts":[[2022,2,25]],"date-time":"2022-02-25T00:00:00Z","timestamp":1645747200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Future Internet"],"abstract":"<jats:p>In recent years, 5G networks and services become progressively popular among telecommunication providers. Simultaneously, the growth in the usage and deployment of smartphone platforms and mobile applications have been seen as phenomenal. Therefore, this paper discusses the current state of the art of 5G technology in the merger of unconditional security requirements referred to as Quantum Cryptography. The various domain of Quantum Cryptography is illustrated including the protocols available, their functionality and previous implementation in real networks. This paper further identifies research gaps covering critical aspects of how Quantum Cryptography can be realized and effectively utilized in 5G networks. These include improving the current technique in Quantum Cryptography through efficient key distribution and message sharing between users in 5G networks.<\/jats:p>","DOI":"10.3390\/fi14030073","type":"journal-article","created":{"date-parts":[[2022,2,25]],"date-time":"2022-02-25T10:00:40Z","timestamp":1645783240000},"page":"73","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":27,"title":["Quantum Key Distribution for 5G Networks: A Review, State of Art and Future Directions"],"prefix":"10.3390","volume":"14","author":[{"given":"Mohd Hirzi","family":"Adnan","sequence":"first","affiliation":[{"name":"Department of Communication Technology and Network, Faculty of Computer Science and Information Technology, University Putra Malaysia, Seri Kembangan 43400, Selangor, Malaysia"}]},{"given":"Zuriati","family":"Ahmad Zukarnain","sequence":"additional","affiliation":[{"name":"Department of Communication Technology and Network, Faculty of Computer Science and Information Technology, University Putra Malaysia, Seri Kembangan 43400, Selangor, Malaysia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8045-7569","authenticated-orcid":false,"given":"Nur Ziadah","family":"Harun","sequence":"additional","affiliation":[{"name":"Department of Web Technology and Information Technology, Faculty of Computer Science and Information Technology, University Tun Hussein Onn Malaysia, Batu Pahat 86400, Johor, Malaysia"}]}],"member":"1968","published-online":{"date-parts":[[2022,2,25]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"1617","DOI":"10.1109\/COMST.2016.2532458","article-title":"Next Generation 5G Wireless Networks: A Comprehensive Survey","volume":"18","author":"Agiwal","year":"2016","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Ahmad, I., Kumar, T., Liyanage, M., Okwuibe, J., Ylianttila, M., and Gurtov, A. (2017, January 18\u201321). 5G security: Analysis of threats and solutions. Proceedings of the 2017 IEEE Conference on Standards for Communications and Networking (CSCN), Helsinki, Finland.","DOI":"10.1109\/CSCN.2017.8088621"},{"key":"ref_3","unstructured":"Bennett, C.H., and Brassard, G. (1984, January 9\u201312). Quantum cryptography: Public key distribution and coin tossing. Proceedings of the International Conference on Computers, Systems & Signal Processing, Bangalore, India."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1016\/j.jnca.2017.10.017","article-title":"Security for 4G and 5G cellular networks: A survey of existing authentication and privacy-preserving schemes","volume":"101","author":"Ferrag","year":"2018","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"196","DOI":"10.1109\/COMST.2019.2933899","article-title":"A Survey on Security and Privacy of 5G Technologies: Potential Solutions, Recent Advancements, and Future Directions","volume":"22","author":"Khan","year":"2020","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Kumari, K.A., Sadasivam, G.S., Gowri, S.S., Akash, S.A., and Radhika, E.G. (2018, January 3\u20135). An Approach for End-to-End (E2E) Security of 5G Applications. Proceedings of the 2018 IEEE 4th International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Performance and Smart Computing, (HPSC) and IEEE International Conference on Intelligent Data and Security (IDS), Omaha, NE, USA.","DOI":"10.1109\/BDS\/HPSC\/IDS18.2018.00038"},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"101825","DOI":"10.1016\/j.cose.2020.101825","article-title":"The impact of quantum computing on real-world security: A 5G case study","volume":"93","author":"Mitchell","year":"2020","journal-title":"Comput. Secur."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"132","DOI":"10.1016\/j.icte.2016.01.003","article-title":"5G mobile technology: A survey","volume":"1","author":"Mitra","year":"2015","journal-title":"ICT Express"},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Zavitsanos, D., Ntanos, A., Giannoulis, G., and Avramopoulos, H. (2020). On the QKD Integration in Converged Fiber\/Wireless Topologies for Secured, Low-Latency 5G\/B5G Fronthaul. Appl. Sci., 10.","DOI":"10.3390\/app10155193"},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"e32","DOI":"10.1002\/que2.32","article-title":"Full quantum one-way function for quantum cryptography","volume":"2","author":"Shang","year":"2020","journal-title":"Quantum Eng."},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Trinh, P.V., Pham, A.T., Carrasco-Casado, A., and Toyoshima, M. (2018, January 1\u20134). Quantum Key Distribution over FSO: Current Development and Future Perspectives. Proceedings of the 2018 Progress in Electromagnetics Research Symposium (PIERS-Toyama), Toyama, Japan.","DOI":"10.23919\/PIERS.2018.8597918"},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Hasnat, M.A., Rumee, S.T.A., Razzaque, M.A., and Mamun-Or-Rashid, M. (2019, January 7\u20139). Security Study of 5G Heterogeneous Network: Current Solutions, Limitations & Future Direction. Proceedings of the 2019 International Conference on Electrical, Computer and Communication Engineering (ECCE), Cox\u2019s Bazar, Bangladesh.","DOI":"10.1109\/ECACE.2019.8679326"},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"599","DOI":"10.1007\/s11277-016-3295-8","article-title":"Virtualization and Scheduling Methods for 5G Cognitive Radio Based Wireless Networks","volume":"89","author":"Badoi","year":"2016","journal-title":"Wirel. Pers. Commun."},{"key":"ref_14","first-page":"1","article-title":"5G Internet of Things: A survey","volume":"10","author":"Li","year":"2018","journal-title":"J. Ind. Inf. Integr."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"729","DOI":"10.1007\/s11036-015-0665-5","article-title":"Software-Defined Mobile Networks Security","volume":"21","author":"Chen","year":"2016","journal-title":"Mob. Net. Appl."},{"key":"ref_16","unstructured":"Taralika, A., Challa, D., Kumar, S., Ojha, A., and Chung, L. (2018). Secure Authentication to Provide Mobile Access to Shared Network Resources. (10,148,637), U.S. Patent, Available online: https:\/\/uspto.report\/patent\/grant\/10,148,637."},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Liyanage, M., Salo, J., Braeken, A., Kumar, T., Seneviratne, S., and Ylianttila, M. (2018, January 9\u201311). 5G Privacy: Scenarios and Solutions. Proceedings of the 2018 IEEE 5G World Forum (5GWF), Santa Clara, CA, USA.","DOI":"10.1109\/5GWF.2018.8516981"},{"key":"ref_18","first-page":"441","article-title":"Data is different, and that\u2019s why the world needs a new approach to governing cross-border data flows","volume":"5","author":"Aaronson","year":"2019","journal-title":"Digit. Policy Regul. Gov."},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Basin, D., Dreier, J., Hirschi, L., Radomirovic, S., Sasse, R., and Stettler, V. (2018, January 15\u201319). A formal analysis of 5G authentication. Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, Toronto, ON, Canada.","DOI":"10.1145\/3243734.3243846"},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Cremers, C., and Dehnel-Wild, M. (2019, January 24\u201327). Component-based formal analysis of 5G-AKA: Channel assumptions and session confusion. Proceedings of the Network and Distributed Systems Security (NDSS) Symposium, San Diego, CA, USA.","DOI":"10.14722\/ndss.2019.23394"},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"108","DOI":"10.2478\/popets-2019-0039","article-title":"New privacy threat on 3G, 4G, and upcoming 5G AKA protocols","volume":"2019","author":"Borgaonkar","year":"2019","journal-title":"Proc. Priv. Enhancing Technol."},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Behrad, S., Bertin, E., and Crespi, N. (2018, January 19\u201322). Securing authentication for mobile networks, a survey on 4G issues and 5G answers. Proceedings of the 2018 21st Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN), Paris, France.","DOI":"10.1109\/ICIN.2018.8401619"},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Arkko, J., Norrman, K., N\u00e4slund, M., and Sahlin, B. (2015, January 20\u201322). A USIM compatible 5G AKA protocol with perfect forward secrecy. Proceedings of the 2015 IEEE Trustcom\/BigDataSE\/ISPA, Washington, DC, USA.","DOI":"10.1109\/Trustcom.2015.506"},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Giustolisi, R., and Gerhmann, C. (2016, January 26\u201328). Threats to 5G group-based authentication. Proceedings of the 13th International Conference on Security and Cryptography (SECRYPT 2016), Madrid, Spain.","DOI":"10.5220\/0005996203600367"},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Koutsos, A. (2019, January 17\u201319). The 5G-AKA authentication protocol privacy. Proceedings of the 2019 IEEE European Symposium on Security and Privacy (EuroS&P), Stockholm, Sweden.","DOI":"10.1109\/EuroSP.2019.00041"},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"64040","DOI":"10.1109\/ACCESS.2019.2914941","article-title":"Novel 5G Authentication Protocol to Improve the Resistance against Active Attacks and Malicious Serving Networks","volume":"7","author":"Braeken","year":"2019","journal-title":"IEEE Access"},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Ozhelvaci, A., and Ma, M. (2018, January 28\u201330). Secure and efficient vertical handover authentication for 5G HetNets. Proceedings of the 2018 IEEE International Conference on Information Communication and Signal Processing (ICICSP), Singapore.","DOI":"10.1109\/ICICSP.2018.8549809"},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Ma, T., and Hu, F. (2019). A Cross-Layer Collaborative Handover Authentication Approach for 5G Heterogeneous Network, IOP Publishing.","DOI":"10.1088\/1742-6596\/1169\/1\/012066"},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"21977","DOI":"10.1109\/ACCESS.2017.2758646","article-title":"QoS-Aware Frequency-Based 4G+Relative Authentication Model for Next Generation LTE and Its Dependent Public Safety Networks","volume":"5","author":"Baskaran","year":"2017","journal-title":"IEEE Access"},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"3637","DOI":"10.1109\/TII.2017.2778090","article-title":"Privacy-Preserving Authentication and Key Agreement Protocols for D2D Group Communications","volume":"14","author":"Wang","year":"2018","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"11229","DOI":"10.1109\/ACCESS.2018.2796539","article-title":"Two-Factor Authenticated Key Agreement Supporting Unlinkability in 5G-Integrated Wireless Sensor Networks","volume":"6","author":"Shin","year":"2018","journal-title":"IEEE Access"},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"5766","DOI":"10.1109\/TVT.2017.2789022","article-title":"Optimization-Based Access Assignment Scheme for Physical-Layer Security in D2D Communications Underlaying a Cellular Network","volume":"67","author":"Wang","year":"2018","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_33","first-page":"416","article-title":"Automated Synthesis of Distributed Network Access Controls: A Formal Framework with Refinement","volume":"28","author":"Rahman","year":"2017","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"ref_34","doi-asserted-by":"crossref","unstructured":"Khan, M., Ginzboorg, P., J\u00e4rvinen, K., and Niemi, V. (2018, January 26\u201327). Defeating the downgrade attack on identity privacy in 5G. Proceedings of the International Conference on Research in Security Standardisation, Darmstadt, Germany.","DOI":"10.1007\/978-3-030-04762-7_6"},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"389","DOI":"10.1109\/TWC.2014.2347311","article-title":"Accountable and Privacy-Enhanced Access Control in Wireless Sensor Networks","volume":"14","author":"He","year":"2015","journal-title":"IEEE Trans. Wirel. Commun."},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"7012","DOI":"10.1109\/ACCESS.2017.2694044","article-title":"On the Design of Fine Grained Access Control With User Authentication Scheme for Telecare Medicine Information Systems","volume":"5","author":"Chatterjee","year":"2017","journal-title":"IEEE Access"},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"242","DOI":"10.1109\/TDSC.2007.70225","article-title":"Towards Formal Verification of Role-Based Access Control Policies","volume":"5","author":"Jha","year":"2008","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"12941","DOI":"10.1109\/ACCESS.2017.2727054","article-title":"Secure Data Access Control With Ciphertext Update and Computation Outsourcing in Fog Computing for Internet of Things","volume":"5","author":"Huang","year":"2017","journal-title":"IEEE Access"},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1109\/CC.2014.6825263","article-title":"Improving security and efciency for encrypted data sharing in online social networks","volume":"11","author":"Qinlong","year":"2014","journal-title":"China Commun."},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"158","DOI":"10.1109\/TPDS.2008.77","article-title":"Efficient Node Admission and Certificateless Secure Communication in Short-Lived MANETs","volume":"20","author":"Saxena","year":"2009","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"850","DOI":"10.1109\/TIFS.2015.2512533","article-title":"Hierarchical and Shared Access Control","volume":"11","author":"Castiglione","year":"2016","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"739","DOI":"10.1109\/TIFS.2010.2058104","article-title":"On the Insecurity of Proactive RSA in the URSA Mobile Ad Hoc Network Access Control Protocol","volume":"5","author":"Jarecki","year":"2010","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"1194","DOI":"10.1002\/rnc.3623","article-title":"Security-guaranteed filtering for discrete-time stochastic delayed systems with randomly occurring sensor saturations and deception attacks","volume":"27","author":"Wang","year":"2017","journal-title":"Int. J. Robust Nonlinear Control"},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"1348","DOI":"10.1109\/ACCESS.2014.2370391","article-title":"Security and Reliability Performance Analysis for Cloud Radio Access Networks with Channel Estimation Errors","volume":"2","author":"You","year":"2014","journal-title":"IEEE Access"},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"1388","DOI":"10.1109\/TII.2015.2489181","article-title":"Semiautomated Verification of Access Control Implementation in Industrial Networked Systems","volume":"11","author":"Cheminod","year":"2015","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_46","doi-asserted-by":"crossref","unstructured":"Siriwardhana, Y., Porambage, P., Liyanage, M., Walia, J.S., Matinmikko-Blue, M., and Ylianttila, M. (2019, January 15\u201318). Micro-Operator driven Local 5G Network Architecture for Industrial Internet. Proceedings of the 2019 IEEE Wireless Communications and Networking Conference (WCNC), Marrakesh, Morocco.","DOI":"10.1109\/WCNC.2019.8885900"},{"key":"ref_47","doi-asserted-by":"crossref","unstructured":"Prasad, A., Li, Z., Holtmanns, S., and Uusitalo, M.A. (2017, January 21\u201322). 5G micro-operator networks\u2014A key enabler for new verticals and markets. Proceedings of the 2017 25th Telecommunication Forum (TELFOR), Belgrade, Serbia.","DOI":"10.1109\/TELFOR.2017.8249272"},{"key":"ref_48","first-page":"143","article-title":"Future micro operators business models in 5G","volume":"7","author":"Ahokangas","year":"2016","journal-title":"Bus. Manag. Rev."},{"key":"ref_49","doi-asserted-by":"crossref","unstructured":"Sriram, P.P., Wang, H.-C., Jami, H.G., and Srinivasan, K. (2019). 5G security: Concepts and challenges. 5G Enabled Secure Wireless Networks, Springer.","DOI":"10.1007\/978-3-030-03508-2_1"},{"key":"ref_50","doi-asserted-by":"crossref","unstructured":"Yao, J., Han, Z., Sohail, M., and Wang, L. (2019). A robust security architecture for SDN-based 5G networks. Futur. Internet, 11.","DOI":"10.3390\/fi11040085"},{"key":"ref_51","doi-asserted-by":"crossref","first-page":"34","DOI":"10.1109\/MSP.2016.82","article-title":"Opportunities and Challenges of Software-Defined Mobile Networks in Network Security","volume":"14","author":"Liyanage","year":"2016","journal-title":"IEEE Secur. Priv."},{"key":"ref_52","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1016\/j.comnet.2017.01.007","article-title":"Secure communication channel architecture for Software Defined Mobile Networks","volume":"114","author":"Liyanage","year":"2017","journal-title":"Comput. Netw."},{"key":"ref_53","unstructured":"M\u00e4mmel\u00e4, O., Hiltunen, J., Suomalainen, J., Ahola, K., Mannersalo, P., and Vehkaper\u00e4, J. (2016, January 27\u201330). Towards micro-segmentation in 5G network security. Proceedings of the European Conference on Networks and Communications (EuCNC 2016) Workshop on Network Management, Quality of Service and Security for 5G Networks, Athens, Greece."},{"key":"ref_54","doi-asserted-by":"crossref","first-page":"96","DOI":"10.1109\/MSP.2017.46","article-title":"Security Challenges and Opportunities of Software-Defined Networking","volume":"15","author":"Dacier","year":"2017","journal-title":"IEEE Secur. Priv."},{"key":"ref_55","doi-asserted-by":"crossref","first-page":"3059","DOI":"10.1002\/sec.1243","article-title":"V A security and trust framework for virtualized networks and software-defined networking","volume":"9","author":"Yan","year":"2016","journal-title":"Secur. Commun. Netw."},{"key":"ref_56","unstructured":"Lam, J.-H., Lee, S.-G., Lee, H.-J., and Oktian, Y.E. (2015, January 7\u201310). Securing distributed SDN with IBC. Proceedings of the 2015 Seventh International Conference on Ubiquitous and Future Networks, Sapporo, Japan."},{"key":"ref_57","doi-asserted-by":"crossref","unstructured":"Pasquale, L., Ghezzi, C., Menghi, C., Tsigkanos, C., and Nuseibeh, B. (2014, January 18\u201324). Topology aware adaptive security. Proceedings of the Proceedings of the 9th International Symposium on Software Engineering for Adaptive and Self-Managing Systems, Madrid, Spain.","DOI":"10.1145\/2593929.2593939"},{"key":"ref_58","unstructured":"Edemekong, P.F., Annamaraju, P., and Haydel, M.J. (2018). Health Insurance Portability and Accountability Act. SAGE Encycl. Educ. Res. Meas. Eval."},{"key":"ref_59","doi-asserted-by":"crossref","unstructured":"Kemmer, F., Reich, C., Knahl, M., and Clarke, N. (2016, January 4\u20138). Software defined privacy. Proceedings of the 2016 IEEE International Conference on Cloud Engineering Workshop (IC2EW), Berlin, Germany.","DOI":"10.1109\/IC2EW.2016.34"},{"key":"ref_60","doi-asserted-by":"crossref","first-page":"100895","DOI":"10.1016\/j.softx.2021.100895","article-title":"PADRES: Tool for PrivAcy, Data REgulation and Security","volume":"17","author":"Pereira","year":"2022","journal-title":"SoftwareX"},{"key":"ref_61","doi-asserted-by":"crossref","unstructured":"Clancy, T.C., McGwier, R., and Chen, L. (2019, January 14\u201317). Post-Quantum Cryptography and 5G Security: Tutorial. Proceedings of the ACM WiSec, Miami, FL, USA.","DOI":"10.1145\/3317549.3324882"},{"key":"ref_62","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1016\/j.jnca.2017.07.002","article-title":"A survey on green communication and security challenges in 5G wireless communication networks","volume":"96","author":"Gandotra","year":"2017","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_63","doi-asserted-by":"crossref","first-page":"1206","DOI":"10.1109\/ACCESS.2015.2461602","article-title":"A Survey of 5G Network: Architecture and Emerging Technologies","volume":"3","author":"Gupta","year":"2015","journal-title":"IEEE Access"},{"key":"ref_64","first-page":"37","article-title":"An Overview of Quantum Key Distribution Protocols","volume":"21","author":"Trizna","year":"2018","journal-title":"Inf. Technol. Manag. Sci."},{"key":"ref_65","first-page":"195","article-title":"On the Einstein Podolsky Rosen paradox","volume":"1","author":"Bell","year":"1964","journal-title":"Phys. Phys. Fiz."},{"key":"ref_66","doi-asserted-by":"crossref","first-page":"070501","DOI":"10.1103\/PhysRevLett.124.070501","article-title":"Sending-or-Not-Sending with Independent Lasers: Secure Twin-Field Quantum Key Distribution over 509 km","volume":"124","author":"Chen","year":"2020","journal-title":"Phys. Rev. Lett."},{"key":"ref_67","doi-asserted-by":"crossref","unstructured":"Aaron Lopez-Leyva, J., Talamantes-Alvarez, A., Ponce-Camacho, M.A., Garcia-Cardenas, E., and Alvarez-Guzman, E. (2019). Free-Space-Optical Quantum Key Distribution Systems: Challenges and Trends, IntechOpen.","DOI":"10.5772\/intechopen.81032"},{"key":"ref_68","doi-asserted-by":"crossref","first-page":"575","DOI":"10.1109\/LPT.2009.2015058","article-title":"Field experiment on a \u201cstar type\u201d metropolitan quantum key distribution network","volume":"21","author":"Chen","year":"2009","journal-title":"IEEE Photonics Technol. Lett."},{"key":"ref_69","doi-asserted-by":"crossref","first-page":"2454","DOI":"10.1364\/OL.35.002454","article-title":"Field test of wavelength-saving quantum key distribution network","volume":"35","author":"Wang","year":"2010","journal-title":"Opt. Lett."},{"key":"ref_70","doi-asserted-by":"crossref","first-page":"188","DOI":"10.1049\/el:19970147","article-title":"Simultaneous quantum cryptographic key distribution and conventional data transmission over installed fibre using wavelength-division multiplexing","volume":"33","author":"Townsend","year":"1997","journal-title":"Electron. Lett."},{"key":"ref_71","doi-asserted-by":"crossref","first-page":"105001","DOI":"10.1088\/1367-2630\/11\/10\/105001","article-title":"Optical networking for quantum key distribution and quantum communications","volume":"11","author":"Chapuran","year":"2009","journal-title":"New J. Phys."},{"key":"ref_72","doi-asserted-by":"crossref","first-page":"9600","DOI":"10.1364\/OE.18.009600","article-title":"Quantum key distribution on a 10Gb\/s WDM-PON","volume":"18","author":"Choi","year":"2010","journal-title":"Opt. Express"},{"key":"ref_73","doi-asserted-by":"crossref","first-page":"63027","DOI":"10.1088\/1367-2630\/12\/6\/063027","article-title":"Quantum key distribution and 1 Gbps data encryption over a single fibre","volume":"12","author":"Eraerds","year":"2010","journal-title":"New J. Phys."},{"key":"ref_74","first-page":"41010","article-title":"Coexistence of high-bitrate quantum key distribution and data on optical fiber","volume":"2","author":"Patel","year":"2012","journal-title":"Phys. Rev. X"},{"key":"ref_75","doi-asserted-by":"crossref","first-page":"6010","DOI":"10.1364\/OE.26.006010","article-title":"Integrating quantum key distribution with classical communications in backbone fiber network","volume":"26","author":"Mao","year":"2018","journal-title":"Opt. Express"},{"key":"ref_76","doi-asserted-by":"crossref","first-page":"190502","DOI":"10.1103\/PhysRevLett.121.190502","article-title":"Secure quantum key distribution over 421 km of optical fiber","volume":"121","author":"Boaron","year":"2018","journal-title":"Phys. Rev. Lett."},{"key":"ref_77","doi-asserted-by":"crossref","first-page":"400","DOI":"10.1038\/s41586-018-0066-6","article-title":"Overcoming the rate\u2013distance limit of quantum key distribution without quantum repeaters","volume":"557","author":"Lucamarini","year":"2018","journal-title":"Nature"},{"key":"ref_78","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1103\/RevModPhys.83.33","article-title":"Quantum repeaters based on atomic ensembles and linear optics","volume":"83","author":"Sangouard","year":"2011","journal-title":"Rev. Mod. Phys."},{"key":"ref_79","doi-asserted-by":"crossref","first-page":"381","DOI":"10.1038\/nphoton.2016.51","article-title":"An efficient quantum light\u2013matter interface with sub-second lifetime","volume":"10","author":"Yang","year":"2016","journal-title":"Nat. Photonics"},{"key":"ref_80","doi-asserted-by":"crossref","first-page":"441","DOI":"10.1038\/508441a","article-title":"Quantum communications leap out of the lab","volume":"508","author":"Qiu","year":"2014","journal-title":"Nature"},{"key":"ref_81","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1038\/nature23655","article-title":"Satellite-to-ground quantum key distribution","volume":"549","author":"Liao","year":"2017","journal-title":"Nature"},{"key":"ref_82","doi-asserted-by":"crossref","first-page":"70","DOI":"10.1038\/nature23675","article-title":"Ground-to-satellite quantum teleportation","volume":"549","author":"Ren","year":"2017","journal-title":"Nature"},{"key":"ref_83","doi-asserted-by":"crossref","first-page":"1140","DOI":"10.1126\/science.aan3211","article-title":"Satellite-based entanglement distribution over 1200 kilometers","volume":"356","author":"Yin","year":"2017","journal-title":"Science"},{"key":"ref_84","doi-asserted-by":"crossref","first-page":"16025","DOI":"10.1038\/npjqi.2016.25","article-title":"Practical challenges in quantum key distribution","volume":"2","author":"Diamanti","year":"2016","journal-title":"npj Quantum Inf."},{"key":"ref_85","unstructured":"Fuloria, S., Anderson, R., McGrath, K., Hansen, K., and Alvarez, F. (2010, January 19\u201321). The protection of substation communications. Proceedings of the SCADA Security Scientific Symposium, Miami, FL, USA."},{"key":"ref_86","doi-asserted-by":"crossref","first-page":"802","DOI":"10.1038\/299802a0","article-title":"A single quantum cannot be cloned","volume":"299","author":"Wootters","year":"1982","journal-title":"Nature"},{"key":"ref_87","unstructured":"Singh, S. (1999). The Code Book: The Secret History of Codes and Codebreaking, Fourth Estate."},{"key":"ref_88","doi-asserted-by":"crossref","first-page":"441","DOI":"10.1103\/PhysRevLett.85.441","article-title":"Simple proof of security of the BB84 quantum key distribution protocol","volume":"85","author":"Shor","year":"2000","journal-title":"Phys. Rev. Lett."},{"key":"ref_89","doi-asserted-by":"crossref","first-page":"3121","DOI":"10.1103\/PhysRevLett.68.3121","article-title":"Quantum cryptography using any two nonorthogonal states","volume":"68","author":"Bennett","year":"1992","journal-title":"Phys. Rev. Lett."},{"key":"ref_90","doi-asserted-by":"crossref","first-page":"6-es","DOI":"10.1145\/1242471.1242474","article-title":"Quantum cryptography: A survey","volume":"39","author":"Bruss","year":"2007","journal-title":"ACM Comput. Surv."},{"key":"ref_91","doi-asserted-by":"crossref","first-page":"3018","DOI":"10.1103\/PhysRevLett.81.3018","article-title":"Optimal eavesdropping in quantum cryptography with six states","volume":"81","year":"1998","journal-title":"Phys. Rev. Lett."},{"key":"ref_92","doi-asserted-by":"crossref","first-page":"57901","DOI":"10.1103\/PhysRevLett.92.057901","article-title":"Quantum cryptography protocols robust against photon number splitting attacks for weak laser pulse implementations","volume":"92","author":"Scarani","year":"2004","journal-title":"Phys. Rev. Lett."},{"key":"ref_93","doi-asserted-by":"crossref","first-page":"64","DOI":"10.1109\/MNET.2015.7293307","article-title":"Quantum cryptography and its applications over the internet","volume":"29","author":"Chen","year":"2015","journal-title":"IEEE Netw."},{"key":"ref_94","doi-asserted-by":"crossref","first-page":"661","DOI":"10.1103\/PhysRevLett.67.661","article-title":"Quantum cryptography based on Bell\u2019s theorem","volume":"67","author":"Ekert","year":"1991","journal-title":"Phys. Rev. Lett."},{"key":"ref_95","doi-asserted-by":"crossref","first-page":"17753","DOI":"10.1109\/ACCESS.2017.2741899","article-title":"A Shared Secret Key Initiated by EPR Authentication and Qubit Transmission Channels","volume":"5","author":"Abushgra","year":"2017","journal-title":"IEEE Access"},{"key":"ref_96","doi-asserted-by":"crossref","first-page":"3621","DOI":"10.1007\/s10773-018-3875-3","article-title":"Semi-Quantum Key Distribution Protocols with GHZ States","volume":"57","author":"Zhu","year":"2018","journal-title":"Int. J. Theor. Phys."},{"key":"ref_97","doi-asserted-by":"crossref","first-page":"2654","DOI":"10.1007\/s10773-019-04153-0","article-title":"Multi-party Quantum Key Distribution Protocol Without Information Leakage","volume":"58","author":"Wang","year":"2019","journal-title":"Int. J. Theor. Phys."},{"key":"ref_98","doi-asserted-by":"crossref","first-page":"4681","DOI":"10.1007\/s11128-016-1396-7","article-title":"A comparative study of protocols for secure quantum communication under noisy environment: Single-qubit-based protocols versus entangled-state-based protocols","volume":"15","author":"Sharma","year":"2016","journal-title":"Quantum Inf. Process."},{"key":"ref_99","doi-asserted-by":"crossref","first-page":"103016","DOI":"10.1088\/1367-2630\/aade06","article-title":"Implementation vulnerabilities in general quantum cryptography","volume":"20","author":"Huang","year":"2018","journal-title":"New, J. Phys."},{"key":"ref_100","doi-asserted-by":"crossref","first-page":"557","DOI":"10.1103\/PhysRevLett.68.557","article-title":"Quantum cryptography without Bell\u2019s theorem","volume":"68","author":"Bennett","year":"1992","journal-title":"Phys. Rev. Lett."},{"key":"ref_101","doi-asserted-by":"crossref","first-page":"37902","DOI":"10.1103\/PhysRevLett.89.037902","article-title":"Differential phase shift quantum key distribution","volume":"89","author":"Inoue","year":"2002","journal-title":"Phys. Rev. Lett."},{"key":"ref_102","doi-asserted-by":"crossref","first-page":"12344","DOI":"10.1103\/PhysRevA.73.012344","article-title":"Security of differential-phase-shift quantum key distribution against individual attacks","volume":"73","author":"Waks","year":"2006","journal-title":"Phys. Rev. A"},{"key":"ref_103","first-page":"475","article-title":"Practical quantum key distribution protocol without monitoring signal disturbance","volume":"509","author":"Sasaki","year":"2015","journal-title":"Nat. Photonics"},{"key":"ref_104","doi-asserted-by":"crossref","first-page":"194108","DOI":"10.1063\/1.2126792","article-title":"Fast and simple one-way quantum key distribution","volume":"87","author":"Stucki","year":"2005","journal-title":"Appl. Phys. Lett."},{"key":"ref_105","unstructured":"Serna, E.H. (2013). Quantum Key Distribution from a random seed. arXiv."},{"key":"ref_106","doi-asserted-by":"crossref","first-page":"187902","DOI":"10.1103\/PhysRevLett.89.187902","article-title":"Deterministic secure direct communication using entanglement","volume":"89","author":"Felbinger","year":"2002","journal-title":"Phys. Rev. Lett."},{"key":"ref_107","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s11128-020-02874-4","article-title":"Ping-pong quantum key distribution with trusted noise: Non-Markovian advantage","volume":"19","author":"Utagi","year":"2020","journal-title":"Quantum Inf. Process."},{"key":"ref_108","doi-asserted-by":"crossref","first-page":"140501","DOI":"10.1103\/PhysRevLett.94.140501","article-title":"Secure deterministic communication without entanglement","volume":"94","author":"Lucamarini","year":"2005","journal-title":"Phys. Rev. Lett."},{"key":"ref_109","doi-asserted-by":"crossref","first-page":"697","DOI":"10.1016\/j.optcom.2010.09.060","article-title":"Decoy states and two way quantum key distribution schemes","volume":"284","author":"Shaari","year":"2011","journal-title":"Opt. Commun."},{"key":"ref_110","doi-asserted-by":"crossref","unstructured":"Verma, P.K., El Rifai, M., and Chan, K.W.C. (2019). Multi-Photon Quantum Secure Communication, Springer.","DOI":"10.1007\/978-981-10-8618-2"},{"key":"ref_111","doi-asserted-by":"crossref","unstructured":"Parakh, A., and Van Brandwijk, J. (2016, January 16\u201318). Correcting rotational errors in three stage QKD. Proceedings of the 2016 23rd International Conference on Telecommunications (ICT), Thessaloniki, Greece.","DOI":"10.1109\/ICT.2016.7500409"},{"key":"ref_112","doi-asserted-by":"crossref","unstructured":"Khodr, M. (2017, January 12\u201316). Evaluations of Maximum Distance Achieved Using the Three Stage Multiphoton Protocol at 1550 nm, 1310 nm, and 850 nm. Proceedings of the CYBER 2017: The Second International Conference on Cyber-Technologies and Cyber-Systems Evaluations, Barcelona, Spain.","DOI":"10.1109\/ICECTA.2017.8251929"},{"key":"ref_113","doi-asserted-by":"crossref","unstructured":"Khodr, M. (2017, January 21\u201323). Evaluations of quantum bit error rate using the three stage multiphoton protocol. Proceedings of the 2017 International Conference on Electrical and Computing Technologies and Applications (ICECTA), Ras Al Khaimah, United Arab Emirates.","DOI":"10.1109\/ICECTA.2017.8251929"},{"key":"ref_114","doi-asserted-by":"crossref","unstructured":"El Rifai, M., Punekar, N., and Verma, P.K. (2013, January 2\u20137). Implementation of an m-ary three-stage quantum cryptography protocol. Proceedings of the Proc.SPIE, San Francisco, CA, USA.","DOI":"10.1117\/12.2024185"},{"key":"ref_115","unstructured":"El Rifai, M. (2016). Quantum Secure Communication Using Polarization Hopping Multi-Stage Protocols. [Doctor\u2019s Thesis, University of Oklahoma]."},{"key":"ref_116","doi-asserted-by":"crossref","first-page":"99","DOI":"10.2183\/pjab.93.007","article-title":"Finite-block-length analysis in classical and quantum information theory","volume":"93","author":"Hayashi","year":"2017","journal-title":"Proc. Jpn. Acad. Ser. B. Phys. Biol. Sci."},{"key":"ref_117","unstructured":"Chekhova, M., and Banzer, P. (2015). Polarization of Light. Classical, Quantum, and Nonlinear Optics, De Gruyte."},{"key":"ref_118","doi-asserted-by":"crossref","unstructured":"Chan, K.W.C., Rifai, M.E., Verma, P., Kak, S., and Chen, Y. (2015, January 21\u201325). Multi-photon quantum key distribution based on double-lock encryption. Proceedings of the 2015 Conference on Lasers and Electro-Optics (CLEO), Munich, Germany.","DOI":"10.1364\/CLEO_QELS.2015.FF1A.3"},{"key":"ref_119","doi-asserted-by":"crossref","first-page":"319","DOI":"10.1007\/s11082-018-1585-y","article-title":"Multiparameter QKD authentication protocol design over optical quantum channel","volume":"50","author":"Miljkovic","year":"2018","journal-title":"Opt. Quantum Electron."},{"key":"ref_120","doi-asserted-by":"crossref","first-page":"236","DOI":"10.1007\/s11128-017-1681-0","article-title":"Quantum identity authentication with single photon","volume":"16","author":"Hong","year":"2017","journal-title":"Quantum Inf. Process."},{"key":"ref_121","doi-asserted-by":"crossref","unstructured":"Harun, N.Z., Ahmad Zukarnain, Z., Hanapi, Z.M., and Ahmad, I. (2020). Multi-Stage Quantum Secure Direct Communication Using Secure Shared Authentication Key. Symmetry, 12.","DOI":"10.3390\/sym12091481"},{"key":"ref_122","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1103\/PhysRevA.68.042317","article-title":"Two-step quantum direct communication protocol using the Einstein-Podolsky-Rosen pair block","volume":"68","author":"Deng","year":"2003","journal-title":"Phys. Rev. A At. Mol. Opt. Phys."},{"key":"ref_123","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1103\/PhysRevA.65.032302","article-title":"Theoretically efficient high-capacity quantum-key-distribution scheme","volume":"65","author":"Long","year":"2002","journal-title":"Phys. Rev. A At. Mol. Opt. Phys."},{"key":"ref_124","doi-asserted-by":"crossref","first-page":"121146","DOI":"10.1109\/ACCESS.2020.3006136","article-title":"Single-Photon-Memory Two-Step Quantum Secure Direct Communication Relying on Einstein-Podolsky-Rosen Pairs","volume":"8","author":"Pan","year":"2020","journal-title":"IEEE Access"},{"key":"ref_125","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s11433-019-1450-8","article-title":"Measurement-device-independent quantum secure direct communication","volume":"63","author":"Zhou","year":"2020","journal-title":"Sci. China Phys. Mech. Astron."},{"key":"ref_126","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s11433-020-1576-y","article-title":"Quantum secure direct communication with entanglement source and single-photon measurement","volume":"63","author":"Yang","year":"2020","journal-title":"Sci. China Phys. Mech. Astron."},{"key":"ref_127","unstructured":"Sheng, Y.B., Zhou, L., and Long, G.L. (2021). One-step quantum secure direct communication. Sci. Bull., in press."},{"key":"ref_128","first-page":"1","article-title":"Security analysis of the multi-photon three-stage quantum key distribution","volume":"5","author":"Chan","year":"2015","journal-title":"Int. J. Cryptogr. Inf. Secur."},{"key":"ref_129","doi-asserted-by":"crossref","first-page":"22599","DOI":"10.1109\/ACCESS.2019.2898426","article-title":"Hybrid M-Ary in Braided Single Stage Approach for Multiphoton Quantum Secure Direct Communication Protocol","volume":"7","author":"Harun","year":"2019","journal-title":"IEEE Access"},{"key":"ref_130","doi-asserted-by":"crossref","unstructured":"Harun, N.Z., Zukarnain, Z.A., Hanapi, Z.M., Ahmad, I., and Khodr, M.F. (2021). MQC-MB: Multiphoton Quantum Communication Using Multiple-Beam Concept in Free Space Optical Channel. Symmetry, 13.","DOI":"10.3390\/sym13010066"},{"key":"ref_131","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s43673-021-00017-0","article-title":"Chip-based quantum key distribution","volume":"31","author":"Kwek","year":"2021","journal-title":"AAPPS Bull."},{"key":"ref_132","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/JPHOT.2021.3119767","article-title":"Hybrid MPPM-BB84 Quantum Key Distribution Over FSO Channel Considering Atmospheric Turbulence and Pointing Errors","volume":"13","author":"Alshaer","year":"2021","journal-title":"IEEE Photonics J."},{"key":"ref_133","doi-asserted-by":"crossref","unstructured":"Alhussein, M., Inoue, K., and Honjo, T. (2019, January 5\u201310). BB84 and DQPS-QKD experiments using one polarization-insensitive measurement setup with a countermeasure against detector blinding and control attacks. Proceedings of the 2019 Conference on Lasers and Electro-Optics (CLEO), San Jose, CA, USA.","DOI":"10.1364\/CLEO_AT.2019.JTu2A.28"},{"key":"ref_134","doi-asserted-by":"crossref","unstructured":"Choe, J.-S., Ko, H., Choi, B.-S., Kim, K.-J., and Youn, C.J. (2018, January 13\u201315). Integrated Polarization Beam Splitter Module for Polarization-Encoded Free-Space BB84 QKD. Proceedings of the 2018 Optical Fiber Communications Conference and Exposition (OFC), San Diego, CA, USA.","DOI":"10.1364\/OFC.2018.Th2A.5"},{"key":"ref_135","doi-asserted-by":"crossref","first-page":"168052","DOI":"10.1109\/ACCESS.2021.3137357","article-title":"Reliability and Security Analysis of an Entanglement-Based QKD Protocol in a Dynamic Ground-to-UAV FSO Communications System","volume":"9","author":"Alshaer","year":"2021","journal-title":"IEEE Access"},{"key":"ref_136","doi-asserted-by":"crossref","unstructured":"Amer, O., Krawec, W.O., and Wang, B. (2020, January 12\u201316). Efficient Routing for Quantum Key Distribution Networks. Proceedings of the 2020 IEEE International Conference on Quantum Computing and Engineering (QCE), Broomfield, CO, USA.","DOI":"10.1109\/QCE49297.2020.00027"},{"key":"ref_137","doi-asserted-by":"crossref","unstructured":"Zhou, C., Bao, W., and Fu, X. (2010, January 12\u201314). Information-Disturbance Tradeoff of Individual Attack Against BBM92 Protocol. Proceedings of the 2010 International Conference on Communications and Mobile Computing, Shenzhen, China.","DOI":"10.1109\/CMC.2010.173"},{"key":"ref_138","unstructured":"Honjo, T., Nam, S.W., Takesue, H., Zhang, Q., Kamada, H., Nishida, Y., Tadanaga, O., Asobe, M., Baek, B., and Hadfield, R. (2008, January 4\u20139). Entanglement-based BBM92 QKD experiment using superconducting single photon detectors. Proceedings of the 2008 Conference on Lasers and Electro-Optics and 2008 Conference on Quantum Electronics and Laser Science, San Jose, CA, USA."},{"key":"ref_139","doi-asserted-by":"crossref","unstructured":"Geng, J., Jin, W., Yan, X., and Cheng, Y. (2019, January 11\u201313). Performance on The Discrete Variable Based Satellite-to-Ground Quantum Key Distribution Links. Proceedings of the 2019 IEEE International Conference on Signal, Information and Data Processing (ICSIDP), Chongqing, China.","DOI":"10.1109\/ICSIDP47821.2019.9173453"},{"key":"ref_140","doi-asserted-by":"crossref","unstructured":"Miljkovi\u0107, N.N., Stojanovi\u0107, A.D., and Matavulj, P.S. (2016, January 22\u201323). Physical model for B92-QKD authentication based on analogy with optical chaotic systems. Proceedings of the 2016 24th Telecommunications Forum (TELFOR), Belgrade, Serbia.","DOI":"10.1109\/TELFOR.2016.7818943"},{"key":"ref_141","doi-asserted-by":"crossref","unstructured":"Wijesekera, S., Palit, S., and Balachandran, B. (2007, January 11\u201313). Software Development for B92 Quantum Key Distribution Communication Protocol. Proceedings of the 6th IEEE\/ACIS International Conference on Computer and Information Science (ICIS 2007), Melbourne, Australia.","DOI":"10.1109\/ICIS.2007.168"},{"key":"ref_142","doi-asserted-by":"crossref","unstructured":"Xu, X., and Chen, X. (2010, January 23\u201325). Simulating B92 Protocol in Depolarizing Channel. Proceedings of the 2010 6th International Conference on Wireless Communications Networking and Mobile Computing (WiCOM), Chengdu, China.","DOI":"10.1109\/WICOM.2010.5600108"},{"key":"ref_143","doi-asserted-by":"crossref","unstructured":"Guerreau-Lambert, O.L. (2005). Multidimensional Quantum Key Distribution with Single Side Pulse and Single Side Band Modulation Multiplexing, Georgia Institute of Technology.","DOI":"10.1049\/cp:20050631"},{"key":"ref_144","doi-asserted-by":"crossref","unstructured":"Kim, Y., and Ko, Y.-C. (2016, January 19\u201321). Cramer-Rao lower bound of channel estimator in continuous variable quantum key distribution. Proceedings of the 2016 International Conference on Information and Communication Technology Convergence (ICTC), Jeju Island, Korea.","DOI":"10.1109\/ICTC.2016.7763560"},{"key":"ref_145","doi-asserted-by":"crossref","unstructured":"Ghalaii, M., Kumar, R., and Razavi, M. (2017, January 25\u201329). Quantum-scissor amplified continuous-variable quantum key distribution. Proceedings of the 2017 Conference on Lasers and Electro-Optics Europe & European Quantum Electronics Conference (CLEO\/Europe-EQEC), Munich, Germany.","DOI":"10.1109\/CLEOE-EQEC.2017.8087440"},{"key":"ref_146","doi-asserted-by":"crossref","first-page":"6354","DOI":"10.1109\/TIT.2020.2989459","article-title":"Lightweight Authentication for Quantum Key Distribution","volume":"66","author":"Kiktenko","year":"2020","journal-title":"IEEE Trans. Inf. Theory"},{"key":"ref_147","doi-asserted-by":"crossref","unstructured":"Vokic, N., Milovan\u010dev, D., Schrenk, B., Hentschel, M., and H\u00fcbel, H. (2020, January 8\u201312). Deployment Opportunities for DPS-QKD in the Co-Existence Regime of Lit GPON \/ NG-PON2 Access Networks. Proceedings of the 2020 Optical Fiber Communications Conference and Exhibition (OFC), San Diego, CA, USA.","DOI":"10.1364\/OFC.2020.W2A.56"},{"key":"ref_148","doi-asserted-by":"crossref","unstructured":"Ranu, S.K., Prabhakar, A., and Mandayam, P. (2019, January 20\u201323). Differential Phase Encoding Scheme for Measurement-Device-Independent Quantum Key Distribution. Proceedings of the 2019 National Conference on Communications (NCC), Bangalore, India.","DOI":"10.1109\/NCC.2019.8732260"},{"key":"ref_149","unstructured":"Iwai, Y., Honjo, T., Inoue, K., Kamada, H., Nishida, Y., Tadanaga, O., and Asobe, M. (2008, January 4\u20139). Polarization independent DPS-QKD system using up-conversion detectors. Proceedings of the 2008 Conference on Lasers and Electro-Optics and 2008 Conference on Quantum Electronics and Laser Science, San Jose, CA, USA."},{"key":"ref_150","doi-asserted-by":"crossref","unstructured":"Klicnik, O., Munster, P., Horvath, T., Hajny, J., and Malina, L. (2021, January 25\u201327). Quantum Key Distribution Polygon. Proceedings of the 2021 13th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT), Brno, Czech Republic.","DOI":"10.1109\/ICUMT54235.2021.9631732"},{"key":"ref_151","doi-asserted-by":"crossref","unstructured":"Abushgra, A.A. (2021, January 8\u201310). SARG04 and AK15 Protocols Based on the Run-Time Execution and QBER. Proceedings of the 2021 IEEE 5th International Conference on Cryptography, Security and Privacy (CSP), Zhuhai, China.","DOI":"10.1109\/CSP51677.2021.9357500"},{"key":"ref_152","doi-asserted-by":"crossref","unstructured":"Lopes, M., and Sarwade, N. (2015, January 15\u201317). On the performance of quantum cryptographic protocols SARG04 and KMB09. Proceedings of the 2015 International Conference on Communication, Information & Computing Technology (ICCICT), Mumbai, India.","DOI":"10.1109\/ICCICT.2015.7045661"},{"key":"ref_153","doi-asserted-by":"crossref","unstructured":"Ali, S., and Mahmoud, O. (2011, January 20\u201321). Implementation of SARG04 decoy state quantum key distribution. Proceedings of the 2011 6th International Conference on Telecommunication Systems, Services, and Applications (TSSA), Denpasar, Bali.","DOI":"10.1109\/TSSA.2011.6095412"},{"key":"ref_154","doi-asserted-by":"crossref","unstructured":"Zheng, J., Sun, W., Wang, W., Liu, J., Zhu, N., and Chang, G.-K. (2015, January 4\u20136). Orthogonal polarization modulation based fully coherent self-heterodyne detection for future UDWDM-PON. Proceedings of the 2015 International Symposium on Next-Generation Electronics (ISNE), Taipei, Taiwan.","DOI":"10.1109\/ISNE.2015.7132006"},{"key":"ref_155","doi-asserted-by":"crossref","unstructured":"Hua, B., Ju, C., Zhang, Z., Guo, Q., and Huang, X. (2018, January 26\u201329). Low Cost PAM4-TDM-PON Upstream Scheme Based on Electrical Nyquist Pulse Shaping and Heterodyne Coherent Detection. Proceedings of the 2018 Asia Communications and Photonics Conference (ACP), Hangzhou, China.","DOI":"10.1109\/ACP.2018.8596094"},{"key":"ref_156","doi-asserted-by":"crossref","unstructured":"Khir, M.F.A., Bahari, I., Zain, M.N.M., and Ehsan, A.A. (2012, January 1\u20133). Erroneous signal detection and secure distance improvement in two way Quantum Key Distribution protocol with decoy state. Proceedings of the 2012 IEEE 3rd International Conference on Photonics, Pulau Pinang, Malaysia.","DOI":"10.1109\/ICP.2012.6379867"},{"key":"ref_157","unstructured":"Khir, M.F.A., and Bahari, I. (2013, January 28\u201330). Secure communication with practical two way Quantum Key Distribution protocol and Weak+ Vacuum decoy state. Proceedings of the 2013 IEEE 4th International Conference on Photonics (ICP), Melaka, Malaysia."},{"key":"ref_158","doi-asserted-by":"crossref","first-page":"1076","DOI":"10.1109\/TNS.2019.2921982","article-title":"Active Phase Stabilization for the Interferometer With 128 Actively Selectable Paths","volume":"66","author":"Xu","year":"2019","journal-title":"IEEE Trans. Nucl. Sci."},{"key":"ref_159","doi-asserted-by":"crossref","first-page":"47699","DOI":"10.1109\/ACCESS.2018.2866554","article-title":"Evaluation of Parameters Effect in Multiphoton Quantum Key Distribution Over Fiber Optic","volume":"6","author":"Harun","year":"2018","journal-title":"IEEE Access"},{"key":"ref_160","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/JPHOT.2018.2883994","article-title":"Reference-Frame-Independent Measurement-Device-Independent Quantum Key Distribution with Modified Coherent States","volume":"10","author":"Zhang","year":"2018","journal-title":"IEEE Photonics J."},{"key":"ref_161","doi-asserted-by":"crossref","unstructured":"Viel, F., Augusto Silva, L., Leithardt, V.R., De Paz Santana, J.F., Celeste Ghizoni Teive, R., and Albenes Zeferino, C. (2020). An Efficient Interface for the Integration of IoT Devices with Smart Grids. Sensors, 20.","DOI":"10.3390\/s20102849"}],"container-title":["Future Internet"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1999-5903\/14\/3\/73\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T22:27:17Z","timestamp":1760135237000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1999-5903\/14\/3\/73"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,2,25]]},"references-count":161,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2022,3]]}},"alternative-id":["fi14030073"],"URL":"https:\/\/doi.org\/10.3390\/fi14030073","relation":{},"ISSN":["1999-5903"],"issn-type":[{"value":"1999-5903","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,2,25]]}}}