{"id":"https://openalex.org/W7138868914","doi":"https://doi.org/10.1109/globecom59602.2025.11432658","title":"PU-QKD: Enhancing Authentication of Quantum Key Distribution via Physical Unclonable Function","display_name":"PU-QKD: Enhancing Authentication of Quantum Key Distribution via Physical Unclonable Function","publication_year":2025,"publication_date":"2025-12-08","ids":{"openalex":"https://openalex.org/W7138868914","doi":"https://doi.org/10.1109/globecom59602.2025.11432658"},"language":"en","primary_location":{"id":"doi:10.1109/globecom59602.2025.11432658","is_oa":false,"landing_page_url":"https://doi.org/10.1109/globecom59602.2025.11432658","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"GLOBECOM 2025 - 2025 IEEE Global Communications Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://vbn.aau.dk/da/publications/75cd3010-901f-4f3c-80f9-7dfe0a12a200","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5064285677","display_name":"Mieszko Ferens","orcid":"https://orcid.org/0000-0002-4461-259X"},"institutions":[{"id":"https://openalex.org/I891191580","display_name":"Aalborg University","ror":"https://ror.org/04m5j1k67","country_code":"DK","type":"education","lineage":["https://openalex.org/I891191580"]}],"countries":["DK"],"is_corresponding":true,"raw_author_name":"Mieszko Ferens","raw_affiliation_strings":["Aalborg University,Department of Electronic Systems,Copenhagen,Denmark"],"affiliations":[{"raw_affiliation_string":"Aalborg University,Department of Electronic Systems,Copenhagen,Denmark","institution_ids":["https://openalex.org/I891191580"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5092542344","display_name":"Edlira Dushku","orcid":null},"institutions":[{"id":"https://openalex.org/I891191580","display_name":"Aalborg University","ror":"https://ror.org/04m5j1k67","country_code":"DK","type":"education","lineage":["https://openalex.org/I891191580"]}],"countries":["DK"],"is_corresponding":false,"raw_author_name":"Edlira Dushku","raw_affiliation_strings":["Aalborg University,Department of Electronic Systems,Copenhagen,Denmark"],"affiliations":[{"raw_affiliation_string":"Aalborg University,Department of Electronic Systems,Copenhagen,Denmark","institution_ids":["https://openalex.org/I891191580"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5017655875","display_name":"Simon Rommel","orcid":"https://orcid.org/0000-0001-8279-8180"},"institutions":[{"id":"https://openalex.org/I83019370","display_name":"Eindhoven University of Technology","ror":"https://ror.org/02c2kyt77","country_code":"NL","type":"education","lineage":["https://openalex.org/I83019370"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Simon Rommel","raw_affiliation_strings":["Eindhoven University of Technology,Department of Electrical Engineering,Eindhoven,The Netherlands"],"affiliations":[{"raw_affiliation_string":"Eindhoven University of Technology,Department of Electrical Engineering,Eindhoven,The Netherlands","institution_ids":["https://openalex.org/I83019370"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5129808142","display_name":"Idelfonso Tafur Monroy","orcid":null},"institutions":[{"id":"https://openalex.org/I83019370","display_name":"Eindhoven University of Technology","ror":"https://ror.org/02c2kyt77","country_code":"NL","type":"education","lineage":["https://openalex.org/I83019370"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Idelfonso Tafur Monroy","raw_affiliation_strings":["Eindhoven University of Technology,Department of Electrical Engineering,Eindhoven,The Netherlands"],"affiliations":[{"raw_affiliation_string":"Eindhoven University of Technology,Department of Electrical Engineering,Eindhoven,The Netherlands","institution_ids":["https://openalex.org/I83019370"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5120309716","display_name":"Sokol Kosta","orcid":null},"institutions":[{"id":"https://openalex.org/I891191580","display_name":"Aalborg University","ror":"https://ror.org/04m5j1k67","country_code":"DK","type":"education","lineage":["https://openalex.org/I891191580"]}],"countries":["DK"],"is_corresponding":false,"raw_author_name":"Sokol Kosta","raw_affiliation_strings":["Aalborg University,Department of Electronic Systems,Copenhagen,Denmark"],"affiliations":[{"raw_affiliation_string":"Aalborg University,Department of Electronic Systems,Copenhagen,Denmark","institution_ids":["https://openalex.org/I891191580"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5064285677"],"corresponding_institution_ids":["https://openalex.org/I891191580"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.80008347,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1968","last_page":"1973"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9735000133514404,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9735000133514404,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13748","display_name":"Advanced Statistical Modeling Techniques","score":0.003700000001117587,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.002300000051036477,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/quantum-key-distribution","display_name":"Quantum key distribution","score":0.5879999995231628},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.47780001163482666},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.4691999852657318},{"id":"https://openalex.org/keywords/function","display_name":"Function (biology)","score":0.4471000134944916},{"id":"https://openalex.org/keywords/physical-unclonable-function","display_name":"Physical unclonable function","score":0.41850000619888306},{"id":"https://openalex.org/keywords/quantum","display_name":"Quantum","score":0.35749998688697815},{"id":"https://openalex.org/keywords/topology","display_name":"Topology (electrical circuits)","score":0.35249999165534973},{"id":"https://openalex.org/keywords/realization","display_name":"Realization (probability)","score":0.34470000863075256}],"concepts":[{"id":"https://openalex.org/C95466800","wikidata":"https://www.wikidata.org/wiki/Q1027298","display_name":"Quantum key distribution","level":3,"score":0.5879999995231628},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5853000283241272},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.47780001163482666},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.4691999852657318},{"id":"https://openalex.org/C14036430","wikidata":"https://www.wikidata.org/wiki/Q3736076","display_name":"Function (biology)","level":2,"score":0.4471000134944916},{"id":"https://openalex.org/C8643368","wikidata":"https://www.wikidata.org/wiki/Q4046262","display_name":"Physical unclonable function","level":3,"score":0.41850000619888306},{"id":"https://openalex.org/C84114770","wikidata":"https://www.wikidata.org/wiki/Q46344","display_name":"Quantum","level":2,"score":0.35749998688697815},{"id":"https://openalex.org/C184720557","wikidata":"https://www.wikidata.org/wiki/Q7825049","display_name":"Topology (electrical circuits)","level":2,"score":0.35249999165534973},{"id":"https://openalex.org/C24326235","wikidata":"https://www.wikidata.org/wiki/Q126095","display_name":"Electronic engineering","level":1,"score":0.3483000099658966},{"id":"https://openalex.org/C2781089630","wikidata":"https://www.wikidata.org/wiki/Q21856745","display_name":"Realization (probability)","level":2,"score":0.34470000863075256},{"id":"https://openalex.org/C110121322","wikidata":"https://www.wikidata.org/wiki/Q865811","display_name":"Distribution (mathematics)","level":2,"score":0.34279999136924744},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3400000035762787},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.33320000767707825},{"id":"https://openalex.org/C125411270","wikidata":"https://www.wikidata.org/wiki/Q18653","display_name":"Encoding (memory)","level":2,"score":0.3303000032901764},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.31310001015663147},{"id":"https://openalex.org/C163173736","wikidata":"https://www.wikidata.org/wiki/Q3308558","display_name":"Key generation","level":3,"score":0.2919999957084656},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.28220000863075256},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.27889999747276306},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.2734000086784363},{"id":"https://openalex.org/C144901912","wikidata":"https://www.wikidata.org/wiki/Q471906","display_name":"Quantum cryptography","level":4,"score":0.26010000705718994},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.25940001010894775},{"id":"https://openalex.org/C99498987","wikidata":"https://www.wikidata.org/wiki/Q2210247","display_name":"Noise (video)","level":3,"score":0.257999986410141},{"id":"https://openalex.org/C28855332","wikidata":"https://www.wikidata.org/wiki/Q198099","display_name":"Quantization (signal processing)","level":2,"score":0.2526000142097473},{"id":"https://openalex.org/C2778355321","wikidata":"https://www.wikidata.org/wiki/Q17079427","display_name":"Identity (music)","level":2,"score":0.25200000405311584}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/globecom59602.2025.11432658","is_oa":false,"landing_page_url":"https://doi.org/10.1109/globecom59602.2025.11432658","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"GLOBECOM 2025 - 2025 IEEE Global Communications Conference","raw_type":"proceedings-article"},{"id":"pmh:oai:pure.atira.dk:openaire/75cd3010-901f-4f3c-80f9-7dfe0a12a200","is_oa":true,"landing_page_url":"https://vbn.aau.dk/da/publications/75cd3010-901f-4f3c-80f9-7dfe0a12a200","pdf_url":null,"source":{"id":"https://openalex.org/S4306401731","display_name":"VBN Forskningsportal (Aalborg Universitet)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I891191580","host_organization_name":"Aalborg University","host_organization_lineage":["https://openalex.org/I891191580"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Ferens, M, Dushku, E, Rommel, S, Monroy, I T & Kosta, S 2025, PU-QKD: Enhancing Authentication of Quantum Key Distribution via Physical Unclonable Function. in GLOBECOM 2025 - 2025 IEEE Global Communications Conference., 11432658, IEEE (Institute of Electrical and Electronics Engineers), Proceedings - IEEE Global Communications Conference, GLOBECOM, pp. 1968-1973, GLOBECOM 2025 - 2025 IEEE Global Communications Conference, 08/12/2025. https://doi.org/10.1109/GLOBECOM59602.2025.11432658","raw_type":"info:eu-repo/semantics/publishedVersion"}],"best_oa_location":{"id":"pmh:oai:pure.atira.dk:openaire/75cd3010-901f-4f3c-80f9-7dfe0a12a200","is_oa":true,"landing_page_url":"https://vbn.aau.dk/da/publications/75cd3010-901f-4f3c-80f9-7dfe0a12a200","pdf_url":null,"source":{"id":"https://openalex.org/S4306401731","display_name":"VBN Forskningsportal (Aalborg Universitet)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I891191580","host_organization_name":"Aalborg University","host_organization_lineage":["https://openalex.org/I891191580"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Ferens, M, Dushku, E, Rommel, S, Monroy, I T & Kosta, S 2025, PU-QKD: Enhancing Authentication of Quantum Key Distribution via Physical Unclonable Function. in GLOBECOM 2025 - 2025 IEEE Global Communications Conference., 11432658, IEEE (Institute of Electrical and Electronics Engineers), Proceedings - IEEE Global Communications Conference, GLOBECOM, pp. 1968-1973, GLOBECOM 2025 - 2025 IEEE Global Communications Conference, 08/12/2025. https://doi.org/10.1109/GLOBECOM59602.2025.11432658","raw_type":"info:eu-repo/semantics/publishedVersion"},"sustainable_development_goals":[{"display_name":"Reduced inequalities","id":"https://metadata.un.org/sdg/10","score":0.4380679130554199}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W1988134541","https://openalex.org/W2095410905","https://openalex.org/W2247946197","https://openalex.org/W2895182117","https://openalex.org/W2914756886","https://openalex.org/W2923423143","https://openalex.org/W2996319223","https://openalex.org/W3033025150","https://openalex.org/W3162318070","https://openalex.org/W3183980863","https://openalex.org/W3190558739","https://openalex.org/W4283838238","https://openalex.org/W4285303121","https://openalex.org/W4297094550","https://openalex.org/W4362716538"],"related_works":[],"abstract_inverted_index":{"The":[0,83],"rapid":[1],"advances":[2],"in":[3,81,97],"quantum":[4,24],"computing":[5],"pressure":[6],"the":[7,53,56,67,78,94,107,115,138],"existing":[8],"essential":[9],"cryptographic":[10],"algorithms.":[11],"In":[12],"this":[13],"context,":[14],"Quantum":[15,70],"Key":[16,71],"Distribution":[17,72],"(QKD)":[18],"has":[19],"been":[20],"proposed":[21,139],"as":[22,117,148],"a":[23,64,127],"safe":[25],"solution":[26],"for":[27],"key":[28,135],"distribution.":[29],"However,":[30],"current":[31],"QKD":[32,100,111],"systems":[33],"require":[34],"an":[35,118],"authenticated":[36],"classical":[37,87],"channel":[38],"which":[39],"relies":[40],"on":[41],"pre-shared":[42],"symmetric":[43],"keys":[44],"that":[45,58],"are":[46],"manually":[47],"distributed":[48],"and":[49],"do":[50],"not":[51],"guarantee":[52],"identity":[54],"of":[55,110],"hardware":[57],"hosts":[59],"them.":[60],"This":[61],"paper":[62],"proposes":[63],"novel":[65],"scheme,":[66],"Physically":[68],"Unclonable":[69,89],"(PU-QKD)":[73],"system,":[74],"to":[75,92,124],"intrinsically":[76],"authenticate":[77],"communicating":[79],"endpoints":[80],"QKD.":[82],"PU-QKD":[84],"scheme":[85,105,140],"leverages":[86],"Physical":[88],"Functions":[90],"(PUFs)":[91],"encode":[93],"data":[95],"transmission":[96],"discrete":[98],"variable":[99],"protocols":[101,112],"(e.g.,":[102],"BB84).":[103],"Our":[104],"maintains":[106],"information-theoretic":[108],"security":[109],"by":[113],"integrating":[114],"PUF":[116,145],"additional":[119],"layer.":[120],"Authentication":[121],"is":[122,141],"bound":[123],"hardware,":[125],"providing":[126],"robust":[128],"fingerprint,":[129],"while":[130],"lower":[131],"post-processing":[132],"overhead":[133],"increases":[134],"rates.":[136],"Additionally,":[137],"resilient":[142],"against":[143],"state-of-the-art":[144],"vulnerabilities,":[146],"such":[147],"modeling":[149],"attacks.":[150]},"counts_by_year":[],"updated_date":"2026-03-29T08:15:47.926485","created_date":"2026-03-20T00:00:00"}
