{"id":"https://openalex.org/W4402125201","doi":"https://doi.org/10.1109/icton62926.2024.10648124","title":"Quantum secure communication using hybrid post-quantum cryptography and quantum key distribution","display_name":"Quantum secure communication using hybrid post-quantum cryptography and quantum key distribution","publication_year":2024,"publication_date":"2024-07-14","ids":{"openalex":"https://openalex.org/W4402125201","doi":"https://doi.org/10.1109/icton62926.2024.10648124"},"language":"en","primary_location":{"id":"doi:10.1109/icton62926.2024.10648124","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icton62926.2024.10648124","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 24th International Conference on Transparent Optical Networks (ICTON)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://pure.tue.nl/ws/files/339086854/Quantum_secure_communication_using_hybrid_post_quantum_cryptography_and_quantum_key_distribution.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5106930335","display_name":"Nick Aquina","orcid":null},"institutions":[{"id":"https://openalex.org/I83019370","display_name":"Eindhoven University of Technology","ror":"https://ror.org/02c2kyt77","country_code":"NL","type":"education","lineage":["https://openalex.org/I83019370"]}],"countries":["NL"],"is_corresponding":true,"raw_author_name":"Nick Aquina","raw_affiliation_strings":["Eindhoven University of Technology,Department of Electrical Engineering,Eindhoven,The Netherlands"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Eindhoven University of Technology,Department of Electrical Engineering,Eindhoven,The Netherlands","institution_ids":["https://openalex.org/I83019370"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5017655875","display_name":"Simon Rommel","orcid":"https://orcid.org/0000-0001-8279-8180"},"institutions":[{"id":"https://openalex.org/I83019370","display_name":"Eindhoven University of Technology","ror":"https://ror.org/02c2kyt77","country_code":"NL","type":"education","lineage":["https://openalex.org/I83019370"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Simon Rommel","raw_affiliation_strings":["Eindhoven University of Technology,Department of Electrical Engineering,Eindhoven,The Netherlands"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Eindhoven University of Technology,Department of Electrical Engineering,Eindhoven,The Netherlands","institution_ids":["https://openalex.org/I83019370"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5024064810","display_name":"Idelfonso Tafur Monroy","orcid":"https://orcid.org/0000-0002-2935-7682"},"institutions":[{"id":"https://openalex.org/I83019370","display_name":"Eindhoven University of Technology","ror":"https://ror.org/02c2kyt77","country_code":"NL","type":"education","lineage":["https://openalex.org/I83019370"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Idelfonso Tafur Monroy","raw_affiliation_strings":["Eindhoven University of Technology,Department of Electrical Engineering,Eindhoven,The Netherlands"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Eindhoven University of Technology,Department of Electrical Engineering,Eindhoven,The Netherlands","institution_ids":["https://openalex.org/I83019370"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5106930335"],"corresponding_institution_ids":["https://openalex.org/I83019370"],"apc_list":null,"apc_paid":null,"fwci":3.3047,"has_fulltext":true,"cited_by_count":10,"citation_normalized_percentile":{"value":0.9308526,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"4"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10682","display_name":"Quantum Computing Algorithms and Architecture","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10682","display_name":"Quantum Computing Algorithms and Architecture","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10020","display_name":"Quantum Information and Cryptography","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13182","display_name":"Quantum-Dot Cellular Automata","score":0.9943000078201294,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/quantum-cryptography","display_name":"Quantum cryptography","score":0.8598686456680298},{"id":"https://openalex.org/keywords/quantum-key-distribution","display_name":"Quantum key distribution","score":0.8196147680282593},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6106076836585999},{"id":"https://openalex.org/keywords/quantum-network","display_name":"Quantum network","score":0.5596438050270081},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.48382988572120667},{"id":"https://openalex.org/keywords/quantum-channel","display_name":"Quantum channel","score":0.4760151505470276},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.44694656133651733},{"id":"https://openalex.org/keywords/quantum","display_name":"Quantum","score":0.43478843569755554},{"id":"https://openalex.org/keywords/key-distribution","display_name":"Key distribution","score":0.41962939500808716},{"id":"https://openalex.org/keywords/quantum-computer","display_name":"Quantum computer","score":0.3433516323566437},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3080751895904541},{"id":"https://openalex.org/keywords/quantum-information","display_name":"Quantum information","score":0.27944236993789673},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.25070902705192566},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.24495640397071838},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.19441500306129456},{"id":"https://openalex.org/keywords/quantum-mechanics","display_name":"Quantum mechanics","score":0.18480056524276733},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.17027032375335693}],"concepts":[{"id":"https://openalex.org/C144901912","wikidata":"https://www.wikidata.org/wiki/Q471906","display_name":"Quantum cryptography","level":4,"score":0.8598686456680298},{"id":"https://openalex.org/C95466800","wikidata":"https://www.wikidata.org/wiki/Q1027298","display_name":"Quantum key distribution","level":3,"score":0.8196147680282593},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6106076836585999},{"id":"https://openalex.org/C186468114","wikidata":"https://www.wikidata.org/wiki/Q836478","display_name":"Quantum network","level":4,"score":0.5596438050270081},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.48382988572120667},{"id":"https://openalex.org/C187486625","wikidata":"https://www.wikidata.org/wiki/Q2122176","display_name":"Quantum channel","level":4,"score":0.4760151505470276},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.44694656133651733},{"id":"https://openalex.org/C84114770","wikidata":"https://www.wikidata.org/wiki/Q46344","display_name":"Quantum","level":2,"score":0.43478843569755554},{"id":"https://openalex.org/C160333310","wikidata":"https://www.wikidata.org/wiki/Q6398153","display_name":"Key distribution","level":4,"score":0.41962939500808716},{"id":"https://openalex.org/C58053490","wikidata":"https://www.wikidata.org/wiki/Q176555","display_name":"Quantum computer","level":3,"score":0.3433516323566437},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3080751895904541},{"id":"https://openalex.org/C169699857","wikidata":"https://www.wikidata.org/wiki/Q2122243","display_name":"Quantum information","level":3,"score":0.27944236993789673},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.25070902705192566},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.24495640397071838},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.19441500306129456},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.18480056524276733},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.17027032375335693}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/icton62926.2024.10648124","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icton62926.2024.10648124","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 24th International Conference on Transparent Optical Networks (ICTON)","raw_type":"proceedings-article"},{"id":"pmh:oai:pure.tue.nl:publications/50610de0-aff6-485e-86c7-bc6d46492bd7","is_oa":true,"landing_page_url":"https://research.tue.nl/en/publications/50610de0-aff6-485e-86c7-bc6d46492bd7","pdf_url":"https://pure.tue.nl/ws/files/339086854/Quantum_secure_communication_using_hybrid_post_quantum_cryptography_and_quantum_key_distribution.pdf","source":{"id":"https://openalex.org/S4406922641","display_name":"TU/e Research Portal","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Aquina, N, Rommel, S & Monroy, I T 2024, Quantum secure communication using hybrid post-quantum cryptography and quantum key distribution. in F Prudenzano & M Marciniak (eds), 2024 24th International Conference on Transparent Optical Networks, ICTON 2024., 10648124, Institute of Electrical and Electronics Engineers, 2024 24th International Conference on Transparent Optical Networks (ICTON), Bari, Italy, 14/07/24. https://doi.org/10.1109/ICTON62926.2024.10648124","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"pmh:oai:pure.tue.nl:openaire/50610de0-aff6-485e-86c7-bc6d46492bd7","is_oa":true,"landing_page_url":"https://research.tue.nl/files/339086854/Quantum_secure_communication_using_hybrid_post_quantum_cryptography_and_quantum_key_distribution.pdf","pdf_url":null,"source":{"id":"https://openalex.org/S4406922641","display_name":"TU/e Research Portal","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Aquina, N, Rommel, S & Monroy, I T 2024, Quantum secure communication using hybrid post-quantum cryptography and quantum key distribution. in F Prudenzano & M Marciniak (eds), 2024 24th International Conference on Transparent Optical Networks, ICTON 2024., 10648124, Institute of Electrical and Electronics Engineers, 2024 24th International Conference on Transparent Optical Networks (ICTON), Bari, Italy, 14/07/24. https://doi.org/10.1109/ICTON62926.2024.10648124","raw_type":"info:eu-repo/semantics/publishedVersion"}],"best_oa_location":{"id":"pmh:oai:pure.tue.nl:publications/50610de0-aff6-485e-86c7-bc6d46492bd7","is_oa":true,"landing_page_url":"https://research.tue.nl/en/publications/50610de0-aff6-485e-86c7-bc6d46492bd7","pdf_url":"https://pure.tue.nl/ws/files/339086854/Quantum_secure_communication_using_hybrid_post_quantum_cryptography_and_quantum_key_distribution.pdf","source":{"id":"https://openalex.org/S4406922641","display_name":"TU/e Research Portal","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Aquina, N, Rommel, S & Monroy, I T 2024, Quantum secure communication using hybrid post-quantum cryptography and quantum key distribution. in F Prudenzano & M Marciniak (eds), 2024 24th International Conference on Transparent Optical Networks, ICTON 2024., 10648124, Institute of Electrical and Electronics Engineers, 2024 24th International Conference on Transparent Optical Networks (ICTON), Bari, Italy, 14/07/24. https://doi.org/10.1109/ICTON62926.2024.10648124","raw_type":"info:eu-repo/semantics/publishedVersion"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4402125201.pdf","grobid_xml":"https://content.openalex.org/works/W4402125201.grobid-xml"},"referenced_works_count":10,"referenced_works":["https://openalex.org/W2052267638","https://openalex.org/W2168676717","https://openalex.org/W2725913349","https://openalex.org/W2957658350","https://openalex.org/W4239555993","https://openalex.org/W4365934498","https://openalex.org/W4388588841","https://openalex.org/W4393242480","https://openalex.org/W4399882160","https://openalex.org/W6861414595"],"related_works":["https://openalex.org/W4312132309","https://openalex.org/W2916069885","https://openalex.org/W4221147165","https://openalex.org/W4240944159","https://openalex.org/W2105140999","https://openalex.org/W4226054070","https://openalex.org/W4301359832","https://openalex.org/W2374628129","https://openalex.org/W2294476531","https://openalex.org/W4384517576"],"abstract_inverted_index":{"Once":[0],"a":[1,100],"cryptographically":[2],"relevant":[3],"quantum":[4],"computer":[5],"is":[6,11,115,118,144],"built,":[7],"confidential":[8],"information":[9,45],"that":[10,102,130],"communicated":[12],"today":[13],"can":[14,24,36],"be":[15,26,37,54],"decrypted":[16],"and":[17,28,82,95],"exposed.":[18],"Key":[19,79],"exchange":[20,99,113],"methods":[21,114,128],"currently":[22],"used":[23,31,55],"then":[25],"broken":[27],"the":[29,34,41,71,110,121],"key":[30,101,112],"to":[32,47,53,57,97,124],"protect":[33,58],"data":[35,59],"recovered.":[38],"Depending":[39],"on":[40],"duration":[42],"for":[43],"which":[44],"needs":[46],"remain":[48,132],"confidential,":[49],"quantum-safe":[50,76],"solutions":[51],"have":[52],"now":[56],"transmitted":[60],"today.":[61],"In":[62],"this":[63],"paper,":[64],"we":[65],"review":[66],"recent":[67],"advances":[68],"in":[69,86],"integrating":[70],"combination":[72],"of":[73,109,120,138],"two":[74],"different":[75],"solutions,":[77],"Quantum":[78],"Distribution":[80],"(QKD)":[81],"Post-Quantum":[83],"Cryptography":[84],"(PQC),":[85],"existing":[87,126],"protocols.":[88],"We":[89],"also":[90],"combine":[91],"classical":[92,142],"cryptography,":[93],"PQC":[94],"QKD":[96,140],"securely":[98],"remains":[103],"secure":[104,133],"even":[105,134],"if":[106,135],"only":[107,136],"one":[108,119,137],"three":[111],"secure.":[116,145],"This":[117],"first":[122],"steps":[123],"update":[125],"communication":[127],"such":[129],"they":[131],"PQC,":[139],"or":[141],"cryptography":[143]},"counts_by_year":[{"year":2026,"cited_by_count":4},{"year":2025,"cited_by_count":5},{"year":2024,"cited_by_count":1}],"updated_date":"2026-04-25T08:17:42.794288","created_date":"2025-10-10T00:00:00"}
