{"id":"https://openalex.org/W4387822099","doi":"https://doi.org/10.3390/cryptography7040053","title":"On the Security of Quantum Key Distribution Networks","display_name":"On the Security of Quantum Key Distribution Networks","publication_year":2023,"publication_date":"2023-10-20","ids":{"openalex":"https://openalex.org/W4387822099","doi":"https://doi.org/10.3390/cryptography7040053"},"language":"en","primary_location":{"id":"doi:10.3390/cryptography7040053","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography7040053","pdf_url":"https://www.mdpi.com/2410-387X/7/4/53/pdf?version=1697789445","source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.mdpi.com/2410-387X/7/4/53/pdf?version=1697789445","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5025292265","display_name":"Eufemia Lella","orcid":"https://orcid.org/0000-0001-6137-328X"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Eufemia Lella","raw_affiliation_strings":["Innovation & Technology-Innovation Lab, EXPRIVIA S.p.A, 70056 Molfetta, Italy"],"affiliations":[{"raw_affiliation_string":"Innovation & Technology-Innovation Lab, EXPRIVIA S.p.A, 70056 Molfetta, Italy","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5062697214","display_name":"Giovanni Schmid","orcid":"https://orcid.org/0000-0002-7901-6464"},"institutions":[{"id":"https://openalex.org/I3005160176","display_name":"Institute for High Performance Computing and Networking","ror":"https://ror.org/04r5fge26","country_code":"IT","type":"facility","lineage":["https://openalex.org/I3005160176","https://openalex.org/I4210155236"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Giovanni Schmid","raw_affiliation_strings":["Consiglio Nazionale delle Ricerche, Istituto di Calcolo e Reti ad Alte Prestazioni, 80131 Naples, Italy"],"affiliations":[{"raw_affiliation_string":"Consiglio Nazionale delle Ricerche, Istituto di Calcolo e Reti ad Alte Prestazioni, 80131 Naples, Italy","institution_ids":["https://openalex.org/I3005160176"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5025292265"],"corresponding_institution_ids":[],"apc_list":{"value":1600,"currency":"CHF","value_usd":1732},"apc_paid":{"value":1600,"currency":"CHF","value_usd":1732},"fwci":2.0556,"has_fulltext":true,"cited_by_count":12,"citation_normalized_percentile":{"value":0.89621056,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":"7","issue":"4","first_page":"53","last_page":"53"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10020","display_name":"Quantum Information and Cryptography","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10020","display_name":"Quantum Information and Cryptography","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10622","display_name":"Quantum Mechanics and Applications","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/3107","display_name":"Atomic and Molecular Physics, and Optics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10682","display_name":"Quantum Computing Algorithms and Architecture","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/quantum-key-distribution","display_name":"Quantum key distribution","score":0.8060382008552551},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7121922969818115},{"id":"https://openalex.org/keywords/quantum-cryptography","display_name":"Quantum cryptography","score":0.7047742605209351},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5346271991729736},{"id":"https://openalex.org/keywords/quantum-network","display_name":"Quantum network","score":0.5137442350387573},{"id":"https://openalex.org/keywords/key-distribution","display_name":"Key distribution","score":0.5058638453483582},{"id":"https://openalex.org/keywords/quantum-computer","display_name":"Quantum computer","score":0.4198746681213379},{"id":"https://openalex.org/keywords/quantum-information","display_name":"Quantum information","score":0.37853941321372986},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3246425986289978},{"id":"https://openalex.org/keywords/quantum","display_name":"Quantum","score":0.2719762325286865},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.2320241928100586},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.18612727522850037},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.11106559634208679},{"id":"https://openalex.org/keywords/quantum-mechanics","display_name":"Quantum mechanics","score":0.0846603512763977}],"concepts":[{"id":"https://openalex.org/C95466800","wikidata":"https://www.wikidata.org/wiki/Q1027298","display_name":"Quantum key distribution","level":3,"score":0.8060382008552551},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7121922969818115},{"id":"https://openalex.org/C144901912","wikidata":"https://www.wikidata.org/wiki/Q471906","display_name":"Quantum cryptography","level":4,"score":0.7047742605209351},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5346271991729736},{"id":"https://openalex.org/C186468114","wikidata":"https://www.wikidata.org/wiki/Q836478","display_name":"Quantum network","level":4,"score":0.5137442350387573},{"id":"https://openalex.org/C160333310","wikidata":"https://www.wikidata.org/wiki/Q6398153","display_name":"Key distribution","level":4,"score":0.5058638453483582},{"id":"https://openalex.org/C58053490","wikidata":"https://www.wikidata.org/wiki/Q176555","display_name":"Quantum computer","level":3,"score":0.4198746681213379},{"id":"https://openalex.org/C169699857","wikidata":"https://www.wikidata.org/wiki/Q2122243","display_name":"Quantum information","level":3,"score":0.37853941321372986},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3246425986289978},{"id":"https://openalex.org/C84114770","wikidata":"https://www.wikidata.org/wiki/Q46344","display_name":"Quantum","level":2,"score":0.2719762325286865},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.2320241928100586},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.18612727522850037},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.11106559634208679},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0846603512763977}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.3390/cryptography7040053","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography7040053","pdf_url":"https://www.mdpi.com/2410-387X/7/4/53/pdf?version=1697789445","source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:ee3070f249fa46bc9075904bfef8a927","is_oa":true,"landing_page_url":"https://doaj.org/article/ee3070f249fa46bc9075904bfef8a927","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cryptography, Vol 7, Iss 4, p 53 (2023)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.3390/cryptography7040053","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography7040053","pdf_url":"https://www.mdpi.com/2410-387X/7/4/53/pdf?version=1697789445","source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.550000011920929}],"awards":[{"id":"https://openalex.org/G1076797115","display_name":null,"funder_award_id":"co-funded","funder_id":"https://openalex.org/F4320335322","funder_display_name":"European Regional Development Fund"},{"id":"https://openalex.org/G3455173562","display_name":null,"funder_award_id":"ARS01_00734","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"},{"id":"https://openalex.org/G453067482","display_name":null,"funder_award_id":"014-2020","funder_id":"https://openalex.org/F4320335322","funder_display_name":"European Regional Development Fund"},{"id":"https://openalex.org/G5634946813","display_name":null,"funder_award_id":"2014-2020","funder_id":"https://openalex.org/F4320335322","funder_display_name":"European Regional Development Fund"},{"id":"https://openalex.org/G6870533126","display_name":null,"funder_award_id":"2014-2020","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"}],"funders":[{"id":"https://openalex.org/F4320320300","display_name":"European Commission","ror":"https://ror.org/00k4n6c32"},{"id":"https://openalex.org/F4320335322","display_name":"European Regional Development Fund","ror":"https://ror.org/00k4n6c32"}],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W4387822099.pdf"},"referenced_works_count":43,"referenced_works":["https://openalex.org/W1508193711","https://openalex.org/W1523800107","https://openalex.org/W1533182289","https://openalex.org/W1976066853","https://openalex.org/W1985623009","https://openalex.org/W1988838064","https://openalex.org/W2003762972","https://openalex.org/W2020272675","https://openalex.org/W2029693536","https://openalex.org/W2047463679","https://openalex.org/W2052207834","https://openalex.org/W2055945975","https://openalex.org/W2071179368","https://openalex.org/W2084652510","https://openalex.org/W2109394932","https://openalex.org/W2120755151","https://openalex.org/W2168676717","https://openalex.org/W2172273481","https://openalex.org/W2320204756","https://openalex.org/W2355550369","https://openalex.org/W2498454731","https://openalex.org/W2508902623","https://openalex.org/W2785593271","https://openalex.org/W2799278992","https://openalex.org/W2948602808","https://openalex.org/W2980484562","https://openalex.org/W2981311533","https://openalex.org/W2991441573","https://openalex.org/W3004357554","https://openalex.org/W3008629526","https://openalex.org/W3036871920","https://openalex.org/W3118428022","https://openalex.org/W3157314160","https://openalex.org/W3157463048","https://openalex.org/W3194289915","https://openalex.org/W4200555992","https://openalex.org/W4207049710","https://openalex.org/W4211243246","https://openalex.org/W4221053224","https://openalex.org/W4232836212","https://openalex.org/W4283070117","https://openalex.org/W4295790499","https://openalex.org/W6636970380"],"related_works":["https://openalex.org/W4312132309","https://openalex.org/W2064775687","https://openalex.org/W4240944159","https://openalex.org/W2916069885","https://openalex.org/W2147369345","https://openalex.org/W2336878745","https://openalex.org/W2903657089","https://openalex.org/W4384158840","https://openalex.org/W3217264812","https://openalex.org/W2374628129"],"abstract_inverted_index":{"The":[0,42],"main":[1],"purpose":[2],"of":[3,23,38,76,96,103,142,145],"a":[4,20,39,46,50,53,56,77,117],"quantum":[5,40,57,69,78,94,99,146,148],"key":[6,58,79,149],"distribution":[7,59,80,150],"network":[8,129],"is":[9,85],"to":[10,14,28,170],"provide":[11],"secret":[12],"keys":[13,43],"any":[15,34],"users":[16],"or":[17],"applications":[18],"requiring":[19],"high":[21],"level":[22],"security,":[24],"ideally":[25],"such":[26],"as":[27],"offer":[29,154],"the":[30,68,74,93,123,139,165],"best":[31],"protection":[32],"against":[33],"computational":[35,155],"attack,":[36],"even":[37],"nature.":[41],"shared":[44],"through":[45],"point-to-point":[47],"link":[48],"between":[49],"source":[51],"and":[52,108,127,157],"detector":[54],"using":[55],"protocol":[60],"can":[61,152],"be":[62],"proven":[63],"information-theoretically":[64],"secure":[65],"based":[66,86,121],"on":[67,87,122],"information":[70],"theory.":[71],"However,":[72],"evaluating":[73],"security":[75,95,105,131,156,160],"network,":[81],"especially":[82],"if":[83],"it":[84],"relay":[88],"nodes,":[89],"goes":[90],"far":[91],"beyond":[92],"its":[97],"single":[98],"links,":[100],"involving":[101],"aspects":[102],"conventional":[104],"for":[106],"devices":[107],"their":[109,159],"communication":[110],"channels.":[111],"In":[112],"this":[113],"contribution,":[114],"we":[115],"perform":[116],"rigorous":[118],"threat":[119],"analysis":[120],"most":[124],"recent":[125],"recommendations":[126],"practical":[128,162],"deployment":[130],"issues.":[132],"We":[133],"show":[134],"that,":[135],"at":[136],"least":[137],"in":[138,161,164],"current":[140],"state":[141],"our":[143],"understanding":[144],"cryptography,":[147],"networks":[151],"only":[153],"that":[158],"implementations":[163],"shorter":[166],"term":[167],"requires":[168],"resorting":[169],"post-quantum":[171],"cryptography.":[172]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":9},{"year":2024,"cited_by_count":1}],"updated_date":"2026-04-21T08:09:41.155169","created_date":"2025-10-10T00:00:00"}
