[1] Shor P W 1999 SIAM Rev. 41, 303 [2] Rivest R L, Shamir A and Adleman L 1978 Commun. ACM 21, 120 [3] Diffie W and Hellman M E 2022 Democratizing Cryptography: The Work of Whitfield Diffie and Martin Hellman pp. 365 [4] Arute F, Arya K, Babbush R, et al. 2019 Nature 574, 505 [5] Kent S and Seo K 2005 Security Architecture for the Internet Protocol (IETF) [6] Bennett C H and Brassard G 1984 Quantum Cryptography: Public Key Distribution and Coin Tossing, in IEEE Int. Conf. Computers, Systems and Signal Processing, pp. 175 [7] Bernstein D J 2025 Encyclopedia of Cryptography, Security and Privacy (Springer) pp. 1846 [8] Wootters W K and Zurek W H 1982 Nature 299, 802 [9] Vernam G S 1926 J. AIEE 45, 109 [10] Lo H K, Curty M and Qi B 2012 Phys. Rev. Lett. 108, 130503 [11] Pirandola S, Laurenza R, Ottaviani C and Banchi L 2017 Nat. Commun. 8, 1 [12] Lucamarini M, Yuan Z L, Dynes J F and Shields A J 2018 Nature 557, 400 [13] Wang X B, Yu Z W and Hu X L 2018 Phys. Rev. A 98, 062323 [14] Ma X, Zeng P and Zhou H 2018 Phys. Rev. X 8, 031043 [15] Cui C, Yin Z Q,Wang R, ChenW,Wang S, Guo G C and Han Z F 2019 Phys. Rev. Appl. 11, 034053 [16] Liu J, Jiang Q, Ding H, Ma X, Sun M, Xu J, Zhang C H, Xie S, Li J and Zeng G 2023 Sci. China Inf. Sci. 66, 189402 [17] Li W, Zhang L, Lu Y, Li Z P, Jiang C, Liu Y, Huang J, Li H, Wang Z and Wang X B 2023 Phys. Rev. Lett. 130, 250802 [18] Zeng P, Zhou H, Wu W and Ma X 2022 Nat. Commun. 13, 3903 [19] Xie Y M, Lu Y S, Weng C X, Cao X Y, Jia Z Y, Bao Y, Wang Y, Fu Y, Yin H L and Chen Z B 2022 PRX Quantum 3, 020315 [20] Zhu H T, Huang Y, Liu H, Zeng P, Zou M, Dai Y, Tang S, Li H, You L and Wang Z 2023 Phys. Rev. Lett. 130, 030801 [21] Zhou L, Lin J, Xie Y M, Lu Y S, Jing Y, Yin H L and Yuan Z 2023 Phys. Rev. Lett. 130, 250801 [22] Zhu H T, Huang Y, Pan W X, Zhou C W, Tang J, He H, Cheng M, Jin X, Zou M and Tang S 2024 Optica 11, 883 [23] Luo D, Liu X, Qin K, Zhang Z and Wei K 2024 Phys. Rev. A 110, 022605 [24] Liu X, Luo D, Zhang Z and Wei K 2023 Phys. Rev. A 107, 062613 [25] Guo M, Cao Y, Zhu J, Zhou X, Zhang C, Yu X, Zhao Y, Zhang J and Wang Q 2023 J. Opt. Commun. Netw. 15, 700 [26] Cao Y, Zhao Y, Wang Q, Zhang J, Ng S X and Hanzo L 2022 IEEE Commun. Surv. Tut. 24, 839 [27] Cao Y, Zhao Y, Zhang J andWang Q 2022 IEEE Commun. Mag. 60, 38 [28] Cao Y, Zhao Y, Zhang J, Wang Q, Niyato D and Hanzo L 2022 IEEE Netw. 36, 14 [29] Cao Y, Zhao Y, Li J, Lin R, Zhang J and Chen J 2021 IEEE J. Sel. Areas Commun. 39, 2701 [30] Huang C, Chen Y, Luo T, He W, Liu X, Zhang Z and Wei K 2024 Sci. China Phys. Mech. Astron. 67, 240312 [31] Wei K, Li W, Tan H, et al. 2020 Phys. Rev. X 10, 031030 [32] Elliott C, Pearson D and Troxel G 2003 Proceedings of the 2003 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications pp. 227 [33] Berzanskis A, Hakkarainen H, Lee K and Hussain M R 2009 Method of Integrating QKD with IPsec, U.S. Patent 7,602,919 [34] Zhang P, Chen N, Shen S, Yu S, Wu S and Kumar N 2022 IEEE Wireless Communications 31, 141 [35] Marksteiner S and Maurhart O 2015 9th Int. Conf. Quantum, Nano/Bio, and Micro Technologies, pp. 35 [36] Cano A, Garcia C R, Frantz R, Monroy I T, Imaña J L and Vegas J J 2024 2024 IEEE 32nd International Conference on Network Protocols (ICNP) pp. 1 [37] Li J, Zheng P, Li Z, Xue K, Xie Z, Yu N, Sun Q and Lu J 2025 IEEE Network 39, 180 [38] Sibson P, Kennard J, Crabtree T, Wright P, White C, Salas E H, Lord A, Grammel G, Mead B and Radev R 2024 Optical Fiber Communication Conference (Optica Publishing Group) pp. Th3B-4 [39] Alia O, Huang A, Luo H, Amer O, Pistoia M and Lim C 2024 Optical Fiber Communication Conference (Optica Publishing Group) pp. Th3B-5 [40] Lawo D C, Abu Bakar R, Cano Aguilera A, Cugini F, Imaña J L, Tafur Monroy I and Vegas Olmos J J 2024 Future Internet 16, 300 [41] Gao X, Xue K, Li J, Li Z, Wu J, Yu N, Sun Q and Lu J 2025 IEEE Comm. Mag. 63 148 [42] Cao Y, Yu X, Zhao Y, Zhang C, Zhou X, Zhang J and Wang Q 2025 Chin. Phys. B 34, 010310 [43] Garcia C R, Cano A, Olmos J V, Rommel S and Monroy I T 2025 Optical Fiber Communications Conference and Exhibition (OFC) (IEEE), pp. 1 [44] Fluhrer S, Kampanakis P, McGrew D and Smyslov V 2020 RFC 8784 [45] Harkins D and Carrel D 1998 RFC 2409: The Internet Key Exchange (IKE) [46] Kaufman C 2005 RFC 4306: Internet Key Exchange (IKEv2) Protocol (RFC Editor) [47] Joan D and Vincent R 2002 Information Security and Cryptography (Springer) [48] Huttner B, Imoto N, Gisin N and Mor T 1995 Phys. Rev. A 51, 1863 [49] Hwang W Y 2003 Phys. Rev. Lett. 91, 057901 [50] Wang X B 2005 Phys. Rev. Lett. 94, 230503 [51] Lo H K, Ma X and Chen K 2005 Phys. Rev. Lett. 94, 230504 [52] Ma X, Qi B, Zhao Y and Lo H K 2005 Phys. Rev. A 72, 012326 [53] Gottesman D, Lo H K, Lutkenhaus N and Preskill J 2004 Security of Quantum Key Distribution with Imperfect Devices, International Symposium on Information Theory [54] Jiang C, Yu Z W, Hu X L and Wang X B 2019 Phys. Rev. Appl. 12, 024061 [55] Wang Z H, Wang R, Yin Z Q, Wang S, Lu F Y, Chen W, He D Y, Guo G C and Han Z F 2023 Commun. Phys. 6, 265 [56] Chernoff H 1952 Ann. Math. Stat. 23, 493-507 [57] Alia O, Huang A, Luo H, Amer O, Pistoia M and Lim C 2024 arXiv:2405.04415 [quant-ph] [58] Fan-Yuan G J, Lu F Y, Wang S, Yin Z Q, He D Y, Chen W, Zhou Z, Wang Z H, Teng J and Guo G C 2022 Optica 9, 812 |