{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T11:48:45Z","timestamp":1774352925372,"version":"3.50.1"},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2026,2,18]],"date-time":"2026-02-18T00:00:00Z","timestamp":1771372800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,2,18]],"date-time":"2026-02-18T00:00:00Z","timestamp":1771372800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"DOI":"10.1007\/s11128-026-05057-9","type":"journal-article","created":{"date-parts":[[2026,2,18]],"date-time":"2026-02-18T07:52:21Z","timestamp":1771401141000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Experimental composable secure key rate in COW QKD system"],"prefix":"10.1007","volume":"25","author":[{"given":"Vivek","family":"Kumar","sequence":"first","affiliation":[]},{"given":"Ayan","family":"Biswas","sequence":"additional","affiliation":[]},{"given":"Prasanta","family":"Halder","sequence":"additional","affiliation":[]},{"given":"Arka","family":"Mukherjee","sequence":"additional","affiliation":[]},{"given":"Akriti","family":"Katiyar","sequence":"additional","affiliation":[]},{"given":"Prashant Kumar","family":"Rathore","sequence":"additional","affiliation":[]},{"given":"Atul Kumar","family":"Gupta","sequence":"additional","affiliation":[]},{"given":"Pankaj Kumar","family":"Dalela","sequence":"additional","affiliation":[]},{"given":"Rajkumar","family":"Upadhyay","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,2,18]]},"reference":[{"issue":"5","key":"5057_CR1","doi-asserted-by":"publisher","first-page":"1484","DOI":"10.1137\/S0097539795293172","volume":"26","author":"PW Shor","year":"1997","unstructured":"Shor, P.W.: Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM J. Comput. 26(5), 1484\u20131509 (1997). https:\/\/doi.org\/10.1137\/S0097539795293172","journal-title":"SIAM J. Comput."},{"issue":"8052","key":"5057_CR2","doi-asserted-by":"publisher","first-page":"920","DOI":"10.1038\/s41586-024-08449-y","volume":"638","author":"R Acharya","year":"2025","unstructured":"Acharya, R., et al.: Quantum error correction below the surface code threshold. Nature 638(8052), 920\u2013926 (2025). https:\/\/doi.org\/10.1038\/s41586-024-08449-y. arXiv:2408.13687 [quant-ph]","journal-title":"Nature"},{"key":"5057_CR3","doi-asserted-by":"publisher","unstructured":"Bernstein, D.J.: Post-quantum Cryptography (Springer Nature Switzerland, Cham, 2025), pp. 1846\u20131847. https:\/\/doi.org\/10.1007\/978-3-030-71522-9_386","DOI":"10.1007\/978-3-030-71522-9_386"},{"key":"5057_CR4","doi-asserted-by":"publisher","unstructured":"Bennett, C.H., Brassard, G.: Quantum cryptography: Public key distribution and coin tossing. Theoret. Comput. Sci. 560, 7\u201311 (2014) https:\/\/doi.org\/10.1016\/j.tcs.2014.05.025. https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0304397514004241. Theoretical Aspects of Quantum Cryptography - celebrating 30 years of BB84","DOI":"10.1016\/j.tcs.2014.05.025"},{"key":"5057_CR5","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1103\/RevModPhys.74.145","volume":"74","author":"N Gisin","year":"2002","unstructured":"Gisin, N., Ribordy, G., Tittel, W., Zbinden, H.: Quantum cryptography. Rev. Mod. Phys. 74, 145\u2013195 (2002). https:\/\/doi.org\/10.1103\/RevModPhys.74.145","journal-title":"Rev. Mod. Phys."},{"key":"5057_CR6","doi-asserted-by":"publisher","first-page":"13326","DOI":"10.1364\/OE.17.013326","volume":"17","author":"D Stucki","year":"2009","unstructured":"Stucki, D., Barreiro, C., Fasel, S., Gautier, J.D., Gay, O., Gisin, N., Thew, R., Thoma, Y., Trinkler, P., Vannel, F., Zbinden, H.: Continuous high speed coherent one-way quantum key distribution. Opt. Express 17, 13326\u201313334 (2009). https:\/\/doi.org\/10.1364\/OE.17.013326","journal-title":"Opt. Express"},{"key":"5057_CR7","unstructured":"Gisin, N., Ribordy, G., Zbinden, H., Stucki, D., Brunner, N., Scarani, V.: Towards practical and fast quantum cryptography (2004)"},{"key":"5057_CR8","doi-asserted-by":"publisher","unstructured":"Mukherjee, A., Kumar, V., Halder, P., Kumar, A., Sharma, R.L., Rathore, P.K., Gupta, A.K., Dalela, P.K., Upadhyay, R.: Quantum key distribution over existing optical fibre carrying traffic, in 16th International Conference on COMmunication Systems & NETworkS (2024). https:\/\/doi.org\/10.1109\/COMSNETS59351.2024.10427249","DOI":"10.1109\/COMSNETS59351.2024.10427249"},{"key":"5057_CR9","doi-asserted-by":"publisher","first-page":"025002","DOI":"10.1103\/RevModPhys.92.025002","volume":"92","author":"F Xu","year":"2020","unstructured":"Xu, F., Ma, X., Zhang, Q., Lo, H.K., Pan, J.W.: Secure quantum key distribution with realistic devices. Rev. Mod. Phys. 92, 025002 (2020). https:\/\/doi.org\/10.1103\/RevModPhys.92.025002","journal-title":"Rev. Mod. Phys."},{"key":"5057_CR10","doi-asserted-by":"publisher","first-page":"1330","DOI":"10.1103\/PhysRevLett.85.1330","volume":"85","author":"G Brassard","year":"2000","unstructured":"Brassard, G., L\u00fctkenhaus, N., Mor, T., Sanders, B.C.: Limitations on practical quantum cryptography. Phys. Rev. Lett. 85, 1330\u20131333 (2000). https:\/\/doi.org\/10.1103\/PhysRevLett.85.1330","journal-title":"Phys. Rev. Lett."},{"issue":"1","key":"5057_CR11","doi-asserted-by":"publisher","first-page":"013047","DOI":"10.1088\/1367-2630\/16\/1\/013047","volume":"16","author":"N Walenta","year":"2014","unstructured":"Walenta, N., Burg, A., Caselunghe, D., Constantin, J., Gisin, N., Guinnard, O., Houlmann, R., Junod, P., Korzh, B., Kulesza, N., Legr\u00e9, M., Lim, C.W., Lunghi, T., Monat, L., Portmann, C., Soucarros, M., Thew, R.T., Trinkler, P., Trolliet, G., Vannel, F., Zbinden, H.: A fast and versatile quantum key distribution system with hardware key distillation and wavelength multiplexing. New J. Phys. 16(1), 013047 (2014). https:\/\/doi.org\/10.1088\/1367-2630\/16\/1\/013047","journal-title":"New J. Phys."},{"key":"5057_CR12","doi-asserted-by":"publisher","unstructured":"Gao, R.Q., Xie, Y.M., Gu, J., Liu, W.B., Weng, C.X., Li, B.H., Yin, H.L., Chen, Z.B.: Simple security proof of coherent-one-way quantum key distribution. Opt. Express 30(13), 23783\u201323795 (2022) https:\/\/doi.org\/10.1364\/OE.461669. https:\/\/opg.optica.org\/oe\/abstract.cfm?URI=oe-30-13-23783","DOI":"10.1364\/OE.461669"},{"issue":"8","key":"5057_CR13","doi-asserted-by":"publisher","first-page":"1369","DOI":"10.1007\/s11082-024-06934-2","volume":"56","author":"P Malpani","year":"2024","unstructured":"Malpani, P., Kumar, S., Pathak, A.: Implementation of coherent one way protocol for quantum key distribution up to an effective distance of 145 km. Opt. Quant. Electron. 56(8), 1369 (2024). https:\/\/doi.org\/10.1007\/s11082-024-06934-2","journal-title":"Opt. Quant. Electron."},{"issue":"1","key":"5057_CR14","doi-asserted-by":"publisher","first-page":"013031","DOI":"10.1088\/1367-2630\/10\/1\/013031","volume":"10","author":"C Branciard","year":"2008","unstructured":"Branciard, C., Gisin, N., Scarani, V.: Upper bounds for the security of two distributed-phase reference protocols of quantum cryptography. New J. Phys. 10(1), 013031 (2008). https:\/\/doi.org\/10.1088\/1367-2630\/10\/1\/013031","journal-title":"New J. Phys."},{"key":"5057_CR15","doi-asserted-by":"publisher","first-page":"063027","DOI":"10.1088\/1367-2630\/12\/6\/063027","volume":"12","author":"P Eraerds","year":"2010","unstructured":"Eraerds, P., Walenta, N., Legre, M., Gisin, N., Zbinden, H.: Quantum key distribution and 1 gbps data encryption over a single fibre. New J. Phys. 12, 063027 (2010). https:\/\/doi.org\/10.1088\/1367-2630\/12\/6\/063027","journal-title":"New J. Phys."},{"key":"5057_CR16","unstructured":"Mink, A., Nakassis, A.: Ldpc for qkd reconciliation (2014). arXiv:abs\/1205.4977"},{"issue":"6","key":"5057_CR17","doi-asserted-by":"publisher","first-page":"1915","DOI":"10.1109\/18.476316","volume":"41","author":"C Bennett","year":"1995","unstructured":"Bennett, C., Brassard, G., Crepeau, C., Maurer, U.: Generalized privacy amplification. IEEE Trans. Inf. Theory 41(6), 1915\u20131923 (1995). https:\/\/doi.org\/10.1109\/18.476316","journal-title":"IEEE Trans. Inf. Theory"},{"key":"5057_CR18","doi-asserted-by":"publisher","first-page":"140502","DOI":"10.1103\/PhysRevLett.98.140502","volume":"98","author":"R K\u00f6nig","year":"2007","unstructured":"K\u00f6nig, R., Renner, R., Bariska, A., Maurer, U.: Small accessible quantum information does not imply security. Phys. Rev. Lett. 98, 140502 (2007). https:\/\/doi.org\/10.1103\/PhysRevLett.98.140502","journal-title":"Phys. Rev. Lett."},{"key":"5057_CR19","doi-asserted-by":"publisher","first-page":"025008","DOI":"10.1103\/RevModPhys.94.025008","volume":"94","author":"C Portmann","year":"2022","unstructured":"Portmann, C., Renner, R.: Security in quantum cryptography. Rev. Mod. Phys. 94, 025008 (2022). https:\/\/doi.org\/10.1103\/RevModPhys.94.025008","journal-title":"Rev. Mod. Phys."},{"issue":"01","key":"5057_CR20","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1142\/S0219749908003256","volume":"06","author":"R Renner","year":"2008","unstructured":"Renner, R.: Security of quantum key distribution. Int. J. Quantum Inform. 06(01), 1\u2013127 (2008). https:\/\/doi.org\/10.1142\/S0219749908003256","journal-title":"Int. J. Quantum Inform."},{"key":"5057_CR21","doi-asserted-by":"crossref","unstructured":"Ben-Or, M., Horodecki, M., Leung, D.W., Mayers, D., Oppenheim, J.: The Universal Composable Security of Quantum Key Distribution. In: Kilian, J. (ed.) Theory of Cryptography, pp. 386\u2013406. Springer, Berlin Heidelberg, Berlin, Heidelberg (2005)","DOI":"10.1007\/978-3-540-30576-7_21"},{"key":"5057_CR22","doi-asserted-by":"publisher","unstructured":"Devetak, I., Winter, A., Devetak, i., winter, a.: distillation of secret key and entanglement from quantum states. proc. r. soc. lond. a 461, 207-235. Proceed. Royal Soc. A: Math. Phys. Eng. Sci. 461 (2003). https:\/\/doi.org\/10.1098\/rspa.2004.1372","DOI":"10.1098\/rspa.2004.1372"},{"key":"5057_CR23","doi-asserted-by":"publisher","first-page":"634","DOI":"10.1038\/ncomms1631","volume":"3","author":"M Tomamichel","year":"2012","unstructured":"Tomamichel, M., Gisin, N., Renner, R.: Tight finite-key analysis for quantum cryptography. Nat. Commun. 3, 634 (2012). https:\/\/doi.org\/10.1038\/ncomms1631","journal-title":"Nat. Commun."},{"key":"5057_CR24","doi-asserted-by":"publisher","first-page":"013022","DOI":"10.1103\/PhysRevResearch.6.013022","volume":"6","author":"MY Li","year":"2024","unstructured":"Li, M.Y., Cao, X.Y., Xie, Y.M., Yin, H.L., Chen, Z.B.: Finite-key analysis for coherent one-way quantum key distribution. Phys. Rev. Res. 6, 013022 (2024). https:\/\/doi.org\/10.1103\/PhysRevResearch.6.013022","journal-title":"Phys. Rev. Res."},{"key":"5057_CR25","unstructured":"Walenta, N., Burg, A.P., Constantin, J.H.F., Gisin, N., Guinnard, O., Houlmann, R., Lim, C.C.W., Lunghi, T., Zbinden, H.: 1 mbps coherent one-way qkd with dense wavelength division multiplexing and hardware key distillation (2012). https:\/\/infoscience.epfl.ch\/handle\/20.500.14299\/84796"},{"issue":"7","key":"5057_CR26","doi-asserted-by":"publisher","first-page":"075003","DOI":"10.1088\/1367-2630\/11\/7\/075003","volume":"11","author":"D Stucki","year":"2009","unstructured":"Stucki, D., Walenta, N., Vannel, F., Thew, R.T., Gisin, N., Zbinden, H., Gray, S., Towery, C.R., Ten, S.: High rate, long-distance quantum key distribution over 250 km of ultra low loss fibres. New J. Phys. 11(7), 075003 (2009). https:\/\/doi.org\/10.1088\/1367-2630\/11\/7\/075003","journal-title":"New J. Phys."}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-026-05057-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11128-026-05057-9","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-026-05057-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T09:55:45Z","timestamp":1774346145000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11128-026-05057-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,2,18]]},"references-count":26,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2026,3]]}},"alternative-id":["5057"],"URL":"https:\/\/doi.org\/10.1007\/s11128-026-05057-9","relation":{},"ISSN":["1573-1332"],"issn-type":[{"value":"1573-1332","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,2,18]]},"assertion":[{"value":"14 August 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 January 2026","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 February 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"78"}}