{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T11:48:45Z","timestamp":1774352925178,"version":"3.50.1"},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T00:00:00Z","timestamp":1773360000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T00:00:00Z","timestamp":1773360000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"DOI":"10.1007\/s11128-026-05123-2","type":"journal-article","created":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T05:28:19Z","timestamp":1773379699000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Fault tolerant quantum key distribution with integrated time synchronization"],"prefix":"10.1007","volume":"25","author":[{"given":"Suresh Kumar","family":"Jha","sequence":"first","affiliation":[]},{"given":"Aditya Narayan","family":"Hati","sequence":"additional","affiliation":[]},{"given":"Siddhanta Kumar","family":"Singh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,3,13]]},"reference":[{"key":"5123_CR1","unstructured":"Imran, M., Altamimi, A.B., Khan, W., Hussain, S., Alsaffar, M., et al.: Quantum cryptography for future networks security: A systematic review. IEEE Access (2024)"},{"issue":"1","key":"5123_CR2","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1007\/s42484-019-00005-6","volume":"1","author":"Y Younes","year":"2019","unstructured":"Younes, Y., Schmitt, I.: On quantum implication. Quantum Mach. Intell. 1(1), 53\u201363 (2019)","journal-title":"Quantum Mach. Intell."},{"issue":"5","key":"5123_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3402192","volume":"53","author":"M Mehic","year":"2020","unstructured":"Mehic, M., Niemiec, M., Rass, S., Ma, J., Peev, M., Aguado, A., Martin, V., Schauer, S., Poppe, A., Pacher, C., et al.: Quantum key distribution: a networking perspective. ACM Comput. Surv. (CSUR) 53(5), 1\u201341 (2020)","journal-title":"ACM Comput. Surv. (CSUR)"},{"issue":"16","key":"5123_CR4","doi-asserted-by":"publisher","first-page":"6284","DOI":"10.3390\/s22166284","volume":"22","author":"A Adu-Kyere","year":"2022","unstructured":"Adu-Kyere, A., Nigussie, E., Isoaho, J.: Quantum key distribution: Modeling and simulation through bb84 protocol using python3. Sensors 22(16), 6284 (2022)","journal-title":"Sensors"},{"issue":"7","key":"5123_CR5","doi-asserted-by":"publisher","first-page":"602","DOI":"10.1140\/epjp\/s13360-024-05337-2","volume":"139","author":"L Mariani","year":"2024","unstructured":"Mariani, L., Salatino, L., Attanasio, C., Pagano, S., Citro, R.: Simulation of an entanglement-based quantum key distribution protocol. Eur. Phys. J. Plus 139(7), 602 (2024)","journal-title":"Eur. Phys. J. Plus"},{"issue":"3","key":"5123_CR6","doi-asserted-by":"publisher","first-page":"329","DOI":"10.1038\/s41566-024-01595-9","volume":"19","author":"FA Mele","year":"2025","unstructured":"Mele, F.A., Lami, L., Giovannetti, V.: Maximum tolerable excess noise in continuous-variable quantum key distribution and improved lower bound on two-way capacities. Nat. Photon. 19(3), 329\u2013334 (2025)","journal-title":"Nat. Photon."},{"key":"5123_CR7","doi-asserted-by":"crossref","unstructured":"Jofre, M.: Qubit rate modulation-based time synchronization mechanism for multi-node quantum networks. IEEE Trans. Quantum Eng. (2025)","DOI":"10.1109\/TQE.2025.3542484"},{"key":"5123_CR8","doi-asserted-by":"crossref","unstructured":"Oliveira, D., Giusto, E., Dri, E., Casciola, N., Baheri, B., Guan, Q., Montrucchio, B., Rech, P.: Qufi: a quantum fault injector to measure the reliability of qubits and quantum circuits. In: 2022 52nd Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN), pp. 137\u2013149 (2022). IEEE","DOI":"10.1109\/DSN53405.2022.00025"},{"issue":"2","key":"5123_CR9","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevResearch.5.023065","volume":"5","author":"M Pereira","year":"2023","unstructured":"Pereira, M., Curr\u00e1s-Lorenzo, G., Navarrete, \u00c1., Mizutani, A., Kato, G., Curty, M., Tamaki, K.: Modified bb84 quantum key distribution protocol robust to source imperfections. Phys. Rev. Res. 5(2), 023065 (2023)","journal-title":"Phys. Rev. Res."},{"issue":"7","key":"5123_CR10","doi-asserted-by":"publisher","first-page":"602","DOI":"10.1140\/epjp\/s13360-024-05337-2","volume":"139","author":"L Mariani","year":"2024","unstructured":"Mariani, L., Salatino, L., Attanasio, C., Pagano, S., Citro, R.: Simulation of an entanglement-based quantum key distribution protocol. Eur. Phys. J. Plus 139(7), 602 (2024)","journal-title":"Eur. Phys. J. Plus"},{"issue":"1","key":"5123_CR11","first-page":"93","volume":"1","author":"Z-Q Yin","year":"2021","unstructured":"Yin, Z.-Q., Lu, F.-Y., Teng, J., Wang, S., Chen, W., Guo, G.-C., Han, Z.-F.: Twin-field protocols: Towards intercity quantum key distribution without quantum repeaters. Fund. Res. 1(1), 93\u201395 (2021)","journal-title":"Fund. Res."},{"issue":"1","key":"5123_CR12","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1038\/s41534-025-00963-9","volume":"11","author":"Q Peng","year":"2025","unstructured":"Peng, Q., Chen, J.-P., Xing, T., Wang, D., Wang, Y., Liu, Y., Huang, A.: Practical security of twin-field quantum key distribution with optical phase-locked loop under wavelength-switching attack. npj Quantum Inf. 11(1), 7 (2025)","journal-title":"npj Quantum Inf."},{"key":"5123_CR13","doi-asserted-by":"publisher","first-page":"45375","DOI":"10.1109\/ACCESS.2022.3169499","volume":"10","author":"LM Marrero","year":"2022","unstructured":"Marrero, L.M., Merlano-Duncan, J.C., Querol, J., Kumar, S., Krivochiza, J., Sharma, S.K., Chatzinotas, S., Camps, A., Ottersten, B.: Architectures and synchronization techniques for distributed satellite systems: A survey. IEEE access 10, 45375\u201345409 (2022)","journal-title":"IEEE access"},{"issue":"4","key":"5123_CR14","doi-asserted-by":"publisher","first-page":"6076","DOI":"10.1364\/OE.477156","volume":"31","author":"A Lee","year":"2023","unstructured":"Lee, A., Castillo, A.T., Whitehill, C., Donaldson, R.: Quantum bit error rate timing jitter dependency on multi-mode fibers. Opt. Exp. 31(4), 6076\u20136087 (2023)","journal-title":"Opt. Exp."},{"issue":"4","key":"5123_CR15","doi-asserted-by":"publisher","first-page":"1566","DOI":"10.1109\/TCST.2018.2828380","volume":"27","author":"M Chen","year":"2018","unstructured":"Chen, M., Bansal, S., Fisac, J.F., Tomlin, C.J.: Robust sequential trajectory planning under disturbances and adversarial intruder. IEEE Trans. Control Syst. Technol. 27(4), 1566\u20131582 (2018)","journal-title":"IEEE Trans. Control Syst. Technol."},{"issue":"2","key":"5123_CR16","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1007\/s10626-019-00283-z","volume":"29","author":"MV Moreira","year":"2019","unstructured":"Moreira, M.V., Lesage, J.-J.: Discrete event system identification with the aim of fault detection. Discrete Event Dyn. Syst. 29(2), 191\u2013209 (2019)","journal-title":"Discrete Event Dyn. Syst."},{"issue":"21","key":"5123_CR17","doi-asserted-by":"publisher","first-page":"1551","DOI":"10.1049\/el:20031015","volume":"39","author":"Y Tsividis","year":"2003","unstructured":"Tsividis, Y.: Continuous-time digital signal processing. Electron. Lett. 39(21), 1551\u20131552 (2003)","journal-title":"Electron. Lett."},{"issue":"4","key":"5123_CR18","doi-asserted-by":"crossref","first-page":"1444","DOI":"10.1109\/TSP.2008.2011834","volume":"57","author":"X Li","year":"2008","unstructured":"Li, X., Wu, Y.-C., Serpedin, E.: Timing synchronization in decode-and-forward cooperative communication systems. IEEE Trans. Signal Process. 57(4), 1444\u20131455 (2008)","journal-title":"IEEE Trans. Signal Process."},{"issue":"22","key":"5123_CR19","doi-asserted-by":"publisher","first-page":"4675","DOI":"10.1364\/OL.37.004675","volume":"37","author":"GC Valley","year":"2012","unstructured":"Valley, G.C., Sefler, G.A., Shaw, T.J.: Compressive sensing of sparse radio frequency signals using optical mixing. Opt. Lett. 37(22), 4675\u20134677 (2012)","journal-title":"Opt. Lett."},{"issue":"12","key":"5123_CR20","doi-asserted-by":"publisher","first-page":"696","DOI":"10.1038\/nphoton.2009.230","volume":"3","author":"RH Hadfield","year":"2009","unstructured":"Hadfield, R.H.: Single-photon detectors for optical quantum information applications. Nat. Photon. 3(12), 696\u2013705 (2009)","journal-title":"Nat. Photon."},{"issue":"9","key":"5123_CR21","doi-asserted-by":"publisher","first-page":"2673","DOI":"10.1515\/nanoph-2020-0186","volume":"9","author":"L You","year":"2020","unstructured":"You, L.: Superconducting nanowire single-photon detectors for quantum information. Nanophotonics 9(9), 2673\u20132692 (2020)","journal-title":"Nanophotonics"},{"issue":"17","key":"5123_CR22","doi-asserted-by":"publisher","first-page":"16874","DOI":"10.1109\/JSEN.2022.3193111","volume":"22","author":"S Riccardo","year":"2022","unstructured":"Riccardo, S., Conca, E., Sesta, V., Velten, A., Tosi, A.: Fast-gated 16$$\\times $$ 16 spad array with 16 on-chip 6 ps time-to-digital converters for non-line-of-sight imaging. IEEE Sens. J. 22(17), 16874\u201316885 (2022)","journal-title":"IEEE Sens. J."},{"issue":"2","key":"5123_CR23","doi-asserted-by":"publisher","first-page":"1608","DOI":"10.1364\/OE.20.001608","volume":"20","author":"MK Akhlaghi","year":"2012","unstructured":"Akhlaghi, M.K., Majedi, A.H.: Gated mode superconducting nanowire single photon detectors. Opt. Express 20(2), 1608\u20131616 (2012)","journal-title":"Opt. Express"},{"issue":"5","key":"5123_CR24","doi-asserted-by":"publisher","first-page":"409","DOI":"10.1007\/s42979-021-00796-1","volume":"2","author":"SK Jha","year":"2021","unstructured":"Jha, S.K., Gupta, A., Panigrahi, N.: Security threat analysis and countermeasures on consensus-based time synchronization algorithms for wireless sensor network. SN Comput. Sci. 2(5), 409 (2021)","journal-title":"SN Comput. Sci."},{"issue":"9","key":"5123_CR25","first-page":"747","volume":"7","author":"V Eze","year":"2016","unstructured":"Eze, V., Eze, M.C., Chidiebere, C.S., Ibokette, B.O., Ani, M., Anike, U.P.: Review of the effects of standard deviation on time and frequency response of gaussian filter. Int. J. Sci. & Eng. Res. 7(9), 747\u2013751 (2016)","journal-title":"Int. J. Sci. & Eng. Res."},{"issue":"1","key":"5123_CR26","doi-asserted-by":"publisher","first-page":"164","DOI":"10.1038\/s42005-021-00647-8","volume":"4","author":"T Coopmans","year":"2021","unstructured":"Coopmans, T., Knegjens, R., Dahlberg, A., Maier, D., Nijsten, L., Oliveira Filho, J., Papendrecht, M., Rabbie, J., Rozp\u0119dek, F., Skrzypczyk, M., et al.: Netsquid, a network simulator for quantum information using discrete events. Commun. Phys. 4(1), 164 (2021)","journal-title":"Commun. Phys."},{"issue":"8","key":"5123_CR27","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-020-2886-x","volume":"63","author":"G-J Fan-Yuan","year":"2020","unstructured":"Fan-Yuan, G.-J., Chen, W., Lu, F.-Y., Yin, Z.-Q., Wang, S., Guo, G.-C., Han, Z.-F.: A universal simulating framework for quantum key distribution systems. Sci. China Inf. Sci. 63(8), 180504 (2020)","journal-title":"Sci. China Inf. Sci."},{"key":"5123_CR28","doi-asserted-by":"crossref","unstructured":"Singh, P.N., Navaneetha, M.: Exploring quantum circuits, quantum cryptography and post quantum-computing using qiskit in python. In: International Conference on Computational Complexity and Intelligent Algorithms, pp. 329\u2013339 (2025). Springer","DOI":"10.1007\/978-981-96-7473-2_23"}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-026-05123-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11128-026-05123-2","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-026-05123-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T09:55:46Z","timestamp":1774346146000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11128-026-05123-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,3,13]]},"references-count":28,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2026,3]]}},"alternative-id":["5123"],"URL":"https:\/\/doi.org\/10.1007\/s11128-026-05123-2","relation":{},"ISSN":["1573-1332"],"issn-type":[{"value":"1573-1332","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,3,13]]},"assertion":[{"value":"30 October 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 February 2026","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 March 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest or Competing interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"All authors have given their consent for publication of this work.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}}],"article-number":"100"}}