{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,8]],"date-time":"2026-05-08T15:51:53Z","timestamp":1778255513384,"version":"3.51.4"},"reference-count":19,"publisher":"MDPI AG","issue":"3","license":[{"start":{"date-parts":[[2017,10,31]],"date-time":"2017-10-31T00:00:00Z","timestamp":1509408000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Cryptography"],"abstract":"<jats:p>In the description of quantum key distribution systems, much attention is paid to the operation of quantum cryptography protocols. The main problem is the insufficient study of the synchronization process of quantum key distribution systems. This paper contains a general description of quantum cryptography principles. A two-line fiber-optic quantum key distribution system with phase coding of photon states in transceiver and coding station synchronization mode was examined. A quantum key distribution system was built on the basis of the scheme with automatic compensation of polarization mode distortions. Single-photon avalanche diodes were used as optical radiation detecting devices. It was estimated how the parameters used in quantum key distribution systems of optical detectors affect the detection of the time frame with attenuated optical pulse in synchronization mode with respect to its probabilistic and time-domain characteristics. A design method was given for the process that detects the time frame that includes an optical pulse during synchronization. This paper describes the main quantum communication channel attack methods by removing a portion of optical emission. This paper describes the developed synchronization algorithm that takes into account the time required to restore the photodetector\u2019s operation state after the photon has been registered during synchronization. The computer simulation results of the developed synchronization algorithm were analyzed. The efficiency of the developed algorithm with respect to synchronization process protection from unauthorized gathering of optical emission is demonstrated herein.<\/jats:p>","DOI":"10.3390\/cryptography1030018","type":"journal-article","created":{"date-parts":[[2017,10,31]],"date-time":"2017-10-31T12:48:31Z","timestamp":1509454111000},"page":"18","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":21,"title":["Synchronization in Quantum Key Distribution Systems"],"prefix":"10.3390","volume":"1","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6713-9347","authenticated-orcid":false,"given":"Anton","family":"Pljonkin","sequence":"first","affiliation":[{"name":"Institute of computer technology and information security, Southern Federal University, Taganrog 347900, Russia"}]},{"given":"Konstantin","family":"Rumyantsev","sequence":"additional","affiliation":[{"name":"Institute of computer technology and information security, Southern Federal University, Taganrog 347900, Russia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7676-9014","authenticated-orcid":false,"given":"Pradeep","family":"Singh","sequence":"additional","affiliation":[{"name":"Department of CSE, Jaypee University of Information Technology, Himachal Pradesh 173234, India"}]}],"member":"1968","published-online":{"date-parts":[[2017,10,31]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"145","DOI":"10.1103\/RevModPhys.74.145","article-title":"Quantum cryptography","volume":"74","author":"Gisin","year":"2002","journal-title":"Rev. Mod. Phys."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1007\/BF00191318","article-title":"Experimental quantum cryptography","volume":"5","author":"Bennet","year":"1992","journal-title":"J. Cryptol."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"1484","DOI":"10.1137\/S0097539795293172","article-title":"Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer","volume":"26","author":"Shor","year":"1997","journal-title":"SIAM J. Comput."},{"key":"ref_4","unstructured":"Bennett, C.H., and Brassard, G. (1984, January 9\u201312). Quantum Cryptography: Public key distribution and coin tossing. Proceedings of the IEEE International Conference on Computer, Systems & Signal Processing, Bangalore, India."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"1301","DOI":"10.1103\/RevModPhys.81.1301","article-title":"The security of practical quantum key distribution","volume":"81","author":"Scarani","year":"2009","journal-title":"Rev. Mod. Phys."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"36756","DOI":"10.1038\/srep36756","article-title":"Two-dimensional distributed-phase-reference protocol for quantum key distribution","volume":"6","author":"Bacco","year":"2016","journal-title":"Sci. Rep."},{"key":"ref_7","unstructured":"Hentschel, M., Poppe, A., Schrenk, B., Peev, M., Querasser, E., and Lieger, R. (arXiv, 2014). A Diferential Phase Shif Scheme for Quantum Key Distribution in Passive Optical Networks, arXiv."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1088\/1367-2630\/4\/1\/341","article-title":"Quantum Key Distribution over 67 km with a plug & play system","volume":"4","author":"Stucki","year":"2002","journal-title":"New J. Phys."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"351","DOI":"10.1007\/s10623-015-0157-4","article-title":"Quantum cryptography beyond quantum key distribution","volume":"78","author":"Broadbent","year":"2016","journal-title":"Des. Codes Cryptogr."},{"key":"ref_10","unstructured":"Makarov, V. (2007). Quantum Cryptography and Quantum Cryptanalysis. [Ph.D. Thesis, Norwegian University of Science]."},{"key":"ref_11","first-page":"135","article-title":"Security of synchronization mode of quantum keys distribution system. Izvestiya SFedU","volume":"5","author":"Rumyantsev","year":"2015","journal-title":"Eng. Sci."},{"key":"ref_12","first-page":"54","article-title":"Quantum Cryptography Experimental Investigations","volume":"5","author":"Kurochkin","year":"2012","journal-title":"Photonics"},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"686","DOI":"10.1038\/nphoton.2010.214","article-title":"Hacking commercial quantum cryptography systems by tailored bright illumination","volume":"4","author":"Lydersen","year":"2010","journal-title":"Nat. Photonics"},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"250505","DOI":"10.1103\/PhysRevLett.117.250505","article-title":"Insecurity of detector-device-independent quantum key distribution","volume":"117","author":"Sajeed","year":"2016","journal-title":"Phys. Rev. Lett."},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Pljonkin, A.P., and Rumyantsev, K.Y. (2016, January 11\u201313). Single-photon Synchronization Mode of Quantum Key Distribution System. Proceedings of the International Conference on Computational Techniques in Information and Communication Technologies (ICCTICT), New Delhi, India.","DOI":"10.1109\/ICCTICT.2016.7514637"},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Rumyantsev, K.E., and Pljonkin, A.P. (2016, January 27\u201330). Preliminary Stage Synchronization Algorithm of Auto-compensation Quantum Key Distribution System with an Unauthorized Access Security. Proceedings of the International Conference on Electronics, Information, and Communications (ICEIC), Da Nang, Vietnam.","DOI":"10.1109\/ELINFOCOM.2016.7562955"},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Rumyantsev, K.E., and Pljonkin, A.P. (2015, January 16\u201317). Synchronization algorithm of quantum key distribution system with protection from unauthorized access. Proceedings of the Workshop on Recent Advances in Photonics (WRAP), Bangalore, India.","DOI":"10.1109\/WRAP.2015.7805988"},{"key":"ref_18","unstructured":"Pljonkin, A., and Rumyantsev, K. (, January 14\u201317). Quantum-cryptographic network. Proceedings of the IEEE East-West Design & Test Symposium (EWDTS), Armenia, Yerevan."},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Pljonkin, A.P. (2017, January 17\u201319). Features of the Photon Pulse Detection Algorithm in the Quantum Key Distribution System. Proceedings of the International Conference on Cryptography, Security and Privacy (ICCSP\u201917), Wuhan, China.","DOI":"10.1145\/3058060.3058078"}],"container-title":["Cryptography"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2410-387X\/1\/3\/18\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T18:48:58Z","timestamp":1760208538000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2410-387X\/1\/3\/18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,10,31]]},"references-count":19,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2017,12]]}},"alternative-id":["cryptography1030018"],"URL":"https:\/\/doi.org\/10.3390\/cryptography1030018","relation":{},"ISSN":["2410-387X"],"issn-type":[{"value":"2410-387X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,10,31]]}}}