{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T14:59:33Z","timestamp":1773154773932,"version":"3.50.1"},"reference-count":68,"publisher":"MDPI AG","issue":"3","license":[{"start":{"date-parts":[[2023,8,2]],"date-time":"2023-08-02T00:00:00Z","timestamp":1690934400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Cryptography"],"abstract":"<jats:p>With the rise of quantum technologies, data security increasingly relies on quantum cryptography and its most notable application, quantum key distribution (QKD). Yet, current technological limitations, in particular, the unavailability of quantum repeaters, cause relatively low key distribution rates in practical QKD implementations. Here, we demonstrate a remarkable improvement in the QKD performance using end-to-end line tomography for the wide class of relevant protocols. Our approach is based on the real-time detection of interventions in the transmission channel, enabling an adaptive response that modifies the QKD setup and post-processing parameters, leading, thereby, to a substantial increase in the key distribution rates. Our findings provide everlastingly secure efficient quantum cryptography deployment potentially overcoming the repeaterless rate-distance limit.<\/jats:p>","DOI":"10.3390\/cryptography7030038","type":"journal-article","created":{"date-parts":[[2023,8,2]],"date-time":"2023-08-02T10:57:33Z","timestamp":1690973853000},"page":"38","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":18,"title":["Boosting Quantum Key Distribution via the End-to-End Loss Control"],"prefix":"10.3390","volume":"7","author":[{"ORCID":"https:\/\/orcid.org\/0009-0005-9112-2891","authenticated-orcid":false,"given":"Aleksei D.","family":"Kodukhov","sequence":"first","affiliation":[{"name":"Terra Quantum AG, Kornhausstrasse 25, 9000 St. Gallen, Switzerland"}]},{"given":"Valeria A.","family":"Pastushenko","sequence":"additional","affiliation":[{"name":"Terra Quantum AG, Kornhausstrasse 25, 9000 St. Gallen, Switzerland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4126-5481","authenticated-orcid":false,"given":"Nikita S.","family":"Kirsanov","sequence":"additional","affiliation":[{"name":"Terra Quantum AG, Kornhausstrasse 25, 9000 St. Gallen, Switzerland"}]},{"given":"Dmitry A.","family":"Kronberg","sequence":"additional","affiliation":[{"name":"Terra Quantum AG, Kornhausstrasse 25, 9000 St. Gallen, Switzerland"}]},{"given":"Markus","family":"Pflitsch","sequence":"additional","affiliation":[{"name":"Terra Quantum AG, Kornhausstrasse 25, 9000 St. Gallen, Switzerland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0977-3515","authenticated-orcid":false,"given":"Valerii M.","family":"Vinokur","sequence":"additional","affiliation":[{"name":"Terra Quantum AG, Kornhausstrasse 25, 9000 St. Gallen, Switzerland"}]}],"member":"1968","published-online":{"date-parts":[[2023,8,2]]},"reference":[{"key":"ref_1","first-page":"175","article-title":"Quantum cryptography: Public key distribution and coin tossing","volume":"560","author":"Bennett","year":"1984","journal-title":"Theor. Comput. Sci."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"057901","DOI":"10.1103\/PhysRevLett.91.057901","article-title":"Quantum key distribution with high loss: Toward global secure communication","volume":"91","author":"Hwang","year":"2003","journal-title":"Phys. Rev. Lett."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"230504","DOI":"10.1103\/PhysRevLett.94.230504","article-title":"Decoy state quantum key distribution","volume":"94","author":"Lo","year":"2005","journal-title":"Phys. Rev. Lett."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"012326","DOI":"10.1103\/PhysRevA.72.012326","article-title":"Practical decoy state for quantum key distribution","volume":"72","author":"Ma","year":"2005","journal-title":"Phys. Rev. A"},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"88","DOI":"10.3367\/UFNe.2020.11.038882","article-title":"Sectionrity of the decoy state method for quantum key distribution","volume":"64","author":"Trushechkin","year":"2021","journal-title":"Physics-Uspekhi"},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"194108","DOI":"10.1063\/1.2126792","article-title":"Fast and simple one-way quantum key distribution","volume":"87","author":"Stucki","year":"2005","journal-title":"Appl. Phys. Lett."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"075003","DOI":"10.1088\/1367-2630\/11\/7\/075003","article-title":"High rate, long-distance quantum key distribution over 250 km of ultra low loss fibres","volume":"11","author":"Stucki","year":"2009","journal-title":"New J. Phys."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"163","DOI":"10.1038\/nphoton.2014.327","article-title":"Provably secure and practical quantum key distribution over 307 km of optical fibre","volume":"9","author":"Korzh","year":"2015","journal-title":"Nat. Photon."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"15043","DOI":"10.1038\/ncomms15043","article-title":"Fundamental limits of repeaterless quantum communications","volume":"8","author":"Pirandola","year":"2017","journal-title":"Nat. Commun."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"8756","DOI":"10.1038\/s41598-023-35579-6","article-title":"Forty Thousand Kilometers Under Quantum Protection","volume":"13","author":"Kirsanov","year":"2023","journal-title":"Sci. Rep."},{"key":"ref_11","first-page":"3","article-title":"Bounds for the Quantity of Information Transmitted by a Quantum Communication Channel","volume":"9","author":"Holevo","year":"1973","journal-title":"Probl. Peredachi Informatsii"},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"32815","DOI":"10.1038\/srep32815","article-title":"H-theorem in quantum physics","volume":"6","author":"Lesovik","year":"2016","journal-title":"Sci. Rep."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"4396","DOI":"10.1038\/s41598-019-40765-6","article-title":"Arrow of time and its reversal on the IBM quantum computer","volume":"9","author":"Lesovik","year":"2019","journal-title":"Sci. Rep."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1007\/s10946-018-9698-0","article-title":"Entropy dynamics in the system of interacting qubits","volume":"39","author":"Kirsanov","year":"2018","journal-title":"J. Rus. Laser Res."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"020026","DOI":"10.1063\/1.5025464","article-title":"H-theorem and Maxwell demon in quantum physics","volume":"1936","author":"Kirsanov","year":"2018","journal-title":"AIP Conf. Proc."},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Smirnov, A., Yarovikov, M., Zhdanova, E., Gutor, A., and Vyatkin, M. (2023). An Optical-Fiber-Based Key for Remote Authentication of Users and Optical Fiber Lines. Sensors, 23.","DOI":"10.21203\/rs.3.rs-2385586\/v1"},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"3195","DOI":"10.1103\/PhysRevA.55.3195","article-title":"Optical coherence: A convenient fiction","volume":"55","year":"1997","journal-title":"Phys. Rev. A"},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"052304","DOI":"10.1103\/PhysRevA.61.052304","article-title":"Sectionrity against individual attacks for realistic quantum key distribution","volume":"61","year":"2000","journal-title":"Phys. Rev. A"},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"027902","DOI":"10.1103\/PhysRevLett.88.027902","article-title":"Quantum state of an ideal propagating laser field","volume":"88","author":"Fuchs","year":"2001","journal-title":"Phys. Rev. Lett."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"044106","DOI":"10.1063\/1.2432296","article-title":"Experimental quantum key distribution with active phase randomization","volume":"90","author":"Zhao","year":"2007","journal-title":"Appl. Phys. Lett."},{"key":"ref_21","unstructured":"Chaiwongkhot, P., Hosseini, S., Ahmadi, A., Higgins, B.L., Dalacu, D., Poole, P.J., Williams, R.L., Reimer, M.E., and Jennewein, T. (2020). Enhancing secure key rates of satellite QKD using a quantum dot single-photon source. arXiv."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/JQE.2021.3111332","article-title":"Experimental side channel analysis of BB84 QKD source","volume":"57","author":"Biswas","year":"2021","journal-title":"IEEE J. Quantum Electron."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"023065","DOI":"10.1103\/PhysRevResearch.5.023065","article-title":"Modified BB84 quantum key distribution protocol robust to source imperfections","volume":"5","author":"Pereira","year":"2023","journal-title":"Phys. Rev. Res."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"4238","DOI":"10.1103\/PhysRevA.59.4238","article-title":"Incoherent and coherent eavesdropping in the six-state protocol of quantum cryptography","volume":"59","author":"Gisin","year":"1999","journal-title":"Phys. Rev. A"},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"24550","DOI":"10.1364\/OE.21.024550","article-title":"Efficient decoy-state quantum key distribution with quantified security","volume":"21","author":"Lucamarini","year":"2013","journal-title":"Opt. Express"},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"3427","DOI":"10.1109\/JLT.2018.2843136","article-title":"10-Mb\/s quantum key distribution","volume":"36","author":"Yuan","year":"2018","journal-title":"J. Light. Technol."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"057901","DOI":"10.1103\/PhysRevLett.92.057901","article-title":"Quantum cryptography protocols robust against photon number splitting attacks for weak laser pulse implementations","volume":"92","author":"Scarani","year":"2004","journal-title":"Phys. Rev. Lett."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"1330","DOI":"10.1103\/PhysRevLett.85.1330","article-title":"Limitations on Practical Quantum Cryptography","volume":"85","author":"Brassard","year":"2000","journal-title":"Phys. Rev. Lett."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"012309","DOI":"10.1103\/PhysRevA.69.012309","article-title":"Coherent-pulse implementations of quantum cryptography protocols resistant to photon-number-splitting attacks","volume":"69","author":"Gisin","year":"2004","journal-title":"Phys. Rev. A"},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"4901","DOI":"10.1109\/JLT.2023.3246175","article-title":"Performance analysis on co-existence of COW-QKD and classical DWDM channels transmission in UK national quantum networks","volume":"41","author":"Duan","year":"2023","journal-title":"J. Light. Technol."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"022317","DOI":"10.1103\/PhysRevA.68.022317","article-title":"Differential-phase-shift quantum key distribution using coherent light","volume":"68","author":"Inoue","year":"2003","journal-title":"Phys. Rev. A"},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"343","DOI":"10.1038\/nphoton.2007.75","article-title":"Quantum key distribution over a 40-dB channel loss using superconducting single-photon detectors","volume":"1","author":"Takesue","year":"2007","journal-title":"Nat. Photon."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"032341","DOI":"10.1103\/PhysRevA.77.032341","article-title":"Unconditionally secure quantum key distribution with relatively strong signal pulse","volume":"77","author":"Tamaki","year":"2008","journal-title":"Phys. Rev. A"},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"032302","DOI":"10.1103\/PhysRevA.80.032302","article-title":"Unconditional security of the Bennett 1992 quantum-key-distribution scheme with a strong reference pulse","volume":"80","author":"Tamaki","year":"2009","journal-title":"Phys. Rev. A"},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"11292","DOI":"10.1364\/OE.26.011292","article-title":"Sectionrity of subcarrier wave quantum key distribution against the collective beam-splitting attack","volume":"26","author":"Miroshnichenko","year":"2018","journal-title":"Opt. Express"},{"key":"ref_36","first-page":"320","article-title":"Quantum key distribution with unconditional security for all optical fiber network","volume":"Volume 5161","author":"Hirota","year":"2004","journal-title":"Quantum Communications and Quantum Imaging, Proceedings of the Optical Science and Technology, SPIE\u2019s 48th Annual Meeting, San Diego, CA, USA, 3\u20138 August 2003"},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"062333","DOI":"10.1103\/PhysRevA.71.062333","article-title":"Information theory for key distribution systems secured by mesoscopic coherent states","volume":"71","author":"Barbosa","year":"2005","journal-title":"Phys. Rev. A"},{"key":"ref_38","first-page":"639","article-title":"Zero-error attacks and detection statistics in the coherent one-way protocol for quantum cryptography","volume":"7","author":"Branciard","year":"2007","journal-title":"Quantum Inf. Comput."},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"163","DOI":"10.1070\/QEL16240","article-title":"Analysis of coherent quantum cryptography protocol vulnerability to an active beam-splitting attack","volume":"47","author":"Kronberg","year":"2017","journal-title":"Quantum Electron."},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"032334","DOI":"10.1103\/PhysRevA.101.032334","article-title":"Quantum soft filtering for the improved security analysis of the coherent one-way quantum-key-distribution protocol","volume":"101","author":"Kronberg","year":"2020","journal-title":"Phys. Rev. A"},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"441","DOI":"10.1103\/PhysRevLett.85.441","article-title":"Simple Proof of Sectionrity of the BB84 Quantum Key Distribution Protocol","volume":"85","author":"Shor","year":"2000","journal-title":"Phys. Rev. Lett."},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1142\/S0219749908003256","article-title":"Sectionrity of quantum key distribution","volume":"6","author":"Renner","year":"2008","journal-title":"Int. J. Quantum Inf."},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"012332","DOI":"10.1103\/PhysRevA.72.012332","article-title":"Information-theoretic security proof for quantum-key-distribution protocols","volume":"72","author":"Renner","year":"2005","journal-title":"Phys. Rev. A"},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"010504","DOI":"10.1103\/PhysRevLett.98.010504","article-title":"Experimental Demonstration of Free-Space Decoy-State Quantum Key Distribution over 144 km","volume":"98","author":"Weier","year":"2007","journal-title":"Phys. Rev. Lett."},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"032320","DOI":"10.1103\/PhysRevA.90.032320","article-title":"Evaluation of the phase randomness of a light source in quantum-key-distribution systems with an attenuated laser","volume":"90","author":"Kobayashi","year":"2014","journal-title":"Phys. Rev. A"},{"key":"ref_46","doi-asserted-by":"crossref","first-page":"190502","DOI":"10.1103\/PhysRevLett.121.190502","article-title":"Sectionre quantum key distribution over 421 km of optical fiber","volume":"121","author":"Boaron","year":"2018","journal-title":"Phys. Rev. Lett."},{"key":"ref_47","first-page":"207","article-title":"Distillation of secret key and entanglement from quantum states","volume":"461","author":"Devetak","year":"2005","journal-title":"Proc. R. Soc. Lond. A"},{"key":"ref_48","doi-asserted-by":"crossref","first-page":"400","DOI":"10.1038\/s41586-018-0066-6","article-title":"Overcoming the rate\u2013distance limit of quantum key distribution without quantum repeaters","volume":"557","author":"Lucamarini","year":"2018","journal-title":"Nature"},{"key":"ref_49","doi-asserted-by":"crossref","first-page":"530","DOI":"10.1038\/s41566-021-00811-0","article-title":"600-km repeater-like quantum communications with dual-band stabilization","volume":"15","author":"Pittaluga","year":"2021","journal-title":"Nat. Photon."},{"key":"ref_50","doi-asserted-by":"crossref","first-page":"154","DOI":"10.1038\/s41566-021-00928-2","article-title":"Twin-field quantum key distribution over 830-km fibre","volume":"16","author":"Wang","year":"2022","journal-title":"Nat. Photon."},{"key":"ref_51","doi-asserted-by":"crossref","first-page":"042603","DOI":"10.1103\/PhysRevA.107.042603","article-title":"Scalable high-rate twin-field quantum key distribution networks without constraint of probability and intensity","volume":"107","author":"Xie","year":"2023","journal-title":"Phys. Rev. A"},{"key":"ref_52","first-page":"031043","article-title":"Phase-matching quantum key distribution","volume":"8","author":"Ma","year":"2018","journal-title":"Phys. Rev. X"},{"key":"ref_53","doi-asserted-by":"crossref","first-page":"042332","DOI":"10.1103\/PhysRevA.98.042332","article-title":"Simple security analysis of phase-matching measurement-device-independent quantum key distribution","volume":"98","author":"Lin","year":"2018","journal-title":"Phys. Rev. A"},{"key":"ref_54","doi-asserted-by":"crossref","first-page":"022306","DOI":"10.1103\/PhysRevA.100.022306","article-title":"Improving the performance of twin-field quantum key distribution","volume":"100","author":"Lu","year":"2019","journal-title":"Phys. Rev. A"},{"key":"ref_55","doi-asserted-by":"crossref","first-page":"64","DOI":"10.1038\/s41534-019-0175-6","article-title":"Simple security proof of twin-field type quantum key distribution protocol","volume":"5","author":"Curty","year":"2019","journal-title":"Npj Quantum Inf."},{"key":"ref_56","doi-asserted-by":"crossref","first-page":"2167","DOI":"10.1016\/j.scib.2022.10.010","article-title":"Experimental measurement-device-independent type quantum key distribution with flawed and correlated sources","volume":"67","author":"Gu","year":"2022","journal-title":"Sci. Bull."},{"key":"ref_57","doi-asserted-by":"crossref","first-page":"1895","DOI":"10.2514\/1.J062267","article-title":"Quantum advantage in cryptography","volume":"61","author":"Renner","year":"2023","journal-title":"AIAA J."},{"key":"ref_58","doi-asserted-by":"crossref","first-page":"130503","DOI":"10.1103\/PhysRevLett.108.130503","article-title":"Measurement-device-independent quantum key distribution","volume":"108","author":"Lo","year":"2012","journal-title":"Phys. Rev. Lett."},{"key":"ref_59","doi-asserted-by":"crossref","first-page":"130502","DOI":"10.1103\/PhysRevLett.108.130502","article-title":"Side-channel-free quantum key distribution","volume":"108","author":"Braunstein","year":"2012","journal-title":"Phys. Rev. Lett."},{"key":"ref_60","doi-asserted-by":"crossref","first-page":"020315","DOI":"10.1103\/PRXQuantum.3.020315","article-title":"Breaking the rate-loss bound of quantum key distribution with asynchronous two-photon interference","volume":"3","author":"Xie","year":"2022","journal-title":"PRX Quantum"},{"key":"ref_61","doi-asserted-by":"crossref","first-page":"3903","DOI":"10.1038\/s41467-022-31534-7","article-title":"Mode-pairing quantum key distribution","volume":"13","author":"Zeng","year":"2022","journal-title":"Nat. Commun."},{"key":"ref_62","doi-asserted-by":"crossref","first-page":"054070","DOI":"10.1103\/PhysRevApplied.19.054070","article-title":"Advantages of Asynchronous Measurement-Device-Independent Quantum Key Distribution in Intercity Networks","volume":"19","author":"Xie","year":"2023","journal-title":"Phys. Rev. Appl."},{"key":"ref_63","doi-asserted-by":"crossref","first-page":"3045","DOI":"10.1038\/s41598-019-39454-1","article-title":"Measurement-device-independent twin-field quantum key distribution","volume":"9","author":"Yin","year":"2019","journal-title":"Sci. Rep."},{"key":"ref_64","doi-asserted-by":"crossref","first-page":"025008","DOI":"10.1103\/RevModPhys.94.025008","article-title":"Sectionrity in quantum cryptography","volume":"94","author":"Portmann","year":"2022","journal-title":"Rev. Mod. Phys."},{"key":"ref_65","doi-asserted-by":"crossref","unstructured":"Unruh, D. (2013, January 18\u201322). Everlasting multi-party computation. Proceedings of the Advances in Cryptology\u2014CRYPTO 2013: 33rd Annual Cryptology Conference, Santa Barbara, CA, USA. Proceedings, Part II.","DOI":"10.1007\/978-3-642-40084-1_22"},{"key":"ref_66","unstructured":"Stebila, D., Mosca, M., and L\u00fctkenhaus, N. (2009, January 26\u201330). The case for quantum key distribution. Proceedings of the Quantum Communication and Quantum Networking: First International Conference, QuantumComm 2009, Naples, Italy. Revised Selected Papers 1."},{"key":"ref_67","unstructured":"All\u00e9aume, R., L\u00fctkenhaus, N., Renner, R., Grangier, P., Debuisschert, T., Ribordy, G., Gisin, N., Painchault, P., Pornin, T., and Slavail, L. (2010). Dagstuhl Seminar Proceedings, Schloss Dagstuhl-Leibniz-Zentrum f\u00fcr Informatik."},{"key":"ref_68","doi-asserted-by":"crossref","unstructured":"Pastushenko, V.A., and Kronberg, D.A. (2023). Improving the Performance of Quantum Cryptography by Using the Encryption of the Error Correction Data. Entropy, 25.","DOI":"10.3390\/e25060956"}],"container-title":["Cryptography"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2410-387X\/7\/3\/38\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T20:24:20Z","timestamp":1760127860000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2410-387X\/7\/3\/38"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8,2]]},"references-count":68,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2023,9]]}},"alternative-id":["cryptography7030038"],"URL":"https:\/\/doi.org\/10.3390\/cryptography7030038","relation":{},"ISSN":["2410-387X"],"issn-type":[{"value":"2410-387X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,8,2]]}}}