{"id":"https://openalex.org/W7118164261","doi":"https://doi.org/10.1109/access.2025.3650606","title":"Syndrome-Based Multi-Bit Error Correction With Chaotic Secure Check-Sequence Sharing for Quantum Key Distribution Systems","display_name":"Syndrome-Based Multi-Bit Error Correction With Chaotic Secure Check-Sequence Sharing for Quantum Key Distribution Systems","publication_year":2026,"publication_date":"2026-01-01","ids":{"openalex":"https://openalex.org/W7118164261","doi":"https://doi.org/10.1109/access.2025.3650606"},"language":null,"primary_location":{"id":"doi:10.1109/access.2025.3650606","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2025.3650606","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1109/access.2025.3650606","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5121937621","display_name":"R. K Mugelan","orcid":null},"institutions":[{"id":"https://openalex.org/I876193797","display_name":"Vellore Institute of Technology University","ror":"https://ror.org/00qzypv28","country_code":"IN","type":"education","lineage":["https://openalex.org/I876193797"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"R. K. Mugelan","raw_affiliation_strings":["School of Electronics Engineering (SENSE), Vellore Institute of Technology (VIT), Vellore, Tamil Nadu, India"],"affiliations":[{"raw_affiliation_string":"School of Electronics Engineering (SENSE), Vellore Institute of Technology (VIT), Vellore, Tamil Nadu, India","institution_ids":["https://openalex.org/I876193797"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5121921832","display_name":"N. G Swetha","orcid":null},"institutions":[{"id":"https://openalex.org/I876193797","display_name":"Vellore Institute of Technology University","ror":"https://ror.org/00qzypv28","country_code":"IN","type":"education","lineage":["https://openalex.org/I876193797"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"N. G. Swetha","raw_affiliation_strings":["School of Computer Science and Engineering (SCOPE), Vellore Institute of Technology (VIT), Vellore, Tamil Nadu, India"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering (SCOPE), Vellore Institute of Technology (VIT), Vellore, Tamil Nadu, India","institution_ids":["https://openalex.org/I876193797"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5121937621"],"corresponding_institution_ids":["https://openalex.org/I876193797"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":119.8796,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.99433721,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":97,"max":99},"biblio":{"volume":"14","issue":null,"first_page":"3545","last_page":"3559"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10020","display_name":"Quantum Information and Cryptography","score":0.6202999949455261,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10020","display_name":"Quantum Information and Cryptography","score":0.6202999949455261,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13748","display_name":"Advanced Statistical Modeling Techniques","score":0.07419999688863754,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10682","display_name":"Quantum Computing Algorithms and Architecture","score":0.041999999433755875,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/quantum-key-distribution","display_name":"Quantum key distribution","score":0.7688999772071838},{"id":"https://openalex.org/keywords/error-detection-and-correction","display_name":"Error detection and correction","score":0.5250999927520752},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5077000260353088},{"id":"https://openalex.org/keywords/chaotic","display_name":"Chaotic","score":0.506600022315979},{"id":"https://openalex.org/keywords/low-density-parity-check-code","display_name":"Low-density parity-check code","score":0.44920000433921814},{"id":"https://openalex.org/keywords/usable","display_name":"USable","score":0.415800005197525},{"id":"https://openalex.org/keywords/reduction","display_name":"Reduction (mathematics)","score":0.3937999904155731},{"id":"https://openalex.org/keywords/detector","display_name":"Detector","score":0.3799000084400177},{"id":"https://openalex.org/keywords/entropy","display_name":"Entropy (arrow of time)","score":0.37689998745918274},{"id":"https://openalex.org/keywords/decoding-methods","display_name":"Decoding methods","score":0.367900013923645}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7778000235557556},{"id":"https://openalex.org/C95466800","wikidata":"https://www.wikidata.org/wiki/Q1027298","display_name":"Quantum key distribution","level":3,"score":0.7688999772071838},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.5440000295639038},{"id":"https://openalex.org/C103088060","wikidata":"https://www.wikidata.org/wiki/Q1062839","display_name":"Error detection and correction","level":2,"score":0.5250999927520752},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5077000260353088},{"id":"https://openalex.org/C2777052490","wikidata":"https://www.wikidata.org/wiki/Q5072826","display_name":"Chaotic","level":2,"score":0.506600022315979},{"id":"https://openalex.org/C67692717","wikidata":"https://www.wikidata.org/wiki/Q187444","display_name":"Low-density parity-check code","level":3,"score":0.44920000433921814},{"id":"https://openalex.org/C2780615836","wikidata":"https://www.wikidata.org/wiki/Q2471869","display_name":"USable","level":2,"score":0.415800005197525},{"id":"https://openalex.org/C111335779","wikidata":"https://www.wikidata.org/wiki/Q3454686","display_name":"Reduction (mathematics)","level":2,"score":0.3937999904155731},{"id":"https://openalex.org/C94915269","wikidata":"https://www.wikidata.org/wiki/Q1834857","display_name":"Detector","level":2,"score":0.3799000084400177},{"id":"https://openalex.org/C106301342","wikidata":"https://www.wikidata.org/wiki/Q4117933","display_name":"Entropy (arrow of time)","level":2,"score":0.37689998745918274},{"id":"https://openalex.org/C57273362","wikidata":"https://www.wikidata.org/wiki/Q576722","display_name":"Decoding methods","level":2,"score":0.367900013923645},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3619000017642975},{"id":"https://openalex.org/C2777210771","wikidata":"https://www.wikidata.org/wiki/Q4927124","display_name":"Block (permutation group theory)","level":2,"score":0.3424000144004822},{"id":"https://openalex.org/C163173736","wikidata":"https://www.wikidata.org/wiki/Q3308558","display_name":"Key generation","level":3,"score":0.34130001068115234},{"id":"https://openalex.org/C60582962","wikidata":"https://www.wikidata.org/wiki/Q83886","display_name":"Viterbi algorithm","level":3,"score":0.3391999900341034},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.329800009727478},{"id":"https://openalex.org/C2778112365","wikidata":"https://www.wikidata.org/wiki/Q3511065","display_name":"Sequence (biology)","level":2,"score":0.32739999890327454},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.31859999895095825},{"id":"https://openalex.org/C48372109","wikidata":"https://www.wikidata.org/wiki/Q3913","display_name":"Binary number","level":2,"score":0.3057999908924103},{"id":"https://openalex.org/C175291020","wikidata":"https://www.wikidata.org/wiki/Q1156822","display_name":"Offset (computer science)","level":2,"score":0.304500013589859},{"id":"https://openalex.org/C58053490","wikidata":"https://www.wikidata.org/wiki/Q176555","display_name":"Quantum computer","level":3,"score":0.30309998989105225},{"id":"https://openalex.org/C40969351","wikidata":"https://www.wikidata.org/wiki/Q3516228","display_name":"Word error rate","level":2,"score":0.2994000017642975},{"id":"https://openalex.org/C12426560","wikidata":"https://www.wikidata.org/wiki/Q189569","display_name":"Basis (linear algebra)","level":2,"score":0.29330000281333923},{"id":"https://openalex.org/C125411270","wikidata":"https://www.wikidata.org/wiki/Q18653","display_name":"Encoding (memory)","level":2,"score":0.2921999990940094},{"id":"https://openalex.org/C131521367","wikidata":"https://www.wikidata.org/wiki/Q625502","display_name":"Parity bit","level":2,"score":0.2915000021457672},{"id":"https://openalex.org/C84114770","wikidata":"https://www.wikidata.org/wiki/Q46344","display_name":"Quantum","level":2,"score":0.2897999882698059},{"id":"https://openalex.org/C51003876","wikidata":"https://www.wikidata.org/wiki/Q1536431","display_name":"Quantum error correction","level":4,"score":0.2879999876022339},{"id":"https://openalex.org/C144901912","wikidata":"https://www.wikidata.org/wiki/Q471906","display_name":"Quantum cryptography","level":4,"score":0.2818000018596649},{"id":"https://openalex.org/C34146451","wikidata":"https://www.wikidata.org/wiki/Q5048094","display_name":"Cascade","level":2,"score":0.27810001373291016},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.27059999108314514},{"id":"https://openalex.org/C56296756","wikidata":"https://www.wikidata.org/wiki/Q840922","display_name":"Bit error rate","level":3,"score":0.2653999924659729},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.25540000200271606},{"id":"https://openalex.org/C193319292","wikidata":"https://www.wikidata.org/wiki/Q272172","display_name":"Hamming distance","level":2,"score":0.2526000142097473}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/access.2025.3650606","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2025.3650606","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.1109/access.2025.3650606","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2025.3650606","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.6035661697387695}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":3,"referenced_works":["https://openalex.org/W1916886752","https://openalex.org/W2012213015","https://openalex.org/W2913961225"],"related_works":[],"abstract_inverted_index":{"Error":[0],"correction":[1],"plays":[2],"a":[3,38,103,110,124,133,146,159,175,208],"central":[4],"role":[5],"in":[6,87,94,145,178],"Quantum":[7],"Key":[8],"Distribution":[9],"(QKD)":[10],"because":[11],"the":[12,117,153,164,168,204,217,221],"raw":[13],"keys":[14],"produced":[15],"by":[16],"Alice":[17],"and":[18,27,49,131,186,197,210,215],"Bob":[19],"rarely":[20],"match":[21],"exactly.":[22],"Channel":[23],"noise,":[24],"detector":[25],"fluctuations,":[26],"basis":[28],"mismatches":[29],"routinely":[30],"introduce":[31],"discrepancies":[32],"that":[33],"must":[34],"be":[35,43],"resolved":[36],"before":[37],"usable":[39],"secret":[40],"key":[41,129,190],"can":[42],"formed.":[44],"Methods":[45],"such":[46],"as":[47],"Cascade":[48],"LDPC":[50],"generally":[51],"perform":[52],"well":[53],"under":[54],"moderate":[55],"noise":[56],"conditions;":[57],"however,":[58],"they":[59],"depend":[60],"on":[61],"repeated":[62],"message":[63],"exchanges":[64],"or":[65,142],"computationally":[66,211],"intensive":[67],"decoding,":[68],"which":[69],"limits":[70],"their":[71],"effectiveness":[72],"when":[73],"several":[74],"bits":[75,196],"flip":[76],"together":[77],"within":[78],"short":[79],"time":[80],"windows.":[81],"These":[82],"issues":[83],"become":[84],"particularly":[85],"evident":[86],"high-noise":[88],"environments":[89],"where":[90],"correlated":[91],"errors":[92,144],"appear":[93],"bursts.":[95],"To":[96,149],"address":[97],"these":[98],"challenges,":[99],"this":[100],"work":[101],"presents":[102],"syndrome-based":[104],"multi-bit":[105],"error-correction":[106,218],"technique":[107,122],"combined":[108],"with":[109,167,183],"chaotic":[111],"masking":[112],"approach":[113,214],"for":[114],"securely":[115],"transmitting":[116],"necessary":[118],"check-sequence":[119,155],"data.":[120],"The":[121],"forms":[123,216],"decimal-summation":[125],"matrix":[126],"from":[127,163],"each":[128],"block":[130],"extracts":[132],"compact":[134],"syndrome":[135],"vector":[136],"capable":[137],"of":[138,192,220],"identifying":[139],"one-,":[140],"two-,":[141],"three-bit":[143],"single":[147],"step.":[148],"prevent":[150],"classical-channel":[151],"leakage,":[152],"required":[154],"is":[156],"masked":[157],"using":[158],"Tent-map":[160],"sequence":[161],"initialized":[162],"entropy":[165],"associated":[166],"unmatched":[169],"quantum":[170],"indices.":[171],"Simulation":[172],"results":[173],"demonstrate":[174],"50\u201370%":[176],"reduction":[177],"post-correction":[179],"bit-error":[180],"rate":[181],"compared":[182],"Cascade,":[184],"LDPC,":[185],"Polar":[187],"codes":[188],"across":[189],"lengths":[191],"128":[193],"to":[194,201],"1024":[195],"error":[198],"probabilities":[199],"up":[200],"0.5.":[202],"Overall,":[203],"proposed":[205],"model":[206],"offers":[207],"noise-tolerant":[209],"lightweight":[212],"reconciliation":[213],"component":[219],"patented":[222],"Q-RAPTOR":[223],"framework":[224],"(Indian":[225],"Patent":[226],"Application":[227],"No.":[228],"202541093982).":[229]},"counts_by_year":[{"year":2026,"cited_by_count":1}],"updated_date":"2026-01-11T23:08:45.486102","created_date":"2026-01-05T00:00:00"}
