{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T18:12:10Z","timestamp":1742926330154,"version":"3.40.3"},"publisher-location":"Cham","reference-count":33,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030354220"},{"type":"electronic","value":"9783030354237"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-35423-7_24","type":"book-chapter","created":{"date-parts":[[2019,12,9]],"date-time":"2019-12-09T00:02:46Z","timestamp":1575849766000},"page":"472-491","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Generalized Approach for Analysing Quantum Key Distribution Experiments"],"prefix":"10.1007","author":[{"given":"Arpita","family":"Maitra","sequence":"first","affiliation":[]},{"given":"Suvra Sekhar","family":"Das","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,11,19]]},"reference":[{"key":"24_CR1","doi-asserted-by":"publisher","first-page":"032121","DOI":"10.1103\/PhysRevA.85.032121","volume":"85","author":"R Auccaise","year":"2012","unstructured":"Auccaise, R., et al.: Experimental analysis of the quantum complementarity principle. Phys. Rev. A 85, 032121 (2012)","journal-title":"Phys. Rev. A"},{"key":"24_CR2","unstructured":"Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. In: Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, vol. 175, issue 8 (1984)"},{"key":"24_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"250","DOI":"10.1007\/978-3-642-40349-1_15","volume-title":"Cryptographic Hardware and Embedded Systems - CHES 2013","author":"DJ Bernstein","year":"2013","unstructured":"Bernstein, D.J., Chou, T., Schwabe, P.: McBits: fast constant-time code-based cryptography. In: Bertoni, G., Coron, J.-S. (eds.) CHES 2013. LNCS, vol. 8086, pp. 250\u2013272. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-40349-1_15"},{"key":"24_CR4","doi-asserted-by":"crossref","unstructured":"Brakerski, Z., Langlois, A., Peikert, C., Regev, O., Stehl\u00e9, D.: Classical hardness of learning with errors. In: Proceedings of the Forty-fifth Annual ACM Symposium on Theory of Computing, STOC 2013, pp. 575\u2013584. ACM, New York (2013)","DOI":"10.1145\/2488608.2488680"},{"key":"24_CR5","unstructured":"Bra\u0144czyk, A.M.: Hong-Ou-Mandel Interference (2017). arXiv:1711.00080v1"},{"key":"24_CR6","doi-asserted-by":"publisher","first-page":"130502","DOI":"10.1103\/PhysRevLett.108.130502","volume":"108","author":"SL Braunstein","year":"2012","unstructured":"Braunstein, S.L., Pirandola, S.: Side-channel-free quantum key distribution. Phys. Rev. Lett. 108, 130502 (2012)","journal-title":"Phys. Rev. Lett."},{"key":"24_CR7","doi-asserted-by":"crossref","unstructured":"Curty, M., Ma, X., Lo, H.-K., L\u00fctkenhaus, N.: Passive preparation of BB84 signal states with coherent light. Prog. Inf. (8), 57\u201363 (2011)","DOI":"10.2201\/NiiPi.2011.8.7"},{"issue":"6","key":"24_CR8","doi-asserted-by":"publisher","first-page":"271272","DOI":"10.1016\/0375-9601(82)90084-6","volume":"92","author":"D Dieks","year":"1982","unstructured":"Dieks, D.: Communication by EPR devices. Phys. Lett. A 92(6), 271272 (1982)","journal-title":"Phys. Lett. A"},{"issue":"6","key":"24_CR9","doi-asserted-by":"publisher","first-page":"661","DOI":"10.1103\/PhysRevLett.67.661","volume":"67","author":"AK Ekert","year":"1991","unstructured":"Ekert, A.K.: Quantum cryptography based on Bell\u2019s theorem. Phys. Rev. Lett. 67(6), 661 (1991)","journal-title":"Phys. Rev. Lett."},{"key":"24_CR10","doi-asserted-by":"publisher","first-page":"230406","DOI":"10.1103\/PhysRevLett.107.230406","volume":"107","author":"R Ionicioiu","year":"2011","unstructured":"Ionicioiu, R., Terno, D.R.: Proposal for a quantum delayed-choice experiment. Phys. Rev. Lett. 107, 230406 (2011)","journal-title":"Phys. Rev. Lett."},{"key":"24_CR11","doi-asserted-by":"crossref","unstructured":"Jennewein, T., Weihs, G., Zeilinger, A.: Photon statistics and quantum teleportation experiments. J. Phys. Soc. Jpn. 72, 168\u2013173 (2003). Proceedings Waseda International Symposium on Fundamental Physics-New Perspectives in Quantum Physics","DOI":"10.1143\/JPSJS.72SC.168"},{"key":"24_CR12","doi-asserted-by":"publisher","first-page":"637640","DOI":"10.1126\/science.1226755","volume":"338","author":"F Kaiser","year":"2012","unstructured":"Kaiser, F., Coudreau, T., Milman, P., Ostrowsky, D.B., Tanzilli, S.: Entanglement-enabled delayed choice experiment. Science 338, 637640 (2012)","journal-title":"Science"},{"key":"24_CR13","first-page":"1","volume":"16","author":"P Ku\u0109ra","year":"2007","unstructured":"Ku\u0109ra, P.: Quantum description of optical devices used in interferometry. Radioengineering 16, 1\u20136 (2007)","journal-title":"Radioengineering"},{"key":"24_CR14","doi-asserted-by":"publisher","first-page":"130503","DOI":"10.1103\/PhysRevLett.108.130503","volume":"108","author":"HK Lo","year":"2012","unstructured":"Lo, H.K., Curty, M., Qi, B.: Measurement-device-independent quantum key distribution. Phys. Rev. Lett. 108, 130503 (2012)","journal-title":"Phys. Rev. Lett."},{"key":"24_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1007\/978-3-642-20465-4_2","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2011","author":"PQ Nguyen","year":"2011","unstructured":"Nguyen, P.Q.: Lattice reduction algorithms: theory and practice. In: Paterson, K.G. (ed.) EUROCRYPT 2011. LNCS, vol. 6632, pp. 2\u20136. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-20465-4_2"},{"key":"24_CR16","doi-asserted-by":"publisher","unstructured":"Overbeck, R., Sendrier, N.: Code-based cryptography. In: Bernstein, D.J., Buchmann, J., Dahmen, E. (eds.) Post-Quantum Cryptography, pp. 95\u2013145. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-540-88702-7_4","DOI":"10.1007\/978-3-540-88702-7_4"},{"key":"24_CR17","doi-asserted-by":"crossref","unstructured":"Peikert, C.: Public-key cryptosystems from the worst-case shortest vector problem: extended abstract. In: Proceedings of the Forty-first Annual ACM Symposium on Theory of Computing, STOC 2009, pp. 333\u2013342. ACM, New York (2009)","DOI":"10.1145\/1536414.1536461"},{"key":"24_CR18","doi-asserted-by":"publisher","first-page":"634","DOI":"10.1126\/science.1226719","volume":"338","author":"A Peruzzo","year":"2012","unstructured":"Peruzzo, A., Shadbolt, P.J., Brunner, N., Popescu, S., O\u2019Brien, J.L.: A quantum delayed choice experiment. Science 338, 634\u2013637 (2012)","journal-title":"Science"},{"key":"24_CR19","doi-asserted-by":"crossref","unstructured":"Regev, O.: On lattices, learning with errors, random linear codes, and cryptography. In: Proceedings of the Thirty-seventh Annual ACM Symposium on Theory of Computing, STOC 2005, pp. 84\u201393. ACM, New York (2005)","DOI":"10.1145\/1060590.1060603"},{"key":"24_CR20","doi-asserted-by":"publisher","first-page":"022109","DOI":"10.1103\/PhysRevA.85.022109","volume":"85","author":"S Roy","year":"2012","unstructured":"Roy, S., Shukla, A., Mahesh, T.S.: NMR implementation of a quantum delayed-choice experiment. Phys. Rev. A 85, 022109 (2012)","journal-title":"Phys. Rev. A"},{"issue":"4","key":"24_CR21","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1109\/MSP.2017.3151345","volume":"15","author":"N Sendrier","year":"2017","unstructured":"Sendrier, N.: Code-based cryptography: state of the art and perspectives. IEEE Secur. Priv. 15(4), 44\u201350 (2017)","journal-title":"IEEE Secur. Priv."},{"key":"24_CR22","doi-asserted-by":"publisher","first-page":"278286","DOI":"10.1038\/nphys2931","volume":"10","author":"P Shadbolt","year":"2014","unstructured":"Shadbolt, P., Mathews, J.C.F., Laing, A., O\u2019Brien, J.L.: Testing foundations of quantum mechanics with photons. Nat. Phys. 10, 278286 (2014)","journal-title":"Nat. Phys."},{"key":"24_CR23","unstructured":"Shor, P.W.: Algorithms for quantum computation: discrete logarithms and factoring. In: Foundations of Computer Science (FOCS) 1994, pp. 124\u2013134. IEEE Computer Society Press (1994)"},{"key":"24_CR24","doi-asserted-by":"publisher","first-page":"600604","DOI":"10.1038\/nphoton.2012.179","volume":"6","author":"JS Tang","year":"2012","unstructured":"Tang, J.S., et al.: Realization of quantum Wheelers delayed choice experiment. Nat. Photon 6, 600604 (2012)","journal-title":"Nat. Photon"},{"key":"24_CR25","doi-asserted-by":"publisher","first-page":"915","DOI":"10.1038\/s41467-017-01058-6","volume":"8","author":"AS Rab","year":"2017","unstructured":"Rab, A.S., et al.: Entanglement of photons in their dual wave-particle nature. Nat. Commun. 8, 915 (2017)","journal-title":"Nat. Commun."},{"key":"24_CR26","unstructured":"Tannous, R.: Polarization entangled photon sources for free-space quantum key distribution, Master Thesis, University of Waterloo (2018)"},{"key":"24_CR27","doi-asserted-by":"crossref","unstructured":"Tannous, R., Ye, Z., Jin, J., Kuntz, K.B., L\u00fctkenhaus, N., Jennewein, T.: Demonstration of a 6\u20134 state reference frame independent channel for quantum key distribution (2019). https:\/\/arxiv.org\/pdf\/1905.09197.pdf","DOI":"10.1063\/1.5125700"},{"key":"24_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"609","DOI":"10.1007\/978-3-642-38348-9_36","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2013","author":"M Tomamichel","year":"2013","unstructured":"Tomamichel, M., Fehr, S., Kaniewski, J., Wehner, S.: One-sided device-independent QKD and position-based cryptography from monogamy games. In: Johansson, T., Nguyen, P.Q. (eds.) EUROCRYPT 2013. LNCS, vol. 7881, pp. 609\u2013625. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-38348-9_36"},{"key":"24_CR29","doi-asserted-by":"publisher","first-page":"140501","DOI":"10.1103\/PhysRevLett.113.140501","volume":"113","author":"U Vazirani","year":"2014","unstructured":"Vazirani, U., Vidick, T.: Fully device-independent quantum key distribution. Phys. Rev. Lett. 113, 140501 (2014)","journal-title":"Phys. Rev. Lett."},{"key":"24_CR30","doi-asserted-by":"crossref","unstructured":"Vintskevich, S.V., Grigoriev, D.A., Miklin, N.I., Fedorov, M.V.: Entanglement of multiphoton polarization Fock states and their superpositions. arXiv:1812.11462v2 (2019)","DOI":"10.1088\/1612-202X\/ab72a1"},{"key":"24_CR31","doi-asserted-by":"publisher","first-page":"802803","DOI":"10.1038\/299802a0","volume":"299","author":"WK Wootters","year":"1982","unstructured":"Wootters, W.K., Zurek, W.H.: A single quantum cannot be cloned. Nature 299, 802803 (1982)","journal-title":"Nature"},{"key":"24_CR32","doi-asserted-by":"publisher","unstructured":"Supplementary material of [26]. https:\/\/doi.org\/10.1038\/s41467-017-01058-6","DOI":"10.1038\/s41467-017-01058-6"},{"key":"24_CR33","unstructured":"https:\/\/www.idquantique.com"}],"container-title":["Lecture Notes in Computer Science","Progress in Cryptology \u2013 INDOCRYPT 2019"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-35423-7_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,7]],"date-time":"2024-03-07T17:46:46Z","timestamp":1709833606000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-35423-7_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030354220","9783030354237"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-35423-7_24","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"19 November 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"INDOCRYPT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Cryptology in India","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Hyderabad","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 December 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 December 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"indocrypt2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.isical.ac.in\/~indocrypt2019\/#\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"90","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"28","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"31% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.67","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"6","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Please note that there were 110 submissions, but 20 were not peer-reviewed because they were withdrawn before the deadline or they violated the submission policy.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}