{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,1]],"date-time":"2025-04-01T01:08:33Z","timestamp":1743469713016,"version":"3.40.3"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030629991"},{"type":"electronic","value":"9783030630003"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-63000-3_6","type":"book-chapter","created":{"date-parts":[[2020,11,30]],"date-time":"2020-11-30T00:03:23Z","timestamp":1606694603000},"page":"69-81","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Quantum Candies and Quantum Cryptography"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3096-931X","authenticated-orcid":false,"given":"Junan","family":"Lin","sequence":"first","affiliation":[]},{"given":"Tal","family":"Mor","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,11,30]]},"reference":[{"issue":"25","key":"6_CR1","doi-asserted-by":"publisher","first-page":"1804","DOI":"10.1103\/PhysRevLett.49.1804","volume":"49","author":"A Aspect","year":"1982","unstructured":"Aspect, A., Dalibard, J., Roger, G.: Experimental test of Bell\u2019s inequalities using time-varying analyzers. Phys. Rev. Lett. 49(25), 1804\u20131807 (1982). https:\/\/doi.org\/10.1103\/PhysRevLett.49.1804","journal-title":"Phys. Rev. Lett."},{"issue":"2","key":"6_CR2","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1103\/PhysRevLett.49.91","volume":"49","author":"A Aspect","year":"1982","unstructured":"Aspect, A., Grangier, P., Roger, G.: Experimental realization of Einstein-Podolsky-Rosen-Bohm Gedankenexperiment : a new violation of Bell\u2019s inequalities. Phys. Rev. Lett. 49(2), 91\u201394 (1982). https:\/\/doi.org\/10.1103\/PhysRevLett.49.91","journal-title":"Phys. Rev. Lett."},{"issue":"3","key":"6_CR3","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1103\/PhysicsPhysiqueFizika.1.195","volume":"1","author":"JS Bell","year":"1964","unstructured":"Bell, J.S.: On the Einstein Podolsky Rosen paradox. Physics Physique Fizika 1(3), 195\u2013200 (1964). https:\/\/doi.org\/10.1103\/PhysicsPhysiqueFizika.1.195","journal-title":"Physics Physique Fizika"},{"issue":"21","key":"6_CR4","doi-asserted-by":"publisher","first-page":"3121","DOI":"10.1103\/PhysRevLett.68.3121","volume":"68","author":"CH Bennett","year":"1992","unstructured":"Bennett, C.H.: Quantum cryptography using any two nonorthogonal states. Phys. Rev. Lett. 68(21), 3121\u20133124 (1992). https:\/\/doi.org\/10.1103\/PhysRevLett.68.3121","journal-title":"Phys. Rev. Lett."},{"key":"6_CR5","unstructured":"Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. In: International Conference on Computers, Systems and Signal Processing, Bangalore, India, pp. 175\u2013179 (1984)"},{"issue":"5","key":"6_CR6","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1103\/PhysRevLett.68.557","volume":"68","author":"CH Bennett","year":"1992","unstructured":"Bennett, C.H., Brassard, G., Mermin, N.D.: Quantum cryptography without Bell\u2019s theorem. Phys. Rev. Lett. 68(5), 557\u2013559 (1992). https:\/\/doi.org\/10.1103\/PhysRevLett.68.557","journal-title":"Phys. Rev. Lett."},{"issue":"10","key":"6_CR7","doi-asserted-by":"publisher","first-page":"777","DOI":"10.1103\/PhysRev.47.777","volume":"47","author":"A Einstein","year":"1935","unstructured":"Einstein, A., Podolsky, B., Rosen, N.: Can quantum-mechanical description of physical reality be considered complete? Phys. Rev. 47(10), 777\u2013780 (1935). https:\/\/doi.org\/10.1103\/PhysRev.47.777","journal-title":"Phys. Rev."},{"issue":"6","key":"6_CR8","doi-asserted-by":"publisher","first-page":"661","DOI":"10.1103\/PhysRevLett.67.661","volume":"67","author":"AK Ekert","year":"1991","unstructured":"Ekert, A.K.: Quantum cryptography based on Bell\u2019s theorem. Phys. Rev. Lett. 67(6), 661\u2013663 (1991). https:\/\/doi.org\/10.1103\/PhysRevLett.67.661","journal-title":"Phys. Rev. Lett."},{"key":"6_CR9","unstructured":"Jacobs, K.: Private communication (2009)"},{"issue":"2","key":"6_CR10","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1007\/s00145-004-0142-y","volume":"18","author":"H-K Lo","year":"2004","unstructured":"Lo, H.-K., Chau, H.F., Ardehali, M.: Efficient quantum key distribution scheme and a proof of its unconditional security. J. Cryptol. 18(2), 133\u2013165 (2004). https:\/\/doi.org\/10.1007\/s00145-004-0142-y","journal-title":"J. Cryptol."},{"issue":"17","key":"6_CR11","doi-asserted-by":"publisher","first-page":"3414","DOI":"10.1103\/PhysRevLett.78.3414","volume":"78","author":"D Mayers","year":"1997","unstructured":"Mayers, D.: Unconditionally secure quantum bit commitment is impossible. Phys. Rev. Lett. 78(17), 3414\u20133417 (1997). https:\/\/doi.org\/10.1103\/PhysRevLett.78.3414","journal-title":"Phys. Rev. Lett."},{"issue":"14","key":"6_CR12","doi-asserted-by":"publisher","first-page":"3137","DOI":"10.1103\/PhysRevLett.80.3137","volume":"80","author":"T Mor","year":"1998","unstructured":"Mor, T.: No cloning of orthogonal states in composite systems. Phys. Rev. Lett. 80(14), 3137\u20133140 (1998). https:\/\/doi.org\/10.1103\/PhysRevLett.80.3137","journal-title":"Phys. Rev. Lett."},{"issue":"2","key":"6_CR13","doi-asserted-by":"publisher","first-page":"441","DOI":"10.1103\/PhysRevLett.85.441","volume":"85","author":"PW Shor","year":"2000","unstructured":"Shor, P.W., Preskill, J.: Simple proof of security of the BB84 quantum key distribution protocol. Phys. Rev. Lett. 85(2), 441\u2013444 (2000). https:\/\/doi.org\/10.1103\/PhysRevLett.85.441","journal-title":"Phys. Rev. Lett."},{"issue":"9","key":"6_CR14","doi-asserted-by":"publisher","first-page":"800","DOI":"10.1119\/1.2205879","volume":"74","author":"K Svozil","year":"2006","unstructured":"Svozil, K.: Staging quantum cryptography with chocolate balls. Am. J. Phys. 74(9), 800\u2013803 (2006). https:\/\/doi.org\/10.1119\/1.2205879","journal-title":"Am. J. Phys."},{"issue":"P1","key":"6_CR15","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1016\/j.tcs.2014.09.019","volume":"560","author":"K Svozil","year":"2014","unstructured":"Svozil, K.: Non-contextual chocolate balls versus value indefinite quantum cryptography. Theoret. Comput. Sci. 560(P1), 82\u201390 (2014). https:\/\/doi.org\/10.1016\/j.tcs.2014.09.019","journal-title":"Theoret. Comput. Sci."},{"issue":"7","key":"6_CR16","doi-asserted-by":"publisher","first-page":"881","DOI":"10.1007\/BF01889696","volume":"20","author":"R Wright","year":"1990","unstructured":"Wright, R.: Generalized urn models. Found. Phys. 20(7), 881\u2013903 (1990). https:\/\/doi.org\/10.1007\/BF01889696","journal-title":"Found. Phys."}],"container-title":["Lecture Notes in Computer Science","Theory and Practice of Natural Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-63000-3_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,30]],"date-time":"2020-11-30T00:05:11Z","timestamp":1606694711000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-63000-3_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030629991","9783030630003"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-63000-3_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"30 November 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"TPNC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on the Theory and Practice of Natural Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Taoyuan","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Taiwan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 December 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 December 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"tpnc2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/irdta.eu\/tpnc2020\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"24","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"12","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"50% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"An invited paper is also included.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}