{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:26:50Z","timestamp":1742912810939,"version":"3.40.3"},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031067907"},{"type":"electronic","value":"9783031067914"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-06791-4_22","type":"book-chapter","created":{"date-parts":[[2022,7,3]],"date-time":"2022-07-03T23:03:27Z","timestamp":1656889407000},"page":"271-279","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Data Reconciliation Model Based on\u00a0QLDPC for\u00a0Satellite-Ground Quantum Key Distribution Network"],"prefix":"10.1007","author":[{"given":"Wenting","family":"Zhou","sequence":"first","affiliation":[]},{"given":"Jie","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Bao","family":"Feng","sequence":"additional","affiliation":[]},{"given":"Xiao","family":"Ye","sequence":"additional","affiliation":[]},{"given":"Tianbing","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Yuxiang","family":"Bian","sequence":"additional","affiliation":[]},{"given":"Wenjie","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,7,4]]},"reference":[{"key":"22_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"475","DOI":"10.1007\/3-540-39568-7_39","volume-title":"Advances in Cryptology","author":"CH Bennett","year":"1985","unstructured":"Bennett, C.H., Brassard, G.: An update on quantum cryptography. In: Blakley, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 475\u2013480. Springer, Heidelberg (1985). https:\/\/doi.org\/10.1007\/3-540-39568-7_39"},{"issue":"6","key":"22_CR2","doi-asserted-by":"publisher","first-page":"661","DOI":"10.1103\/PhysRevLett.67.661","volume":"67","author":"AK Ekert","year":"1991","unstructured":"Ekert, A.K.: Quantum cryptography based on Bell\u2019s theorem. Phys. Rev. Lett. 67(6), 661 (1991)","journal-title":"Phys. Rev. Lett."},{"issue":"14","key":"22_CR3","doi-asserted-by":"publisher","first-page":"3018","DOI":"10.1103\/PhysRevLett.81.3018","volume":"81","author":"D Bru\u00df","year":"1998","unstructured":"Bru\u00df, D.: Optimal eavesdropping in quantum cryptography with six states. Phys. Rev. Lett. 81(14), 3018 (1998)","journal-title":"Phys. Rev. Lett."},{"issue":"5","key":"22_CR4","doi-asserted-by":"publisher","first-page":"057901","DOI":"10.1103\/PhysRevLett.92.057901","volume":"92","author":"K Inoue","year":"2004","unstructured":"Inoue, K., Waks, E., Yamamoto, Y.: Quantum cryptography protocols robust against photon number splitting attacks for weak laser pulse implementations. Phys. Rev. Lett. 92(5), 057901 (2004)","journal-title":"Phys. Rev. Lett."},{"issue":"3","key":"22_CR5","doi-asserted-by":"publisher","first-page":"037902","DOI":"10.1103\/PhysRevLett.89.037902","volume":"89","author":"V Scarani","year":"2002","unstructured":"Scarani, V., Acin, A., Ribordy, G., Gisin, N.: Differential phase shift quantum key distribution. Phys. Rev. Lett. 89(3), 037902 (2002)","journal-title":"Phys. Rev. Lett."},{"issue":"14","key":"22_CR6","doi-asserted-by":"publisher","first-page":"140501","DOI":"10.1103\/PhysRevLett.94.140501","volume":"94","author":"M Lucamarini","year":"2005","unstructured":"Lucamarini, M., Mancini, S.: Secure deterministic communication without entanglement. Phys. Rev. Lett. 94(14), 140501 (2005)","journal-title":"Phys. Rev. Lett."},{"issue":"19","key":"22_CR7","doi-asserted-by":"publisher","first-page":"190502","DOI":"10.1103\/PhysRevLett.121.190502","volume":"121","author":"A Boaron","year":"2018","unstructured":"Boaron, A., et al.: Secure quantum key distribution over 421 km of optical fiber. Phys. Rev. Lett. 121(19), 190502 (2018)","journal-title":"Phys. Rev. Lett."},{"issue":"6","key":"22_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10773-020-04439-8","volume":"59","author":"L Guo","year":"2020","unstructured":"Guo, L., Ran, Q., Jin, D., Huang, D.: QKD iterative information reconciliation based on LDPC codes. Int. J. Theor. Phys. 59(6), 1\u201313 (2020)","journal-title":"Int. J. Theor. Phys."},{"key":"22_CR9","doi-asserted-by":"crossref","unstructured":"Lee, S., Park, J., Heo, J.: Improved reconciliation with polar codes in quantum key distribution (2018). arXiv:1805.05046","DOI":"10.1109\/ICUFN.2018.8436787"},{"key":"22_CR10","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"696","DOI":"10.1007\/978-3-030-01177-2_51","volume-title":"Intelligent Computing","author":"DK Ben Ismail","year":"2019","unstructured":"Ben Ismail, D.K., Karadimas, P., Epiphaniou, G., Al-Khateeb, H.M.: Error reconciliation with turbo codes for secret key generation in vehicular AD hoc networks. In: Arai, K., Kapoor, S., Bhatia, R. (eds.) SAI 2018. AISC, vol. 857, pp. 696\u2013704. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-01177-2_51"},{"issue":"4","key":"22_CR11","doi-asserted-by":"publisher","first-page":"R2493","DOI":"10.1103\/PhysRevA.52.R2493","volume":"52","author":"PW Shor","year":"1995","unstructured":"Shor, P.W.: Scheme for reducing decoherence in quantum computer memory. Phys. Rev. A 52(4), R2493 (1995)","journal-title":"Phys. Rev. A"},{"issue":"2","key":"22_CR12","doi-asserted-by":"publisher","first-page":"1098","DOI":"10.1103\/PhysRevA.54.1098","volume":"54","author":"AR Calderbank","year":"1996","unstructured":"Calderbank, A.R., Shor, P.W.: Good quantum error-correcting codes exist. Phys. Rev. A 54(2), 1098 (1996)","journal-title":"Phys. Rev. A"},{"issue":"6","key":"22_CR13","doi-asserted-by":"publisher","first-page":"4741","DOI":"10.1103\/PhysRevA.54.4741","volume":"54","author":"AM Steane","year":"1996","unstructured":"Steane, A.M.: Simple quantum error-correcting codes. Phys. Rev. A 54(6), 4741 (1996)","journal-title":"Phys. Rev. A"},{"key":"22_CR14","unstructured":"Gottesman, D.: Stabilizer codes and quantum error correction. California Institute of Technology (1997)"},{"issue":"1","key":"22_CR15","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1109\/TIT.1962.1057683","volume":"8","author":"R Gallager","year":"1962","unstructured":"Gallager, R.: Low-density parity-check codes. IRE Trans. Inf. Theory 8(1), 21\u201328 (1962)","journal-title":"IRE Trans. Inf. Theory"},{"issue":"10","key":"22_CR16","doi-asserted-by":"publisher","first-page":"2315","DOI":"10.1109\/TIT.2004.834737","volume":"50","author":"DJC MacKay","year":"2004","unstructured":"MacKay, D.J.C., Mitchison, G., McFadden, P.L.: Sparse-graph codes for quantum error correction. IEEE Trans. Inf. Theory 50(10), 2315\u20132330 (2004)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"1","key":"22_CR17","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1109\/LCOMM.2015.2494020","volume":"20","author":"Z Babar","year":"2015","unstructured":"Babar, Z., Botsinis, P., Alanis, D., Ng, S.X., Hanzo, L.: Construction of quantum LDPC codes from classical row-circulant QC-LDPCs. IEEE Commun. Lett. 20(1), 9\u201312 (2015)","journal-title":"IEEE Commun. Lett."},{"key":"22_CR18","doi-asserted-by":"publisher","first-page":"432","DOI":"10.22331\/q-2021-04-15-432","volume":"5","author":"A Grospellier","year":"2021","unstructured":"Grospellier, A., Grou\u00e8s, L., Krishna, A., Leverrier, A.: Combining hard and soft decoders for hypergraph product codes. Quantum 5, 432 (2021)","journal-title":"Quantum"},{"key":"22_CR19","unstructured":"Roffe, J., White, D.R., Burton, S., Campbell, E.T.: Decoding across the quantum LDPC code landscape (2020). arXiv:2005.07016"},{"issue":"5","key":"22_CR20","doi-asserted-by":"publisher","first-page":"1379","DOI":"10.1109\/18.412683","volume":"41","author":"MPC Fossorier","year":"1995","unstructured":"Fossorier, M.P.C., Lin, S.: Soft-decision decoding of linear block codes based on ordered statistics. IEEE Trans. Inf. Theory 41(5), 1379\u20131396 (1995)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"22_CR21","unstructured":"Panteleev, P., Kalachev, G.: Degenerate quantum LDPC codes with good finite length performance (2019). arXiv:1904.02703"},{"key":"22_CR22","unstructured":"Richardson, T., Urbanke, R.: Multi-edge type LDPC codes. In: Workshop honoring, Prof. Bob McEliece on his 60th birthday, California Institute of Technology, Pasadena, California. Springer (2002)"},{"issue":"7670","key":"22_CR23","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1038\/nature23655","volume":"549","author":"SK Liao","year":"2017","unstructured":"Liao, S.K., et al.: Satellite-to-ground quantum key distribution. Nature 549(7670), 43\u201347 (2017)","journal-title":"Nature"}],"container-title":["Lecture Notes in Computer Science","Artificial Intelligence and Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-06791-4_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,13]],"date-time":"2022-07-13T12:34:46Z","timestamp":1657715686000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-06791-4_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031067907","9783031067914"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-06791-4_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"4 July 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICAIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Artificial Intelligence and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Qinghai","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 July 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 July 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"incodldos2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.icaisconf.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"CMT","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"1124","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"115","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"53","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"10% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"8","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}