{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T09:59:19Z","timestamp":1743155959417,"version":"3.40.3"},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319042671"},{"type":"electronic","value":"9783319042688"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-04268-8_8","type":"book-chapter","created":{"date-parts":[[2014,1,22]],"date-time":"2014-01-22T13:17:57Z","timestamp":1390396677000},"page":"122-141","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Insider-Proof Encryption with Applications for Quantum Key Distribution"],"prefix":"10.1007","author":[{"given":"Matthew","family":"McKague","sequence":"first","affiliation":[]},{"given":"Lana","family":"Sheridan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,1,23]]},"reference":[{"key":"8_CR1","doi-asserted-by":"publisher","first-page":"230501","DOI":"10.1103\/PhysRevLett.98.230501","volume":"98","author":"A Ac\u00edn","year":"2007","unstructured":"Ac\u00edn, A., Brunner, N., Gisin, N., Massar, S., Pironio, S., Scarani, V.: Device-independent security of quantum cryptography against collective attacks. Phys. Rev. Lett. 98, 230501 (2007)","journal-title":"Phys. Rev. Lett."},{"issue":"12","key":"8_CR2","doi-asserted-by":"publisher","first-page":"120405","DOI":"10.1103\/PhysRevLett.97.120405","volume":"97","author":"A Acin","year":"2006","unstructured":"Acin, A., Gisin, N., Masanes, L.: From Bell\u2019s theorem to secure quantum key distribution. Phys. Rev. Lett. 97(12), 120405 (2006)","journal-title":"Phys. Rev. Lett."},{"key":"8_CR3","doi-asserted-by":"crossref","unstructured":"Barrett, J., Colbeck, R., Kent, A.: Prisoners of their own device: trojan attacks on device-independent quantum cryptography. arXiv:1201.4407v3 (2012)","DOI":"10.1103\/PhysRevLett.110.010503"},{"key":"8_CR4","doi-asserted-by":"publisher","first-page":"062326","DOI":"10.1103\/PhysRevA.86.062326","volume":"86","author":"J Barrett","year":"2012","unstructured":"Barrett, J., Colbeck, R., Kent, A.: Unconditionally secure device-independent quantum key distribution with only two devices. Phys. Rev. A 86, 062326 (2012)","journal-title":"Phys. Rev. A"},{"key":"8_CR5","first-page":"175","volume-title":"In: Proceedings of IEEE International Conference on Computers, Systems and Signal Processing","author":"CH Bennett","year":"1984","unstructured":"Bennett, C.H., Brassard, G.: Quantum cryptography: public-key distribution and coin tossing. In: Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, pp. 175\u2013179. IEEE, New York (1984)"},{"issue":"2","key":"8_CR6","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1016\/0022-0000(79)90044-8","volume":"18","author":"JL Carter","year":"1979","unstructured":"Carter, J.L., Wegman, M.N.: Universal classes of hash functions. J. Comput. Syst. Sci. 18(2), 143 (1979)","journal-title":"J. Comput. Syst. Sci."},{"key":"8_CR7","doi-asserted-by":"publisher","first-page":"052306","DOI":"10.1103\/PhysRevA.61.052306","volume":"61","author":"V Coffman","year":"2000","unstructured":"Coffman, V., Kundu, J., Wootters, W.K.: Distributed entanglement. Phys. Rev. A 61, 052306 (2000)","journal-title":"Phys. Rev. A"},{"issue":"6","key":"8_CR8","doi-asserted-by":"publisher","first-page":"661","DOI":"10.1103\/PhysRevLett.67.661","volume":"67","author":"AK Ekert","year":"1991","unstructured":"Ekert, A.K.: Quantum cryptography based on Bell\u2019s theorem. Phys. Rev. Lett. 67(6), 661\u2013663 (1991)","journal-title":"Phys. Rev. Lett."},{"key":"8_CR9","doi-asserted-by":"crossref","unstructured":"Hanggi, E., Renner, R.: Device-independent quantum key distribution with commuting measurements. arXiv:1009.1833v2 (2010)","DOI":"10.1007\/978-3-642-13190-5_11"},{"issue":"2","key":"8_CR10","doi-asserted-by":"publisher","first-page":"022313","DOI":"10.1103\/PhysRevA.74.022313","volume":"74","author":"V Makarov","year":"2006","unstructured":"Makarov, V., Anisimov, A., Skaar, J.: Effects of detector efficiency mismatch on security of quantum cryptosystems. Phys. Rev. A 74(2), 022313 (2006)","journal-title":"Phys. Rev. A"},{"key":"8_CR11","doi-asserted-by":"publisher","first-page":"238","DOI":"10.1038\/ncomms1244","volume":"2","author":"L Masanes","year":"2011","unstructured":"Masanes, L., Pironio, S., Ac\u00edn, A.: Secure device-independent quantum key distribution with causally independent measurement devices. Nat. Commun. 2, 238 (2011)","journal-title":"Nat. Commun."},{"key":"8_CR12","doi-asserted-by":"publisher","first-page":"045021","DOI":"10.1088\/1367-2630\/11\/4\/045021","volume":"11","author":"S Pironio","year":"2009","unstructured":"Pironio, S., Ac\u00edn, A., Brunner, N., Gisin, N., Massar, S., Scarani, V.: Device-independent quantum key distribution secure against collective attacks. New J. Phys. 11, 045021 (2009)","journal-title":"New J. Phys."},{"key":"8_CR13","doi-asserted-by":"crossref","unstructured":"Reichardt, B.W., Unger, F., Vazirani, U.: Classical command of quantum systems via rigidity of CHSH games. arXiv:1209.0449 (2012)","DOI":"10.1145\/2422436.2422473"},{"key":"8_CR14","doi-asserted-by":"crossref","unstructured":"Reichardt, B.W., Unger, F., Vazirani, U.: A classical leash for a quantum system: command of quantum systems via rigidity of CHSH games. arXiv:1209.0448 (2012)","DOI":"10.1145\/2422436.2422473"},{"key":"8_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1142\/S0219749908003256","volume":"6","author":"R Renner","year":"2008","unstructured":"Renner, R.: Security of quantum key distribution. Int. J. Quant. Inf. 6, 1 (2008)","journal-title":"Int. J. Quant. Inf."},{"key":"8_CR16","doi-asserted-by":"publisher","first-page":"441","DOI":"10.1103\/PhysRevLett.85.441","volume":"85","author":"PW Shor","year":"2000","unstructured":"Shor, P.W., Preskill, J.: Simple proof of security of the BB84 quantum key distribution protocol. Phys. Rev. Lett. 85, 441\u2013444 (2000)","journal-title":"Phys. Rev. Lett."},{"key":"8_CR17","doi-asserted-by":"publisher","first-page":"5524","DOI":"10.1109\/TIT.2011.2158473","volume":"57","author":"M Tomamichel","year":"2011","unstructured":"Tomamichel, M., Schaffner, C., Smith, A., Renner, R.: Leftover hashing against quantum side information. IEEE Trans. Inf. Theory 57, 5524 (2011)","journal-title":"IEEE Trans. Inf. Theory"}],"container-title":["Lecture Notes in Computer Science","Information Theoretic Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-04268-8_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,19]],"date-time":"2023-02-19T22:01:54Z","timestamp":1676844114000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-04268-8_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319042671","9783319042688"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-04268-8_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"23 January 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}