{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,31]],"date-time":"2025-05-31T04:11:54Z","timestamp":1748664714984,"version":"3.41.0"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319243146"},{"type":"electronic","value":"9783319243153"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-24315-3_29","type":"book-chapter","created":{"date-parts":[[2015,10,5]],"date-time":"2015-10-05T20:20:13Z","timestamp":1444076413000},"page":"282-285","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Efficient Almost Strongly Universal Hash Function for Quantum Key Distribution"],"prefix":"10.1007","author":[{"given":"Bo","family":"Liu","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Baokang","family":"Zhao","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Chunqing","family":"Wu","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Wanrong","family":"Yu","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ilsun","family":"You","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2015,11,19]]},"reference":[{"key":"29_CR1","doi-asserted-by":"publisher","first-page":"1301","DOI":"10.1103\/RevModPhys.81.1301","volume":"81","author":"V Scarani","year":"2009","unstructured":"Scarani, V., Bechmann-Pasquinucci, H., Cerf, N., Du\u0161ek, M., L\u00fctkenhaus, N., Peev, M.: The security of practical quantum key distribution. Rev. Mod. Phys. 81 , 1301\u20131350 (2009)","journal-title":"Rev. Mod. Phys."},{"key":"29_CR2","doi-asserted-by":"publisher","first-page":"081108","DOI":"10.1063\/1.4913483","volume":"106","author":"L Wang","year":"2015","unstructured":"Wang, L., Chen, L., Ju, L., Xu, M., Zhao, Y., Chen, K., Chen, Z., Chen, T.-Y., Pan, J.-W.: Experimental multiplexing of quantum key distribution with classical optical communication. Appl. Phys. Lett. 106 , 081108 (2015)","journal-title":"Appl. Phys. Lett."},{"key":"29_CR3","unstructured":"Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. In: Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, New York (Year)"},{"key":"29_CR4","doi-asserted-by":"publisher","first-page":"172","DOI":"10.1016\/j.cose.2010.11.001","volume":"30","author":"X Ma","year":"2011","unstructured":"Ma, X., Fung, C.-H.F., Boileau, J.C., Chau, H.F.: Universally composable and customizable post-processing for practical quantum key distribution. Comput. Securtiy 30 , 172\u2013177 (2011)","journal-title":"Comput. Securtiy"},{"key":"29_CR5","unstructured":"Leverrier, A., Karpov, E., Grangier, P., Cerf, N.J.: Unconditional security of continuous-variable quantum key distribution. arXiv preprint arXiv:0809.2252 (2008)"},{"key":"29_CR6","doi-asserted-by":"publisher","first-page":"10387","DOI":"10.1364\/OE.19.010387","volume":"19","author":"M Sasaki","year":"2011","unstructured":"Sasaki, M., Fujiwara, M., et al.: Field test of quantum key distribution in the Tokyo QKD Network. Opt. Express 19 , 10387\u201310409 (2011)","journal-title":"Opt. Express"},{"key":"29_CR7","unstructured":"http:\/\/www.quantum2011.org\/"},{"key":"29_CR8","unstructured":"Ma, X.: Practical Quantum key Distribution post-processing (2011)"},{"key":"29_CR9","unstructured":"Abidin, A.: Authentication in Quantum Key Distribution: Security Proof and Universal Hash Functions. Department of Electrical Engineering, vol. Ph.D. Linkoping University (2013)"},{"key":"29_CR10","unstructured":"Pacher, C., Abidin, A., Lorunser, T., Peev, M., Ursin, R., Zeilinger, A., Larsson, J.-A.: Attacks on quantum key distribution protocols that employ non-ITS authentication. arXiv preprint arXiv:1209.0365 (2012)"},{"key":"29_CR11","unstructured":"Ioannou, L.M., Mosca, M.: Unconditionally-secure and reusable public-key authentication. arXiv preprint arXiv:1108.2887 (2011)"},{"key":"29_CR12","unstructured":"Portmann, C.: Key Recycling in Authentication. arXiv preprint arXiv:1202.1229 (2012)"},{"key":"29_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1007\/3-540-48658-5_15","volume-title":"Advances in Cryptology - CRYPTO \u201894","author":"H Krawczyk","year":"1994","unstructured":"Krawczyk, H.: LFSR-based hashing and authentication. In: Desmedt, Y.G. (ed.) CRYPTO 1994. LNCS, vol. 839, pp. 129\u2013139. Springer, Heidelberg (1994)"},{"key":"29_CR14","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1016\/0022-0000(81)90033-7","volume":"22","author":"MN Wegman","year":"1981","unstructured":"Wegman, M.N., Carter, J.L.: New hash functions and their use in authentication and set equality. J. Comput. Syst. Sci. 22 , 265\u2013279 (1981)","journal-title":"J. Comput. Syst. Sci."},{"key":"29_CR15","doi-asserted-by":"publisher","first-page":"1008","DOI":"10.1364\/OL.37.001008","volume":"37","author":"S Wang","year":"2012","unstructured":"Wang, S., Chen, W., Guo, J.: YIn, Z., Li, H., Zhou, Z., Guo, G., Han, Z.: 2\u00a0GHz clock quantum key distribution over 260\u00a0km of standard telecom fiber. Opt. Lett. 37 , 1008\u20131010 (2012)","journal-title":"Opt. Lett."},{"key":"29_CR16","doi-asserted-by":"publisher","first-page":"542","DOI":"10.1109\/JQE.2012.2187327","volume":"48","author":"A Tanaka","year":"2012","unstructured":"Tanaka, A., Fujiwara, M., et al.: High-speed quantum key distribution system for 1-Mbps real-time key generation. IEEE J. Quant. Electron. 48 , 542\u2013550 (2012)","journal-title":"IEEE J. Quant. Electron."},{"key":"29_CR17","doi-asserted-by":"crossref","unstructured":"Carter, J.L., Wegman, M.N.: Universal classes of hash functions. In: Proceedings of the Ninth Annual ACM Symposium on Theory of Computing, pp. 106\u2013112. ACM (Year)","DOI":"10.1145\/800105.803400"},{"key":"29_CR18","doi-asserted-by":"crossref","unstructured":"Liu, B., Zhao, B., Wei, Z., et al.: Qphone: a quantum security VoIP phone. In: Proceedings of the ACM SIGCOMM 2013 Conference on SIGCOMM. ACM, pp. 477\u2013478 (2013)","DOI":"10.1145\/2534169.2491696"},{"issue":"16","key":"29_CR19","first-page":"2420","volume":"19","author":"B Liu","year":"2013","unstructured":"Liu, B., Zhao, B., Liu, B., et al.: A security real-time privacy amplification scheme in QKD system. J. UCS. 19 (16), 2420\u20132436 (2013)","journal-title":"J. UCS."},{"key":"29_CR20","doi-asserted-by":"crossref","unstructured":"Sun, S., Jiang, M., Ma, X., Li, C., Liang, L.: Hacking on decoy-state quantum key distribution system with partial phase randomization, Scientific Reports (2013)","DOI":"10.1038\/srep04759"},{"issue":"11","key":"29_CR21","doi-asserted-by":"publisher","first-page":"2201","DOI":"10.1002\/sec.738","volume":"7","author":"Y Liu","year":"2014","unstructured":"Liu, Y., Peng, W., Jinshu, S.: A study of IP prefix hijacking in cloud computing networks. Secur. Commun. Netw. 7 (11), 2201\u20132210 (2014)","journal-title":"Secur. Commun. Netw."},{"issue":"2","key":"29_CR22","first-page":"21","volume":"6","author":"R Roland","year":"2015","unstructured":"Roland, R., Zhdanova, M., Repp, J.: Security compliance tracking of processes in networked cooperating systems. J. Wirel. Mob. Netw., Ubiquitous Comput., Dependable Appl. (JoWUA) 6 (2), 21\u201340 (2015)","journal-title":"J. Wirel. Mob. Netw., Ubiquitous Comput., Dependable Appl. (JoWUA)"},{"issue":"2","key":"29_CR23","first-page":"1","volume":"6","author":"I Kotenko","year":"2015","unstructured":"Kotenko, I.: Guest editorial: security in distributed and network-based computing. J. Wirel. Mob. Netw., Ubiquitous Comput., Dependable Appl. (JoWUA) 6 (2), 1\u20133 (2015)","journal-title":"J. Wirel. Mob. Netw., Ubiquitous Comput., Dependable Appl. (JoWUA)"},{"issue":"2","key":"29_CR24","first-page":"78","volume":"6","author":"A Skovoroda","year":"2015","unstructured":"Skovoroda, A., Gamayunov, D.: Securing mobile devices: malware mitigation methods. J. Wirel. Mob. Netw., Ubiquitous Comput., Dependable Appl. (JoWUA) 6 (2), 78\u201397 (2015)","journal-title":"J. Wirel. Mob. Netw., Ubiquitous Comput., Dependable Appl. (JoWUA)"}],"container-title":["Lecture Notes in Computer Science","Information and Communication Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-24315-3_29","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,30]],"date-time":"2025-05-30T22:37:34Z","timestamp":1748644654000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-24315-3_29"}},"subtitle":["Extended Abstract"],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319243146","9783319243153"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-24315-3_29","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"19 November 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}