{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,6]],"date-time":"2026-05-06T20:49:03Z","timestamp":1778100543762,"version":"3.51.4"},"publisher-location":"Berlin, Heidelberg","reference-count":42,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540709350","type":"print"},{"value":"9783540709367","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-70936-7_25","type":"book-chapter","created":{"date-parts":[[2007,5,16]],"date-time":"2007-05-16T11:43:44Z","timestamp":1179315824000},"page":"456-478","source":"Crossref","is-referenced-by-count":39,"title":["Unifying Classical and Quantum Key Distillation"],"prefix":"10.1007","author":[{"given":"Matthias","family":"Christandl","sequence":"first","affiliation":[]},{"given":"Artur","family":"Ekert","sequence":"additional","affiliation":[]},{"given":"Micha\u0142","family":"Horodecki","sequence":"additional","affiliation":[]},{"given":"Pawe\u0142","family":"Horodecki","sequence":"additional","affiliation":[]},{"given":"Jonathan","family":"Oppenheim","sequence":"additional","affiliation":[]},{"given":"Renato","family":"Renner","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"25_CR1","doi-asserted-by":"crossref","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","volume":"28","author":"C.E. Shannon","year":"1949","unstructured":"Shannon, C.E.: Communication theory of secrecy systems. Bell Systems Technical Journal\u00a028, 656\u2013715 (1949)","journal-title":"Bell Systems Technical Journal"},{"key":"25_CR2","doi-asserted-by":"publisher","first-page":"733","DOI":"10.1109\/18.256484","volume":"39","author":"U.M. Maurer","year":"1993","unstructured":"Maurer, U.M.: Secret key agreement by public discussion from common information. IEEE Transactions on Information Theory\u00a039, 733\u2013742 (1993)","journal-title":"IEEE Transactions on Information Theory"},{"key":"25_CR3","doi-asserted-by":"publisher","first-page":"339","DOI":"10.1109\/TIT.1978.1055892","volume":"24","author":"I. Csisz\u00e1r","year":"1978","unstructured":"Csisz\u00e1r, I., K\u00f6rner, J.: Broadcast channels with confidential messages. IEEE Trans. Inf. Theory\u00a024, 339\u2013348 (1978)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"25_CR4","doi-asserted-by":"publisher","first-page":"1121","DOI":"10.1109\/18.243431","volume":"39","author":"R. Ahlswede","year":"1993","unstructured":"Ahlswede, R., Csisz\u00e1r, I.: Common randomness in information theory and cryptography. IEEE Transactions on Information Theory\u00a039, 1121\u20131132 (1993)","journal-title":"IEEE Transactions on Information Theory"},{"key":"25_CR5","first-page":"175","volume-title":"Proceedings of the IEEE International Conference on Computers, Systems and Signal Processing","author":"C.H. Bennett","year":"1984","unstructured":"Bennett, C.H., Brassard, G.: Quantum cryptography: Public key distribution and coin tossing. In: Proceedings of the IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, India, December 1984, pp. 175\u2013179. IEEE Computer Society Press, New York (1984)"},{"key":"25_CR6","doi-asserted-by":"publisher","first-page":"661","DOI":"10.1103\/PhysRevLett.67.661","volume":"67","author":"A. Ekert","year":"1991","unstructured":"Ekert, A.: Quantum cryptography based on Bell\u2019s theorem. Phys. Rev. Lett.\u00a067, 661\u2013663 (1991)","journal-title":"Phys. Rev. Lett."},{"key":"25_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"562","DOI":"10.1007\/3-540-39200-9_35","volume-title":"Advances in Cryptology \u2013 EUROCRPYT 2003","author":"R. Renner","year":"2003","unstructured":"Renner, R., Wolf, S.: New bounds in secret-key agreement: the gap between formation and secrecy extraction. In: Biham, E. (ed.) Advances in Cryptology \u2013 EUROCRPYT 2003. LNCS, vol.\u00a02656, pp. 562\u2013577. Springer, Heidelberg (2003)"},{"key":"25_CR8","doi-asserted-by":"crossref","first-page":"1355","DOI":"10.1002\/j.1538-7305.1975.tb02040.x","volume":"54","author":"A.D. Wyner","year":"1975","unstructured":"Wyner, A.D.: The wire-tap channel. Bell System Technical Journal\u00a054, 1355\u20131387 (1975)","journal-title":"Bell System Technical Journal"},{"key":"25_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"482","DOI":"10.1007\/3-540-44598-6_30","volume-title":"Advances in Cryptology - CRYPTO 2000","author":"N. Gisin","year":"2000","unstructured":"Gisin, N., Wolf, S.: Linking classical and quantum key agreement: is there \u2018bound information. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol.\u00a01880, pp. 482\u2013500. Springer, Heidelberg (2000)"},{"key":"25_CR10","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1098\/rspa.2004.1372","volume":"461","author":"I. Devetak","year":"2004","unstructured":"Devetak, I., Winter, A.: Distillation of secret key and entanglement from quantum states. Proc. Roy. Soc. Lond. Ser. A\u00a0461, 207\u2013235 (2004)","journal-title":"Proc. Roy. Soc. Lond. Ser. A"},{"key":"25_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"407","DOI":"10.1007\/978-3-540-30576-7_22","volume-title":"Theory of Cryptography","author":"R. Renner","year":"2005","unstructured":"Renner, R., K\u00f6nig, R.: Universally composable privacy amplification against quantum adversaries. In: Kilian, J. (ed.) TCC 2005. LNCS, vol.\u00a03378, pp. 407\u2013425. Springer, Heidelberg (2005)"},{"key":"25_CR12","doi-asserted-by":"crossref","first-page":"042309","DOI":"10.1103\/PhysRevA.66.042309","volume":"66","author":"N.J. Cerf","year":"2002","unstructured":"Cerf, N.J., Massar, S., Schneider, S.: Multipartite classical and quantum secrecy monotones. Phys. Rev. A\u00a066, 042309 (2002)","journal-title":"Phys. Rev. A"},{"key":"25_CR13","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1109\/ISIT.1997.613003","volume-title":"Proceedings of the 1997 IEEE Symposium on Information Theory","author":"U. Maurer","year":"1997","unstructured":"Maurer, U., Wolf, S.: The intrinsic conditional mutual information and perfect secrecy. In: Proceedings of the 1997 IEEE Symposium on Information Theory, p. 88. IEEE, Los Alamitos (1997)"},{"key":"25_CR14","first-page":"3","volume":"1","author":"M. Horodecki","year":"2001","unstructured":"Horodecki, M.: Entanglement measures. Quantum Inf. Comp.\u00a01, 3\u201326 (2001)","journal-title":"Quantum Inf. Comp."},{"key":"25_CR15","doi-asserted-by":"publisher","first-page":"160502","DOI":"10.1103\/PhysRevLett.94.160502","volume":"94","author":"K. Horodecki","year":"2005","unstructured":"Horodecki, K., Horodecki, M., Horodecki, P., Oppenheim, J.: Secure key from bound entanglement. Phys. Rev. Lett.\u00a094, 160502 (2005)","journal-title":"Phys. Rev. Lett."},{"key":"25_CR16","doi-asserted-by":"crossref","first-page":"067902","DOI":"10.1103\/PhysRevLett.92.067902","volume":"92","author":"D. DiVincenzo","year":"2004","unstructured":"DiVincenzo, D., Horodecki, M., Leung, D., Smolin, J., Terhal, B.: Locking classical correlation in quantum states. Phys. Rev. Lett.\u00a092, 067902 (2004)","journal-title":"Phys. Rev. Lett."},{"key":"25_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1007\/3-540-45539-6_24","volume-title":"Advances in Cryptology - EUROCRYPT 2000","author":"U. Maurer","year":"2000","unstructured":"Maurer, U., Wolf, S.: Information-theoretic key agreement: From weak to strong secrecy for free. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol.\u00a01807, pp. 351\u2013368. Springer, Heidelberg (2000)"},{"key":"25_CR18","unstructured":"Renner, R.: Security of Quantum Key Distribution. PhD thesis, Swiss Federal Institute of Technology (ETH) Zurich, quant-ph\/0512258 (2005)"},{"key":"25_CR19","first-page":"135","volume-title":"Proceedings of the 2004 IEEE International Symposion on Information Theory","author":"M. Christandl","year":"2004","unstructured":"Christandl, M., Renner, R.: On intrinsic information. In: Proceedings of the 2004 IEEE International Symposion on Information Theory, p. 135. IEEE, Los Alamitos (2004)"},{"key":"25_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"386","DOI":"10.1007\/978-3-540-30576-7_21","volume-title":"Theory of Cryptography","author":"M. Ben-Or","year":"2005","unstructured":"Ben-Or, M., Horodecki, M., Leung, D.W., Mayers, D., Oppenheim, J.: The universal composable security of quantum key distribution. In: Kilian, J. (ed.) TCC 2005. LNCS, vol.\u00a03378, pp. 386\u2013406. Springer, Heidelberg (2005)"},{"key":"25_CR21","unstructured":"K\u00f6nig, R., Renner, R., Bariska, A., Maurer, U.: Locking of accessible information and implications for the security of quantum cryptography. (quant-ph\/0512021)"},{"key":"25_CR22","unstructured":"Horodecki, K., Horodecki, M., Horodecki, P., Oppenheim, J.: General paradigm for distilling classical key from quantum states. quant-ph\/0506189 (2005)"},{"key":"25_CR23","doi-asserted-by":"publisher","first-page":"2014","DOI":"10.1103\/PhysRevLett.84.2014","volume":"84","author":"M. Horodecki","year":"2000","unstructured":"Horodecki, M., Horodecki, P., Horodecki, R.: Limits for entanglement measures. Phys. Rev. Lett.\u00a084, 2014 (2000)","journal-title":"Phys. Rev. Lett."},{"key":"25_CR24","doi-asserted-by":"publisher","first-page":"4252","DOI":"10.1063\/1.1495917","volume":"43","author":"M. Donald","year":"2002","unstructured":"Donald, M., Horodecki, M., Rudolph, O.: The uniqueness theorem for entanglement measures. J. Math. Phys.\u00a043, 4252\u20134272 (2002)","journal-title":"J. Math. Phys."},{"key":"25_CR25","doi-asserted-by":"crossref","first-page":"032314","DOI":"10.1103\/PhysRevA.65.032314","volume":"65","author":"G. Vidal","year":"2002","unstructured":"Vidal, G., Werner, R.: A computable measure of entanglement. Phys. Rev. A\u00a065, 032314 (2002)","journal-title":"Phys. Rev. A"},{"key":"25_CR26","doi-asserted-by":"crossref","first-page":"012311","DOI":"10.1103\/PhysRevA.73.012311","volume":"73","author":"T. Moroder","year":"2006","unstructured":"Moroder, T., Curty, M., L\u00fctkenhaus, N.: Upper bound on the secret key rate distillable from effective quantum correlations with imperfect detectors. Phys. Rev. A\u00a073, 012311 (2006)","journal-title":"Phys. Rev. A"},{"key":"25_CR27","doi-asserted-by":"publisher","first-page":"829","DOI":"10.1063\/1.1643788","volume":"45","author":"M. Christandl","year":"2004","unstructured":"Christandl, M., Winter, A.: Squashed entanglement \u2014 an additive entanglement measure. J. Math. Phys.\u00a045, 829\u2013840 (2004)","journal-title":"J. Math. Phys."},{"key":"25_CR28","doi-asserted-by":"crossref","unstructured":"Alicki, R., Fannes, M.: Continuity of conditional quantum mutual information. J. Phys. A 37 (2003)","DOI":"10.1088\/0305-4470\/37\/5\/L01"},{"key":"25_CR29","unstructured":"Christandl, M.: The Structure of Bipartite Quantum States: Insights from Group Theory and Cryptography. PhD thesis, University of Cambridge (2006)"},{"key":"25_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-39200-9_35","volume-title":"Advances in Cryptology \u2013 EUROCRPYT 2003","author":"R. Renner","year":"2003","unstructured":"Renner, R., Wolf, S.: New bounds in secret-key agreement: The gap between formation and secrecy extraction. In: Biham, E. (ed.) Advances in Cryptology \u2013 EUROCRPYT 2003. LNCS, vol.\u00a02656, Springer, Heidelberg (2003)"},{"key":"25_CR31","doi-asserted-by":"publisher","first-page":"2275","DOI":"10.1103\/PhysRevLett.78.2275","volume":"78","author":"V. Vedral","year":"1997","unstructured":"Vedral, V., Plenio, M.B., Rippin, M.A., Knight, P.L.: Quantifying entanglement. Phys. Rev. Lett.\u00a078, 2275\u20132279 (1997)","journal-title":"Phys. Rev. Lett."},{"key":"25_CR32","doi-asserted-by":"publisher","first-page":"1619","DOI":"10.1103\/PhysRevA.57.1619","volume":"57","author":"V. Vedral","year":"1998","unstructured":"Vedral, V., Plenio, M.B.: Entanglement measures and purification procedures. Phys. Rev. A\u00a057, 1619\u20131633 (1998)","journal-title":"Phys. Rev. A"},{"key":"25_CR33","doi-asserted-by":"crossref","first-page":"200501","DOI":"10.1103\/PhysRevLett.94.200501","volume":"94","author":"K. Horodecki","year":"2005","unstructured":"Horodecki, K., Horodecki, M., Horodecki, P., Oppenheim, J.: Locking entanglement with a single qubit. Phys. Rev. Lett.\u00a094, 200501 (2005)","journal-title":"Phys. Rev. Lett."},{"key":"25_CR34","doi-asserted-by":"publisher","first-page":"3159","DOI":"10.1109\/TIT.2005.853338","volume":"51","author":"M. Christandl","year":"2005","unstructured":"Christandl, M., Winter, A.: Uncertainty, monogamy and locking of quantum correlations. IEEE Transactions on Information Theory\u00a051, 3159\u20133165, quant-ph\/0501090 (2005)","journal-title":"IEEE Transactions on Information Theory"},{"key":"25_CR35","doi-asserted-by":"publisher","first-page":"1070","DOI":"10.1103\/PhysRevA.59.1070","volume":"59","author":"C.H. Bennett","year":"1999","unstructured":"Bennett, C.H., DiVincenzo, D.P., Fuchs, C.A., Mor, T., Rains, E., Shor, P.W., Smolin, J., Wootters, W.K.: Quantum nonlocality without entanglement. Phys. Rev. A\u00a059, 1070 (1999)","journal-title":"Phys. Rev. A"},{"key":"25_CR36","doi-asserted-by":"crossref","first-page":"117901","DOI":"10.1103\/PhysRevLett.91.117901","volume":"91","author":"P. Badzia\u0327g","year":"2003","unstructured":"Badzia\u0327g, P., Horodecki, M., Sen(De), A., Sen, U.: Universal Holevo-like bound for locally accesible information. Phys. Rev. Lett.\u00a091, 117901 (2003)","journal-title":"Phys. Rev. Lett."},{"key":"25_CR37","doi-asserted-by":"crossref","first-page":"107903","DOI":"10.1103\/PhysRevLett.92.107903","volume":"92","author":"A. Acin","year":"2004","unstructured":"Acin, A., Cirac, I., Massanes, L.: Multipartite bound information exists and can be activated. Phys. Rev. Lett.\u00a092, 107903 (2004)","journal-title":"Phys. Rev. Lett."},{"key":"25_CR38","doi-asserted-by":"publisher","first-page":"3824","DOI":"10.1103\/PhysRevA.54.3824","volume":"54","author":"C.H. Bennett","year":"1997","unstructured":"Bennett, C.H., DiVincenzo, D.P., Smolin, J., Wootters, W.K.: Mixed-state entanglement and quantum error correction. Phys. Rev. A\u00a054, 3824\u20133851 (1997)","journal-title":"Phys. Rev. A"},{"key":"25_CR39","unstructured":"Christandl, M.: The quantum analog to intrinsic information. Diploma Thesis, Institute for Theoretical Computer Science, ETH Zurich (2002)"},{"key":"25_CR40","unstructured":"Renner, R.: Linking information theoretic secret-key agreement and quantum purification. Diploma Thesis, Institute for Theoretical Computer Science, ETH Zurich (2000)"},{"key":"25_CR41","doi-asserted-by":"publisher","first-page":"2657","DOI":"10.1103\/PhysRevLett.85.2657","volume":"85","author":"P. Horodecki","year":"2000","unstructured":"Horodecki, P., Lewenstein, M.: Bound entanglement and continuous variables. Phys. Rev. Lett.\u00a085, 2657 (2000)","journal-title":"Phys. Rev. Lett."},{"key":"25_CR42","doi-asserted-by":"publisher","first-page":"2270","DOI":"10.1109\/ISIT.2005.1523752","volume-title":"Proceedings of the 2005 IEEE International Symposium on Information Theory","author":"A. Winter","year":"2005","unstructured":"Winter, A.: Secret, public and quantum correlation cost of triples of random variables. In: Proceedings of the 2005 IEEE International Symposium on Information Theory, pp. 2270\u20132274. IEEE Computer Society Press, Los Alamitos (2005)"}],"container-title":["Lecture Notes in Computer Science","Theory of Cryptography"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-70936-7_25.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T05:12:56Z","timestamp":1605762776000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-70936-7_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540709350","9783540709367"],"references-count":42,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-70936-7_25","relation":{},"subject":[]}}