{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T09:48:18Z","timestamp":1725702498715},"publisher-location":"Berlin, Heidelberg","reference-count":48,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642338595"},{"type":"electronic","value":"9783642338601"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-33860-1_12","type":"book-chapter","created":{"date-parts":[[2012,9,26]],"date-time":"2012-09-26T22:44:30Z","timestamp":1348699470000},"page":"133-146","source":"Crossref","is-referenced-by-count":3,"title":["On the Security of Interferometric Quantum Key Distribution"],"prefix":"10.1007","author":[{"given":"Ran","family":"Gelles","sequence":"first","affiliation":[]},{"given":"Tal","family":"Mor","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"6B","key":"12_CR1","doi-asserted-by":"publisher","first-page":"1410","DOI":"10.1103\/PhysRev.134.B1410","volume":"134","author":"Y. Aharonov","year":"1964","unstructured":"Aharonov, Y., Bergmann, P.G., Lebowitz, J.L.: Time symmetry in the quantum process of measurement. Phys. Rev.\u00a0134(6B), B1410\u2013B1416 (1964)","journal-title":"Phys. Rev."},{"issue":"1","key":"12_CR2","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1103\/PhysRevA.41.11","volume":"41","author":"Y. Aharonov","year":"1990","unstructured":"Aharonov, Y., Vaidman, L.: Properties of a quantum system during the time interval between two measurements. Physical Review A\u00a041(1), 11\u201320 (1990)","journal-title":"Physical Review A"},{"key":"12_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"386","DOI":"10.1007\/978-3-540-30576-7_21","volume-title":"Theory of Cryptography","author":"M. Ben-Or","year":"2005","unstructured":"Ben-Or, M., Horodecki, M., Leung, D.W., Mayers, D., Oppenheim, J.: The Universal Composable Security of Quantum Key Distribution. In: Kilian, J. (ed.) TCC 2005. LNCS, vol.\u00a03378, pp. 386\u2013406. Springer, Heidelberg (2005)"},{"issue":"21","key":"12_CR4","doi-asserted-by":"publisher","first-page":"3121","DOI":"10.1103\/PhysRevLett.68.3121","volume":"68","author":"C.H. Bennett","year":"1992","unstructured":"Bennett, C.H.: Quantum cryptography using any two nonorthogonal states. Physical Review Letters\u00a068(21), 3121\u20133124 (1992)","journal-title":"Physical Review Letters"},{"unstructured":"Bennett, C.H., Brassard, G.: Quantum Cryptography: Public key distribution and coin tossing. In: Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, pp. 175\u2013179 (December 1984)","key":"12_CR5"},{"issue":"4","key":"12_CR6","doi-asserted-by":"publisher","first-page":"381","DOI":"10.1007\/s00145-005-0011-3","volume":"19","author":"E. Biham","year":"2006","unstructured":"Biham, E., Boyer, M., Boykin, P.O., Mor, T., Roychowdhury, V.P.: A proof of the security of quantum key distribution. J. Cryptology\u00a019(4), 381\u2013439 (2006)","journal-title":"J. Cryptology"},{"issue":"4","key":"12_CR7","doi-asserted-by":"publisher","first-page":"2651","DOI":"10.1103\/PhysRevA.54.2651","volume":"54","author":"E. Biham","year":"1996","unstructured":"Biham, E., Huttner, B., Mor, T.: Quantum cryptographic network based on quantum memories. Physical Review A\u00a054(4), 2651\u20132658 (1996)","journal-title":"Physical Review A"},{"issue":"13","key":"12_CR8","doi-asserted-by":"publisher","first-page":"846","DOI":"10.1049\/el:20010508","volume":"37","author":"G. Bonfrate","year":"2001","unstructured":"Bonfrate, G., Harlow, M., Ford, C., Maxwell, G., Townsend, P.: Asymmetric mach-zehnder germano-silicate channel waveguide interferometers for quantum cryptography systems. Electronics Letters\u00a037(13), 846\u2013847 (2001)","journal-title":"Electronics Letters"},{"issue":"14","key":"12_CR9","doi-asserted-by":"publisher","first-page":"140501","DOI":"10.1103\/PhysRevLett.99.140501","volume":"99","author":"M. Boyer","year":"2007","unstructured":"Boyer, M., Kenigsberg, D., Mor, T.: Quantum Key Distribution with Classical Bob. Physical Review Letters\u00a099(14), 140501 (2007)","journal-title":"Physical Review Letters"},{"issue":"3","key":"12_CR10","doi-asserted-by":"publisher","first-page":"32341","DOI":"10.1103\/PhysRevA.79.032341","volume":"79","author":"M. Boyer","year":"2009","unstructured":"Boyer, M., Gelles, R., Kenigsberg, D., Mor, T.: Semiquantum key distribution. Physical Review A\u00a079(3), 032341 (2009)","journal-title":"Physical Review A"},{"key":"12_CR11","series-title":"LNCS","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1007\/978-3-642-33860-1_9","volume-title":"Proceedings of the 1st International Conference on Theory and Practice of Natural Computing","author":"M. Boyer","year":"2012","unstructured":"Boyer, M., Gelles, R., Mor, T.: Attacks on Fixed Apparatus Quantum Key Distribution Schemes. In: Dediu, A.-H., Mart\u00edn-Vide, C., Truthe, B. (eds.) TPNC 2012. LNCS, pp. 97\u2013107. Springer, Heidelberg (2012)"},{"issue":"4","key":"12_CR12","first-page":"396","volume":"5","author":"P.O. Boykin","year":"2005","unstructured":"Boykin, P.O., Roychowdhury, V.P.: Information vs. disturbance in dimension d. Quantum Info. Comput.\u00a05(4), 396\u2013412 (2005)","journal-title":"Quantum Info. Comput."},{"issue":"6","key":"12_CR13","doi-asserted-by":"publisher","first-page":"1330","DOI":"10.1103\/PhysRevLett.85.1330","volume":"85","author":"G. Brassard","year":"2000","unstructured":"Brassard, G., L\u00fctkenhaus, N., Mor, T., Sanders, B.C.: Limitations on practical quantum cryptography. Physical Review Letters\u00a085(6), 1330\u20131333 (2000)","journal-title":"Physical Review Letters"},{"key":"12_CR14","doi-asserted-by":"publisher","first-page":"3018","DOI":"10.1103\/PhysRevLett.81.3018","volume":"81","author":"D. Bru\u00df","year":"1998","unstructured":"Bru\u00df, D.: Optimal Eavesdropping in Quantum Cryptography with Six States. Physical Review Letters\u00a081, 3018\u20133021 (1998)","journal-title":"Physical Review Letters"},{"doi-asserted-by":"crossref","unstructured":"Dusek, M., L\u00fctkenhaus, N., Hendrych, M.: Chapter 5 quantum cryptography. In: Wolf, E. (ed.) Progress in Optics, vol.\u00a049, pp. 381\u2013454. Elsevier (2006)","key":"12_CR15","DOI":"10.1016\/S0079-6638(06)49005-3"},{"doi-asserted-by":"crossref","unstructured":"Elliott, C., Pearson, D., Troxel, G.: Quantum cryptography in practice. In: SIGCOMM 2003, pp. 227\u2013238 (2003)","key":"12_CR16","DOI":"10.1145\/863981.863982"},{"issue":"2","key":"12_CR17","doi-asserted-by":"publisher","first-page":"1163","DOI":"10.1103\/PhysRevA.56.1163","volume":"56","author":"C.A. Fuchs","year":"1997","unstructured":"Fuchs, C.A., Gisin, N., Griffiths, R.B., Niu, C.S., Peres, A.: Optimal eavesdropping in quantum cryptography. i. information bound and optimal strategy. Physical Review A\u00a056(2), 1163\u20131172 (1997)","journal-title":"Physical Review A"},{"issue":"4","key":"12_CR18","doi-asserted-by":"publisher","first-page":"2038","DOI":"10.1103\/PhysRevA.53.2038","volume":"53","author":"C.A. Fuchs","year":"1996","unstructured":"Fuchs, C.A., Peres, A.: Quantum-state disturbance versus information gain: Uncertainty relations for quantum information. Physical Review A\u00a053(4), 2038\u20132045 (1996)","journal-title":"Physical Review A"},{"unstructured":"Gelles, R., Mor, T.: On the security of interferometric quantum key distribution (2011), (full version) arXiv:1110.6573","key":"12_CR19"},{"issue":"1","key":"12_CR20","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1103\/RevModPhys.74.145","volume":"74","author":"N. Gisin","year":"2002","unstructured":"Gisin, N., Ribordy, G., Tittel, W., Zbinden, H.: Quantum cryptography. Reviews of Modern Physics\u00a074(1), 145\u2013195 (2002)","journal-title":"Reviews of Modern Physics"},{"issue":"19","key":"12_CR21","doi-asserted-by":"publisher","first-page":"3762","DOI":"10.1063\/1.1738173","volume":"84","author":"C. Gobby","year":"2004","unstructured":"Gobby, C., Yuan, Z.L., Shields, A.J.: Quantum key distribution over 122 km of standard telecom fiber. Applied Physics Letters\u00a084(19), 3762\u20133764 (2004)","journal-title":"Applied Physics Letters"},{"key":"12_CR22","doi-asserted-by":"crossref","first-page":"325","DOI":"10.26421\/QIC4.5-1","volume":"5","author":"D. Gottesman","year":"2004","unstructured":"Gottesman, D., Lo, H.-K., L\u00fctkenhaus, N., Preskill, J.: Security of quantum key distribution with imperfect devices. Quantum Information and Computation\u00a05, 325\u2013360 (2004)","journal-title":"Quantum Information and Computation"},{"doi-asserted-by":"crossref","unstructured":"Hughes, R.J., Luther, G.G., Morgan, G.L., Simmons, C.: Quantum cryptography over 14km of installed optical fiber. In: Rochester Conference on Coherence and Quantum Optics, pp. 7\u201310 (June 1995)","key":"12_CR23","DOI":"10.1007\/978-1-4757-9742-8_15"},{"key":"12_CR24","doi-asserted-by":"publisher","first-page":"599","DOI":"10.1140\/epjd\/e2007-00010-4","volume":"41","author":"H. Inamori","year":"2007","unstructured":"Inamori, H., L\u00fctkenhaus, N., Mayers, D.: Unconditional security of practical quantum key distribution. European Physical Journal D\u00a041, 599\u2013627 (2007)","journal-title":"European Physical Journal D"},{"issue":"3","key":"12_CR25","doi-asserted-by":"publisher","first-page":"37902","DOI":"10.1103\/PhysRevLett.89.037902","volume":"89","author":"K. Inoue","year":"2002","unstructured":"Inoue, K., Waks, E., Yamamoto, Y.: Differential phase shift quantum key distribution. Physical Review Letters\u00a089(3), 037902 (2002)","journal-title":"Physical Review Letters"},{"doi-asserted-by":"crossref","unstructured":"Jaeger, G., Sergienko, A.: Entangled states in quantum key distribution. In: AIP Conference Proceedings, vol.\u00a0810(1), pp. 161\u2013167 (2006)","key":"12_CR26","DOI":"10.1063\/1.2158719"},{"issue":"5","key":"12_CR27","doi-asserted-by":"publisher","first-page":"52304","DOI":"10.1103\/PhysRevA.61.052304","volume":"61","author":"N. L\u00fctkenhaus","year":"2000","unstructured":"L\u00fctkenhaus, N.: Security against individual attacks for realistic quantum key distribution. Physical Review A\u00a061(5), 052304 (2000)","journal-title":"Physical Review A"},{"key":"12_CR28","doi-asserted-by":"publisher","first-page":"691","DOI":"10.1080\/09500340410001730986","volume":"52","author":"V. Makarov","year":"2005","unstructured":"Makarov, V., Hjelme, D.R.: Faked states attack on quantum cryptosystems. Journal of Modern Optics\u00a052, 691\u2013705 (2005)","journal-title":"Journal of Modern Optics"},{"key":"12_CR29","doi-asserted-by":"publisher","first-page":"22313","DOI":"10.1103\/PhysRevA.74.022313","volume":"74","author":"V. Makarov","year":"2006","unstructured":"Makarov, V., Anisimov, A., Skaar, J.: Effects of detector efficiency mismatch on security of quantum cryptosystems. Physical Review A\u00a074, 022313 (2006)","journal-title":"Physical Review A"},{"key":"12_CR30","doi-asserted-by":"publisher","first-page":"32337","DOI":"10.1103\/PhysRevA.82.032337","volume":"82","author":"\u00d8. Mar\u00f8y","year":"2010","unstructured":"Mar\u00f8y, \u00d8., Lydersen, L., Skaar, J.: Security of quantum key distribution with arbitrary individual imperfections. Physical Review A\u00a082, 032337 (2010)","journal-title":"Physical Review A"},{"issue":"3","key":"12_CR31","first-page":"351","volume":"48","author":"D. Mayers","year":"2001","unstructured":"Mayers, D.: Unconditional security in quantum cryptography. J.\u00a0ACM\u00a048(3), 351\u2013406 (2001)","journal-title":"J.\u00a0ACM"},{"unstructured":"Mayers, D., Yao, A.: Quantum cryptography with imperfect apparatus. In: FOCS 1998, p. 503 (1998)","key":"12_CR32"},{"issue":"7","key":"12_CR33","doi-asserted-by":"publisher","first-page":"793","DOI":"10.1063\/1.118224","volume":"70","author":"A. Muller","year":"1997","unstructured":"Muller, A., Herzog, T., Huttner, B., Tittel, W., Zbinden, H., Gisin, N.: \u201cPlug and play\u201d systems for quantum cryptography. Applied Physics Letters\u00a070(7), 793\u2013795 (1997)","journal-title":"Applied Physics Letters"},{"unstructured":"Nambu, Y., Hatanaka, T., Nakamura, K.: Planar lightwave circuits for quantum cryptographic systems. Arxiv:quant-ph\/0307074 (2003)","key":"12_CR34"},{"issue":"8B","key":"12_CR35","doi-asserted-by":"publisher","first-page":"1109","DOI":"10.1143\/JJAP.43.L1109","volume":"43","author":"Y. Nambu","year":"2004","unstructured":"Nambu, Y., Hatanaka, T., Nakamura, K.: BB84 quantum key distribution system based on silica-based planar lightwave circuits. Japanese Journal of Applied Physics\u00a043(8B), L1109\u2013L1110 (2004)","journal-title":"Japanese Journal of Applied Physics"},{"issue":"12","key":"12_CR36","doi-asserted-by":"publisher","first-page":"1953","DOI":"10.1080\/09500340801942414","volume":"55","author":"Y. Nambu","year":"2008","unstructured":"Nambu, Y., Yoshino, K., Tomita, A.: Quantum encoder and decoder for practical quantum key distribution using a planar lightwave circuit. Journal of Modern Optics\u00a055(12), 1953\u20131970 (2008)","journal-title":"Journal of Modern Optics"},{"issue":"4","key":"12_CR37","doi-asserted-by":"publisher","first-page":"897","DOI":"10.1109\/JSTQE.2006.876175","volume":"12","author":"M. Nazarathy","year":"2006","unstructured":"Nazarathy, M., Tselniker, I., Regev, Y., Orenstein, M., Katz, M.: Integrated-optical realizations of quantum key distribution over maximally unbiased bases. IEEE Journal of Selected Topics in Quantum Electronics\u00a012(4), 897\u2013913 (2006)","journal-title":"IEEE Journal of Selected Topics in Quantum Electronics"},{"issue":"12","key":"12_CR38","doi-asserted-by":"publisher","first-page":"1533","DOI":"10.1364\/OL.30.001533","volume":"30","author":"M. Nazarathy","year":"2005","unstructured":"Nazarathy, M.: Quantum key distribution over a fiber-optic channel by means of pulse position modulation. Opt. Lett.\u00a030(12), 1533\u20131535 (2005)","journal-title":"Opt. Lett."},{"unstructured":"Renner, R.: Security of Quantum Key Distribution. Ph.D. thesis, Swiss Federal Institute of Technology, Zurich (2005)","key":"12_CR39"},{"issue":"2","key":"12_CR40","doi-asserted-by":"publisher","first-page":"441","DOI":"10.1103\/PhysRevLett.85.441","volume":"85","author":"P.W. Shor","year":"2000","unstructured":"Shor, P.W., Preskill, J.: Simple proof of security of the BB84 quantum key distribution protocol. Physical Review Letters\u00a085(2), 441\u2013444 (2000)","journal-title":"Physical Review Letters"},{"key":"12_CR41","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1088\/1367-2630\/4\/1\/341","volume":"4","author":"D. Stucki","year":"2002","unstructured":"Stucki, D., Gisin, N., Guinnard, O., Ribordy, G., Zbinden, H.: Quantum key distribution over 67 km with a plug&play system. New Journal of Physics\u00a04, 41 (2002)","journal-title":"New Journal of Physics"},{"key":"12_CR42","doi-asserted-by":"publisher","first-page":"232","DOI":"10.1088\/1367-2630\/7\/1\/232","volume":"7","author":"H. Takesue","year":"2005","unstructured":"Takesue, H., Diamanti, E., Honjo, T., Langrock, C., Fejer, M.M., Inoue, K., Yamamoto, Y.: Differential phase shift quantum key distribution experiment over 105km fibre. New Journal of Physics\u00a07, 232 (2005)","journal-title":"New Journal of Physics"},{"key":"12_CR43","doi-asserted-by":"publisher","first-page":"5757","DOI":"10.1143\/JJAP.45.5757","volume":"45","author":"H. Takesue","year":"2006","unstructured":"Takesue, H., Honjo, T., Kamada, H.: Differential phase shift quantum key distribution using 1.3-\u03bcm up-conversion detectors. Japanese Journal of Applied Physics\u00a045, 5757 (2006)","journal-title":"Japanese Journal of Applied Physics"},{"key":"12_CR44","doi-asserted-by":"publisher","first-page":"809","DOI":"10.1049\/el:19940558","volume":"30","author":"P.D. Townsend","year":"1994","unstructured":"Townsend, P.D.: Secure key distribution system based on quantum cryptography. Electronics Letters\u00a030, 809\u2013811 (1994)","journal-title":"Electronics Letters"},{"issue":"1","key":"12_CR45","doi-asserted-by":"publisher","first-page":"12344","DOI":"10.1103\/PhysRevA.73.012344","volume":"73","author":"E. Waks","year":"2006","unstructured":"Waks, E., Takesue, H., Yamamoto, Y.: Security of differential-phase-shift quantum key distribution against individual attacks. Physical Review A (Atomic, Molecular, and Optical Physics)\u00a073(1), 012344 (2006)","journal-title":"Physical Review A (Atomic, Molecular, and Optical Physics)"},{"issue":"8","key":"12_CR46","doi-asserted-by":"publisher","first-page":"87901","DOI":"10.1103\/PhysRevLett.91.087901","volume":"91","author":"Z.D. Walton","year":"2003","unstructured":"Walton, Z.D., Abouraddy, A.F., Sergienko, A.V., Saleh, B.E.A., Teich, M.C.: Decoherence-free subspaces in quantum key distribution. Physical Review Letters\u00a091(8), 087901 (2003)","journal-title":"Physical Review Letters"},{"issue":"2","key":"12_CR47","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1364\/OL.37.000223","volume":"37","author":"K. Yoshino","year":"2012","unstructured":"Yoshino, K., Fujiwara, M., Tanaka, A., Takahashi, S., Nambu, Y., Tomita, A., Miki, S., Yamashita, T., Wang, Z., Sasaki, M., Tajima, A.: High-speed wavelength-division multiplexing quantum key distribution system. Opt. Lett.\u00a037(2), 223\u2013225 (2012)","journal-title":"Opt. Lett."},{"issue":"5","key":"12_CR48","doi-asserted-by":"publisher","first-page":"52312","DOI":"10.1103\/PhysRevA.79.052312","volume":"79","author":"X. Zou","year":"2009","unstructured":"Zou, X., Qiu, D., Li, L., Wu, L., Li, L.: Semiquantum-key distribution using less than four quantum states. Physical Review A\u00a079(5), 052312 (2009)","journal-title":"Physical Review A"}],"container-title":["Lecture Notes in Computer Science","Theory and Practice of Natural Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-33860-1_12.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,29]],"date-time":"2022-01-29T17:14:28Z","timestamp":1643476468000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-33860-1_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642338595","9783642338601"],"references-count":48,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-33860-1_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}