{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T02:02:28Z","timestamp":1742954548965,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":26,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642544286"},{"type":"electronic","value":"9783642544293"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-642-54429-3_9","type":"book-chapter","created":{"date-parts":[[2014,3,7]],"date-time":"2014-03-07T09:33:06Z","timestamp":1394184786000},"page":"143-152","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Long Distance Quantum Key Distribution with Continuous Variables"],"prefix":"10.1007","author":[{"given":"Anthony","family":"Leverrier","sequence":"first","affiliation":[]},{"given":"Philippe","family":"Grangier","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,3,8]]},"reference":[{"issue":"3","key":"9_CR1","doi-asserted-by":"publisher","first-page":"1301","DOI":"10.1103\/RevModPhys.81.1301","volume":"81","author":"V Scarani","year":"2009","unstructured":"Scarani, V., et al.: The security of practical quantum key distribution. Rev. Mod. Phys. 81(3), 1301\u20131350 (2009)","journal-title":"Rev. Mod. Phys."},{"key":"9_CR2","unstructured":"Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. In: Proceedings of IEEE International Conference on Computers Systems and Signal Processing, vol. 175 (1984)"},{"issue":"7","key":"9_CR3","doi-asserted-by":"publisher","first-page":"075003","DOI":"10.1088\/1367-2630\/11\/7\/075003","volume":"11","author":"D Stucki","year":"2009","unstructured":"Stucki, D., et al.: High rate, long-distance quantum key distribution over 250 km of ultra low loss fibres. New J. Phys. 11(7), 075003 (2009)","journal-title":"New J. Phys."},{"issue":"5","key":"9_CR4","doi-asserted-by":"publisher","first-page":"052323","DOI":"10.1103\/PhysRevA.76.052323","volume":"76","author":"B Qi","year":"2007","unstructured":"Qi, B., Huang, L.L., Qian, L., Lo, H.K.: Experimental study on the Gaussian-modulated coherent-state quantum key distribution over standard telecommunication fibers. Phys. Rev. A 76(5), 052323 (2007)","journal-title":"Phys. Rev. A"},{"issue":"4","key":"9_CR5","doi-asserted-by":"publisher","first-page":"042305","DOI":"10.1103\/PhysRevA.76.042305","volume":"76","author":"J Lodewyck","year":"2007","unstructured":"Lodewyck, J., Bloch, M., Garc\u00eda-Patr\u00f3n, R., Fossier, S., Karpov, E., Diamanti, E., Debuisschert, T., Cerf, N.J., Tualle-Brouri, R., McLaughlin, S.W., Grangier, P.: Quantum key distribution over 25 km with an all-fiber continuous-variable system. Phys. Rev. A 76(4), 042305 (2007)","journal-title":"Phys. Rev. A"},{"issue":"26","key":"9_CR6","doi-asserted-by":"publisher","first-page":"24244","DOI":"10.1364\/OE.17.024244","volume":"17","author":"Q Dinh Xuan","year":"2009","unstructured":"Dinh Xuan, Q., Zhang, Z., Voss, P.L.: A 24 km fiber-based discretely signaled continuous variable quantum key distribution system. Opt. Express 17(26), 24244\u201324249 (2009)","journal-title":"Opt. Express"},{"issue":"1","key":"9_CR7","doi-asserted-by":"publisher","first-page":"013003","DOI":"10.1088\/1367-2630\/13\/1\/013003","volume":"13","author":"YM Chi","year":"2011","unstructured":"Chi, Y.M., Qi, B., Zhu, W., Qian, L., Lo, H.K., Youn, S.H., Lvovsky, A.I., Tian, L.: A balanced homodyne detector for high-rate Gaussian-modulated coherent-state quantum key distribution. New J. Phys. 13(1), 013003 (2011)","journal-title":"New J. Phys."},{"issue":"18","key":"9_CR8","doi-asserted-by":"publisher","first-page":"180504","DOI":"10.1103\/PhysRevLett.102.180504","volume":"102","author":"A Leverrier","year":"2009","unstructured":"Leverrier, A., Grangier, P.: Unconditional security proof of long-distance continuous-variable quantum key distribution with discrete modulation. Phys. Rev. Lett. 102(18), 180504 (2009)","journal-title":"Phys. Rev. Lett."},{"key":"9_CR9","doi-asserted-by":"crossref","unstructured":"Leverrier, A., Grangier, P.: Continuous-variable quantum key distribution protocols with a discrete modulation. Arxiv preprint 1002.4083 (2010)","DOI":"10.1103\/PhysRevA.81.062343"},{"issue":"1","key":"9_CR10","doi-asserted-by":"publisher","first-page":"010303(R)","DOI":"10.1103\/PhysRevA.61.010303","volume":"61","author":"TC Ralph","year":"1999","unstructured":"Ralph, T.C.: Continuous variable quantum cryptography. Phys. Rev. A 61(1), 010303(R) (1999)","journal-title":"Phys. Rev. A"},{"issue":"19","key":"9_CR11","doi-asserted-by":"publisher","first-page":"190503","DOI":"10.1103\/PhysRevLett.97.190503","volume":"97","author":"R Garc\u00eda-Patr\u00f3n","year":"2006","unstructured":"Garc\u00eda-Patr\u00f3n, R., Cerf, N.J.: Unconditional optimality of Gaussian attacks against continuous-variable quantum key distribution. Phys. Rev. Lett. 97(19), 190503 (2006)","journal-title":"Phys. Rev. Lett."},{"issue":"19","key":"9_CR12","doi-asserted-by":"publisher","first-page":"190502","DOI":"10.1103\/PhysRevLett.97.190502","volume":"97","author":"M Navascu\u00e9s","year":"2006","unstructured":"Navascu\u00e9s, M., Grosshans, F., Ac\u00edn, A.: Optimality of Gaussian attacks in continuous-variable quantum cryptography. Phys. Rev. Lett. 97(19), 190502 (2006)","journal-title":"Phys. Rev. Lett."},{"issue":"6","key":"9_CR13","doi-asserted-by":"publisher","first-page":"062314","DOI":"10.1103\/PhysRevA.81.062314","volume":"81","author":"A Leverrier","year":"2010","unstructured":"Leverrier, A., Grangier, P.: Simple proof that Gaussian attacks are optimal among collective attacks against continuous-variable quantum key distribution with a gaussian modulation. Phys. Rev. A 81(6), 062314 (2010)","journal-title":"Phys. Rev. A"},{"issue":"11","key":"9_CR14","doi-asserted-by":"publisher","first-page":"110504","DOI":"10.1103\/PhysRevLett.102.110504","volume":"102","author":"R Renner","year":"2009","unstructured":"Renner, R., De Cirac, J.I.: Finetti representation theorem for infinite-dimensional quantum systems and applications to quantum cryptography. Phys. Rev. Lett. 102(11), 110504 (2009)","journal-title":"Phys. Rev. Lett."},{"issue":"6","key":"9_CR15","doi-asserted-by":"publisher","first-page":"062343","DOI":"10.1103\/PhysRevA.81.062343","volume":"81","author":"A Leverrier","year":"2010","unstructured":"Leverrier, A., Grosshans, F., Grangier, P.: Finite-size analysis of a continuous-variable quantum key distribution. Phys. Rev. A 81(6), 062343 (2010)","journal-title":"Phys. Rev. A"},{"key":"9_CR16","unstructured":"Leverrier, A.: Theoretical study of continuous-variable quantum key distribution. Ph.D. thesis, Ecole Nationale Sup\u00e9rieure des T\u00e9l\u00e9communications (2009)"},{"issue":"5","key":"9_CR17","doi-asserted-by":"publisher","first-page":"057902","DOI":"10.1103\/PhysRevLett.88.057902","volume":"88","author":"F Grosshans","year":"2002","unstructured":"Grosshans, F., Grangier, P.: Continuous variable quantum cryptography using coherent states. Phys. Rev. Lett. 88(5), 057902 (2002)","journal-title":"Phys. Rev. Lett."},{"issue":"2","key":"9_CR18","doi-asserted-by":"publisher","first-page":"619","DOI":"10.1109\/18.910578","volume":"47","author":"TJ Richardson","year":"2001","unstructured":"Richardson, T.J., Shokrollahi, M.A., Urbanke, R.L.: Design of capacity-approaching irregular low-density parity-checkcodes. IEEE Trans. Inf. Theory 47(2), 619\u2013637 (2001)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"9_CR19","unstructured":"Richardson, T., Urbanke, R.: Multi-edge type LDPC codes. In: Workshop Honoring Prof. Bob McEliece on his 60th Birthday, pp. 24\u201325 (2002)"},{"issue":"20","key":"9_CR20","doi-asserted-by":"publisher","first-page":"200501","DOI":"10.1103\/PhysRevLett.100.200501","volume":"100","author":"V Scarani","year":"2008","unstructured":"Scarani, V., Renner, R.: Quantum cryptography with finite resources: unconditional security bound for discrete-variable protocols with one-way postprocessing. Phys. Rev. Lett. 100(20), 200501 (2008)","journal-title":"Phys. Rev. Lett."},{"issue":"8","key":"9_CR21","doi-asserted-by":"publisher","first-page":"080502","DOI":"10.1103\/PhysRevLett.96.080502","volume":"96","author":"MM Wolf","year":"2006","unstructured":"Wolf, M.M., Giedke, G., Cirac, J.I.: Extremality of Gaussian quantum states. Phys. Rev. Lett. 96(8), 080502 (2006)","journal-title":"Phys. Rev. Lett."},{"issue":"4","key":"9_CR22","doi-asserted-by":"publisher","first-page":"042312","DOI":"10.1103\/PhysRevA.83.042312","volume":"83","author":"A Leverrier","year":"2011","unstructured":"Leverrier, A., Grangier, P.: Continuous-variable quantum-key-distribution protocols with a non-gaussian modulation. Phys. Rev. A 83(4), 042312 (2011)","journal-title":"Phys. Rev. A"},{"issue":"4","key":"9_CR23","doi-asserted-by":"publisher","first-page":"042325","DOI":"10.1103\/PhysRevA.77.042325","volume":"77","author":"A Leverrier","year":"2008","unstructured":"Leverrier, A., All\u00e9aume, R., Boutros, J., Z\u00e9mor, G., Grangier, P.: Multidimensional reconciliation for a continuous-variable quantum key distribution. Phys. Rev. A 77(4), 042325 (2008)","journal-title":"Phys. Rev. A"},{"issue":"17","key":"9_CR24","doi-asserted-by":"publisher","first-page":"170504","DOI":"10.1103\/PhysRevLett.93.170504","volume":"93","author":"C Weedbrook","year":"2004","unstructured":"Weedbrook, C., Lance, A.M., Bowen, W.P., Symul, T., Ralph, T.C., Lam, P.K.: Quantum cryptography without switching. Phys. Rev. Lett. 93(17), 170504 (2004)","journal-title":"Phys. Rev. Lett."},{"issue":"4","key":"9_CR25","doi-asserted-by":"publisher","first-page":"045024","DOI":"10.1088\/1367-2630\/11\/4\/045024","volume":"11","author":"RYQ Cai","year":"2009","unstructured":"Cai, R.Y.Q., Scarani, V.: Finite-key analysis for practical implementations of quantum key distribution. New J. Phys. 11(4), 045024 (2009)","journal-title":"New J. Phys."},{"issue":"6711","key":"9_CR26","doi-asserted-by":"publisher","first-page":"537","DOI":"10.1038\/25059","volume":"396","author":"P Grangier","year":"1998","unstructured":"Grangier, P., Levenson, J.A., Poizat, J.P.: Quantum non-demolition measurements in optics. Nature 396(6711), 537\u2013542 (1998)","journal-title":"Nature"}],"container-title":["Lecture Notes in Computer Science","Theory of Quantum Computation, Communication, and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-54429-3_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,19]],"date-time":"2023-02-19T22:50:17Z","timestamp":1676847017000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-642-54429-3_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783642544286","9783642544293"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-54429-3_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"8 March 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}