{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,31]],"date-time":"2022-03-31T12:20:25Z","timestamp":1648729225341},"reference-count":64,"publisher":"Springer Science and Business Media LLC","issue":"1-2","license":[{"start":{"date-parts":[[2006,9,16]],"date-time":"2006-09-16T00:00:00Z","timestamp":1158364800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Informatik Forsch. Entw."],"published-print":{"date-parts":[[2006,10,5]]},"DOI":"10.1007\/s00450-006-0009-6","type":"journal-article","created":{"date-parts":[[2006,9,15]],"date-time":"2006-09-15T10:45:07Z","timestamp":1158317107000},"page":"29-37","source":"Crossref","is-referenced-by-count":1,"title":["Secret keys from quantum correlations"],"prefix":"10.1007","volume":"21","author":[{"given":"N.","family":"L\u00fctkenhaus","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2006,9,16]]},"reference":[{"key":"9_CR1","unstructured":"Acin A, Gisin N, Masanes L, Scarani V (2003) Bell\u2019s inequalities detect efficient entanglement. quant-ph\/0310166"},{"key":"9_CR2","doi-asserted-by":"crossref","first-page":"4238","DOI":"10.1103\/PhysRevA.59.4238","volume":"59","author":"H Bechmann-Pasquinucci","year":"1999","unstructured":"Bechmann-Pasquinucci H, Gisin N (1999) Incoherent and coherent eavesdropping in the 6-state protocol of quantum cryptography. Phys Rev A 59:4238\u20134248","journal-title":"Phys Rev A"},{"key":"9_CR3","unstructured":"Ben-Or M, Horodecki M, Leung DW, Mayers D, Oppenheim J (2004) The universal composable security of quantum key distribution. quant-ph\/0409078"},{"issue":"21","key":"9_CR4","doi-asserted-by":"crossref","first-page":"3121","DOI":"10.1103\/PhysRevLett.68.3121","volume":"68","author":"CH Bennett","year":"1992","unstructured":"Bennett CH (1992) Quantum cryptography using any two non-orthogonal states. Phys Rev Lett 68(21):3121\u20133124","journal-title":"Phys Rev Lett"},{"key":"9_CR5","unstructured":"Bennett CH, Brassard G (1984) Quantum cryptography: Public key distribution and coin tossing. In: Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, India, IEEE, New York, pp 175\u2013179"},{"key":"9_CR6","doi-asserted-by":"crossref","first-page":"1915","DOI":"10.1109\/18.476316","volume":"41","author":"CH Bennett","year":"1995","unstructured":"Bennett CH, Brassard G, Maurer UM (1995) Generalized privacy amplification. IEEE Trans Inf Theory 41:1915\u20131923","journal-title":"IEEE Trans Inf Theory"},{"issue":"5","key":"9_CR7","doi-asserted-by":"crossref","first-page":"722","DOI":"10.1103\/PhysRevLett.76.722","volume":"76","author":"CH Bennett","year":"1996","unstructured":"Bennett CH, Brassard G, Popescu S, Schumacher B, Smolin JA, Wootters WK (1996) Purification of noisy entanglement and faithful teleportation via noisy channels. Phys Rev Lett 76(5):722\u2013725","journal-title":"Phys Rev Lett"},{"key":"9_CR8","doi-asserted-by":"crossref","first-page":"1640","DOI":"10.1364\/AO.41.001640","volume":"41","author":"DS Bethune","year":"2002","unstructured":"Bethune DS, Navarro M, Risk WP (2002) Enhanced autocompensating quantum cryptography system. Appl Opt LP 41:1640","journal-title":"Appl Opt LP"},{"key":"9_CR9","unstructured":"Boileau JC, Tamaki K, Batuwantdawe J, Laflamme R, Renes JM (2004) Unconditional security of three state quantum key distribution protocols. quant-ph\/0412035"},{"issue":"6","key":"9_CR10","doi-asserted-by":"crossref","first-page":"1330","DOI":"10.1103\/PhysRevLett.85.1330","volume":"85","author":"G Brassard","year":"2000","unstructured":"Brassard G, L\u00fctkenhaus N, Mor T, Sanders B (2000) Limitations on practical quantum cryptography. Phys Rev Lett 85(6):1330\u20131333","journal-title":"Phys Rev Lett"},{"key":"9_CR11","doi-asserted-by":"crossref","first-page":"401","DOI":"10.1007\/s003400050826","volume":"69","author":"D Bru\u00df","year":"1999","unstructured":"Bru\u00df D (1999) On universal quantum cloning and state estimation. Appl Phys B 69:401\u2013405","journal-title":"Appl Phys B"},{"key":"9_CR12","doi-asserted-by":"crossref","first-page":"060302","DOI":"10.1103\/PhysRevA.66.060302","volume":"66","author":"HF Chau","year":"2002","unstructured":"Chau HF (2002) Practical scheme to share a secret key through a quantum channel with a 27.6% bit error rate. Phys Rev A 66:060302","journal-title":"Phys Rev A"},{"issue":"3","key":"9_CR13","doi-asserted-by":"crossref","first-page":"339","DOI":"10.1109\/TIT.1978.1055892","volume":"24","author":"I Csisz\u00e1r","year":"1978","unstructured":"Csisz\u00e1r I, K\u00f6rner J (1978) Broadcast channels with confidential messages. IEEE Trans Inf Theory 24(3):339\u2013348","journal-title":"IEEE Trans Inf Theory"},{"key":"9_CR14","unstructured":"Curty M, G\u00fchne O, Lewenstein M, L\u00fctkenhaus N (2004) Detecting two-party quantum correlations in quantum key distribution protocols. quant-ph\/0409047"},{"key":"9_CR15","doi-asserted-by":"crossref","first-page":"217903","DOI":"10.1103\/PhysRevLett.92.217903","volume":"92","author":"M Curty","year":"2004","unstructured":"Curty M, Lewenstein M, L\u00fctkenhaus N (2004) Entanglement as precondition for secure quantum key distribution. Phys Rev Lett 92:217903","journal-title":"Phys Rev Lett"},{"key":"9_CR16","doi-asserted-by":"crossref","first-page":"2818","DOI":"10.1103\/PhysRevLett.77.2818","volume":"77","author":"D Deutsch","year":"1996","unstructured":"Deutsch D, Ekert A, Josza R, Macchiavello C, Popescu S, Sanpera A (1996) Quantum privacy amplification and the security of quantum cryptography over noisy channels. Phys Rev Lett 77:2818\u20132821","journal-title":"Phys Rev Lett"},{"key":"9_CR17","doi-asserted-by":"crossref","first-page":"022306","DOI":"10.1103\/PhysRevA.62.022306","volume":"62","author":"M Du\u0161ek","year":"2000","unstructured":"Du\u0161ek M, Jahma M, L\u00fctkenhaus N (2000) Unambiguous state discrimination in quantum cryptography with weak coherent states. Phys Rev A 62:022306","journal-title":"Phys Rev A"},{"key":"9_CR18","unstructured":"Eisert J, Hyllus P, G\u00fchne O, Curty M (2004) quant-ph\/0407135"},{"key":"9_CR19","doi-asserted-by":"crossref","first-page":"3762","DOI":"10.1063\/1.1738173","volume":"84","author":"C Gobby","year":"2004","unstructured":"Gobby C, Yuan ZL, Shields AJ (2004) Quantum key distribution over 122 km of standard telecom fiber. Appl Phys Lett 84:3762\u20133764","journal-title":"Appl Phys Lett"},{"issue":"7","key":"9_CR20","doi-asserted-by":"crossref","first-page":"1239","DOI":"10.1103\/PhysRevLett.75.1239","volume":"75","author":"L Goldenberg","year":"1995","unstructured":"Goldenberg L, Vaidman L (1995) Quantum cryptography based on orthogonal states. Phys Rev Lett 75(7):1239\u20131243","journal-title":"Phys Rev Lett"},{"key":"9_CR21","doi-asserted-by":"crossref","first-page":"457","DOI":"10.1109\/TIT.2002.807289","volume":"49","author":"D Gottesman","year":"2003","unstructured":"Gottesman D, Lo HK (2003) Proof of security of quantum key distribution with two-way classical communications. IEEE Trans Inf Theory 49:457","journal-title":"IEEE Trans Inf Theory"},{"key":"9_CR22","first-page":"325","volume":"4","author":"D Gottesman","year":"2004","unstructured":"Gottesman D, Lo HK, L\u00fctkenhaus N, Preskill J (2004) Security of quantum key distribution with imperfect devices. Quantum Inf Comput 4:325","journal-title":"Quantum Inf Comput"},{"key":"9_CR23","doi-asserted-by":"crossref","first-page":"238","DOI":"10.1038\/nature01289","volume":"421","author":"F Grosshans","year":"2003","unstructured":"Grosshans F, van Assche G, Wenger J, Brouri R, Cerf NJ, Grangier Ph (2003) Quantum key distribution using gaussian-modulated coherent states. Nature 421:238\u2013241","journal-title":"Nature"},{"key":"9_CR24","unstructured":"Horodecki K, Horodecki M, Horodecki P, Oppenheim J (2003) Secure key from bound entanglement. quant-ph\/0309110"},{"key":"9_CR25","doi-asserted-by":"crossref","first-page":"5239","DOI":"10.1103\/PhysRevLett.80.5239","volume":"80","author":"M Horodecki","year":"1998","unstructured":"Horodecki M, Horodecki P, Horodecki R (1998) Mixed-state entanglement and distillation: Is there a \u201cbound\u201d entanglement in nature? Phys Rev Lett 80:5239","journal-title":"Phys Rev Lett"},{"key":"9_CR26","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1088\/1367-2630\/4\/1\/343","volume":"4","author":"RJ Hughes","year":"2002","unstructured":"Hughes RJ, Nordholt JE, Derkacs D, Peterson CG (2002) Practical free-space quantum key distribution over 10 km in daylight and at night. New J Phys 4:43","journal-title":"New J Phys"},{"issue":"3","key":"9_CR27","doi-asserted-by":"crossref","first-page":"1863","DOI":"10.1103\/PhysRevA.51.1863","volume":"51","author":"B Huttner","year":"1995","unstructured":"Huttner B, Imoto N, Gisin N, Mor T (1995) Quantum cryptography with coherent states. Phys Rev A 51(3):1863\u20131869","journal-title":"Phys Rev A"},{"key":"9_CR28","doi-asserted-by":"crossref","first-page":"057901","DOI":"10.1103\/PhysRevLett.91.057901","volume":"91","author":"W-Y Hwang","year":"2003","unstructured":"Hwang W-Y (2003) Quantum key distribution with high loss: Toward global secure communication. Phys Rev Lett 91:057901","journal-title":"Phys Rev Lett"},{"key":"9_CR29","unstructured":"Inamori H, L\u00fctkenhaus N, Mayers D (2001) Unconditional security of practical quantum key distribution. quant-ph\/0107017"},{"key":"9_CR30","doi-asserted-by":"crossref","first-page":"4729","DOI":"10.1103\/PhysRevLett.84.4729","volume":"84","author":"T Jennewein","year":"2000","unstructured":"Jennewein T, Simon C, Wiehs G, Weinfurter H, Zeilinger A (2000) Quantum cryptography with entangled photons. Phys Rev Lett 84:4729\u20134732","journal-title":"Phys Rev Lett"},{"issue":"2","key":"9_CR31","doi-asserted-by":"crossref","first-page":"L1217","DOI":"10.1143\/JJAP.43.L1217","volume":"43","author":"T Kimura","year":"2004","unstructured":"Kimura T, Nambu Y, Hatanaka T, Tomita A, Kosaka H, Nakamura K (2004) Single-photon interference over 150 km transmission using silica-based integrated-optic interferometers for quantum cryptography. Japan J Appl Phys 43(2):L1217\u2013L1219","journal-title":"Japan J Appl Phys"},{"key":"9_CR32","doi-asserted-by":"crossref","first-page":"2383","DOI":"10.1103\/PhysRevLett.79.2383","volume":"79","author":"M Koashi","year":"1997","unstructured":"Koashi M, Imoto N (1997) Quantum cryptography based on split transmission of one-bit information in two steps. Phys Rev Lett 79:2383\u20132386","journal-title":"Phys Rev Lett"},{"issue":"12","key":"9_CR33","doi-asserted-by":"crossref","first-page":"120501","DOI":"10.1103\/PhysRevLett.93.120501","volume":"93","author":"M Koashi","year":"2004","unstructured":"Koashi M (2004) Unconditional security of coherent-state quantum key distribution with a strong phase-reference pulse. Phys Rev Lett 93(12):120501","journal-title":"Phys Rev Lett"},{"key":"9_CR34","doi-asserted-by":"crossref","first-page":"450","DOI":"10.1038\/419450a","volume":"419","author":"C Kurtsiefer","year":"2002","unstructured":"Kurtsiefer C, Zarda P, Halder M, Weinfurter H, Gorman PM, Tapster PR, Rarity JG (2002) Quantum cryptography: A step towards global key distribution. Nature 419:450","journal-title":"Nature"},{"key":"9_CR35","first-page":"81","volume":"1","author":"HK Lo","year":"2001","unstructured":"Lo HK (2001) Proof of unconditional security of six-state quantum key distribution scheme. Quantum Inf Comput 1:81\u201394","journal-title":"Quantum Inf Comput"},{"key":"9_CR36","doi-asserted-by":"crossref","first-page":"2050","DOI":"10.1126\/science.283.5410.2050","volume":"283","author":"HK Lo","year":"1999","unstructured":"Lo HK, Chau HF (1999) Unconditional security of quantum key distribution over arbitrarily long distances. Science 283:2050\u20132056","journal-title":"Science"},{"key":"9_CR37","unstructured":"Lo HK, Ma X, Chen K (2004) Decoy state quantum key distribution. quant-ph\/0411004"},{"key":"9_CR38","doi-asserted-by":"crossref","first-page":"273","DOI":"10.1007\/s00340-004-1574-7","volume":"79","author":"Lorenz Korolkova","year":"2004","unstructured":"Korolkova Lorenz S, Korolkova N, Leuchs G (2004) Continuous variable quantum key distribution using polarization encoding and post selection. Appl Phys B 79:273\u2013277","journal-title":"Appl Phys B"},{"key":"9_CR39","first-page":"549","volume":"49","author":"N L\u00fctkenhaus","year":"1999","unstructured":"L\u00fctkenhaus N (1999) Security of quantum cryptography with realistic sources. Acta Phys Slovaca 49:549\u2013556","journal-title":"Acta Phys Slovaca"},{"key":"9_CR40","doi-asserted-by":"crossref","first-page":"052304","DOI":"10.1103\/PhysRevA.61.052304","volume":"61","author":"N L\u00fctkenhaus","year":"2000","unstructured":"L\u00fctkenhaus N (2000) Security against individual attacks for realistic quantum key distribution. Phys Rev A 61:052304","journal-title":"Phys Rev A"},{"key":"9_CR41","doi-asserted-by":"crossref","first-page":"44","DOI":"10.1088\/1367-2630\/4\/1\/344","volume":"4","author":"N L\u00fctkenhaus","year":"2002","unstructured":"L\u00fctkenhaus N, Jahma M (2002) Quantum key distribution with realistic states: photon-number statistics in the photon-number splitting attack. New J Phys 4:44","journal-title":"New J Phys"},{"issue":"16","key":"9_CR42","doi-asserted-by":"crossref","first-page":"1695","DOI":"10.1364\/OL.20.001695","volume":"20","author":"C Marand","year":"1995","unstructured":"Marand C, Townsend PT (1995) Quantum key distribution over distances as long as 30 km. Opt Lett 20(16):1695\u20131697","journal-title":"Opt Lett"},{"issue":"18","key":"9_CR43","doi-asserted-by":"crossref","first-page":"180502","DOI":"10.1103\/PhysRevLett.93.180502","volume":"93","author":"I Marcikic","year":"2004","unstructured":"Marcikic I, de Riedmatten H, Tittel W, Zbinden H, Legre M, Gisin N (2004) Distribution of time-bin entangled qubits over 50 km of optical fiber. Phys Rev Lett 93(18):180502","journal-title":"Phys Rev Lett"},{"key":"9_CR44","doi-asserted-by":"crossref","first-page":"499","DOI":"10.1109\/18.748999","volume":"45","author":"U Maurer","year":"1999","unstructured":"Maurer U, Wolf S (1999) Unconditionally secure key agreement and the intrinsic conditional information. IEEE Trans Inf Theory 45:499\u2013514","journal-title":"IEEE Trans Inf Theory"},{"issue":"3","key":"9_CR45","doi-asserted-by":"crossref","first-page":"733","DOI":"10.1109\/18.256484","volume":"39","author":"UM Maurer","year":"1993","unstructured":"Maurer UM (1993) Secret key agreement by public discussion from common information. IEEE Trans Inf Theory 39(3):733\u2013742","journal-title":"IEEE Trans Inf Theory"},{"key":"9_CR46","doi-asserted-by":"crossref","unstructured":"Mayers D (1996) Quantum key distribution and string oblivious transfer in noisy channels. In: Advances in Cryptology \u2013 Proceedings of Crypto \u201996, Springer, Berlin, pp 343\u2013357, available as quant-ph\/9606003","DOI":"10.1007\/3-540-68697-5_26"},{"issue":"3","key":"9_CR47","doi-asserted-by":"crossref","first-page":"351","DOI":"10.1145\/382780.382781","volume":"48","author":"D Mayers","year":"2001","unstructured":"Mayers D (2001) Unconditional security in quantum cryptography. J ACM 48(3):351\u2013406","journal-title":"J ACM"},{"issue":"8","key":"9_CR48","doi-asserted-by":"crossref","first-page":"1656","DOI":"10.1103\/PhysRevLett.82.1656","volume":"82","author":"JM M\u00e9rolla","year":"1999","unstructured":"M\u00e9rolla JM, Mazurenko Y, Goedgebuer JP, Rhodes WT (1999) Single-photon interference in sidebands of phase-modulated light for quantum cryptography. Phys Rev Lett 82(8):1656\u20131659","journal-title":"Phys Rev Lett"},{"key":"9_CR49","unstructured":"Mo XF, Zhu B, Han ZF, Gui YZ, Guo GC (2004) Intrinsic-stabilization uni-directional quantum key distribution between Beijing and Tianjin. quant-ph\/0412023"},{"issue":"7","key":"9_CR50","doi-asserted-by":"crossref","first-page":"793","DOI":"10.1063\/1.118224","volume":"70","author":"A Muller","year":"1997","unstructured":"Muller A, Herzog T, Huttner B, Tittel W, Zbinden H, Gisin N (1997) \u201cPlug and Play\u201d systems for quantum cryptography. Appl Phys Lett 70(7):793\u2013795","journal-title":"Appl Phys Lett"},{"key":"9_CR51","unstructured":"Rosenberg D et al. (2006) Long distance decoy state quantum key distribution in optical fiber. quant-ph\/0607186"},{"key":"9_CR52","doi-asserted-by":"crossref","first-page":"057901","DOI":"10.1103\/PhysRevLett.92.057901","volume":"92","author":"V Scarani","year":"2004","unstructured":"Scarani V, Ac\u00edn A, Ribordy G, Gisin N (2004) Quantum cryptography protocols robust against photon number splitting attacks for weak laser pulse implementations. Phys Rev Lett 92:057901","journal-title":"Phys Rev Lett"},{"key":"9_CR53","doi-asserted-by":"crossref","first-page":"441","DOI":"10.1103\/PhysRevLett.85.441","volume":"85","author":"PW Shor","year":"2000","unstructured":"Shor PW, Preskill J (2000) Simple proof of security of the BB84 quantum key distribution protocol. Phys Rev Lett 85:441\u2013444","journal-title":"Phys Rev Lett"},{"key":"9_CR54","doi-asserted-by":"crossref","first-page":"167901","DOI":"10.1103\/PhysRevLett.89.167901","volume":"89","author":"C Silberhorn","year":"2002","unstructured":"Silberhorn C, Ralph TC, L\u00fctkenhaus N, Leuchs G (2002) Continuous variable quantum cryptography: Beating the 3 dB loss limit. Phys Rev Lett 89:167901","journal-title":"Phys Rev Lett"},{"key":"9_CR55","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1088\/1367-2630\/4\/1\/341","volume":"4","author":"Stucki D","year":"2002","unstructured":"D Stucki, Gisin N, Guinnard O, Ribordy G, Zbinden H (2002) Quantum key distribution over 67 km with a plug&play system. New J Phys 4:41","journal-title":"New J Phys"},{"key":"9_CR56","doi-asserted-by":"crossref","first-page":"167904","DOI":"10.1103\/PhysRevLett.90.167904","volume":"90","author":"K Tamaki","year":"2003","unstructured":"Tamaki K, Koashi M, Imoto N (2003) Unconditionally secure key distribution based on two nonorthogonal states. Phys Rev Lett 90:167904","journal-title":"Phys Rev Lett"},{"key":"9_CR57","unstructured":"Tamaki K, Lo HK (2004) Unconditionally secure polarization based quantum key distribution with laser pulses implementations. quant-ph\/0412035"},{"key":"9_CR58","doi-asserted-by":"crossref","first-page":"032316","DOI":"10.1103\/PhysRevA.69.032316","volume":"69","author":"K Tamaki","year":"2004","unstructured":"Tamaki K, L\u00fctkenhus N (2004) Unconditional security of the Bennett 1992 quantum key-distribution protocol over a lossy and noisy channel. Phys Rev A 69:032316","journal-title":"Phys Rev A"},{"key":"9_CR59","unstructured":"Tamaki K, L\u00fctkenhaus N, Koashi M, Batuwantudawe J (2006) Unconditional security of the Bennett 1992 quantum key-distribution scheme with strong reference pulse. quant-ph\/0607082"},{"key":"9_CR60","unstructured":"Ursin R et al. (2006) Free-Space distribution of entanglement and single photons over 144 km. quant-ph\/0607182"},{"key":"9_CR61","first-page":"295","volume":"45","author":"GS Vernam","year":"1926","unstructured":"Vernam GS (1926) Cipher printing telegraph systems. J AIEE 45:295","journal-title":"J AIEE"},{"key":"9_CR62","unstructured":"Wang XB (2004) Beating the pns attack in practical quantum cryptography. quant-ph\/0410075"},{"key":"9_CR63","unstructured":"Wang XB (2004) A decoy-state protocol for quantum cryptography with 4 intensities of coherent light. quant-ph\/0411047"},{"key":"9_CR64","doi-asserted-by":"crossref","first-page":"265","DOI":"10.1016\/0022-0000(81)90033-7","volume":"22","author":"MN Wegman","year":"1981","unstructured":"Wegman MN, Carter JL (1981) New hash functions and their use in authenticationand set equality. J Comput Syst Sci 22:265\u2013279","journal-title":"J Comput Syst Sci"}],"container-title":["Informatik - Forschung und Entwicklung"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00450-006-0009-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00450-006-0009-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00450-006-0009-6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,29]],"date-time":"2019-05-29T09:32:44Z","timestamp":1559122364000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00450-006-0009-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,9,16]]},"references-count":64,"journal-issue":{"issue":"1-2","published-print":{"date-parts":[[2006,10,5]]}},"alternative-id":["9"],"URL":"https:\/\/doi.org\/10.1007\/s00450-006-0009-6","relation":{},"ISSN":["0178-3564","0949-2925"],"issn-type":[{"value":"0178-3564","type":"print"},{"value":"0949-2925","type":"electronic"}],"subject":[],"published":{"date-parts":[[2006,9,16]]}}}