{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,5,14]],"date-time":"2024-05-14T21:55:38Z","timestamp":1715723738821},"reference-count":29,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2012,6,28]],"date-time":"2012-06-28T00:00:00Z","timestamp":1340841600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"published-print":{"date-parts":[[2013,2]]},"DOI":"10.1007\/s11128-012-0438-z","type":"journal-article","created":{"date-parts":[[2012,6,27]],"date-time":"2012-06-27T17:25:07Z","timestamp":1340817907000},"page":"907-920","source":"Crossref","is-referenced-by-count":5,"title":["Bipartite coherent-state quantum key distribution with strong reference pulse"],"prefix":"10.1007","volume":"12","author":[{"given":"Manoj K.","family":"Mishra","sequence":"first","affiliation":[]},{"given":"Hari","family":"Prakash","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,6,28]]},"reference":[{"key":"438_CR1","unstructured":"Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. In: Proceedings of IEEE International Conference on Computers Systems and Signal Processing, pp. 175\u2013179. IEEE (1984)"},{"key":"438_CR2","doi-asserted-by":"crossref","first-page":"1225","DOI":"10.1103\/RevModPhys.77.1225","volume":"77","author":"V. Scarani","year":"2005","unstructured":"Scarani V., Iblisdir S., Gisin N.: Quantum cloning. Rev. Mod. Phys. 77, 1225\u20131256 (2005)","journal-title":"Rev. Mod. Phys."},{"key":"438_CR3","doi-asserted-by":"crossref","first-page":"145","DOI":"10.1103\/RevModPhys.74.145","volume":"74","author":"N. Gisin","year":"2002","unstructured":"Gisin N., Ribordy G., Tittel W., Zbinden H.: Quantum cryptography. Rev. Mod. Phys. 74, 145\u2013195 (2002)","journal-title":"Rev. Mod. Phys."},{"key":"438_CR4","doi-asserted-by":"crossref","first-page":"96","DOI":"10.1103\/PhysRevA.48.96","volume":"48","author":"S.J.D. Phoenix","year":"1993","unstructured":"Phoenix S.J.D.: Quantum cryptography without conjugate coding. Phys. Rev. A 48, 96 (1993)","journal-title":"Phys. Rev. A"},{"key":"438_CR5","first-page":"343","volume-title":"Proceedings of Advances in Cryptology-Crypto \u201896, Lecture Notes in Computer Science Vol 1109.","author":"D. Mayers","year":"1996","unstructured":"Mayers D.: Quantum key distribution and string oblivious transfer in noisy channels. In: Koblitz, N. (ed.) Proceedings of Advances in Cryptology-Crypto \u201896, Lecture Notes in Computer Science Vol 1109., pp. 343. Springer, Berlin (1996)"},{"key":"438_CR6","unstructured":"Biham, E., Boyer, M., Boykin, P. O., Mor, T., Roychowdhury, V.: A Proof of the Security of Quantum Key Distribution. http:\/\/www.arxiv.org\/abs\/quant-ph\/9912053"},{"key":"438_CR7","doi-asserted-by":"crossref","first-page":"2050","DOI":"10.1126\/science.283.5410.2050","volume":"283","author":"H.K. Lo","year":"1999","unstructured":"Lo H.K., Chare H.F.: Unconditional security of quantum key distribution over arbitrarily long distances. Science 283, 2050 (1999)","journal-title":"Science"},{"key":"438_CR8","doi-asserted-by":"crossref","first-page":"057902","DOI":"10.1103\/PhysRevLett.90.057902","volume":"90","author":"M. Koashi","year":"2003","unstructured":"Koashi M., Perskill J.: Secure quantum key distribution with an uncharacterized source. Phys. Rev. Lett. 90, 057902 (2003)","journal-title":"Phys. Rev. Lett."},{"key":"438_CR9","unstructured":"Christandl, M., Renner, R., Ekert, A.: A generic security proof for quantum key distribution. http:\/\/www.arxiv.org\/abs\/quantph\/0402131"},{"key":"438_CR10","doi-asserted-by":"crossref","first-page":"441","DOI":"10.1103\/PhysRevLett.85.441","volume":"85","author":"P.W. Shor","year":"2000","unstructured":"Shor P.W., Perskill J.: Simple proof of security of the BB84 quantum key distribution protocol. Phys. Rev. Lett. 85, 441 (2000)","journal-title":"Phys. Rev. Lett."},{"key":"438_CR11","unstructured":"Inamori H., Lutkenhaus, N., Mayers, D.: Unconditional security of practical quantum key distribution. http:\/\/www.arxiv.org\/abs\/quant-ph\/0107017"},{"key":"438_CR12","unstructured":"Gottesman, D., Lo, H.K., Lutkenhaus, N., Perskill, J.: Security of quantum key distribution with imperfect devices. http:\/\/www.arxiv.org\/abs\/quant-ph\/0212066"},{"key":"438_CR13","doi-asserted-by":"crossref","first-page":"1863","DOI":"10.1103\/PhysRevA.51.1863","volume":"51","author":"B. Huttner","year":"1995","unstructured":"Huttner B., Imoto N., Gisin N., Mor T.: Quantum cryptography with coherent states. Phys. Rev. A 51, 1863 (1995)","journal-title":"Phys. Rev. A"},{"key":"438_CR14","doi-asserted-by":"crossref","first-page":"1330","DOI":"10.1103\/PhysRevLett.85.1330","volume":"85","author":"G. Brassard","year":"2000","unstructured":"Brassard G., L\u00fctkenhaus N., Mor T., Sanders B.C.: Limitations on practical quantum cryptography. Phys. Rev. Lett. 85, 1330 (2000)","journal-title":"Phys. Rev. Lett."},{"key":"438_CR15","doi-asserted-by":"crossref","first-page":"052304","DOI":"10.1103\/PhysRevA.61.052304","volume":"61","author":"N. L\u00fctkenhaus","year":"2000","unstructured":"L\u00fctkenhaus N.: Security against individual attacks for realistic quantum key distribution. Phys. Rev. A 61, 052304 (2000)","journal-title":"Phys. Rev. A"},{"key":"438_CR16","doi-asserted-by":"crossref","first-page":"057901","DOI":"10.1103\/PhysRevLett.91.057901","volume":"91","author":"W.Y. Hwang","year":"2003","unstructured":"Hwang W.Y.: Quantum key distribution with high loss: global secure communication. Phys. Rev. Lett. 91, 057901 (2003)","journal-title":"Phys. Rev. Lett."},{"key":"438_CR17","doi-asserted-by":"crossref","first-page":"230503","DOI":"10.1103\/PhysRevLett.94.230503","volume":"94","author":"X.B. Wang","year":"2005","unstructured":"Wang X.B.: Beating the photon-number-splitting attack in practical quantum cryptography. Phys. Rev. Lett. 94, 230503 (2005)","journal-title":"Phys. Rev. Lett."},{"key":"438_CR18","doi-asserted-by":"crossref","first-page":"012322","DOI":"10.1103\/PhysRevA.72.012322","volume":"72","author":"X.B. Wang","year":"2005","unstructured":"Wang X.B.: Decoy-state protocol for quantum cryptography with four different intensities of coherent light. Phys. Rev. A 72, 012322 (2005)","journal-title":"Phys. Rev. A"},{"key":"438_CR19","doi-asserted-by":"crossref","first-page":"661","DOI":"10.1103\/PhysRevLett.67.661","volume":"67","author":"A.K. Ekert","year":"1991","unstructured":"Ekert A.K.: Quantum cryptography based on Bell\u2019s theorem. Phys. Rev. Lett. 67, 661 (1991)","journal-title":"Phys. Rev. Lett."},{"key":"438_CR20","doi-asserted-by":"crossref","first-page":"3121","DOI":"10.1103\/PhysRevLett.68.3121","volume":"68","author":"C.H. Bennett","year":"1992","unstructured":"Bennett C.H.: Quantum cryptography using any two nonorthogonal states. Phys. Rev. Lett. 68, 3121 (1992)","journal-title":"Phys. Rev. Lett."},{"key":"438_CR21","doi-asserted-by":"crossref","first-page":"120501","DOI":"10.1103\/PhysRevLett.93.120501","volume":"93","author":"M. Koashi","year":"2004","unstructured":"Koashi M.: Unconditional security of coherent-state quantum key distribution with a strong phase-reference pulse. Phys. Rev. Lett. 93, 120501 (2004)","journal-title":"Phys. Rev. Lett."},{"key":"438_CR22","doi-asserted-by":"crossref","first-page":"062323","DOI":"10.1103\/PhysRevA.74.062323","volume":"74","author":"G. Wu","year":"2006","unstructured":"Wu G., Chen J., Li Y., Xu L., Zeng H.: Preventing eavesdropping with bright reference pulses for a practical quantum key distribution. Phys. Rev. A 74, 062323 (2006)","journal-title":"Phys. Rev. A"},{"key":"438_CR23","unstructured":"Ralph, T.: Continuous variable quantum cryptography. http:\/\/www.arxiv.org\/abs\/quant-ph\/9907073"},{"key":"438_CR24","doi-asserted-by":"crossref","first-page":"022309","DOI":"10.1103\/PhysRevA.61.022309","volume":"61","author":"M. Hillery","year":"2000","unstructured":"Hillery M.: Quantum cryptography with squeezed states. Phys. Rev. A 61, 022309 (2000)","journal-title":"Phys. Rev. A"},{"key":"438_CR25","doi-asserted-by":"crossref","DOI":"10.1093\/oso\/9780198501770.001.0001","volume-title":"The Quantum Theory of Light","author":"R. Loudan","year":"2000","unstructured":"Loudan R.: The Quantum Theory of Light. Oxford University Press, Oxford (2000)"},{"key":"438_CR26","volume-title":"Quantum Theory: Concepts and Methods","author":"A. Peres","year":"1993","unstructured":"Peres A.: Quantum Theory: Concepts and Methods. Kluwer, Dordrecht (1993)"},{"key":"438_CR27","doi-asserted-by":"crossref","DOI":"10.1002\/0471200611","volume-title":"Elements of Information theory","author":"T.M. Cover","year":"1991","unstructured":"Cover T.M., Thomas J.A.: Elements of Information theory. Wiley, Newyork (1991)"},{"key":"438_CR28","volume-title":"Information Theory","author":"R.B. Ash","year":"1990","unstructured":"Ash R.B.: Information Theory. Dover, Newyork (1990)"},{"key":"438_CR29","doi-asserted-by":"crossref","first-page":"1047","DOI":"10.1103\/PhysRevA.50.1047","volume":"50","author":"A.K. Ekert","year":"1994","unstructured":"Ekert A.K., Huttner B., Palma G.M., Peres A.: Eavesdropping on quantum-cryptographical systems. Phys. Rev. A 50, 1047 (1994)","journal-title":"Phys. Rev. A"}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-012-0438-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11128-012-0438-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-012-0438-z","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,26]],"date-time":"2024-04-26T04:37:31Z","timestamp":1714106251000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11128-012-0438-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,6,28]]},"references-count":29,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2013,2]]}},"alternative-id":["438"],"URL":"https:\/\/doi.org\/10.1007\/s11128-012-0438-z","relation":{},"ISSN":["1570-0755","1573-1332"],"issn-type":[{"value":"1570-0755","type":"print"},{"value":"1573-1332","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,6,28]]}}}