{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,3]],"date-time":"2025-09-03T10:42:13Z","timestamp":1756896133338},"reference-count":18,"publisher":"Springer Science and Business Media LLC","issue":"10","license":[{"start":{"date-parts":[[2014,6,15]],"date-time":"2014-06-15T00:00:00Z","timestamp":1402790400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"published-print":{"date-parts":[[2014,10]]},"DOI":"10.1007\/s11128-014-0771-5","type":"journal-article","created":{"date-parts":[[2014,6,19]],"date-time":"2014-06-19T08:31:50Z","timestamp":1403166710000},"page":"2277-2291","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":20,"title":["Experimental demonstrations of Y-00 cipher for high capacity and secure optical fiber communications"],"prefix":"10.1007","volume":"13","author":[{"given":"Fumio","family":"Futami","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,6,15]]},"reference":[{"key":"771_CR1","unstructured":"Hirota, O.: Cyber attack against optical communication systems and its defense technology\u2014 toward development of Quantum Enigma Cipher. IEICE Technical report OCS2013-18, pp. 43\u201348, June (2013)"},{"key":"771_CR2","doi-asserted-by":"crossref","first-page":"227901","DOI":"10.1103\/PhysRevLett.90.227901","volume":"22","author":"GA Barbosa","year":"2003","unstructured":"Barbosa, G.A., Corndorf, E., Kumar, P., Yuen, H.P.: Secure communication using mesoscopic coherent states. Phys. Rev. Lett. 22, 227901 (2003)","journal-title":"Phys. Rev. Lett."},{"key":"771_CR3","doi-asserted-by":"crossref","first-page":"022335","DOI":"10.1103\/PhysRevA.72.022335","volume":"72","author":"O Hirota","year":"2005","unstructured":"Hirota, O., Sohma, M., Fuse, M., Kato, K.: Quantum stream cipher by Yuen 2000 protocol: design and experiment by intensity modulation scheme. Phys. Rev. A 72, 022335 (2005)","journal-title":"Phys. Rev. A"},{"key":"771_CR4","doi-asserted-by":"crossref","unstructured":"Kato, K., Hirota, O.: Quantum quadrature amplitude modulation system and its applicability to coherent state quantum cryptography. SPIE conference on quantum communication and imaging III. SPIE Proc. vol. 5893, (2005)","DOI":"10.1117\/12618719"},{"key":"771_CR5","doi-asserted-by":"crossref","first-page":"062326","DOI":"10.1103\/PhysRevA.71.062326","volume":"71","author":"E Corndorf","year":"2005","unstructured":"Corndorf, E., Liang, C., Kanter, G.S., Kumar, P., Yuen, H.P.: Quantum-noise randomized data encryption for wavelength-division-multiplexed fiber-optic networks. Phys. Rev. A 71, 062326 (2005)","journal-title":"Phys. Rev. A"},{"key":"771_CR6","doi-asserted-by":"crossref","unstructured":"Kanter, G.S., Reilly, D., Smith, N.: Practical physical-layer encryption: the marriage of optical noise with traditional cryptography. IEEE Communications Magazine, pp. 74\u201381, November (2009)","DOI":"10.1109\/MCOM.2009.5307469"},{"issue":"6","key":"771_CR7","doi-asserted-by":"crossref","first-page":"1630","DOI":"10.1109\/JSTQE.2009.2025698","volume":"15","author":"HP Yuen","year":"2009","unstructured":"Yuen, H.P.: Key generation: foundations and a new quantum approach. J. Sel. Top. Quantum Electron 15(6), 1630\u20131645 (2009)","journal-title":"J. Sel. Top. Quantum Electron"},{"key":"771_CR8","unstructured":"Lloyd, S.: Quantum enigma machines arXiv:1307.0380 [quant-ph], (2013)"},{"issue":"3","key":"771_CR9","doi-asserted-by":"crossref","first-page":"323","DOI":"10.1109\/JLT.2010.2099207","volume":"29","author":"K Harasawa","year":"2011","unstructured":"Harasawa, K., Hirota, O., Yamashita, K., Honda, M., Ohhata, K., Akutsu, S., Hosoi, T., Doi, Y.: Quantum encryption communication over a 192-km 2.5-Gbit\/s line with optical transceivers employing Yuen-2000 protocol based on intensity modulation. J. Lightwave Technol. 29(3), 323\u2013361 (2011)","journal-title":"J. Lightwave Technol."},{"key":"771_CR10","doi-asserted-by":"crossref","unstructured":"Doi, Y., Akutsu, S., Honda, M., Harasawa, K., Hirota, O., Kawanishi, S., Ohhata, K., Yamashita, K.: 360 km field transmission of 10 Gbit\/s stream cipher by quantum noise for optical network. In Proc. optical fiber communication conference (OFC), OWC4, (2010)","DOI":"10.1364\/OFC.2010.OWC4"},{"key":"771_CR11","doi-asserted-by":"crossref","first-page":"032307","DOI":"10.1103\/PhysRevA.76.032307","volume":"76","author":"O Hirota","year":"2007","unstructured":"Hirota, O.: Practical security analysis of quantum stream cipher by Yuen 2000 protocol. Phys. Rev. A 76, 032307 (2007)","journal-title":"Phys. Rev. A"},{"key":"771_CR12","doi-asserted-by":"crossref","unstructured":"Futami, F., Hirota, O.: Masking of 4096-level intensity modulation signals by noises for secure communication employing Y-00 cipher protocol. In Proc. 37th European conference on optical communication (ECOC), Tu.6.C.4, (2011)","DOI":"10.1364\/ECOC.2011.Tu.6.C.4"},{"key":"771_CR13","doi-asserted-by":"crossref","unstructured":"Futami, F., Hirota, O.: Physical layer encryption by Y-00 protocol for secure optical interconnection between data centers. In Proc. IEEE summer topicals, ME4.4, (2013)","DOI":"10.1109\/PHOSST.2013.6614481"},{"key":"771_CR14","unstructured":"Futami, F., Hirota, O.: Field transmission test of 2.5 Gb\/s Y-00 cipher in 160-km (40 km $$\\times $$ \u00d7 4 spans) installed optical fiber for secure optical fiber communications. In Proc. 11th international conference on quantum communication measurement and computing (QCMC2012), P1\u201338, (2012)"},{"key":"771_CR15","doi-asserted-by":"crossref","unstructured":"Futami, F., Hirota, O.: Optical access system by Y-00 protocol at 2.5-Gb\/s data rate for secure fiber communications. 2013 SPIE defense security+sensing, 8720\u20138738, (2013)","DOI":"10.1117\/12.2016348"},{"key":"771_CR16","doi-asserted-by":"crossref","unstructured":"Futami, F., Hirota, O.: 40 Gbit\/s (4 $$\\times $$ \u00d7 10 Gbit\/s) Y-00 protocol for secure optical communication and its transmission over 120 km. In Proc. optical fiber communication conference (OFC), OTu1H.6, (2012)","DOI":"10.1364\/OFC.2012.OTu1H.6"},{"issue":"4","key":"771_CR17","doi-asserted-by":"crossref","first-page":"4098","DOI":"10.1364\/OE.22.004098","volume":"22","author":"M Nakazawa","year":"2014","unstructured":"Nakazawa, M., Yoshida, M., Hirooka, T.: QAM quantum stream cipher using digital coherent optical transmission. Opt. Express 22(4), 4098\u20134107 (2014)","journal-title":"Opt. Express"},{"issue":"18","key":"771_CR18","doi-asserted-by":"crossref","first-page":"2714","DOI":"10.1109\/JLT.2010.2060713","volume":"28","author":"K Ohhata","year":"2010","unstructured":"Ohhata, K., Hirota, O., Honda, M., Akutsu, S., Doi, Y., Harasawa, K., Yamashita, K.: 10-Gb\/s optical transceiver using the Yuen 2000 encryption protocol. J. Lightwave Technol. 28(18), 2714\u20132723 (2010)","journal-title":"J. Lightwave Technol."}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-014-0771-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11128-014-0771-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-014-0771-5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,11]],"date-time":"2019-08-11T14:29:17Z","timestamp":1565533757000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11128-014-0771-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,6,15]]},"references-count":18,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2014,10]]}},"alternative-id":["771"],"URL":"https:\/\/doi.org\/10.1007\/s11128-014-0771-5","relation":{},"ISSN":["1570-0755","1573-1332"],"issn-type":[{"value":"1570-0755","type":"print"},{"value":"1573-1332","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,6,15]]}}}