{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,31]],"date-time":"2022-03-31T14:23:52Z","timestamp":1648736632636},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"11","license":[{"start":{"date-parts":[[2014,8,20]],"date-time":"2014-08-20T00:00:00Z","timestamp":1408492800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"published-print":{"date-parts":[[2014,11]]},"DOI":"10.1007\/s11128-014-0806-y","type":"journal-article","created":{"date-parts":[[2014,8,19]],"date-time":"2014-08-19T10:47:33Z","timestamp":1408445253000},"page":"2525-2534","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Analysis of measurement-device-independent quantum key distribution under asymmetric channel transmittance efficiency"],"prefix":"10.1007","volume":"13","author":[{"given":"Dong","family":"Chen","sequence":"first","affiliation":[]},{"given":"Zhao","family":"Shang-Hong","sequence":"additional","affiliation":[]},{"given":"Zhao","family":"Wei-Hu","sequence":"additional","affiliation":[]},{"given":"Shi","family":"Lei","sequence":"additional","affiliation":[]},{"given":"Zhao","family":"Gu-Hao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,8,20]]},"reference":[{"key":"806_CR1","unstructured":"Bennet, C.H., Brassard, G.: Proceedings of the IEEE International Conference Computers, Systems and Signal Processing. IEEE, New York, pp. 175\u2013179 (1984)"},{"key":"806_CR2","doi-asserted-by":"crossref","unstructured":"Shor, P.W.: J. Preskill. Simple proof of security of the BB84 quantum key distribution protocol. Phys. Rev. Lett. 85, 441 (2000)","DOI":"10.1103\/PhysRevLett.85.441"},{"key":"806_CR3","doi-asserted-by":"crossref","unstructured":"Mayers, D.: Unconditional security in quantum cryptography. J. ACM. 48, 351 (2001)","DOI":"10.1145\/382780.382781"},{"key":"806_CR4","doi-asserted-by":"crossref","unstructured":"Gottesman, D., Lo, H.K., Lutkenhaus, N., Preskill, J.: Security of quantum key distribution with imperfect devices. Quantum Inf. Comput. 4, 325\u2013360 (2004)","DOI":"10.1109\/ISIT.2004.1365172"},{"key":"806_CR5","doi-asserted-by":"crossref","unstructured":"Braunstein, S.L., Pirandola, S.: Side-channel-free quantum key distribution. Phys. Rev. Lett. 108, 130502 (2012)","DOI":"10.1103\/PhysRevLett.108.130502"},{"key":"806_CR6","doi-asserted-by":"crossref","unstructured":"Brassard, G., Lutkenhaus, N., Mor, T., Sanders, B.C.: Limitations on practical quantum cryptography. Phys. Rev. Lett. 85, 1330\u20131333 (2000)","DOI":"10.1103\/PhysRevLett.85.1330"},{"key":"806_CR7","doi-asserted-by":"crossref","unstructured":"Sun, S.H., Liang, L.M.: Experimental demonstration of an active phase randomization and monitor module for quantum key distribution. Appl. Phys. Lett. 101, 071107 (2012)","DOI":"10.1063\/1.4746402"},{"key":"806_CR8","unstructured":"Makarov, V.: Faked states attack using detector efficiency mismatch on SARG04, phase-time, DPSK, and Ekert protocols. J. Skaar. Quantum. Inf. Comput. 86, 0622\u20130635 (2008)"},{"key":"806_CR9","doi-asserted-by":"crossref","unstructured":"Zhao, Y., Fung, C.H.F., Qi, B., Chen, C., Lo, H.K.: Quantum hacking: experimental demonstration of time-shift attack against practical quantum-key-distribution systems. Phys. Rev. A 78, 042333 (2008)","DOI":"10.1103\/PhysRevA.78.042333"},{"key":"806_CR10","doi-asserted-by":"crossref","unstructured":"Makarov, V.: Controlling passively quenched single photon detectors by bright light. New J. Mod. Opt. 11, 065003 (2009)","DOI":"10.1088\/1367-2630\/11\/6\/065003"},{"key":"806_CR11","unstructured":"Mayers, D., Yao, A.C-C.: Proceedings of the 39th Annual Symposium on Foundation of Computer Science. IEEE Computer Society, Washington DC, p. 503 (1998)"},{"key":"806_CR12","doi-asserted-by":"crossref","unstructured":"Gisin, N., Pironio, S., Sangouard, N.: Proposal for implementing device-independent quantum key distribution based on a heralded qubit amplifier. Phys. Rev. Lett. 105, 70501 (2010)","DOI":"10.1103\/PhysRevLett.105.070501"},{"key":"806_CR13","doi-asserted-by":"crossref","unstructured":"Curty, M., Moroder, T.: Heralded-qubit amplifiers for practical device-independent quantum key distribution. Phys. Rev. A 84, 010304 (2011)","DOI":"10.1103\/PhysRevA.84.010304"},{"key":"806_CR14","doi-asserted-by":"crossref","unstructured":"Pironio, S., Ac\u00edn, A., Brunner, N., Gisin, N., Massar, S., Scarani, V.: Device-independent quantum key distribution secure against collective attacks. New J. Phys. 11, 045021 (2009)","DOI":"10.1088\/1367-2630\/11\/4\/045021"},{"key":"806_CR15","doi-asserted-by":"crossref","unstructured":"Lo, H.K., Curty, M., Qi, B.: Measurement-device-independent quantum key distribution. Phys Rev. Lett. 108, 130503 (2012)","DOI":"10.1103\/PhysRevLett.108.130503"},{"key":"806_CR16","doi-asserted-by":"crossref","unstructured":"Hwang, W.Y.: Quantum key distribution with high loss: toward global secure communication. Phys. Rev. Lett. 91, 057901 (2003)","DOI":"10.1103\/PhysRevLett.91.057901"},{"key":"806_CR17","doi-asserted-by":"crossref","unstructured":"Ma, X.F., Fung, C.H.F., Razavi, M.: Statistical fluctuation analysis for measurement-device-independent quantum key distribution. Phys. Rev. A 86, 052305 (2012)","DOI":"10.1103\/PhysRevA.86.052305"},{"key":"806_CR18","doi-asserted-by":"crossref","unstructured":"Curty, M., Xu, F.H., Cui, W., Lim, C.C.W., Tamaki, K., Lo, H.K.: Finite-key analysis for measurement-device-independent quantum key distribution. Nat. Commun. 5, 3732 (2014)","DOI":"10.1038\/ncomms4732"},{"key":"806_CR19","doi-asserted-by":"crossref","unstructured":"Wang, X.B.: Three-intensity decoy state method for device-independent quantum key distribution with basis-dependent errors. Phys. Rev. A 87, 012320 (2013)","DOI":"10.1103\/PhysRevA.87.012320"},{"key":"806_CR20","doi-asserted-by":"crossref","unstructured":"Sun, S.H., Gao, M., Li, C.Y., Liang, L.M.: Practical decoy-state measurement-device-independent quantum key distribution. Phys. Rev. A 87, 052329 (2013)","DOI":"10.1103\/PhysRevA.87.052329"},{"key":"806_CR21","doi-asserted-by":"crossref","unstructured":"Xu, F.H., Curty, M., Qi, B., Lo, H.K.: Practical measurement-device-independent quantum key distribution. New J. Phys. 15, 113007 (2013)","DOI":"10.1088\/1367-2630\/15\/11\/113007"},{"key":"806_CR22","doi-asserted-by":"crossref","unstructured":"Liu, Y., et al.: Experimental measurement-device-independent quantum key distribution. Phys. Rev. Lett. 111, 130502 (2013)","DOI":"10.1103\/PhysRevLett.111.130502"},{"key":"806_CR23","doi-asserted-by":"crossref","unstructured":"Tang, Z., Liao, Z., Xu, F., Qi, B., Qian, L., Lo, H.K.: Experimental demonstration of polarization encoding measurement-device-independent quantum key distribution. Phys. Rev. Lett. 112, 190503 (2014)","DOI":"10.1103\/PhysRevLett.112.190503"},{"key":"806_CR24","doi-asserted-by":"crossref","unstructured":"Rubenok, A., Slater, J.A., Chan, P., Martinez, I.L., Tittel, W.: Real-world two-photon interference and proof-of-principle quantum key distribution immune to detector attacks. Phys. Rev. Lett. 111, 130501 (2013)","DOI":"10.1103\/PhysRevLett.111.130501"},{"key":"806_CR25","doi-asserted-by":"crossref","unstructured":"Sasaki, M., et al.: Field test of quantum key distribution in the Tokyo QKD network. Opt. Express 19, 10387 (2011)","DOI":"10.1364\/OE.19.010387"},{"key":"806_CR26","doi-asserted-by":"crossref","unstructured":"Ma, X.F., Razavi, M.: Alternative schemes for measurement-device-independent quantum key distribution. Phys. Rev. A 86, 062319 (2012)","DOI":"10.1103\/PhysRevA.86.062319"}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-014-0806-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11128-014-0806-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-014-0806-y","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T07:39:17Z","timestamp":1559374757000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11128-014-0806-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,8,20]]},"references-count":26,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2014,11]]}},"alternative-id":["806"],"URL":"https:\/\/doi.org\/10.1007\/s11128-014-0806-y","relation":{},"ISSN":["1570-0755","1573-1332"],"issn-type":[{"value":"1570-0755","type":"print"},{"value":"1573-1332","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,8,20]]}}}