{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,31]],"date-time":"2024-08-31T05:08:12Z","timestamp":1725080892717},"reference-count":37,"publisher":"Springer Science and Business Media LLC","issue":"10","license":[{"start":{"date-parts":[[2015,8,6]],"date-time":"2015-08-06T00:00:00Z","timestamp":1438819200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"published-print":{"date-parts":[[2015,10]]},"DOI":"10.1007\/s11128-015-1083-0","type":"journal-article","created":{"date-parts":[[2015,8,5]],"date-time":"2015-08-05T11:33:34Z","timestamp":1438774414000},"page":"3827-3834","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Two-way deterministic quantum key distribution against passive detector side channel attacks in the forward line"],"prefix":"10.1007","volume":"14","author":[{"given":"Hua","family":"Lu","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,8,6]]},"reference":[{"key":"1083_CR1","unstructured":"Bennet, C., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. In: Proceedings of the International Conference on Computers, Systems and Signal Processing, Bangalore, India, pp. 10\u201312 (1984)"},{"key":"1083_CR2","doi-asserted-by":"crossref","first-page":"351","DOI":"10.1145\/382780.382781","volume":"48","author":"D Mayer","year":"2001","unstructured":"Mayer, D.: Unconditional security in quantum cryptography. J. ACM 48, 351\u2013406 (2001)","journal-title":"J. ACM"},{"key":"1083_CR3","doi-asserted-by":"crossref","first-page":"2050","DOI":"10.1126\/science.283.5410.2050","volume":"283","author":"H-K Lo","year":"1999","unstructured":"Lo, H.-K., Chau, H.F.: Unconditional security of quantum key distribution over arbitrarily long distances. Sciences 283, 2050\u20132056 (1999)","journal-title":"Sciences"},{"key":"1083_CR4","doi-asserted-by":"crossref","first-page":"441","DOI":"10.1103\/PhysRevLett.85.441","volume":"85","author":"P Shor","year":"2000","unstructured":"Shor, P., Preskill, J.: Simple proof of security of the BB84 quantum key distribution protocol. Phys. Rev. Lett. 85, 441\u2013444 (2000)","journal-title":"Phys. Rev. Lett."},{"key":"1083_CR5","first-page":"325","volume":"4","author":"D Gottesman","year":"2004","unstructured":"Gottesman, D., Lo, H.-K., L\u00fcthenhaus, N., Preskill, J.: Security of quantum key distribution with imperfect devices. Quantum Inf. Comput. 4, 325\u2013360 (2004)","journal-title":"Quantum Inf. Comput."},{"key":"1083_CR6","doi-asserted-by":"crossref","first-page":"022320","DOI":"10.1103\/PhysRevA.73.022320","volume":"73","author":"N Gisin","year":"2006","unstructured":"Gisin, N., Fasel, S., Kraus, B., Zbinden, H., Ribordy, G.: Trojan-horse attacks on quantum-key-distribution systems. Phys. Rev. A 73, 022320 (2006)","journal-title":"Phys. Rev. A"},{"key":"1083_CR7","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1007\/BF00191318","volume":"5","author":"C Bennett","year":"1992","unstructured":"Bennett, C., Bessette, F., Brassard, G., Salvail, L., Smolin, J.: Experimental quantum cryptography. J. Cryptol. 5, 3\u201328 (1992)","journal-title":"J. Cryptol."},{"key":"1083_CR8","doi-asserted-by":"crossref","first-page":"2009","DOI":"10.1080\/09500340108240903","volume":"48","author":"S Felix","year":"2001","unstructured":"Felix, S., Gisin, N., Stefanov, A., Zbinden, H.: Faint laser quantum key distribution: eavesdropping exploiting multiphoton pulses. J. Mod. Opt. 48, 2009\u20132021 (2001)","journal-title":"J. Mod. Opt."},{"key":"1083_CR9","doi-asserted-by":"crossref","first-page":"1330","DOI":"10.1103\/PhysRevLett.85.1330","volume":"85","author":"G Brassard","year":"2000","unstructured":"Brassard, G., L\u00fctkenhaus, N., Mor, T., Sanders, B.C.: Limitations on practical quantum cryptography. Phys. Rev. Lett. 85, 1330\u20131333 (2000)","journal-title":"Phys. Rev. Lett."},{"key":"1083_CR10","doi-asserted-by":"crossref","first-page":"052304","DOI":"10.1103\/PhysRevA.61.052304","volume":"61","author":"N L\u00fctkenhaus","year":"2000","unstructured":"L\u00fctkenhaus, N.: Security against individual attacks for realistic quantum key distribution. Phys. Rev. A 61, 052304 (2000)","journal-title":"Phys. Rev. A"},{"key":"1083_CR11","doi-asserted-by":"crossref","first-page":"057901","DOI":"10.1103\/PhysRevLett.91.057901","volume":"91","author":"W-Y Hwang","year":"2003","unstructured":"Hwang, W.-Y.: Quantum key distribution with high loss: toward global secure communication. Phys. Rev. Lett. 91, 057901 (2003)","journal-title":"Phys. Rev. Lett."},{"key":"1083_CR12","doi-asserted-by":"crossref","first-page":"230503","DOI":"10.1103\/PhysRevLett.94.230503","volume":"94","author":"X-B Wang","year":"2005","unstructured":"Wang, X.-B.: Beating the photon-number-splitting attack in practical quantum cryptography. Phys. Rev. Lett. 94, 230503 (2005)","journal-title":"Phys. Rev. Lett."},{"key":"1083_CR13","doi-asserted-by":"crossref","first-page":"230504","DOI":"10.1103\/PhysRevLett.94.230504","volume":"94","author":"H-K Lo","year":"2005","unstructured":"Lo, H.-K., Ma, X., Chen, K.: Decoy state quantum key distribution. Phys. Rev. Lett. 94, 230504 (2005)","journal-title":"Phys. Rev. Lett."},{"key":"1083_CR14","first-page":"073","volume":"7","author":"B Qi","year":"2007","unstructured":"Qi, B., Fung, C.-H.F., Lo, H.-K., Ma, X.: Time-shift attack in practical quantum cryptosystems. Security proof of quantum key distribution with detection efficiency mismatch. Quantum Inf. Comput. 7, 073\u2013082 (2007)","journal-title":"Quantum Inf. Comput."},{"key":"1083_CR15","doi-asserted-by":"crossref","first-page":"042333","DOI":"10.1103\/PhysRevA.78.042333","volume":"78","author":"Y Zhao","year":"2008","unstructured":"Zhao, Y., Fung, C.-H.F., Qi, B., Chen, C., Lo, H.-K.: Quantum hacking: experimental demonstration of time-shift attack against practical quantum-key-distribution systems. Phys. Rev. A 78, 042333 (2008)","journal-title":"Phys. Rev. A"},{"key":"1083_CR16","first-page":"0131","volume":"9","author":"C-HF Fung","year":"2009","unstructured":"Fung, C.-H.F., Tamaki, K., Qi, B., Lo, H.-K., Ma, X.: Security proof of quantum key distribution with detection efficiency mismatch. Quantum Inf. Comput. 9, 0131\u20130165 (2009)","journal-title":"Quantum Inf. Comput."},{"key":"1083_CR17","doi-asserted-by":"crossref","first-page":"022313","DOI":"10.1103\/PhysRevA.74.022313","volume":"74","author":"V Makarvo","year":"2006","unstructured":"Makarvo, V., Anisimov, A., Skaar, J.: Effects of detector efficiency mismatch on security of quantum cryptosystems. Phys. Rev. A 74, 022313 (2006)","journal-title":"Phys. Rev. A"},{"key":"1083_CR18","doi-asserted-by":"crossref","first-page":"686","DOI":"10.1038\/nphoton.2010.214","volume":"4","author":"L Lydersen","year":"2010","unstructured":"Lydersen, L., Wiechers, C., Wittmann, C., Elser, D., Skaar, J., Makarov, V.: Hacking commercial quantum cryptography systems by tailored bright illumination. Nat. Photonics 4, 686\u2013689 (2010)","journal-title":"Nat. Photonics"},{"key":"1083_CR19","doi-asserted-by":"crossref","first-page":"062308","DOI":"10.1103\/PhysRevA.84.062308","volume":"84","author":"H-W Li","year":"2011","unstructured":"Li, H.-W., Wang, S., Huang, J.-Z., Chen, W., Yin, Z.-Q., Li, F.-Y., Zhou, Z., Liu, D., Zhang, Y., Guo, G.-C., Han, Z.-F.: Attacking a practical quantum-key-distribution system with wavelength-dependent beam-splitter and multiwavelength sources. Phys. Rev. A 84, 062308 (2011)","journal-title":"Phys. Rev. A"},{"key":"1083_CR20","doi-asserted-by":"crossref","first-page":"022308","DOI":"10.1103\/PhysRevA.88.022308","volume":"88","author":"Y-L Tang","year":"2013","unstructured":"Tang, Y.-L., Yin, H.-L., Ma, X., Fung, C.-H.F., Liu, Y., Yong, H.-L., Chen, T.-Y., Peng, C.-Z., Chen, Z.-B., Pan, J.-W.: Source attack of decoy-state quantum key distribution using phase information. Phys. Rev. A 88, 022308 (2013)","journal-title":"Phys. Rev. A"},{"key":"1083_CR21","doi-asserted-by":"crossref","first-page":"130503","DOI":"10.1103\/PhysRevLett.108.130503","volume":"108","author":"H-K Lo","year":"2012","unstructured":"Lo, H.-K., Curty, M., Qi, B.: Measurement-device-independent quantum key distribution. Phys. Rev. Lett. 108, 130503 (2012)","journal-title":"Phys. Rev. Lett."},{"key":"1083_CR22","doi-asserted-by":"crossref","first-page":"187902","DOI":"10.1103\/PhysRevLett.89.187902","volume":"89","author":"K Bostr\u00f6m","year":"2002","unstructured":"Bostr\u00f6m, K., Felbinger, T.: Deterministic secure direct communication using entanglement. Phys. Rev. Lett. 89, 187902 (2002)","journal-title":"Phys. Rev. Lett."},{"key":"1083_CR23","doi-asserted-by":"crossref","first-page":"157901","DOI":"10.1103\/PhysRevLett.90.157901","volume":"90","author":"A W\u00f3jcik","year":"2003","unstructured":"W\u00f3jcik, A.: Eavesdropping on the ping-pong quantum communication protocol. Phys. Rev. Lett. 90, 157901 (2003)","journal-title":"Phys. Rev. Lett."},{"key":"1083_CR24","doi-asserted-by":"crossref","first-page":"109801","DOI":"10.1103\/PhysRevLett.91.109801","volume":"91","author":"Q-y Cai","year":"2003","unstructured":"Cai, Q-y: The ping-pong protocol can be attacked without eavesdropping. Phys. Rev. Lett. 91, 109801 (2003)","journal-title":"Phys. Rev. Lett."},{"key":"1083_CR25","doi-asserted-by":"crossref","first-page":"054301","DOI":"10.1103\/PhysRevA.69.054301","volume":"69","author":"Q-y Cai","year":"2004","unstructured":"Cai, Q-y, Li, B.-W.: Improving the capacity of the Bostr\u00f6m\u2013Felbinger protocol. Phys. Rev. A 69, 054301 (2004)","journal-title":"Phys. Rev. A"},{"key":"1083_CR26","doi-asserted-by":"crossref","unstructured":"Cai, Q-y, Li, B.-W.: Deterministic secure communication without using entanglement. Chin. Phys. Lett. 21, 601\u2013603 (2004)","DOI":"10.1088\/0256-307X\/21\/4\/003"},{"key":"1083_CR27","doi-asserted-by":"crossref","first-page":"052319","DOI":"10.1103\/PhysRevA.69.052319","volume":"69","author":"F-G Deng","year":"2004","unstructured":"Deng, F.-G., Long, G.L.: Secure direct communication with a quantum one-time pad. Phys. Rev. A 69, 052319 (2004)","journal-title":"Phys. Rev. A"},{"key":"1083_CR28","doi-asserted-by":"crossref","first-page":"140501","DOI":"10.1103\/PhysRevLett.94.140501","volume":"94","author":"M Lucamarini","year":"2005","unstructured":"Lucamarini, M., Mancini, S.: Secure deterministic communication without entanglement. Phys. Rev. Lett. 94, 140501 (2005)","journal-title":"Phys. Rev. Lett."},{"key":"1083_CR29","doi-asserted-by":"crossref","first-page":"2254","DOI":"10.1016\/j.optcom.2011.01.007","volume":"284","author":"H Lu","year":"2011","unstructured":"Lu, H.: Upper bound on key generation rate of quantum key distribution with two-way or two-step quantum channels. Opt. Commun. 284, 2254\u20132256 (2011)","journal-title":"Opt. Commun."},{"key":"1083_CR30","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1016\/j.physleta.2005.10.050","volume":"351","author":"Q-y Cai","year":"2006","unstructured":"Cai, Q-y: Eavesdropping on the two-way quantum communication protocols with invisible photons. Phys. Lett. A 351, 23\u201325 (2006)","journal-title":"Phys. Lett. A"},{"key":"1083_CR31","doi-asserted-by":"crossref","first-page":"012311","DOI":"10.1103\/PhysRevA.70.012311","volume":"70","author":"F-G Deng","year":"2004","unstructured":"Deng, F.-G., Long, G.L.: Bidirectional quantum key distribution protocol with practical faint laser pulses. Phys. Rev. A 70, 012311 (2004)","journal-title":"Phys. Rev. A"},{"key":"1083_CR32","doi-asserted-by":"crossref","first-page":"842","DOI":"10.1016\/j.optcom.2011.11.036","volume":"285","author":"MF Abdul Khir","year":"2012","unstructured":"Abdul Khir, M.F., Mohd Zain, M.N., Bahari, I., Suryadi, S.S.: Experimental two way quantum key distribution with decoy state. Opt. Commun. 285, 842\u2013845 (2012)","journal-title":"Opt. Commun."},{"key":"1083_CR33","doi-asserted-by":"crossref","first-page":"042344","DOI":"10.1103\/PhysRevA.84.042344","volume":"84","author":"H Lu","year":"2011","unstructured":"Lu, H., Fung, C.-H.F., Ma, X., Cai, Q-y: Unconditional security proof of a deterministic quantum key distribution with a two-way quantum channel. Phys. Rev. A 84, 042344 (2011)","journal-title":"Phys. Rev. A"},{"key":"1083_CR34","doi-asserted-by":"crossref","first-page":"032308","DOI":"10.1103\/PhysRevA.85.032308","volume":"85","author":"C-HF Fung","year":"2012","unstructured":"Fung, C.-H.F., Ma, X., Chau, H.F., Cai, Q-y: Quantum key distribution with delayed privacy amplification and its application to the security proof of a two-way deterministic protocol. Phys. Rev. A 85, 032308 (2012)","journal-title":"Phys. Rev. A"},{"key":"1083_CR35","doi-asserted-by":"crossref","first-page":"062302","DOI":"10.1103\/PhysRevA.88.062302","volume":"88","author":"NJ Beaudry","year":"2013","unstructured":"Beaudry, N.J., Lucamarini, M., Mancini, S., Renner, R.: Security of two-way quantum key distribution. Phys. Rev. A 88, 062302 (2013)","journal-title":"Phys. Rev. A"},{"key":"1083_CR36","doi-asserted-by":"crossref","first-page":"044302","DOI":"10.1103\/PhysRevA.88.044302","volume":"88","author":"H Lu","year":"2013","unstructured":"Lu, H., Fung, C.-H.F., Cai, Q-y: Two-way deterministic quantum key distribution against detector-side-channel attacks. Phys. Rev. A 88, 044302 (2013)","journal-title":"Phys. Rev. A"},{"key":"1083_CR37","first-page":"407","volume-title":"Second Theory of Cryptography Conference, TCC 2005 Vol. 3378 of LNCS","author":"R Renner","year":"2005","unstructured":"Renner, R., K\u00f6nig, R.: Universally composable privacy amplification against quantum adversaries. In: Kilian, J. (ed.) Second Theory of Cryptography Conference, TCC 2005 Vol. 3378 of LNCS, pp. 407\u2013425. Springer, New York (2005)"}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-015-1083-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11128-015-1083-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-015-1083-0","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T03:39:23Z","timestamp":1559360363000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11128-015-1083-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,8,6]]},"references-count":37,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2015,10]]}},"alternative-id":["1083"],"URL":"https:\/\/doi.org\/10.1007\/s11128-015-1083-0","relation":{},"ISSN":["1570-0755","1573-1332"],"issn-type":[{"value":"1570-0755","type":"print"},{"value":"1573-1332","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,8,6]]}}}