{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,18]],"date-time":"2026-01-18T12:41:15Z","timestamp":1768740075625,"version":"3.49.0"},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"9","license":[{"start":{"date-parts":[[2016,6,28]],"date-time":"2016-06-28T00:00:00Z","timestamp":1467072000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["11274178;61475197;61590932"],"award-info":[{"award-number":["11274178;61475197;61590932"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Natural Science Foundation of the Jiangsu Higher Education Institutions","award":["15KJA120002"],"award-info":[{"award-number":["15KJA120002"]}]},{"name":"Outstanding Youth Project of Jiangsu Province","award":["BK20150039"],"award-info":[{"award-number":["BK20150039"]}]},{"DOI":"10.13039\/501100012246","name":"Priority Academic Program Development of Jiangsu Higher Education Institutions","doi-asserted-by":"crossref","award":["YX002001"],"award-info":[{"award-number":["YX002001"]}],"id":[{"id":"10.13039\/501100012246","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"published-print":{"date-parts":[[2016,9]]},"DOI":"10.1007\/s11128-016-1371-3","type":"journal-article","created":{"date-parts":[[2016,6,28]],"date-time":"2016-06-28T13:33:24Z","timestamp":1467120804000},"page":"3799-3813","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["The enhanced measurement-device-independent quantum key distribution with two-intensity decoy states"],"prefix":"10.1007","volume":"15","author":[{"given":"Jian-Rong","family":"Zhu","sequence":"first","affiliation":[]},{"given":"Feng","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Xing-Yu","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Qin","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,6,28]]},"reference":[{"key":"1371_CR1","doi-asserted-by":"crossref","first-page":"2050","DOI":"10.1126\/science.283.5410.2050","volume":"283","author":"H-K Lo","year":"1999","unstructured":"Lo, H.-K., Chau, H.F.: Unconditional security of quantum key distribution over arbitrarily long distances. Science 283, 2050 (1999)","journal-title":"Science"},{"key":"1371_CR2","doi-asserted-by":"crossref","first-page":"441","DOI":"10.1103\/PhysRevLett.85.441","volume":"85","author":"PW Shor","year":"2000","unstructured":"Shor, P.W., Preskill, J.: Simple proof of security of the BB84 quantum key distribution protocol. Phys. Rev. Lett. 85, 441 (2000)","journal-title":"Phys. Rev. Lett."},{"key":"1371_CR3","doi-asserted-by":"crossref","first-page":"351","DOI":"10.1145\/382780.382781","volume":"48","author":"D Mayers","year":"2001","unstructured":"Mayers, D.: Unconditional security in quantum cryptography. J. ACM 48, 351 (2001)","journal-title":"J. ACM"},{"key":"1371_CR4","doi-asserted-by":"crossref","first-page":"1330","DOI":"10.1103\/PhysRevLett.85.1330","volume":"85","author":"G Brassard","year":"2000","unstructured":"Brassard, G., L\u00fctkenhaus, N., Mor, T., Sanders, B.C.: Limitations on practical quantum cryptography. Phys. Rev. Lett. 85, 1330 (2000)","journal-title":"Phys. Rev. Lett."},{"key":"1371_CR5","doi-asserted-by":"crossref","first-page":"052304","DOI":"10.1103\/PhysRevA.61.052304","volume":"61","author":"N L\u00fctkenhaus","year":"2000","unstructured":"L\u00fctkenhaus, N.: Security against individual attacks for realistic quantum key distribution. Phys. Rev. A 61, 052304 (2000)","journal-title":"Phys. Rev. A"},{"key":"1371_CR6","doi-asserted-by":"crossref","first-page":"44.1","DOI":"10.1088\/1367-2630\/4\/1\/344","volume":"4","author":"N L\u00fctkenhaus","year":"2002","unstructured":"L\u00fctkenhaus, N., Jahma, M.: Quantum key distribution with realistic states: photon-number statistics in the photon-number splitting attack. New J. Phys. 4, 44.1 (2002)","journal-title":"New J. Phys."},{"key":"1371_CR7","doi-asserted-by":"crossref","first-page":"022313","DOI":"10.1103\/PhysRevA.74.022313","volume":"74","author":"V Makarov","year":"2006","unstructured":"Makarov, V., Anisimov, A., Skaar, J.: Effects of detector efficiency mismatch on security of quantum cryptosystems. Phys. Rev. A 74, 022313 (2006)","journal-title":"Phys. Rev. A"},{"key":"1371_CR8","first-page":"073","volume":"7","author":"B Qi","year":"2007","unstructured":"Qi, B., Fung, C.-H.F., Lo, H.-K., et al.: Time-shift attack in practical quantum cryptosystems. Quantum Inf. Comput. 7, 073 (2007)","journal-title":"Quantum Inf. Comput."},{"key":"1371_CR9","doi-asserted-by":"crossref","first-page":"032314","DOI":"10.1103\/PhysRevA.75.032314","volume":"75","author":"C-HF Fung","year":"2007","unstructured":"Fung, C.-H.F., Qi, B., Tamaki, K., Lo, H.-K.: Phase-remapping attack in practical quantum-key-distribution systems. Phys. Rev. A 75, 032314 (2007)","journal-title":"Phys. Rev. A"},{"key":"1371_CR10","doi-asserted-by":"crossref","first-page":"062308","DOI":"10.1103\/PhysRevA.84.062308","volume":"84","author":"H-W Li","year":"2011","unstructured":"Li, H.-W., Wang, S., Huang, J.-Z.: Attacking a practical quantum-key-distribution system with wavelength-dependent beam-splitter and multiwavelength sources. Phys. Rev. A 84, 062308 (2011)","journal-title":"Phys. Rev. A"},{"key":"1371_CR11","doi-asserted-by":"crossref","first-page":"057901","DOI":"10.1103\/PhysRevLett.91.057901","volume":"91","author":"WY Hwang","year":"2003","unstructured":"Hwang, W.Y.: Quantum key distribution with high loss: toward global secure communication. Phys. Rev. Lett. 91, 057901 (2003)","journal-title":"Phys. Rev. Lett."},{"key":"1371_CR12","doi-asserted-by":"crossref","first-page":"230503","DOI":"10.1103\/PhysRevLett.94.230503","volume":"94","author":"X-B Wang","year":"2005","unstructured":"Wang, X.-B.: Beating the photon-number-splitting attack in practical quantum cryptography. Phys. Rev. Lett. 94, 230503 (2005)","journal-title":"Phys. Rev. Lett."},{"key":"1371_CR13","doi-asserted-by":"crossref","first-page":"230504","DOI":"10.1103\/PhysRevLett.94.230504","volume":"94","author":"H-K Lo","year":"2005","unstructured":"Lo, H.-K., Ma, X.-F., Chen, K.: Decoy state quantum key distribution. Phys. Rev. Lett. 94, 230504 (2005)","journal-title":"Phys. Rev. Lett."},{"key":"1371_CR14","doi-asserted-by":"crossref","first-page":"012312","DOI":"10.1103\/PhysRevA.75.012312","volume":"75","author":"Q Wang","year":"2007","unstructured":"Wang, Q., Wang, X.-B., Guo, G.C.: Practical decoy-state method in quantum key distribution with a heralded single-photon source. Phys. Rev. A 75, 012312 (2007)","journal-title":"Phys. Rev. A"},{"key":"1371_CR15","doi-asserted-by":"crossref","first-page":"40001","DOI":"10.1209\/0295-5075\/79\/40001","volume":"79","author":"Q Wang","year":"2007","unstructured":"Wang, Q., Wang, X.-B.: Improved practical decoy state method in quantum key distribution with parametric down-conversion source. Europhys. Lett. 79, 40001 (2007)","journal-title":"Europhys. Lett."},{"key":"1371_CR16","doi-asserted-by":"crossref","first-page":"090501","DOI":"10.1103\/PhysRevLett.100.090501","volume":"100","author":"Q Wang","year":"2008","unstructured":"Wang, Q., Chen, W., Xavier, G.: Experimental decoy-state quantum key distribution with a sub-poissionian heralded single-photon source. Phys. Rev. Lett. 100, 090501 (2008)","journal-title":"Phys. Rev. Lett."},{"key":"1371_CR17","doi-asserted-by":"crossref","first-page":"130502","DOI":"10.1103\/PhysRevLett.108.130502","volume":"108","author":"SL Braunstein","year":"2012","unstructured":"Braunstein, S.L., Pirandola, S.: Side-channel-free quantum key distribution. Phys. Rev. Lett. 108, 130502 (2012)","journal-title":"Phys. Rev. Lett."},{"key":"1371_CR18","doi-asserted-by":"crossref","first-page":"130503","DOI":"10.1103\/PhysRevLett.108.130503","volume":"108","author":"HK Lo","year":"2012","unstructured":"Lo, H.K., Curty, M., Qi, B.: Measurement-device-independent quantum key distribution. Phys. Rev. Lett. 108, 130503 (2012)","journal-title":"Phys. Rev. Lett."},{"key":"1371_CR19","doi-asserted-by":"crossref","first-page":"052325","DOI":"10.1103\/PhysRevA.89.052325","volume":"89","author":"Y-H Zhou","year":"2014","unstructured":"Zhou, Y.-H., Yu, Z.-W., Wang, X.-B.: Tightened estimation can improve the key rate of measurement-device-independent quantum key distribution by more than 100. Phys. Rev. A 89, 052325 (2014)","journal-title":"Phys. Rev. A"},{"key":"1371_CR20","doi-asserted-by":"crossref","first-page":"012320","DOI":"10.1103\/PhysRevA.87.012320","volume":"87","author":"XB Wang","year":"2013","unstructured":"Wang, X.B.: Measurement-device-independent quantum key distribution. Phys. Rev. A 87, 012320 (2013)","journal-title":"Phys. Rev. A"},{"key":"1371_CR21","doi-asserted-by":"crossref","first-page":"042307","DOI":"10.1103\/PhysRevA.85.042307","volume":"85","author":"K Tamaki","year":"2012","unstructured":"Tamaki, K., Lo, H.-K., Fung, C.-H.F., Qi, B.: Phase encoding schemes for measurement-device-independent quantum key distribution with basis-dependent flaw. Phys. Rev. A 85, 042307 (2012)","journal-title":"Phys. Rev. A"},{"key":"1371_CR22","doi-asserted-by":"crossref","first-page":"062319","DOI":"10.1103\/PhysRevA.86.062319","volume":"86","author":"X Ma","year":"2012","unstructured":"Ma, X., Razavi, M.: Alternative schemes for measurement-device-independent quantum key distribution. Phys. Rev. A 86, 062319 (2012)","journal-title":"Phys. Rev. A"},{"key":"1371_CR23","doi-asserted-by":"crossref","first-page":"052332","DOI":"10.1103\/PhysRevA.88.052332","volume":"88","author":"Q Wang","year":"2013","unstructured":"Wang, Q., Wang, X.-B.: An efficient implementation of the decoy-state measurement-device-independent quantum key distribution with heralded single-photon sources. Phys. Rev. A 88, 052332 (2013)","journal-title":"Phys. Rev. A"},{"key":"1371_CR24","doi-asserted-by":"crossref","first-page":"04612","DOI":"10.1038\/srep04612","volume":"4","author":"Q Wang","year":"2014","unstructured":"Wang, Q., Wang, X.-B.: Simulating of the measurement-device independent quantum key distribution with phase randomized general sources. Sci. Rep. 4, 04612 (2014)","journal-title":"Sci. Rep."},{"key":"1371_CR25","doi-asserted-by":"crossref","first-page":"062315","DOI":"10.1103\/PhysRevA.90.062315","volume":"90","author":"D Wang","year":"2014","unstructured":"Wang, D., Li, M., Zhu, F., Yin, Z.-Q., Chen, W., Han, Z.-F., Guo, G.-C., Wang, Q.: Quantum key distribution with the single-photon-added coherent source. Phys. Rev. A 90, 062315 (2014)","journal-title":"Phys. Rev. A"},{"key":"1371_CR26","doi-asserted-by":"crossref","first-page":"022310","DOI":"10.1103\/PhysRevA.81.022310","volume":"81","author":"M Curty","year":"2010","unstructured":"Curty, M., Ma, X., Qi, B., Moroder, T.: Passive decoy state quantum key distribution with practical light sources. Phys. Rev. A 81, 022310 (2010)","journal-title":"Phys. Rev. A"},{"key":"1371_CR27","doi-asserted-by":"crossref","unstructured":"Curty, M., Xu, F., Cui, W., Lim, C.C.W., Tamaki, K., Lo, H.-K.: Finite-key analysis for measurement-device-independent quantum key distribution. Nat. Commun. 5, 3732 (2014)","DOI":"10.1038\/ncomms4732"},{"key":"1371_CR28","doi-asserted-by":"crossref","first-page":"069901","DOI":"10.1103\/PhysRevLett.114.069901","volume":"114","author":"YL Tang","year":"2015","unstructured":"Tang, Y.L., Yin, H.L., Chen, S.J., Liu, Y., Zhang, W.J., Jiang, X., Zhang, L., Wang, J., You, L.X., Guan, J.Y., Yang, D.X., Wang, Z., Liang, H., Zhang, Z., Zhou, N., Ma, X., Chen, T.Y., Zhang, Q., Pan, J.W.: Measurement-device-independent quantum key distribution over 200 km. Phys. Rev. Lett. 114, 069901 (2015)","journal-title":"Phys. Rev. Lett."},{"key":"1371_CR29","doi-asserted-by":"crossref","first-page":"312C315","DOI":"10.1038\/nphoton.2016.50","volume":"10","author":"LC Comandar","year":"2016","unstructured":"Comandar, L.C., Lucamarini, M., Frohlich, B.: Quantum key distribution without detector vulnerabilities using optically seeded lasers. Nat. Photonics 10, 312C315 (2016)","journal-title":"Nat. Photonics"},{"key":"1371_CR30","first-page":"832C836","volume":"9","author":"S Wang","year":"2015","unstructured":"Wang, S., Yin, Z.-Q., Chen, W.: Experimental demonstration of quantum key distribution without monitoring of the signal disturbance. Nat. Photonics 9, 832C836 (2015)","journal-title":"Nat. Photonics"}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-016-1371-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11128-016-1371-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-016-1371-3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,17]],"date-time":"2020-05-17T00:20:47Z","timestamp":1589674847000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11128-016-1371-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,6,28]]},"references-count":30,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2016,9]]}},"alternative-id":["1371"],"URL":"https:\/\/doi.org\/10.1007\/s11128-016-1371-3","relation":{},"ISSN":["1570-0755","1573-1332"],"issn-type":[{"value":"1570-0755","type":"print"},{"value":"1573-1332","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,6,28]]}}}