{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,29]],"date-time":"2022-03-29T04:13:56Z","timestamp":1648527236729},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"10","license":[{"start":{"date-parts":[[2016,7,28]],"date-time":"2016-07-28T00:00:00Z","timestamp":1469664000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"name":"Ministry of Science, ICT and Future Planning (Republic of Korea)","award":["R-20150903-002203"],"award-info":[{"award-number":["R-20150903-002203"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"published-print":{"date-parts":[[2016,10]]},"DOI":"10.1007\/s11128-016-1400-2","type":"journal-article","created":{"date-parts":[[2016,7,28]],"date-time":"2016-07-28T07:52:07Z","timestamp":1469692327000},"page":"4265-4282","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Informatic analysis for hidden pulse attack exploiting spectral characteristics of optics in plug-and-play quantum key distribution system"],"prefix":"10.1007","volume":"15","author":[{"given":"Heasin","family":"Ko","sequence":"first","affiliation":[]},{"given":"Kyongchun","family":"Lim","sequence":"additional","affiliation":[]},{"given":"Junsang","family":"Oh","sequence":"additional","affiliation":[]},{"given":"June-Koo Kevin","family":"Rhee","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,7,28]]},"reference":[{"key":"1400_CR1","unstructured":"Bennett, C.H, Brassard, G.: Quantum cryptography: Public key distribution and coin tossing. In: Proceedings of IEEE International Conference on Computers System and Signal Processing, pp. 175-179 (1984)"},{"issue":"5886","key":"1400_CR2","doi-asserted-by":"crossref","first-page":"802","DOI":"10.1038\/299802a0","volume":"299","author":"WK Wootters","year":"1982","unstructured":"Wootters, W.K., Zurek, W.H.: A single quantum cannot be cloned. Nature 299(5886), 802\u2013803 (1982)","journal-title":"Nature"},{"issue":"2","key":"1400_CR3","doi-asserted-by":"crossref","first-page":"441","DOI":"10.1103\/PhysRevLett.85.441","volume":"85","author":"PW Shor","year":"2000","unstructured":"Shor, P.W., Preskill, J.: Simple proof of security of the BB84 quantum key distribution protocol. Phys. Rev. Lett. 85(2), 441 (2000)","journal-title":"Phys. Rev. Lett."},{"issue":"01","key":"1400_CR4","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1142\/S0219749908003256","volume":"6","author":"R Renner","year":"2008","unstructured":"Renner, R.: Security of quantum key distribution. Int. J. Quantum Inf. 6(01), 1\u2013127 (2008)","journal-title":"Int. J. Quantum Inf."},{"issue":"3","key":"1400_CR5","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/JSTQE.2014.2362737","volume":"21","author":"K Lim","year":"2015","unstructured":"Lim, K., Ko, H., Kim, K., Suh, C., Rhee, J.K.: The Error Tolerance Bound for Secure Multi-Qubit QKD Against Incoherent Attack. IEEE J. Sel. Top. Quantum Electron. 21(3), 1\u20139 (2015)","journal-title":"IEEE J. Sel. Top. Quantum Electron."},{"issue":"10","key":"1400_CR6","doi-asserted-by":"crossref","first-page":"686","DOI":"10.1038\/nphoton.2010.214","volume":"4","author":"L Lydersen","year":"2010","unstructured":"Lydersen, L., Wiechers, C., Wittmann, C., Elser, D., Skaar, J., Makarov, V.: Hacking commercial quantum cryptography systems by tailored bright illumination. Nature Photon. 4(10), 686\u2013689 (2010)","journal-title":"Nature Photon."},{"issue":"6","key":"1400_CR7","doi-asserted-by":"crossref","first-page":"062308","DOI":"10.1103\/PhysRevA.84.062308","volume":"84","author":"HW Li","year":"2011","unstructured":"Li, H.W., Wang, S., Huang, J.Z., Chen, W., Yin, Z.Q., Li, F.Y., Zhou, Z., Liu, D., Zhang, Y., Guo, G.C., Bao, W.S.: Attacking a practical quantum-key-distribution system with wavelength-dependent beam-splitter and multiwavelength sources. Phys. Rev. A 84(6), 062308 (2011)","journal-title":"Phys. Rev. A"},{"issue":"11","key":"1400_CR8","doi-asserted-by":"crossref","first-page":"113026","DOI":"10.1088\/1367-2630\/12\/11\/113026","volume":"12","author":"F Xu","year":"2010","unstructured":"Xu, F., Qi, B., Lo, H.K.: Experimental demonstration of phase-remapping attack in a practical quantum key distribution system. New J. Phys. 12(11), 113026 (2010)","journal-title":"New J. Phys."},{"issue":"6","key":"1400_CR9","doi-asserted-by":"crossref","first-page":"062331","DOI":"10.1103\/PhysRevA.83.062331","volume":"83","author":"SH Sun","year":"2011","unstructured":"Sun, S.H., Jiang, M.S., Liang, L.M.: Passive Faraday-mirror attack in a practical two-way quantum-key-distribution system. Phys. Rev. A 83(6), 062331 (2011)","journal-title":"Phys. Rev. A"},{"issue":"3","key":"1400_CR10","doi-asserted-by":"crossref","first-page":"032310","DOI":"10.1103\/PhysRevA.86.032310","volume":"86","author":"MS Jiang","year":"2012","unstructured":"Jiang, M.S., Sun, S.H., Li, C.Y., Liang, L.M.: Wavelength-selected photon-number-splitting attack against plug-and-play quantum key distribution systems with decoy states. Phys. Rev. A 86(3), 032310 (2012)","journal-title":"Phys. Rev. A"},{"issue":"3","key":"1400_CR11","doi-asserted-by":"crossref","first-page":"032304","DOI":"10.1103\/PhysRevA.85.032304","volume":"85","author":"SH Sun","year":"2012","unstructured":"Sun, S.H., Gao, M., Jiang, M.S., Li, C.Y., Liang, L.M.: Partially random phase attack to the practical two-way quantum-key-distribution system. Phys. Rev. A 85(3), 032304 (2012)","journal-title":"Phys. Rev. A"},{"issue":"3","key":"1400_CR12","doi-asserted-by":"crossref","first-page":"032326","DOI":"10.1103\/PhysRevA.91.032326","volume":"91","author":"S Sajeed","year":"2015","unstructured":"Sajeed, S., Radchenko, I., Kaiser, S., Bourgoin, J.P., Pappa, A., Monat, L., Legr\u00e9, M., Makarov, V.: Attacks exploiting deviation of mean photon number in quantum key distribution and coin tossing. Phys. Rev. A 91(3), 032326 (2015)","journal-title":"Phys. Rev. A"},{"issue":"13","key":"1400_CR13","doi-asserted-by":"crossref","first-page":"130503","DOI":"10.1103\/PhysRevLett.108.130503","volume":"108","author":"HK Lo","year":"2012","unstructured":"Lo, H.K., Curty, M., Qi, B.: Measurement-device-independent quantum key distribution. Phys. Rev. Lett. 108(13), 130503 (2012)","journal-title":"Phys. Rev. Lett."},{"issue":"13","key":"1400_CR14","doi-asserted-by":"crossref","first-page":"130502","DOI":"10.1103\/PhysRevLett.111.130502","volume":"111","author":"Y Liu","year":"2013","unstructured":"Liu, Y., Chen, T.Y., Wang, L.J., Liang, H., Shentu, G.L., Wang, J., Cui, K., Yin, H.L., Liu, N.L., Li, L., Ma, X.: Experimental measurement-device-independent quantum key distribution. Phys. Rev. Lett. 111(13), 130502 (2013)","journal-title":"Phys. Rev. Lett."},{"key":"1400_CR15","unstructured":"Kim, Y. S., Choi, Y., Kwon, O., Han, S. W., and Moon, S.: Plug-and-Play Measurement-Device-Independent Quantum Key Distribution. arXiv preprint arXiv:1501.03344 (2015)"},{"issue":"7","key":"1400_CR16","doi-asserted-by":"crossref","first-page":"793","DOI":"10.1063\/1.118224","volume":"70","author":"A Muller","year":"1997","unstructured":"Muller, A., Herzog, T., Huttner, B., Tittel, W., Zbinden, H., Gisin, N.: Plug and play systems for quantum cryptography. Appl. Phys. Lett. 70(7), 793\u2013795 (1997)","journal-title":"Appl. Phys. Lett."},{"issue":"9","key":"1400_CR17","doi-asserted-by":"crossref","first-page":"2560","DOI":"10.1364\/JOSAB.30.002560","volume":"30","author":"HQ Ma","year":"2013","unstructured":"Ma, H.Q., Wei, K.J., Yang, J.H.: Simple quantum key distribution scheme with excellent long-term stability. J. Opt. Soc. Am. B 30(9), 2560\u20132562 (2013)","journal-title":"J. Opt. Soc. Am. B"},{"key":"1400_CR18","doi-asserted-by":"crossref","unstructured":"Pappa, A., Jouguet, P., Lawson, T., Chailloux, A., Legr\u00e9, M., Trinkler, P.,Kerenidis, I., Diamanti, E.: Experimental plug and play quantum coin flipping. Nat. Commun. 5 (2014)","DOI":"10.1038\/ncomms4717"},{"issue":"6","key":"1400_CR19","doi-asserted-by":"crossref","first-page":"065203","DOI":"10.1088\/1612-2011\/11\/6\/065203","volume":"11","author":"IV Radchenko","year":"2014","unstructured":"Radchenko, I.V., Kravtsov, K.S., Kulik, S.P., Molotkov, S.N.: Relativistic quantum cryptography. Laser Phys. Lett. 11(6), 065203 (2014)","journal-title":"Laser Phys. Lett."},{"issue":"2","key":"1400_CR20","doi-asserted-by":"crossref","first-page":"022320","DOI":"10.1103\/PhysRevA.73.022320","volume":"73","author":"N Gisin","year":"2006","unstructured":"Gisin, N., Fasel, S., Kraus, B., Zbinden, H., Ribordy, G.: Trojan-horse attacks on quantum-key-distribution systems. Phys. Rev. A 73(2), 022320 (2006)","journal-title":"Phys. Rev. A"},{"issue":"3","key":"1400_CR21","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/JQE.2015.2466087","volume":"21","author":"N Jain","year":"2015","unstructured":"Jain, N., Stiller, B., Khan, I., Makarov, V., Marquardt, C., Leuchs, G.: Risk analysis of Trojan-horse attacks on practical quantum key distribution systems. IEEE J. Sel. Top. Quantum Electron. 21(3), 1\u201310 (2015)","journal-title":"IEEE J. Sel. Top. Quantum Electron."},{"issue":"23","key":"1400_CR22","doi-asserted-by":"crossref","first-page":"230504","DOI":"10.1103\/PhysRevLett.94.230504","volume":"94","author":"HK Lo","year":"2005","unstructured":"Lo, H.K., Ma, X., Chen, K.: Decoy state quantum key distribution. Phys. Rev. Lett. 94(23), 230504 (2005)","journal-title":"Phys. Rev. Lett."},{"issue":"1","key":"1400_CR23","doi-asserted-by":"crossref","first-page":"012326","DOI":"10.1103\/PhysRevA.72.012326","volume":"72","author":"X Ma","year":"2005","unstructured":"Ma, X., Qi, B., Zhao, Y., Lo, H.K.: Practical decoy state for quantum key distribution. Phys. Rev. A 72(1), 012326 (2005)","journal-title":"Phys. Rev. A"},{"issue":"19","key":"1400_CR24","doi-asserted-by":"crossref","first-page":"3762","DOI":"10.1063\/1.1738173","volume":"84","author":"C Gobby","year":"2004","unstructured":"Gobby, C., Yuan, Z.L., Shields, A.J.: Quantum key distribution over 122 km of standard telecom fiber. Appl. Phys. Lett. 84(19), 3762\u20133764 (2004)","journal-title":"Appl. Phys. Lett."},{"key":"1400_CR25","volume-title":"Fiber-optic communication systems","author":"GP Agrawal","year":"2012","unstructured":"Agrawal, G.P.: Fiber-optic communication systems. Wiley, New Jersey (2012)"},{"issue":"3","key":"1400_CR26","doi-asserted-by":"crossref","first-page":"1863","DOI":"10.1103\/PhysRevA.51.1863","volume":"51","author":"B Huttner","year":"1995","unstructured":"Huttner, B., Imoto, N., Gisin, N., Mor, T.: Quantum cryptography with coherent states. Phys. Rev. A 51(3), 1863 (1995)","journal-title":"Phys. Rev. A"},{"issue":"5","key":"1400_CR27","doi-asserted-by":"crossref","first-page":"052304","DOI":"10.1103\/PhysRevA.61.052304","volume":"61","author":"N Ltkenhaus","year":"2000","unstructured":"Ltkenhaus, N.: Security against individual attacks for realistic quantum key distribution. Phys. Rev. A 61(5), 052304 (2000)","journal-title":"Phys. Rev. A"},{"issue":"3","key":"1400_CR28","first-page":"3","volume":"9","author":"AS Holevo","year":"1973","unstructured":"Holevo, A.S.: Bounds for the quantity of information transmitted by a quantum communication channel. Problemy Peredachi Informatsii 9(3), 3\u201311 (1973)","journal-title":"Problemy Peredachi Informatsii"},{"issue":"7","key":"1400_CR29","doi-asserted-by":"crossref","first-page":"709","DOI":"10.1109\/JQE.1980.1070557","volume":"16","author":"TP Pearsall","year":"1980","unstructured":"Pearsall, T.P.: Ga 0.47 In 0.53 As: A ternary semiconductor for photodetector applications. IEEE J. of. Quantum Electron. 16(7), 709\u2013720 (1980)","journal-title":"IEEE J. of. Quantum Electron."},{"key":"1400_CR30","unstructured":"http:\/\/www.idquantique.com\/images\/stories\/PDF\/clavis2-quantum-key-distribution\/clavis2-specs"},{"key":"1400_CR31","doi-asserted-by":"crossref","unstructured":"Aleksic, S., Winkler, D., Franzl, G., Poppe, A., Schrenk, B., and Hipp, F.: Quantum key distribution over optical access networks. In Network and Optical Communications (NOC), 2013 18th European Conference on and Optical Cabling and Infrastructure (OC&i), 2013 8th Conference on (pp. 11\u201318). IEEE. (2013, July)","DOI":"10.1109\/NOC-OCI.2013.6582861"}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-016-1400-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11128-016-1400-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-016-1400-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,24]],"date-time":"2017-06-24T15:25:04Z","timestamp":1498317904000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11128-016-1400-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,7,28]]},"references-count":31,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2016,10]]}},"alternative-id":["1400"],"URL":"https:\/\/doi.org\/10.1007\/s11128-016-1400-2","relation":{},"ISSN":["1570-0755","1573-1332"],"issn-type":[{"value":"1570-0755","type":"print"},{"value":"1573-1332","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,7,28]]}}}