{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,7]],"date-time":"2025-11-07T08:29:17Z","timestamp":1762504157694},"reference-count":32,"publisher":"Springer Science and Business Media LLC","issue":"10","license":[{"start":{"date-parts":[[2017,8,17]],"date-time":"2017-08-17T00:00:00Z","timestamp":1502928000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"published-print":{"date-parts":[[2017,10]]},"DOI":"10.1007\/s11128-017-1687-7","type":"journal-article","created":{"date-parts":[[2017,8,17]],"date-time":"2017-08-17T14:41:59Z","timestamp":1502980919000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Parameter optimization in biased decoy-state quantum key distribution with both source errors and statistical fluctuations"],"prefix":"10.1007","volume":"16","author":[{"given":"Jian-Rong","family":"Zhu","sequence":"first","affiliation":[]},{"given":"Jian","family":"Li","sequence":"additional","affiliation":[]},{"given":"Chun-Mei","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Qin","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,8,17]]},"reference":[{"key":"1687_CR1","unstructured":"Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. In: Proceedings of the IEEE International Conference on Computers, Systems and Signal Processing. IEEE, New York, pp. 175\u2013179 (1984)"},{"key":"1687_CR2","doi-asserted-by":"crossref","first-page":"2050","DOI":"10.1126\/science.283.5410.2050","volume":"283","author":"H-K Lo","year":"1999","unstructured":"Lo, H.-K., Chau, H.F.: Unconditional security of quantum key distribution over arbitrarily long distances. Science 283, 2050 (1999)","journal-title":"Science"},{"key":"1687_CR3","doi-asserted-by":"crossref","first-page":"441","DOI":"10.1103\/PhysRevLett.85.441","volume":"85","author":"PW Shor","year":"2000","unstructured":"Shor, P.W., Preskill, J.: Simple proof of security of the BB84 quantum key distribution protocol. Phys. Rev. Lett. 85, 441 (2000)","journal-title":"Phys. Rev. Lett."},{"key":"1687_CR4","doi-asserted-by":"crossref","first-page":"351","DOI":"10.1145\/382780.382781","volume":"48","author":"D Mayers","year":"2001","unstructured":"Mayers, D.: Unconditional security in quantum cryptography. J. ACM 48, 351 (2001)","journal-title":"J. ACM"},{"key":"1687_CR5","doi-asserted-by":"crossref","first-page":"133","DOI":"10.1007\/s00145-004-0142-y","volume":"18","author":"H-K Lo","year":"2005","unstructured":"Lo, H.-K., Chau, H.F., Ardehali, M.: Efficient quantum key distribution scheme and a proof of its unconditional security. J. Cryptol. 18, 133\u2013165 (2005)","journal-title":"J. Cryptol."},{"key":"1687_CR6","doi-asserted-by":"crossref","first-page":"1330","DOI":"10.1103\/PhysRevLett.85.1330","volume":"85","author":"G Brassard","year":"2000","unstructured":"Brassard, G., L\u00fctkenhaus, N., Mor, T., Sanders, B.C.: Limitations on practical quantum cryptography. Phys. Rev. Lett. 85, 1330 (2000)","journal-title":"Phys. Rev. Lett."},{"key":"1687_CR7","doi-asserted-by":"crossref","first-page":"052304","DOI":"10.1103\/PhysRevA.61.052304","volume":"61","author":"N L\u00fctkenhaus","year":"2000","unstructured":"L\u00fctkenhaus, N.: Security against individual attacks for realistic quantum key distribution. Phys. Rev. A 61, 052304 (2000)","journal-title":"Phys. Rev. A"},{"key":"1687_CR8","doi-asserted-by":"crossref","first-page":"44.1","DOI":"10.1088\/1367-2630\/4\/1\/344","volume":"4","author":"N L\u00fctkenhaus","year":"2002","unstructured":"L\u00fctkenhaus, N., Jahma, M.: Quantum key distribution with realistic states: photon-number statistics in the photon-number splitting attack. N. J. Phys. 4, 44.1 (2002)","journal-title":"N. J. Phys."},{"key":"1687_CR9","doi-asserted-by":"crossref","first-page":"057901","DOI":"10.1103\/PhysRevLett.91.057901","volume":"91","author":"WY Hwang","year":"2003","unstructured":"Hwang, W.Y.: Quantum key distribution with high loss: toward global secure communication. Phys. Rev. Lett. 91, 057901 (2003)","journal-title":"Phys. Rev. Lett."},{"key":"1687_CR10","doi-asserted-by":"crossref","first-page":"230503","DOI":"10.1103\/PhysRevLett.94.230503","volume":"94","author":"X-B Wang","year":"2005","unstructured":"Wang, X.-B.: Beating the photon-number-splitting attack in practical quantum cryptography. Phys. Rev. Lett. 94, 230503 (2005)","journal-title":"Phys. Rev. Lett."},{"key":"1687_CR11","doi-asserted-by":"crossref","first-page":"230504","DOI":"10.1103\/PhysRevLett.94.230504","volume":"94","author":"H-K Lo","year":"2005","unstructured":"Lo, H.-K., Ma, X.-F., Chen, K.: Decoy state quantum key distribution. Phys. Rev. Lett. 94, 230504 (2005)","journal-title":"Phys. Rev. Lett."},{"key":"1687_CR12","doi-asserted-by":"crossref","first-page":"012312","DOI":"10.1103\/PhysRevA.75.012312","volume":"75","author":"Q Wang","year":"2007","unstructured":"Wang, Q., Wang, X.-B., Guo, G.-C.: Practical decoy-state method in quantum key distribution with a heralded single-photon source. Phys. Rev. A 75, 012312 (2007)","journal-title":"Phys. Rev. A"},{"key":"1687_CR13","doi-asserted-by":"crossref","first-page":"40001","DOI":"10.1209\/0295-5075\/79\/40001","volume":"79","author":"Q Wang","year":"2007","unstructured":"Wang, Q., Wang, X.-B.: Improved practical decoy state method in quantum key distribution with parametric down-conversion source. Europhys. Lett. 79, 40001 (2007)","journal-title":"Europhys. Lett."},{"key":"1687_CR14","doi-asserted-by":"crossref","first-page":"090501","DOI":"10.1103\/PhysRevLett.100.090501","volume":"100","author":"Q Wang","year":"2008","unstructured":"Wang, Q., Chen, W., Xavier, et al.: Experimental decoy-state quantum key distribution with a sub-Poissionian heralded single-photon source. Phys. Rev. Lett. 100, 090501 (2008)","journal-title":"Phys. Rev. Lett."},{"key":"1687_CR15","doi-asserted-by":"crossref","first-page":"130503","DOI":"10.1103\/PhysRevLett.108.130503","volume":"108","author":"HK Lo","year":"2012","unstructured":"Lo, H.K., Curty, M., Qi, B.: Measurement-device-independent quantum key distribution. Phys. Rev. Lett. 108, 130503 (2012)","journal-title":"Phys. Rev. Lett."},{"key":"1687_CR16","doi-asserted-by":"crossref","first-page":"052325","DOI":"10.1103\/PhysRevA.89.052325","volume":"89","author":"Y-H Zhou","year":"2014","unstructured":"Zhou, Y.-H., Yu, Z.-W., Wang, X.-B.: Tightened estimation can improve the key rate of measurement-device-independent quantum key distribution by more than 100. Phys. Rev. A 89, 052325 (2014)","journal-title":"Phys. Rev. A"},{"key":"1687_CR17","doi-asserted-by":"crossref","first-page":"012320","DOI":"10.1103\/PhysRevA.87.012320","volume":"87","author":"XB Wang","year":"2013","unstructured":"Wang, X.B.: Measurement-device-independent quantum key distribution. Phys. Rev. A 87, 012320 (2013)","journal-title":"Phys. Rev. A"},{"key":"1687_CR18","doi-asserted-by":"crossref","first-page":"042307","DOI":"10.1103\/PhysRevA.85.042307","volume":"85","author":"K Tamaki","year":"2012","unstructured":"Tamaki, K., Lo, H.-K., Fung, C.-H.F., Qi, B.: Phase encoding schemes for measurement-device-independent quantum key distribution with basis-dependent flaw. Phys. Rev. A 85, 042307 (2012)","journal-title":"Phys. Rev. A"},{"key":"1687_CR19","doi-asserted-by":"crossref","first-page":"062319","DOI":"10.1103\/PhysRevA.86.062319","volume":"86","author":"X Ma","year":"2012","unstructured":"Ma, X., Razavi, M.: Alternative schemes for measurement-device-independent quantum key distribution. Phys. Rev. A 86, 062319 (2012)","journal-title":"Phys. Rev. A"},{"key":"1687_CR20","doi-asserted-by":"crossref","first-page":"052332","DOI":"10.1103\/PhysRevA.88.052332","volume":"88","author":"Q Wang","year":"2013","unstructured":"Wang, Q., Wang, X.-B.: An efficient implementation of the decoy-state measurement-device-independent quantum key distribution with heralded single-photon sources. Phys. Rev. A 88, 052332 (2013)","journal-title":"Phys. Rev. A"},{"key":"1687_CR21","doi-asserted-by":"crossref","first-page":"04612","DOI":"10.1038\/srep04612","volume":"4","author":"Q Wang","year":"2014","unstructured":"Wang, Q., Wang, X.-B.: Simulating of the measurement-device independent quantum key distribution with phase randomized general sources. Sci. Rep. 4, 04612 (2014)","journal-title":"Sci. Rep."},{"key":"1687_CR22","doi-asserted-by":"crossref","first-page":"3799","DOI":"10.1007\/s11128-016-1371-3","volume":"15","author":"J-R Zhu","year":"2016","unstructured":"Zhu, J.-R., Zhu, F., Zhou, X.-Y., Wang, Q.: The enhanced measurement-device-independent quantum key distribution with two-intensity decoy states. Quantum Inf. Process. 15, 3799\u20133813 (2016)","journal-title":"Quantum Inf. Process."},{"key":"1687_CR23","doi-asserted-by":"crossref","first-page":"062315","DOI":"10.1103\/PhysRevA.90.062315","volume":"90","author":"D Wang","year":"2014","unstructured":"Wang, D., Li, M., Zhu, F., Yin, Z.-Q., Chen, W., Han, Z.-F., Guo, G.-C., Wang, Q.: Quantum key distribution with the single-photon-added coherent source. Phys. Rev. A 90, 062315 (2014)","journal-title":"Phys. Rev. A"},{"key":"1687_CR24","doi-asserted-by":"crossref","first-page":"075006","DOI":"10.1088\/1367-2630\/11\/7\/075006","volume":"11","author":"X-B Wang","year":"2009","unstructured":"Wang, X.-B., Yang, L., Peng, C.-Z., Pan, J.-W.: Decoy-state quantum key distribution with both source errors and statistical fluctuations. N. J. Phys. 11, 075006 (2009)","journal-title":"N. J. Phys."},{"key":"1687_CR25","doi-asserted-by":"crossref","first-page":"052305","DOI":"10.1103\/PhysRevA.86.052305","volume":"86","author":"X Ma","year":"2012","unstructured":"Ma, X., Fung, C.-H.F., Razavi, M.: Statistical fluctuation analysis for measurement-device-independent quantum key distribution. Phys. Rev. A 86, 052305 (2012)","journal-title":"Phys. Rev. A"},{"key":"1687_CR26","doi-asserted-by":"crossref","first-page":"032318","DOI":"10.1103\/PhysRevA.91.032318","volume":"91","author":"ZW Yu","year":"2015","unstructured":"Yu, Z.W., Zhou, Y.H., Wang, X.B.: Statistical fluctuation analysis for measurement-device-independent quantum key distribution with three-intensity decoy-state method. Phys. Rev. A 91, 032318 (2015)","journal-title":"Phys. Rev. A"},{"key":"1687_CR27","doi-asserted-by":"crossref","first-page":"012318","DOI":"10.1103\/PhysRevA.81.012318","volume":"81","author":"C-HF Fung","year":"2010","unstructured":"Fung, C.-H.F., Ma, X., Chau, H.F.: Practical issues in quantum-key-distribution postprocessing. Phys. Rev. A 81, 012318 (2010)","journal-title":"Phys. Rev. A"},{"key":"1687_CR28","first-page":"325","volume":"4","author":"D Gottesman","year":"2004","unstructured":"Gottesman, D., Lo, H.-K., L\u00fctkenhaus, N., Preskill, J.: Security of quantum key distribution with imperfect devices. Quantum Inf. Comput. 4, 325 (2004)","journal-title":"Quantum Inf. Comput."},{"key":"1687_CR29","doi-asserted-by":"crossref","first-page":"052333","DOI":"10.1103\/PhysRevA.89.052333","volume":"89","author":"F Xu","year":"2014","unstructured":"Xu, F., Xu, H., Lo, H.-K.: Protocol choice and parameter optimization in decoy-state measurement-device-independent quantum key distribution. Phys. Rev. A 89, 052333 (2014)","journal-title":"Phys. Rev. A"},{"key":"1687_CR30","doi-asserted-by":"crossref","first-page":"032312","DOI":"10.1103\/PhysRevA.93.032312","volume":"93","author":"Q Wang","year":"2016","unstructured":"Wang, Q., Zhang, C.-H., Wang, X.-B.: Scheme for realizing passive quantum key distribution with heralded single-photon sources. Phys. Rev. A 93, 032312 (2016)","journal-title":"Phys. Rev. A"},{"key":"1687_CR31","doi-asserted-by":"crossref","first-page":"21739","DOI":"10.1364\/OE.22.021739","volume":"22","author":"S Wang","year":"2014","unstructured":"Wang, S., Chen, W., Yin, Z.-Q., Li, H.-W., He, D.-Y., Li, Y.-H., Zhou, Z., Song, X.-T., Li, F.-Y., Wang, D., Chen, H., Han, Y.-G., Huang, J.-Z., Guo, J.-F., Hao, P.-L., Li, M., Zhang, C.-M., Liu, D., Liang, W.-Y., Miao, C.-H., Wu, P., Guo, G.-C., Han, Z.-F.: Field and long-term demonstration of a wide area quantum key distribution network. Opt. Express 22, 21739 (2014)","journal-title":"Opt. Express"},{"key":"1687_CR32","doi-asserted-by":"crossref","first-page":"032335","DOI":"10.1103\/PhysRevA.94.032335","volume":"94","author":"Y Wang","year":"2016","unstructured":"Wang, Y., Bao, W.-S., Zhou, C., Jiang, M.-S., Li, H.-W.: Tight finite-key analysis of a practical decoy-state quantum key distribution with unstable sources. Phys. Rev. A 94, 032335 (2016)","journal-title":"Phys. Rev. A"}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11128-017-1687-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-017-1687-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-017-1687-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,9,22]],"date-time":"2017-09-22T11:28:18Z","timestamp":1506079698000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11128-017-1687-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,8,17]]},"references-count":32,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2017,10]]}},"alternative-id":["1687"],"URL":"https:\/\/doi.org\/10.1007\/s11128-017-1687-7","relation":{},"ISSN":["1570-0755","1573-1332"],"issn-type":[{"value":"1570-0755","type":"print"},{"value":"1573-1332","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,8,17]]},"article-number":"238"}}