{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,21]],"date-time":"2025-10-21T15:26:53Z","timestamp":1761060413194,"version":"3.37.3"},"reference-count":29,"publisher":"Springer Science and Business Media LLC","issue":"10","license":[{"start":{"date-parts":[[2017,9,5]],"date-time":"2017-09-05T00:00:00Z","timestamp":1504569600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China (CN)","doi-asserted-by":"publisher","award":["61475197"],"award-info":[{"award-number":["61475197"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National Natural Science Foundation of China (CN)","award":["61590932"],"award-info":[{"award-number":["61590932"]}]},{"name":"Natural Science Foundation of the Jiangsu Higher Education Institutions","award":["15KJA120002"],"award-info":[{"award-number":["15KJA120002"]}]},{"name":"Outstanding Youth Project of Jiangsu Province","award":["BK20150039"],"award-info":[{"award-number":["BK20150039"]}]},{"DOI":"10.13039\/501100012246","name":"Priority Academic Program Development of Jiangsu Higher Education Institutions","doi-asserted-by":"crossref","award":["YX002001"],"award-info":[{"award-number":["YX002001"]}],"id":[{"id":"10.13039\/501100012246","id-type":"DOI","asserted-by":"crossref"}]},{"name":"NUPTSF","award":["NY217006"],"award-info":[{"award-number":["NY217006"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"published-print":{"date-parts":[[2017,10]]},"DOI":"10.1007\/s11128-017-1707-7","type":"journal-article","created":{"date-parts":[[2017,9,5]],"date-time":"2017-09-05T01:30:35Z","timestamp":1504575035000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["An improved proposal on the practical quantum key distribution with biased basis"],"prefix":"10.1007","volume":"16","author":[{"given":"Chen-Chen","family":"Mao","sequence":"first","affiliation":[]},{"given":"Jian","family":"Li","sequence":"additional","affiliation":[]},{"given":"Jian-Rong","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Chun-Mei","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Qin","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,9,5]]},"reference":[{"key":"1707_CR1","doi-asserted-by":"crossref","first-page":"661","DOI":"10.1103\/PhysRevLett.67.661","volume":"67","author":"A Ekert","year":"1991","unstructured":"Ekert, A.: Quantum cryptography based on Bell\u2019s theorem. Phys. Rev. Lett. 67, 661 (1991)","journal-title":"Phys. Rev. Lett."},{"key":"1707_CR2","doi-asserted-by":"crossref","first-page":"2050","DOI":"10.1126\/science.283.5410.2050","volume":"283","author":"H-K Lo","year":"1999","unstructured":"Lo, H.-K., Chau, H.F.: Unconditional security of quantum key distribution over arbitrarily long distances. Science 283, 2050 (1999)","journal-title":"Science"},{"key":"1707_CR3","doi-asserted-by":"crossref","first-page":"351","DOI":"10.1145\/382780.382781","volume":"48","author":"D Mayers","year":"2001","unstructured":"Mayers, D.: Unconditional security in quantum cryptography. J. ACM 48, 351 (2001)","journal-title":"J. ACM"},{"key":"1707_CR4","unstructured":"Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. In: Proceedings of the IEEE International Conference on Computers, Systems and Signal Processing, pp. 175\u2013179. IEEE, New York (1984)"},{"key":"1707_CR5","doi-asserted-by":"crossref","first-page":"441","DOI":"10.1103\/PhysRevLett.85.441","volume":"85","author":"PW Shor","year":"2000","unstructured":"Shor, P.W., Preskill, J.: Simple proof of security of the BB84 quantum key distribution protocol. Phys. Rev. Lett. 85, 441 (2000)","journal-title":"Phys. Rev. Lett."},{"key":"1707_CR6","doi-asserted-by":"crossref","first-page":"075001","DOI":"10.1088\/1367-2630\/11\/7\/075001","volume":"11","author":"M Peev","year":"2009","unstructured":"Peev, M., Pacher, C., Alleaume, R., et al.: The SECOQC quantum key distribution network in Vienna. New J. Phys. 11, 075001 (2009)","journal-title":"New J. Phys."},{"key":"1707_CR7","doi-asserted-by":"crossref","first-page":"10387","DOI":"10.1364\/OE.19.010387","volume":"19","author":"M Sasaki","year":"2011","unstructured":"Sasaki, M., Fujiwara, M., Ishizuka, H., et al.: Field test of quantum key distribution in the Tokyo QKD network. Opt. Express 19, 10387 (2011)","journal-title":"Opt. Express"},{"key":"1707_CR8","doi-asserted-by":"crossref","first-page":"133","DOI":"10.1007\/s00145-004-0142-y","volume":"18","author":"H-K Lo","year":"2005","unstructured":"Lo, H.-K., Chau, H.F., Ardehali, M.: Efficient quantum key distribution scheme and a proof of its unconditional security. J. Cryptol. 18, 133 (2005)","journal-title":"J. Cryptol."},{"key":"1707_CR9","doi-asserted-by":"crossref","first-page":"1330","DOI":"10.1103\/PhysRevLett.85.1330","volume":"85","author":"G Brassard","year":"2000","unstructured":"Brassard, G., Ltkenhaus, N., Mor, T., Sanders, B.C.: Limitations on practical quantum cryptography. Phys. Rev. Lett. 85, 1330 (2000)","journal-title":"Phys. Rev. Lett."},{"key":"1707_CR10","first-page":"44.1","volume":"4","author":"N Ltkenhaus","year":"2002","unstructured":"Ltkenhaus, N., Jahma, M.: Quantum key distribution with realistic states: photon-number statistics in the photon-number splitting attack. New J. Phys. 4, 44.1 (2002)","journal-title":"New J. Phys."},{"key":"1707_CR11","doi-asserted-by":"crossref","first-page":"057901","DOI":"10.1103\/PhysRevLett.91.057901","volume":"91","author":"WY Hwang","year":"2003","unstructured":"Hwang, W.Y.: Quantum key distribution with high loss: toward global secure communication. Phys. Rev. Lett. 91, 057901 (2003)","journal-title":"Phys. Rev. Lett."},{"key":"1707_CR12","doi-asserted-by":"crossref","first-page":"230503","DOI":"10.1103\/PhysRevLett.94.230503","volume":"94","author":"X-B Wang","year":"2005","unstructured":"Wang, X.-B.: Beating the photon-number-splitting attack in practical quantum crytography. Phys. Rev. Lett. 94, 230503 (2005)","journal-title":"Phys. Rev. Lett."},{"key":"1707_CR13","doi-asserted-by":"crossref","first-page":"012312","DOI":"10.1103\/PhysRevA.75.012312","volume":"75","author":"Q Wang","year":"2007","unstructured":"Wang, Q., Wang, X.-B., Guo, G.-C.: Practical decoy-state method in quantum key distribution with a heralded single-photon source. Phys. Rev. A 75, 012312 (2007)","journal-title":"Phys. Rev. A"},{"key":"1707_CR14","doi-asserted-by":"crossref","first-page":"090501","DOI":"10.1103\/PhysRevLett.100.090501","volume":"100","author":"Q Wang","year":"2008","unstructured":"Wang, Q., Chen, W., Xavier, G., et al.: Experimental decoy-state quantum key distribution with a sub-Poissionian heralded single-photon source. Phys. Rev. Lett. 100, 090501 (2008)","journal-title":"Phys. Rev. Lett."},{"key":"1707_CR15","doi-asserted-by":"crossref","first-page":"40001","DOI":"10.1209\/0295-5075\/79\/40001","volume":"79","author":"Q Wang","year":"2007","unstructured":"Wang, Q., Wang, X.-B.: Improved practical decoy state method in quantum key distribution with parametric down-conversion source. Europhys. Lett. 79, 40001 (2007)","journal-title":"Europhys. Lett."},{"key":"1707_CR16","doi-asserted-by":"crossref","first-page":"230504","DOI":"10.1103\/PhysRevLett.94.230504","volume":"94","author":"H-K Lo","year":"2005","unstructured":"Lo, H.-K., Ma, X.-F., Chen, K.: Decoy state quantum key distribution. Phys. Rev. Lett. 94, 230504 (2005)","journal-title":"Phys. Rev. Lett."},{"key":"1707_CR17","doi-asserted-by":"crossref","first-page":"012312","DOI":"10.1103\/PhysRevA.75.012312","volume":"75","author":"X-F Ma","year":"2007","unstructured":"Ma, X.-F., Qi, B., Zhao, Y., Lo, H.-K.: Practical decoy state for quantum key distribution. Phys. Rev. A 75, 012312 (2007)","journal-title":"Phys. Rev. A"},{"key":"1707_CR18","doi-asserted-by":"crossref","first-page":"010505","DOI":"10.1103\/PhysRevLett.98.010505","volume":"98","author":"C-Z Peng","year":"2007","unstructured":"Peng, C.-Z., Zhang, J., Yang, D., et al.: Experimental long-distance decoy-state quantum key distribution based on polarization encoding. Phys. Rev. Lett. 98, 010505 (2007)","journal-title":"Phys. Rev. Lett."},{"key":"1707_CR19","doi-asserted-by":"crossref","first-page":"2454","DOI":"10.1038\/srep02454","volume":"3","author":"Z-C Wei","year":"2013","unstructured":"Wei, Z.-C., Wang, W.-L., Zhang, Z., Guo, M., Ma, X.-F.: Decoy-state quantum key distribution with biased basis choice. Sci. Rep. 3, 2454 (2013)","journal-title":"Sci. Rep."},{"key":"1707_CR20","doi-asserted-by":"crossref","first-page":"24550","DOI":"10.1364\/OE.21.024550","volume":"21","author":"M Lucamarini","year":"2013","unstructured":"Lucamarini, M., Patel, K., Dynes, J., et al.: Efficient decoy-state quantum key distribution with quantified security. Opt. Express 21, 24550 (2013)","journal-title":"Opt. Express"},{"key":"1707_CR21","doi-asserted-by":"crossref","first-page":"022307","DOI":"10.1103\/PhysRevA.89.022307","volume":"89","author":"CCW Lim","year":"2014","unstructured":"Lim, C.C.W., Curty, M., Walenta, N., et al.: Concise security bounds for practical decoy-state quantum key distribution. Phys. Rev. A 89, 022307 (2014)","journal-title":"Phys. Rev. A"},{"key":"1707_CR22","first-page":"325","volume":"4","author":"D Gottesman","year":"2004","unstructured":"Gottesman, D., Lo, H.-K., Ltkenhaus, N., Preskill, J.: Security of quantum key distribution with imperfect devices. Quantum Inf. Comput. 4, 325 (2004)","journal-title":"Quantum Inf. Comput."},{"key":"1707_CR23","doi-asserted-by":"crossref","first-page":"012318","DOI":"10.1103\/PhysRevA.81.012318","volume":"81","author":"C-HF Fung","year":"2010","unstructured":"Fung, C.-H.F., Ma, X.-F., Chau, H.F.: Practical issues in quantum-key-distribution postprocessing. Phys. Rev. A 81, 012318 (2010)","journal-title":"Phys. Rev. A"},{"key":"1707_CR24","doi-asserted-by":"crossref","first-page":"052325","DOI":"10.1103\/PhysRevA.89.052325","volume":"89","author":"Y-H Zhou","year":"2014","unstructured":"Zhou, Y.-H., Yu, Z.-W., Wang, X.-B.: Tightened estimation can improve the key rate of measurement-device-indepengdent quantum key distribution by more than 100%. Phys. Rev. A 89, 052325 (2014)","journal-title":"Phys. Rev. A"},{"key":"1707_CR25","doi-asserted-by":"crossref","first-page":"172","DOI":"10.1016\/j.cose.2010.11.001","volume":"30","author":"X-F Ma","year":"2011","unstructured":"Ma, X.-F., Fung, C.-H.F., Boileau, J.-C., Chau, H.F.: Universally composable and customizable post-processing for practical quantum key distribution. Comput. Secur. 30, 172 (2011)","journal-title":"Comput. Secur."},{"key":"1707_CR26","doi-asserted-by":"crossref","first-page":"075006","DOI":"10.1088\/1367-2630\/11\/7\/075006","volume":"11","author":"X-B Wang","year":"2009","unstructured":"Wang, X.-B., Yang, L., Peng, C.-Z., Pan, J.-W.: Decoy-state quantum key distribution with both source errors and statistical fluctuations. New J. Phys. 11, 075006 (2009)","journal-title":"New J. Phys."},{"key":"1707_CR27","doi-asserted-by":"crossref","first-page":"032318","DOI":"10.1103\/PhysRevA.91.032318","volume":"91","author":"Z-W Yu","year":"2015","unstructured":"Yu, Z.-W., Zhou, Y.-H., Wang, X.-B.: Statistical fluctuation analysis for measurement-device-independent quantum key distribution three-intensity decoy-state method. Phys. Rev. A 91, 032318 (2015)","journal-title":"Phys. Rev. A"},{"key":"1707_CR28","doi-asserted-by":"crossref","first-page":"052333","DOI":"10.1103\/PhysRevA.89.052333","volume":"89","author":"F-H Xu","year":"2014","unstructured":"Xu, F.-H., Xu, H., Lo, H.-K.: Protocol choice and parameter optimization in decoy-state measurement-device-independent quantum key distribution. Phys. Rev. A 89, 052333 (2014)","journal-title":"Phys. Rev. A"},{"key":"1707_CR29","doi-asserted-by":"crossref","first-page":"032312","DOI":"10.1103\/PhysRevA.93.032312","volume":"93","author":"Q Wang","year":"2016","unstructured":"Wang, Q., Zhang, C.-H., Wang, X.-B.: Scheme for realizing passive quantum key distribution with heralded single-photon sources. Phys. Rew. A 93, 032312 (2016)","journal-title":"Phys. Rew. A"}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11128-017-1707-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-017-1707-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-017-1707-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,18]],"date-time":"2020-05-18T06:24:16Z","timestamp":1589783056000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11128-017-1707-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,9,5]]},"references-count":29,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2017,10]]}},"alternative-id":["1707"],"URL":"https:\/\/doi.org\/10.1007\/s11128-017-1707-7","relation":{},"ISSN":["1570-0755","1573-1332"],"issn-type":[{"type":"print","value":"1570-0755"},{"type":"electronic","value":"1573-1332"}],"subject":[],"published":{"date-parts":[[2017,9,5]]},"article-number":"256"}}