{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,8,13]],"date-time":"2022-08-13T05:41:03Z","timestamp":1660369263959},"reference-count":25,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2018,1,25]],"date-time":"2018-01-25T00:00:00Z","timestamp":1516838400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"published-print":{"date-parts":[[2018,3]]},"DOI":"10.1007\/s11128-018-1814-0","type":"journal-article","created":{"date-parts":[[2018,1,25]],"date-time":"2018-01-25T12:21:34Z","timestamp":1516882894000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["The statistical fluctuation study of quantum key distribution in means of uncertainty principle"],"prefix":"10.1007","volume":"17","author":[{"given":"Dunwei","family":"Liu","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Huiyao","family":"An","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Xiaoyu","family":"Zhang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Xuemei","family":"Shi","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2018,1,25]]},"reference":[{"key":"1814_CR1","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1145\/1008908.1008920","volume":"15","author":"S Wiesner","year":"1983","unstructured":"Wiesner, S.: Conjugate coding. SIG A CT News 15, 78\u201388 (1983)","journal-title":"SIG A CT News"},{"key":"1814_CR2","unstructured":"Bennett CH., Brassard, G.: Quantum cryptography: public-key distribution and co in tossing [A]. In: Pro-ceedings of the International Conference on Computers, Systems and Signal Processing, pp. 175\u2013179. Ban-galore Press, India (1984)"},{"key":"1814_CR3","doi-asserted-by":"publisher","first-page":"661","DOI":"10.1103\/PhysRevLett.67.661","volume":"67","author":"AK Ekert","year":"1991","unstructured":"Ekert, A.K.: Quantum cryptography based on Bell\u2019s theorem. Phys. Rev. Lett. 67, 661\u2013663 (1991)","journal-title":"Phys. Rev. Lett."},{"key":"1814_CR4","doi-asserted-by":"publisher","first-page":"1370","DOI":"10.1103\/PhysRevLett.86.1370","volume":"86","author":"YH Kim","year":"2000","unstructured":"Kim, Y.H., Kulik, S.P., Shih, Y.: Quantum teleportation of a polarization state with a complete bell state measurement. Phys. Rev. Lett. 86, 1370\u20131373 (2000)","journal-title":"Phys. Rev. Lett."},{"issue":"1","key":"1814_CR5","first-page":"124","volume":"15","author":"C Cinelli","year":"2005","unstructured":"Cinelli, C., Barbieri, M., Martini, F.D., et al.: Realization of hyperentangled two-photon states. Int. J. Laser Phys. 15(1), 124\u2013128 (2005)","journal-title":"Int. J. Laser Phys."},{"key":"1814_CR6","doi-asserted-by":"publisher","first-page":"3121","DOI":"10.1103\/PhysRevLett.68.3121","volume":"68","author":"CH Bennett","year":"1992","unstructured":"Bennett, C.H.: Quantum cryptography using any two nonorthogonal states. Phys. Rev. Lett. 68, 3121\u20133124 (1992)","journal-title":"Phys. Rev. Lett."},{"issue":"1","key":"1814_CR7","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/BF00191318","volume":"5","author":"CH Bennett","year":"1992","unstructured":"Bennett, C.H., et al.: Experimental quantum cryptography. J. Cryptol. 5(1), 3\u201328 (1992)","journal-title":"J. Cryptol."},{"issue":"1","key":"1814_CR8","first-page":"47","volume":"48","author":"JA Smolin","year":"2004","unstructured":"Smolin, J.A.: The early days of experimental quantum cryptography. OBM J. Res. Dev. Phys. Inf. 48(1), 47\u201352 (2004)","journal-title":"OBM J. Res. Dev. Phys. Inf."},{"key":"1814_CR9","doi-asserted-by":"crossref","unstructured":"Tang, X., et al.: High speed fiber-based quantum key distribution using polarization encoding. In: Proceedings of SPIE. 5893, 58931 A (1\u20139), (2005)","DOI":"10.1117\/12.614598"},{"key":"1814_CR10","unstructured":"Tang, X., et al.: Quantum key distribution system operating at sifted-key rate over 4 Mbit\/s. In: Proceedings of SPIE. 6244, 62440P(1\u20138), (2006)"},{"key":"1814_CR11","doi-asserted-by":"crossref","unstructured":"Mink, A., Tang, A. et al.: High speed quantum key distribution system supports one-time pad encryption of real-time video. In: Proceedings of SPIE. 6244, 62440M (1\u20137), (2006)","DOI":"10.1117\/12.664114"},{"issue":"7","key":"1814_CR12","doi-asserted-by":"publisher","first-page":"900","DOI":"10.1109\/JQE.2004.830182","volume":"40","author":"KJ Gordon","year":"2004","unstructured":"Gordon, K.J., et al.: A short wavelength gigahertz clocked fiber-optic quantum key distribution system. IEEE J. Quantum Electron. 40(7), 900\u2013908 (2004)","journal-title":"IEEE J. Quantum Electron."},{"issue":"8","key":"1814_CR13","doi-asserted-by":"publisher","first-page":"3015","DOI":"10.1364\/OPEX.13.003015","volume":"13","author":"KJ Gordon","year":"2005","unstructured":"Gordon, K.J., et al.: Quantum key distribution system clocked at 2 GHz. Opt. Express 13(8), 3015\u20133020 (2005)","journal-title":"Opt. Express"},{"key":"1814_CR14","doi-asserted-by":"crossref","unstructured":"Gordon, K.J. et al. 3.3 gigahertz clocked quantum key distribution system. In: ECOC European Conference on Optical Communication, vol. 4, pp. 913\u2013914, (2005)","DOI":"10.1049\/cp:20050779"},{"issue":"1","key":"1814_CR15","doi-asserted-by":"publisher","first-page":"232","DOI":"10.1088\/1367-2630\/7\/1\/232","volume":"7","author":"H Takesue","year":"2005","unstructured":"Takesue, H., Diamanti, E., Honjo, T., Langrock, C., Fejer, M.M., Inoue, K., Yamamoto, Y.: Differential phase shift quantum key distribution experiment over 105 km fibre. New J. Phys. 7(1), 232\u2013232 (2005)","journal-title":"New J. Phys."},{"key":"1814_CR16","doi-asserted-by":"crossref","unstructured":"Takesue, H., Honjo, T., Inoue, K., Diamanti, E., Langrock, C., Fejer, N.M., Yaniamoto, Y.: Ultra-fast differential-phase-shift quantum key distribution using single-photon detectors based on up-conversion in periodically poled lithium niobate waveguides. In Optical Fiber Communication\u2014OFC, (2006)","DOI":"10.1109\/OFC.2006.216005"},{"issue":"7","key":"1814_CR17","doi-asserted-by":"publisher","first-page":"075003","DOI":"10.1088\/1367-2630\/11\/7\/075003","volume":"11","author":"D Stucki","year":"2009","unstructured":"Stucki, D., Walenta, N., Vannel, F., Thew, R.T., Gisin, N., Zbinden, H., Gray, S., Towery, C.R., Ten, S.: High rate, long-distance quantum key distribution over 250 km of ultralow loss fibres. New J. Phys. 11(7), 075003 (2009)","journal-title":"New J. Phys."},{"key":"1814_CR18","doi-asserted-by":"publisher","first-page":"062308","DOI":"10.1103\/PhysRevA.84.062308","volume":"84","author":"H-W Li","year":"2011","unstructured":"Li, H.-W., Wang, S., Huang, J.-Z., Chen, W., Yin, Z.-Q., Li, F.-Y., Zhou, Z., Liu, D., Zhang, Y., Guo, G.-C., Bao, W.-S., Han, Z.-F.: Attacking practical quantum key distribution system with wavelength dependent beam splitter and multi-wavelength sources. Phys. Rev. A 84, 062308 (2011)","journal-title":"Phys. Rev. A"},{"issue":"5","key":"1814_CR19","doi-asserted-by":"publisher","first-page":"057901","DOI":"10.1103\/PhysRevLett.91.057901","volume":"91","author":"Won-Young Hwang","year":"2003","unstructured":"Hwang, Won-Young: Quantum key distribution with high loss: toward global secure communication. Phys. Rev. Lett. 91(5), 057901 (2003)","journal-title":"Phys. Rev. Lett."},{"issue":"23","key":"1814_CR20","doi-asserted-by":"publisher","first-page":"230504","DOI":"10.1103\/PhysRevLett.94.230504","volume":"94","author":"Hoi-Kwong Lo","year":"2005","unstructured":"Lo, Hoi-Kwong, Ma, Xiongfeng, Chen, Kai: Decoy state quantum key distribution. Phys. Rev. Lett. 94(23), 230504 (2005)","journal-title":"Phys. Rev. Lett."},{"issue":"1","key":"1814_CR21","doi-asserted-by":"publisher","first-page":"012326","DOI":"10.1103\/PhysRevA.72.012326","volume":"72","author":"Ma Xiongfeng","year":"2005","unstructured":"Xiongfeng, Ma., et al.: Practical decoy state for quantum key distribution. Phys. Rev. A 72(1), 012326 (2005)","journal-title":"Phys. Rev. A"},{"issue":"5","key":"1814_CR22","first-page":"325","volume":"4","author":"D Gottesman","year":"2004","unstructured":"Gottesman, D., Lo, H.-K., Lutkenhaus, N., Preskill, J.: Security of quantum key distribution with imperfect device. Quantum Info. Comput. 4(5), 325\u2013360 (2004)","journal-title":"Quantum Info. Comput."},{"issue":"5","key":"1814_CR23","doi-asserted-by":"crossref","first-page":"50302","DOI":"10.7498\/aps.61.050302","volume":"61","author":"R Jiao","year":"2012","unstructured":"Jiao, R., Tang, S., Zhang, C.: Analysis of statistical fluctuation in decoy state quantum key distribution system. Acta Phys. Sin. 61(5), 50302\u2013050302 (2012)","journal-title":"Acta Phys. Sin."},{"issue":"5","key":"1814_CR24","doi-asserted-by":"publisher","first-page":"052304","DOI":"10.1103\/PhysRevA.61.052304","volume":"61","author":"Norbert L\u00fctkenhaus","year":"2000","unstructured":"L\u00fctkenhaus, Norbert: Security against individual attacks for realistic quantum key distribution. Phys. Rev. A 61(5), 052304 (2000)","journal-title":"Phys. Rev. A"},{"issue":"19","key":"1814_CR25","doi-asserted-by":"publisher","first-page":"3762","DOI":"10.1063\/1.1738173","volume":"84","author":"C Gobby","year":"2004","unstructured":"Gobby, C., Yuan, Z.L., Shields, A.J.: Quantum key distribution over 122 km of standard telecom fiber. Appl. Phys. Lett. 84(19), 3762\u20133764 (2004)","journal-title":"Appl. Phys. Lett."}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11128-018-1814-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-018-1814-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-018-1814-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,13]],"date-time":"2022-08-13T05:21:28Z","timestamp":1660368088000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11128-018-1814-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,1,25]]},"references-count":25,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2018,3]]}},"alternative-id":["1814"],"URL":"https:\/\/doi.org\/10.1007\/s11128-018-1814-0","relation":{},"ISSN":["1570-0755","1573-1332"],"issn-type":[{"value":"1570-0755","type":"print"},{"value":"1573-1332","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,1,25]]},"assertion":[{"value":"25 June 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 January 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 January 2018","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"52"}}