{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T11:26:52Z","timestamp":1740137212307,"version":"3.37.3"},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2018,1,24]],"date-time":"2018-01-24T00:00:00Z","timestamp":1516752000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["11704412"],"award-info":[{"award-number":["11704412"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"published-print":{"date-parts":[[2018,3]]},"DOI":"10.1007\/s11128-018-1818-9","type":"journal-article","created":{"date-parts":[[2018,1,24]],"date-time":"2018-01-24T12:18:50Z","timestamp":1516796330000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Measurement-device-independent quantum key distribution with multiple crystal heralded source with post-selection"],"prefix":"10.1007","volume":"17","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2745-0258","authenticated-orcid":false,"given":"Dong","family":"Chen","sequence":"first","affiliation":[]},{"given":"Zhao","family":"Shang-Hong","sequence":"additional","affiliation":[]},{"given":"Deng","family":"MengYi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,1,24]]},"reference":[{"key":"1818_CR1","unstructured":"Bennett, C.H., Brassard, G.; Quantum cryptography. In: Proceedings of the IEEE International Conference Computers, Systems and Signal Processing, pp. 175\u2013179. IEEE, New York (1984)"},{"key":"1818_CR2","doi-asserted-by":"publisher","first-page":"441","DOI":"10.1103\/PhysRevLett.85.441","volume":"85","author":"PW Shor","year":"2000","unstructured":"Shor, P.W., Preskill, J.: Simple proof of security of the BB84 quantum key distribution protocol. Phys. Rev. Lett. 85, 441\u2013444 (2000)","journal-title":"Phys. Rev. Lett."},{"key":"1818_CR3","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1145\/382780.382781","volume":"48","author":"D Mayers","year":"2001","unstructured":"Mayers, D.: Unconditional security in quantum cryptography. J. ACM 48, 351\u2013406 (2001)","journal-title":"J. ACM"},{"key":"1818_CR4","first-page":"325","volume":"4","author":"D Gottesman","year":"2004","unstructured":"Gottesman, D., Lo, H.K., Lutkenhaus, N., Preskill, J.: Security of quantum key distribution with imperfect devices. Quantum Inf. Comput. 4, 325\u2013360 (2004)","journal-title":"Quantum Inf. Comput."},{"key":"1818_CR5","doi-asserted-by":"publisher","first-page":"1330","DOI":"10.1103\/PhysRevLett.85.1330","volume":"85","author":"G Brassard","year":"2000","unstructured":"Brassard, G., Lutkenhaus, N., Mor, T., Sanders, B.C.: Limitations on practical quantum cryptography. Phys. Rev. Lett. 85, 1330\u20131333 (2000)","journal-title":"Phys. Rev. Lett."},{"key":"1818_CR6","doi-asserted-by":"publisher","first-page":"071107","DOI":"10.1063\/1.4746402","volume":"101","author":"SH Sun","year":"2012","unstructured":"Sun, S.H., Liang, L.M.: Experimental demonstration of an active phase randomization and monitor module for quantum key distribution. Appl. Phys. Lett. 101, 071107 (2012)","journal-title":"Appl. Phys. Lett."},{"key":"1818_CR7","first-page":"0622","volume":"86","author":"V Makarov","year":"2008","unstructured":"Makarov, V., Skaar, J.: Faked states attack using detector efficiency mismatch on SARG04, phase-time, DPSK, and Ekert protocols. Quantum Inf. Comput. 86, 0622\u20130635 (2008)","journal-title":"Quantum Inf. Comput."},{"key":"1818_CR8","doi-asserted-by":"publisher","first-page":"052304","DOI":"10.1103\/PhysRevA.75.052304","volume":"75","author":"B Qi","year":"2007","unstructured":"Qi, B., Zhao, Y., Ma, X.F., Lo, H.K., Qian, L.: Quantum key distribution with dual detectors. Phys. Rev. A: At. Mol. Opt. Phys. 75, 052304 (2007)","journal-title":"Phys. Rev. A: At. Mol. Opt. Phys."},{"key":"1818_CR9","doi-asserted-by":"publisher","first-page":"065003","DOI":"10.1088\/1367-2630\/11\/6\/065003","volume":"11","author":"V Makarov","year":"2009","unstructured":"Makarov, V.: Controlling passively-quenched single photon detectors by bright light. New J. Phys. 11, 065003 (2009)","journal-title":"New J. Phys."},{"key":"1818_CR10","doi-asserted-by":"publisher","first-page":"130503","DOI":"10.1103\/PhysRevLett.108.130503","volume":"108","author":"HK Lo","year":"2012","unstructured":"Lo, H.K., Curty, M., Qi, B.: Measurement-device-independent quantum key distribution. Phys. Rev. Lett. 108, 130503 (2012)","journal-title":"Phys. Rev. Lett."},{"key":"1818_CR11","doi-asserted-by":"publisher","first-page":"130501","DOI":"10.1103\/PhysRevLett.111.130501","volume":"111","author":"A Rubenok","year":"2014","unstructured":"Rubenok, A., Slater, J.A., Chan, P., Lucio-Martinez, I., Tittel, W.: Real-world two-photon interference and proof-of-principle quantum key distribution immune to detector attacks. Phys. Rev. Lett. 111, 130501 (2014)","journal-title":"Phys. Rev. Lett."},{"key":"1818_CR12","doi-asserted-by":"publisher","first-page":"052303","DOI":"10.1103\/PhysRevA.88.052303","volume":"88","author":"T Ferreira da Silva","year":"2013","unstructured":"Ferreira da Silva, T., Vitoreti, D., Xavier, G.B., do Amaral, G.C., Temporao, G.P., vonder Weid, J.P.: Proof-of-principle demonstration of measurement-device-independent quantum key distribution using polarization qubits. Phys. Rev. A 88, 052303 (2013)","journal-title":"Phys. Rev. A"},{"key":"1818_CR13","doi-asserted-by":"publisher","first-page":"130502","DOI":"10.1103\/PhysRevLett.111.130502","volume":"111","author":"Y Liu","year":"2013","unstructured":"Liu, Y., Chen, T.Y., Wang, L.J., Liang, H., Shentu, G.L., Wang, J., Cui, K., Yin, H.L., Liu, N.L., Li, L., et al.: Experimental measurement-device-independent quantum key distribution. Phys. Rev. Lett. 111, 130502 (2013)","journal-title":"Phys. Rev. Lett."},{"key":"1818_CR14","doi-asserted-by":"publisher","first-page":"190503","DOI":"10.1103\/PhysRevLett.112.190503","volume":"112","author":"Z Tang","year":"2013","unstructured":"Tang, Z., Liao, Z., Xu, F., Qi, B., Qian, L., Lo, H.K.: Experimental demonstration of polarization encoding measurement-device-independent quantum key distribution. Phys. Rev. Lett. 112, 190503 (2013)","journal-title":"Phys. Rev. Lett."},{"key":"1818_CR15","doi-asserted-by":"publisher","first-page":"190501","DOI":"10.1103\/PhysRevLett.117.190501","volume":"117","author":"HL Yin","year":"2016","unstructured":"Yin, H.L., et al.: Measurement-device-independent quantum key distribution over a 404 km optical fiber. Phys. Rev. Lett. 117, 190501 (2016)","journal-title":"Phys. Rev. Lett."},{"key":"1818_CR16","doi-asserted-by":"publisher","first-page":"180503","DOI":"10.1103\/PhysRevLett.99.180503","volume":"99","author":"Y Adachi","year":"2007","unstructured":"Adachi, Y., Yamamoto, T., Koashi, M., Imoto, N.: Simple and efficient quantum key distribution with parametric down-conversion. Phys. Rev. Lett. 99, 180503 (2007)","journal-title":"Phys. Rev. Lett."},{"key":"1818_CR17","doi-asserted-by":"publisher","first-page":"073018","DOI":"10.1088\/1367-2630\/10\/7\/073018","volume":"10","author":"XF Ma","year":"2008","unstructured":"Ma, X.F., Lo, H.K.: Quantum key distribution with triggering parametric down conversion sources. New J. Phys. 10, 073018 (2008)","journal-title":"New J. Phys."},{"key":"1818_CR18","doi-asserted-by":"publisher","first-page":"221112","DOI":"10.1063\/1.4768288","volume":"101","author":"G Brida","year":"2012","unstructured":"Brida, G., Degiovanni, I.P., Genovese, M., Piacentini, F., Traina, P., Della Frera, A., et al.: ]An extremely low-noise heralded single-photon source: a breakthrough for quantum technologies. Appl. Phys. Lett. 101, 221112 (2012)","journal-title":"Appl. Phys. Lett."},{"key":"1818_CR19","doi-asserted-by":"publisher","first-page":"052332","DOI":"10.1103\/PhysRevA.88.052332","volume":"88","author":"Q Wang","year":"2013","unstructured":"Wang, Q., Wang, X.B.: Efficient implementation of the decoy-state measurement-device-independent quantum key distribution with heralded single-photon sources. Phys. Rev. A 88, 052332 (2013)","journal-title":"Phys. Rev. A"},{"key":"1818_CR20","doi-asserted-by":"publisher","first-page":"052333","DOI":"10.1103\/PhysRevA.88.052333","volume":"88","author":"C Zhou","year":"2013","unstructured":"Zhou, C., Bao, W.S., Chen, W., Li, H.W., Yin, Z.-Q., Wang, Y., Han, Z.F.: Phase-encoded measurement device independent quantum key distribution with practical spontaneous parametric-down-conversion sources. Phys. Rev. A 88, 052333 (2013)","journal-title":"Phys. Rev. A"},{"key":"1818_CR21","doi-asserted-by":"publisher","first-page":"053805","DOI":"10.1103\/PhysRevA.66.053805","volume":"66","author":"AL Migdall","year":"2002","unstructured":"Migdall, A.L., Branning, D., Castelletto, S.: Tailoring single-photon and multiphoton probabilities of a single-photon on-demand source. Phys. Rev. A 66, 053805 (2002)","journal-title":"Phys. Rev. A"},{"key":"1818_CR22","doi-asserted-by":"publisher","first-page":"2698","DOI":"10.1364\/OL.32.002698","volume":"32","author":"JH Shapiro","year":"2007","unstructured":"Shapiro, J.H., Wong, F.N.: On-demand single-photon generation using a modular array of parametric downconverters with electro-optic polarization controls. Opt. Lett. 32, 2698 (2007)","journal-title":"Opt. Lett."},{"key":"1818_CR23","doi-asserted-by":"publisher","first-page":"023848","DOI":"10.1103\/PhysRevA.88.023848","volume":"88","author":"L Mazzarella","year":"2013","unstructured":"Mazzarella, L., Ticozzi, F., Sergienko, A.V., Vallone, G., Villoresi, P.: Asymmetric architecture for heralded single photon sources. Phys. Rev. A 88, 023848 (2013)","journal-title":"Phys. Rev. A"},{"key":"1818_CR24","doi-asserted-by":"publisher","first-page":"012331","DOI":"10.1103\/PhysRevA.93.012331","volume":"93","author":"M Schiavon","year":"2016","unstructured":"Schiavon, M., Vallone, G., Ticozzi, F., Villoresi, P.: Heralded single-photon sources for quantum key distribution applications. Phys. Rev. A 93, 012331 (2016)","journal-title":"Phys. Rev. A"},{"key":"1818_CR25","doi-asserted-by":"publisher","first-page":"062319","DOI":"10.1103\/PhysRevA.86.062319","volume":"86","author":"XF Ma","year":"2012","unstructured":"Ma, X.F., Razavi, M.: Alternative schemes for measurement-device-independent quantum key distribution. Phys. Rev. A 86, 062319 (2012)","journal-title":"Phys. Rev. A"},{"key":"1818_CR26","doi-asserted-by":"publisher","first-page":"052329","DOI":"10.1103\/PhysRevA.87.052329","volume":"87","author":"SH Sun","year":"2013","unstructured":"Sun, S.H., Gao, M., Li, C.Y., Liang, L.M.: Practical decoy-state measurement-device-independent quantum key distribution. Phys. Rev. A 87, 052329 (2013)","journal-title":"Phys. Rev. A"},{"key":"1818_CR27","doi-asserted-by":"publisher","first-page":"3732","DOI":"10.1038\/ncomms4732","volume":"5","author":"M Curty","year":"2014","unstructured":"Curty, M., Xu, F., Cui, W., Lim, C.C.W., Tamaki, K., Lo, H.-K.: Finite-key analysis for measurement-device-independent quantum key distribution. Nat. Commun. 5, 3732 (2014)","journal-title":"Nat. Commun."},{"key":"1818_CR28","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1364\/OPTICA.4.000090","volume":"4","author":"RJA Francis-Jones","year":"2017","unstructured":"Francis-Jones, R.J.A., Hoggarth, R.A., Mosley, P.J.: All-fibre multiplexed source of high-purity single photons. Optica 4, 90\u201396 (2017)","journal-title":"Optica"}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11128-018-1818-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-018-1818-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-018-1818-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,1,24]],"date-time":"2019-01-24T15:25:46Z","timestamp":1548343546000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11128-018-1818-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,1,24]]},"references-count":28,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2018,3]]}},"alternative-id":["1818"],"URL":"https:\/\/doi.org\/10.1007\/s11128-018-1818-9","relation":{},"ISSN":["1570-0755","1573-1332"],"issn-type":[{"type":"print","value":"1570-0755"},{"type":"electronic","value":"1573-1332"}],"subject":[],"published":{"date-parts":[[2018,1,24]]},"assertion":[{"value":"23 January 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 January 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 January 2018","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"50"}}