{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T11:26:52Z","timestamp":1740137212187,"version":"3.37.3"},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2018,1,27]],"date-time":"2018-01-27T00:00:00Z","timestamp":1517011200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"name":"Foundation of Science and Technology on Communication Security Laboratory","award":["6142103040105"],"award-info":[{"award-number":["6142103040105"]}]},{"name":"Strategic Priority Research Program (B) of the Chinese Academy of Sciences","award":["XDB01030300"],"award-info":[{"award-number":["XDB01030300"]}]},{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"crossref","award":["2016YFA0302600"],"award-info":[{"award-number":["2016YFA0302600"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61475148","61575183"],"award-info":[{"award-number":["61475148","61575183"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"published-print":{"date-parts":[[2018,3]]},"DOI":"10.1007\/s11128-018-1830-0","type":"journal-article","created":{"date-parts":[[2018,1,27]],"date-time":"2018-01-27T22:39:49Z","timestamp":1517092789000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Security of BB84 with weak randomness and imperfect qubit encoding"],"prefix":"10.1007","volume":"17","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6192-9102","authenticated-orcid":false,"given":"Liang-Yuan","family":"Zhao","sequence":"first","affiliation":[]},{"given":"Zhen-Qiang","family":"Yin","sequence":"additional","affiliation":[]},{"given":"Hong-Wei","family":"Li","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Xi","family":"Fang","sequence":"additional","affiliation":[]},{"given":"Zheng-Fu","family":"Han","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Huang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,1,27]]},"reference":[{"key":"1830_CR1","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1103\/RevModPhys.74.145","volume":"74","author":"N Gisin","year":"2002","unstructured":"Gisin, N., Ribordy, G., Tittel, W., Zbinden, H.: Quantum cryptography. Rev. Mod. Phys. 74, 145 (2002)","journal-title":"Rev. Mod. Phys."},{"key":"1830_CR2","doi-asserted-by":"publisher","first-page":"1301","DOI":"10.1103\/RevModPhys.81.1301","volume":"81","author":"V Scarani","year":"2009","unstructured":"Scarani, V., Bechmann-Pasquinucci, H., Cerf, N.J., Dus\u0306ek, M., L\u00fctkenhaus, N., Peev, M.: The security of practical quantum key distribution. Rev. Mod. Phys. 81, 1301 (2009)","journal-title":"Rev. Mod. Phys."},{"key":"1830_CR3","doi-asserted-by":"publisher","first-page":"595","DOI":"10.1038\/nphoton.2014.149","volume":"8","author":"H-K Lo","year":"2014","unstructured":"Lo, H.-K., Curty, M., Tamaki, K.: Secure quantum key distribution. Nat. Photonics 8, 595 (2014)","journal-title":"Nat. Photonics"},{"key":"1830_CR4","unstructured":"Bennett, C.H.: Quantum cryptography: public key distribution and coin tossing. In: International Conference on Computer System and Signal Processing, IEEE, 1984 p. 175 (1984)"},{"key":"1830_CR5","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1145\/382780.382781","volume":"48","author":"D Mayers","year":"2001","unstructured":"Mayers, D.: Unconditional security in quantum cryptography. J. ACM (JACM) 48, 351 (2001)","journal-title":"J. ACM (JACM)"},{"key":"1830_CR6","doi-asserted-by":"publisher","first-page":"2050","DOI":"10.1126\/science.283.5410.2050","volume":"283","author":"H-K Lo","year":"1999","unstructured":"Lo, H.-K., Chau, H.F.: Unconditional security of quantum key distribution over arbitrarily long distances. Science 283, 2050 (1999)","journal-title":"Science"},{"key":"1830_CR7","doi-asserted-by":"publisher","first-page":"441","DOI":"10.1103\/PhysRevLett.85.441","volume":"85","author":"PW Shor","year":"2000","unstructured":"Shor, P.W., Preskill, J.: Simple proof of security of the BB84 quantum key distribution protocol. Phys. Rev. Lett. 85, 441 (2000)","journal-title":"Phys. Rev. Lett."},{"key":"1830_CR8","doi-asserted-by":"publisher","first-page":"080501","DOI":"10.1103\/PhysRevLett.95.080501","volume":"95","author":"B Kraus","year":"2005","unstructured":"Kraus, B., Gisin, N., Renner, R.: Lower and upper bounds on the secret-key rate for quantum key distribution protocols using one-way classical communication. Phys. Rev. Lett. 95, 080501 (2005)","journal-title":"Phys. Rev. Lett."},{"key":"1830_CR9","doi-asserted-by":"crossref","unstructured":"Li, H.-W., Yin, Z.-Q., Wang, S., Qian, Y.-J., Chen, W., Guo, G.-C., Han, Z.-F.: Randomness determines practical security of BB84 quantum key distribution. Scientific Reports 5 (2015)","DOI":"10.1038\/srep16200"},{"key":"1830_CR10","first-page":"73","volume":"7","author":"B Qi","year":"2007","unstructured":"Qi, B., Fung, C.-H.F., Lo, H.-K., Ma, X.: Time-shift attack in practical quantum cryptosystems. Quantum Inf. Comput. 7, 73 (2007)","journal-title":"Quantum Inf. Comput."},{"key":"1830_CR11","doi-asserted-by":"publisher","first-page":"062308","DOI":"10.1103\/PhysRevA.84.062308","volume":"84","author":"H-W Li","year":"2011","unstructured":"Li, H.-W., Wang, S., Huang, J.-Z., Chen, W., Yin, Z.-Q., Li, F.-Y., Zhou, Z., Liu, D., Zhang, Y., Guo, G.-C., et al.: Attacking a practical quantum-key-distribution system with wavelength-dependent beam-splitter and multiwavelength sources. Phys. Rev. A 84, 062308 (2011)","journal-title":"Phys. Rev. A"},{"key":"1830_CR12","doi-asserted-by":"publisher","first-page":"022320","DOI":"10.1103\/PhysRevA.73.022320","volume":"73","author":"N Gisin","year":"2006","unstructured":"Gisin, N., Fasel, S., Kraus, B., Zbinden, H., Ribordy, G.: Trojan-horse attacks on quantum-key-distribution systems. Phys. Rev. A 73, 022320 (2006)","journal-title":"Phys. Rev. A"},{"key":"1830_CR13","doi-asserted-by":"publisher","first-page":"123030","DOI":"10.1088\/1367-2630\/16\/12\/123030","volume":"16","author":"N Jain","year":"2014","unstructured":"Jain, N., Anisimova, E., Khan, I., Makarov, V., Marquardt, C., Leuchs, G.: Trojan-horse attacks threaten the security of practical quantum cryptography. New J. Phys. 16, 123030 (2014)","journal-title":"New J. Phys."},{"key":"1830_CR14","first-page":"031030","volume":"5","author":"M Lucamarini","year":"2015","unstructured":"Lucamarini, M., Choi, I., Ward, M.B., Dynes, J.F., Yuan, Z., Shields, A.J.: Practical security bounds against the Trojan-horse attack in quantum key distribution. Phys. Rev. X 5, 031030 (2015)","journal-title":"Phys. Rev. X"},{"key":"1830_CR15","doi-asserted-by":"publisher","first-page":"686","DOI":"10.1038\/nphoton.2010.214","volume":"4","author":"L Lydersen","year":"2010","unstructured":"Lydersen, L., Wiechers, C., Wittmann, C., Elser, D., Skaar, J., Makarov, V.: Hacking commercial quantum cryptography systems by tailored bright illumination. Nat. Photonics 4, 686 (2010)","journal-title":"Nat. Photonics"},{"key":"1830_CR16","doi-asserted-by":"publisher","first-page":"599","DOI":"10.1140\/epjd\/e2007-00010-4","volume":"41","author":"H Inamori","year":"2007","unstructured":"Inamori, H., L\u00fctkenhaus, N., Mayers, D.: Unconditional security of practical quantum key distribution. Eur. Phys. J D 41, 599 (2007)","journal-title":"Eur. Phys. J D"},{"key":"1830_CR17","doi-asserted-by":"publisher","first-page":"045018","DOI":"10.1088\/1367-2630\/11\/4\/045018","volume":"11","author":"M Koashi","year":"2009","unstructured":"Koashi, M.: Simple security proof of quantum key distribution based on complementarity. New J. Phys. 11, 045018 (2009)","journal-title":"New J. Phys."},{"key":"1830_CR18","doi-asserted-by":"publisher","first-page":"659","DOI":"10.1038\/nphys1734","volume":"6","author":"M Berta","year":"2010","unstructured":"Berta, M., Christandl, M., Colbeck, R., Renes, J.M., Renner, R.: The uncertainty principle in the presence of quantum memory. Nat. Phys. 6, 659 (2010)","journal-title":"Nat. Phys."},{"key":"1830_CR19","doi-asserted-by":"publisher","first-page":"634","DOI":"10.1038\/ncomms1631","volume":"3","author":"M Tomamichel","year":"2012","unstructured":"Tomamichel, M., Lim, C.C.W., Gisin, N., Renner, R.: Tight finite-key analysis for quantum cryptography. Nat. Commun. 3, 634 (2012)","journal-title":"Nat. Commun."},{"key":"1830_CR20","doi-asserted-by":"publisher","first-page":"057902","DOI":"10.1103\/PhysRevLett.90.057902","volume":"90","author":"M Koashi","year":"2003","unstructured":"Koashi, M., Preskill, J.: Secure quantum key distribution with an uncharacterized source. Phys. Rev. Lett. 90, 057902 (2003)","journal-title":"Phys. Rev. Lett."},{"key":"1830_CR21","first-page":"325","volume":"4","author":"D Gottesman","year":"2004","unstructured":"Gottesman, D., Lo, H.-K., L\u00fctkenhaus, N., Preskill, J.: Security of quantum key distribution with imperfect devices. Quantum Inf. Comput. 4, 325 (2004)","journal-title":"Quantum Inf. Comput."},{"key":"1830_CR22","doi-asserted-by":"publisher","first-page":"042307","DOI":"10.1103\/PhysRevA.85.042307","volume":"85","author":"K Tamaki","year":"2012","unstructured":"Tamaki, K., Lo, H.-K., Fung, C.-H.F., Qi, B.: Phase encoding schemes for measurement-device-independent quantum key distribution with basis-dependent flaw. Phys. Rev. A 85, 042307 (2012)","journal-title":"Phys. Rev. A"},{"key":"1830_CR23","doi-asserted-by":"publisher","first-page":"2501","DOI":"10.1080\/09500349314552491","volume":"40","author":"SM Barnett","year":"1993","unstructured":"Barnett, S.M., Huttner, B., Phoenix, S.J.: Eavesdropping strategies and rejected-data protocols in quantum cryptography. J. Mod. Opt. 40, 2501 (1993)","journal-title":"J. Mod. Opt."},{"key":"1830_CR24","doi-asserted-by":"publisher","first-page":"R5","DOI":"10.1103\/PhysRevA.48.R5","volume":"48","author":"SM Barnett","year":"1993","unstructured":"Barnett, S.M., Phoenix, S.J.: Information-theoretic limits to quantum cryptography. Phys. Rev. A 48, R5 (1993)","journal-title":"Phys. Rev. A"},{"key":"1830_CR25","doi-asserted-by":"publisher","first-page":"052314","DOI":"10.1103\/PhysRevA.90.052314","volume":"90","author":"K Tamaki","year":"2014","unstructured":"Tamaki, K., Curty, M., Kato, G., Lo, H.-K., Azuma, K.: Loss-tolerant quantum cryptography with imperfect sources. Phys. Rev. A 90, 052314 (2014)","journal-title":"Phys. Rev. A"},{"key":"1830_CR26","doi-asserted-by":"publisher","first-page":"052319","DOI":"10.1103\/PhysRevA.90.052319","volume":"90","author":"Z-Q Yin","year":"2014","unstructured":"Yin, Z.-Q., Fung, C.-H.F., Ma, X., Zhang, C.-M., Li, H.-W., Chen, W., Wang, S., Guo, G.-C., Han, Z.-F.: Mismatched-basis statistics enable quantum key distribution with uncharacterized qubit sources. Phys. Rev. A 90, 052319 (2014)","journal-title":"Phys. Rev. A"},{"key":"1830_CR27","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1007\/s00145-004-0142-y","volume":"18","author":"H-K Lo","year":"2005","unstructured":"Lo, H.-K., Chau, H.-F., Ardehali, M.: Efficient quantum key distribution scheme and a proof of its unconditional security. J. Cryptol. 18, 133 (2005)","journal-title":"J. Cryptol."},{"key":"1830_CR28","unstructured":"Koashi, M.: Complementarity, distillable secret key, and distillable entanglement. arXiv preprint \n                    arXiv:0704.3661\n                    \n                   (2007)"},{"key":"1830_CR29","doi-asserted-by":"publisher","first-page":"022307","DOI":"10.1103\/PhysRevA.89.022307","volume":"89","author":"CCW Lim","year":"2014","unstructured":"Lim, C.C.W., Curty, M., Walenta, N., Xu, F., Zbinden, H.: Concise security bounds for practical decoy-state quantum key distribution. Phys. Rev. A 89, 022307 (2014)","journal-title":"Phys. Rev. A"},{"key":"1830_CR30","doi-asserted-by":"publisher","first-page":"093011","DOI":"10.1088\/1367-2630\/17\/9\/093011","volume":"17","author":"A Mizutani","year":"2015","unstructured":"Mizutani, A., Curty, M., Lim, C.C.W., Imoto, N., Tamaki, K.: Finite-key security analysis of quantum key distribution with imperfect light sources. New J. Phys. 17, 093011 (2015)","journal-title":"New J. Phys."}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11128-018-1830-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-018-1830-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-018-1830-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,18]],"date-time":"2020-05-18T22:34:47Z","timestamp":1589841287000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11128-018-1830-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,1,27]]},"references-count":30,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2018,3]]}},"alternative-id":["1830"],"URL":"https:\/\/doi.org\/10.1007\/s11128-018-1830-0","relation":{},"ISSN":["1570-0755","1573-1332"],"issn-type":[{"type":"print","value":"1570-0755"},{"type":"electronic","value":"1573-1332"}],"subject":[],"published":{"date-parts":[[2018,1,27]]},"assertion":[{"value":"17 June 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 January 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 January 2018","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"55"}}