{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T11:27:12Z","timestamp":1740137232239,"version":"3.37.3"},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2019,3,26]],"date-time":"2019-03-26T00:00:00Z","timestamp":1553558400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"name":"HKSAR Government Research Grant Council","award":["17304716"],"award-info":[{"award-number":["17304716"]}]},{"DOI":"10.13039\/501100012166","name":"National Key Research And Development Program of China","doi-asserted-by":"crossref","award":["2016YFA0302600"],"award-info":[{"award-number":["2016YFA0302600"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61775207","61627820"],"award-info":[{"award-number":["61775207","61627820"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61622506","61575183"],"award-info":[{"award-number":["61622506","61575183"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61822115"],"award-info":[{"award-number":["61822115"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Anhui Initiative in Quantum Information Technology"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"published-print":{"date-parts":[[2019,5]]},"DOI":"10.1007\/s11128-019-2263-0","type":"journal-article","created":{"date-parts":[[2019,3,26]],"date-time":"2019-03-26T17:03:26Z","timestamp":1553619806000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Chau\u2013Wang\u2013Wong17 scheme is experimentally more feasible than the six-state scheme"],"prefix":"10.1007","volume":"18","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3315-532X","authenticated-orcid":false,"given":"H. F.","family":"Chau","sequence":"first","affiliation":[]},{"given":"Zhen-Qiang","family":"Yin","sequence":"additional","affiliation":[]},{"given":"Shuang","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Zheng-Fu","family":"Han","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,3,26]]},"reference":[{"key":"2263_CR1","doi-asserted-by":"publisher","first-page":"3018","DOI":"10.1103\/PhysRevLett.81.3018","volume":"81","author":"D Bru\u00df","year":"1998","unstructured":"Bru\u00df, D.: Optimal eavesdropping in quantum cryptography with six states. Phys. Rev. Lett. 81, 3018 (1998)","journal-title":"Phys. Rev. Lett."},{"key":"2263_CR2","first-page":"81","volume":"1","author":"H-K Lo","year":"2001","unstructured":"Lo, H.-K.: Proof of unconditional security of six-state quantum key distribution scheme. Quantum Inf. Comput. 1, 81 (2001)","journal-title":"Quantum Inf. Comput."},{"key":"2263_CR3","unstructured":"Bennett, C.H., Brassard, G.: In Proceedings of the IEEE International Conference on Computers, Systems and Signal Processing, pp. 175\u2013179. IEEE Press, New York (1984)"},{"key":"2263_CR4","doi-asserted-by":"publisher","first-page":"1301","DOI":"10.1103\/RevModPhys.81.1301","volume":"81","author":"V Scarani","year":"2009","unstructured":"Scarani, V., Bechmann-Pasquinucci, H., Cerf, N.J., Du\u0161ek, M., L\u00fctkenhaus, N., Peev, M.: The security of practical quantum key distribution. Rev. Mod. Phys. 81, 1301 (2009)","journal-title":"Rev. Mod. Phys."},{"key":"2263_CR5","doi-asserted-by":"publisher","first-page":"062324","DOI":"10.1103\/PhysRevA.92.062324","volume":"92","author":"HF Chau","year":"2015","unstructured":"Chau, H.F.: Quantum key distribution using qudits that each encode one bit of raw key. Phys. Rev. A 92, 062324 (2015)","journal-title":"Phys. Rev. A"},{"key":"2263_CR6","doi-asserted-by":"publisher","first-page":"022311","DOI":"10.1103\/PhysRevA.95.022311","volume":"95","author":"HF Chau","year":"2017","unstructured":"Chau, H.F., Wang, Q., Wong, C.: Experimentally feasible quantum-key-distribution scheme using qubit-like qudits and its comparison with existing qubit- and qudit-based protocols. Phys. Rev. A 95, 022311 (2017)","journal-title":"Phys. Rev. A"},{"key":"2263_CR7","doi-asserted-by":"publisher","first-page":"030301(R)","DOI":"10.1103\/PhysRevA.82.030301","volume":"82","author":"L Sheridan","year":"2010","unstructured":"Sheridan, L., Scarani, V.: Security proof for quantum key distribution using qudit systems. Phys. Rev. A 82, 030301(R) (2010)","journal-title":"Phys. Rev. A"},{"key":"2263_CR8","doi-asserted-by":"publisher","first-page":"039901(E)","DOI":"10.1103\/PhysRevA.83.039901","volume":"83","author":"L Sheridan","year":"2011","unstructured":"Sheridan, L., Scarani, V.: Erratum: security proof for quantum key distribution using qudit systems. Phys. Rev. A 83, 039901(E) (2011)","journal-title":"Phys. Rev. A"},{"key":"2263_CR9","doi-asserted-by":"publisher","first-page":"827","DOI":"10.1038\/nphoton.2015.173","volume":"9","author":"H Takesue","year":"2015","unstructured":"Takesue, H., Sasaki, T., Tamaki, K., Koashi, M.: Experimental quantum key distribution without monitoring signal disturbance. Nat Photon 9, 827 (2015)","journal-title":"Nat Photon"},{"key":"2263_CR10","doi-asserted-by":"publisher","first-page":"832","DOI":"10.1038\/nphoton.2015.209","volume":"9","author":"S Wang","year":"2015","unstructured":"Wang, S., Yin, Z.-Q., Chen, W., He, D.-Y., Song, X.-T., Li, H.-W., Zhang, L.-J., Zhou, Z., Guo, G.-C., Han, Z.-F.: Experimental demonstration of a quantum key distribution without signal disturbance monitoring. Nat. Photon 9, 832 (2015)","journal-title":"Nat. Photon"},{"key":"2263_CR11","doi-asserted-by":"publisher","first-page":"030302","DOI":"10.1103\/PhysRevA.93.030302","volume":"93","author":"Y-H Li","year":"2016","unstructured":"Li, Y.-H., Cao, Y., Dai, H., Lin, J., Zhang, Z., Chen, W., Xu, Y., Guan, J.-Y., Liao, S.-K., Yin, J., Zhang, Q., Ma, X., Peng, C.-Z., Pan, J.-W.: Experimental round-robin differential phase-shift quantum key distribution. Phys. Rev. A 93, 030302 (2016)","journal-title":"Phys. Rev. A"},{"key":"2263_CR12","doi-asserted-by":"publisher","first-page":"457","DOI":"10.1038\/s41467-017-02211-x","volume":"9","author":"Z-Q Yin","year":"2018","unstructured":"Yin, Z.-Q., Wang, S., Chen, W., Han, Y.-G., Wang, R., Guo, G.-C., Han, Z.-F.: Improved security bound for the round-robin-differential-phase-shift quantum key distribution. Nat. Commun. 9, 457 (2018)","journal-title":"Nat. Commun."},{"key":"2263_CR13","doi-asserted-by":"publisher","first-page":"180502","DOI":"10.1103\/PhysRevLett.114.180502","volume":"114","author":"J-Y Guan","year":"2015","unstructured":"Guan, J.-Y., Cao, Z., Liu, Y., Shen-Tu, G.-L., Pelc, J.S., Fejer, M.M., Peng, C.-Z., Ma, X., Zhang, Q., Pan, J.-W.: Experimental passive round-robin differential phase-shift quantum key distribution. Phys. Rev. Lett. 114, 180502 (2015)","journal-title":"Phys. Rev. Lett."},{"key":"2263_CR14","doi-asserted-by":"publisher","first-page":"025006","DOI":"10.1088\/2058-9565\/aaace4","volume":"3","author":"S Wang","year":"2018","unstructured":"Wang, S., Yin, Z.-Q., Chau, H.F., Chen, W., Wang, C., Guo, G.-C., Han, Z.-F.: Proof-of-principle experimental realization of a qubit-like qudit-based quantum key distribution scheme. Quantum Sci. Technol. 3, 025006 (2018)","journal-title":"Quantum Sci. Technol."},{"key":"2263_CR15","doi-asserted-by":"publisher","first-page":"475","DOI":"10.1038\/nature13303","volume":"509","author":"T Sasaki","year":"2014","unstructured":"Sasaki, T., Yamamoto, Y., Koashi, M.: Practical quantum key distribution protocol without monitoring signal disturbance. Nature 509, 475 (2014)","journal-title":"Nature"},{"key":"2263_CR16","doi-asserted-by":"publisher","first-page":"e1701491","DOI":"10.1126\/sciadv.1701491","volume":"3","author":"NT Islam","year":"2017","unstructured":"Islam, N.T., Lim, C.C.W., Cahall, C., Kim, J., Gauthier, D.J.: Provably secure and high-rate quantum key distribution with time-bin qudits. Sci. Adv. 3, e1701491 (2017)","journal-title":"Sci. Adv."},{"key":"2263_CR17","doi-asserted-by":"publisher","first-page":"441","DOI":"10.1103\/PhysRevLett.85.441","volume":"85","author":"PW Shor","year":"2000","unstructured":"Shor, P.W., Preskill, J.: Simple proof of security of the BB84 quantum key distribution protocol. Phys. Rev. Lett. 85, 441 (2000)","journal-title":"Phys. Rev. Lett."},{"key":"2263_CR18","doi-asserted-by":"publisher","first-page":"230503","DOI":"10.1103\/PhysRevLett.94.230503","volume":"94","author":"X-B Wang","year":"2005","unstructured":"Wang, X.-B.: Beating the \n                    \n                      \n                    \n                    $$PNS$$\n                    \n                      \n                        \n                          PNS\n                        \n                      \n                    \n                   attack in practical quantum cryptography. Phys. Rev. Lett. 94, 230503 (2005)","journal-title":"Phys. Rev. Lett."},{"key":"2263_CR19","doi-asserted-by":"publisher","first-page":"230504","DOI":"10.1103\/PhysRevLett.94.230504","volume":"94","author":"H-K Lo","year":"2005","unstructured":"Lo, H.-K., Ma, X., Chen, K.: Decoy state quantum key distribution. Phys. Rev. Lett. 94, 230504 (2005)","journal-title":"Phys. Rev. Lett."},{"key":"2263_CR20","doi-asserted-by":"publisher","first-page":"032330","DOI":"10.1103\/PhysRevA.74.032330","volume":"74","author":"X Ma","year":"2006","unstructured":"Ma, X., Fung, C.-H.F., Dupuis, F., Chen, K., Tamaki, K., Lo, H.-K.: Decoy state quantum key distribution with two-way classical post-processing. Phys. Rev. A 74, 032330 (2006)","journal-title":"Phys. Rev. A"},{"key":"2263_CR21","doi-asserted-by":"publisher","first-page":"020303","DOI":"10.1103\/PhysRevA.84.020303","volume":"84","author":"C-HF Fung","year":"2011","unstructured":"Fung, C.-H.F., Chau, H.F., Lo, H.-K.: Universal squash model for optical communications using linear optics and threshold detectors. Phys. Rev. A 84, 020303 (2011)","journal-title":"Phys. Rev. A"},{"key":"2263_CR22","unstructured":"Chau, H. F., Wong, C., Huang, T., Wang, Q.: Provably secure key rate analysis of finite-key-length qudit-based decoy state quantum key distributions (2017) (in preparation)"},{"key":"2263_CR23","doi-asserted-by":"publisher","first-page":"057901","DOI":"10.1103\/PhysRevLett.91.057901","volume":"91","author":"W-Y Hwang","year":"2003","unstructured":"Hwang, W.-Y.: Quantum key distribution with high loss: toward global secure communication. Phys. Rev. Lett. 91, 057901 (2003)","journal-title":"Phys. Rev. Lett."},{"key":"2263_CR24","doi-asserted-by":"publisher","first-page":"062308","DOI":"10.1103\/PhysRevA.84.062308","volume":"84","author":"H-W Li","year":"2011","unstructured":"Li, H.-W., Wang, S., Huang, J.-Z., Chen, W., Yin, Z.-Q., Li, F.-Y., Zhou, Z., Liu, D., Zhang, Y., Guo, G.-C., Bao, W.-S., Han, Z.-F.: Attacking a practical quantum-key-distribution system with wavelength-dependent beam-splitter and multiwavelength sources. Phys. Rev. A 84, 062308 (2011)","journal-title":"Phys. Rev. A"},{"key":"2263_CR25","doi-asserted-by":"publisher","first-page":"063106","DOI":"10.1063\/1.4749802","volume":"112","author":"N Walenta","year":"2012","unstructured":"Walenta, N., Lunghi, T., Guinnard, O., Houlmann, R., Zbinden, H., Gisin, N.: Sine gating detector with simple filtering for low-noise infra-red single photon detection at room temperature. J. Appl. Phys. 112, 063106 (2012). \n                    https:\/\/doi.org\/10.1063\/1.4749802","journal-title":"J. Appl. Phys."},{"key":"2263_CR26","doi-asserted-by":"publisher","first-page":"111104","DOI":"10.1063\/1.4978599","volume":"110","author":"D-Y He","year":"2017","unstructured":"He, D.-Y., Wang, S., Chen, W., Yin, Z.-Q., Qian, Y.-J., Zhou, Z., Guo, G.-C., Han, Z.-F.: Sine-wave gating InGaAs\/InP single photon detector with ultralow afterpulse. Appl. Phys. Lett. 110, 111104 (2017)","journal-title":"Appl. Phys. Lett."},{"key":"2263_CR27","doi-asserted-by":"publisher","first-page":"022307","DOI":"10.1103\/PhysRevA.89.022307","volume":"89","author":"CCW Lim","year":"2014","unstructured":"Lim, C.C.W., Curty, M., Walenta, N., Xu, F., Zbinden, H.: Concise security bounds for practical decoy-state quantum key distribution. Phys. Rev. A 89, 022307 (2014)","journal-title":"Phys. Rev. A"},{"key":"2263_CR28","doi-asserted-by":"publisher","first-page":"033013","DOI":"10.1088\/1367-2630\/aa6274","volume":"19","author":"Z Zhang","year":"2017","unstructured":"Zhang, Z., Yuan, X., Cao, Z., Ma, X.: Practical round-robin differential-phase-shift quantum key distribution. N. J. Phys. 19, 033013 (2017)","journal-title":"N. J. Phys."}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-019-2263-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11128-019-2263-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-019-2263-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,3,25]],"date-time":"2020-03-25T00:29:22Z","timestamp":1585096162000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11128-019-2263-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,3,26]]},"references-count":28,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2019,5]]}},"alternative-id":["2263"],"URL":"https:\/\/doi.org\/10.1007\/s11128-019-2263-0","relation":{},"ISSN":["1570-0755","1573-1332"],"issn-type":[{"type":"print","value":"1570-0755"},{"type":"electronic","value":"1573-1332"}],"subject":[],"published":{"date-parts":[[2019,3,26]]},"assertion":[{"value":"2 November 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 March 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 March 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"138"}}