{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,24]],"date-time":"2025-08-24T01:55:01Z","timestamp":1756000501465,"version":"3.37.3"},"reference-count":22,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2019,11,13]],"date-time":"2019-11-13T00:00:00Z","timestamp":1573603200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,11,13]],"date-time":"2019-11-13T00:00:00Z","timestamp":1573603200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61865002"],"award-info":[{"award-number":["61865002"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Major Project of Guizhou Province","award":["[2016]3022"],"award-info":[{"award-number":["[2016]3022"]}]},{"name":"Science and Technology Cooperation Project of Guizhou Province","award":["[2014]7002","[2016]7431"],"award-info":[{"award-number":["[2014]7002","[2016]7431"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"published-print":{"date-parts":[[2020,1]]},"DOI":"10.1007\/s11128-019-2495-z","type":"journal-article","created":{"date-parts":[[2019,11,18]],"date-time":"2019-11-18T22:01:31Z","timestamp":1574114491000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Unidimensional continuous-variable quantum key distribution with noisy source"],"prefix":"10.1007","volume":"19","author":[{"given":"Tianyi","family":"Wang","sequence":"first","affiliation":[]},{"given":"Lun","family":"Li","sequence":"additional","affiliation":[]},{"given":"Ming","family":"Li","sequence":"additional","affiliation":[]},{"given":"Xu","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Anjiang","family":"Lu","sequence":"additional","affiliation":[]},{"given":"Damin","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Zhengping","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,11,13]]},"reference":[{"key":"2495_CR1","doi-asserted-by":"publisher","first-page":"1301","DOI":"10.1103\/RevModPhys.81.1301","volume":"81","author":"V Scarani","year":"2009","unstructured":"Scarani, V., Bechmann-Pasquinucci, H., Cerf, N.J., Dus\u0306ek, M., L\u00fctkenhaus, N., Peev, M.: The security of practical quantum key distribution. Rev. Mod. Phys. 81, 1301\u20131350 (2009)","journal-title":"Rev. Mod. Phys."},{"key":"2495_CR2","doi-asserted-by":"publisher","first-page":"621","DOI":"10.1103\/RevModPhys.84.621","volume":"84","author":"C Weedbrook","year":"2012","unstructured":"Weedbrook, C., Pirandola, S., Garc\u00eda-Patr\u00f3n, R., Cerf, N.J., Ralph, T.C., Shapiro, J.H., Lloyd, S.: Gaussian quantum information. Rev. Mod. Phys. 84, 621\u2013669 (2012)","journal-title":"Rev. Mod. Phys."},{"key":"2495_CR3","doi-asserted-by":"publisher","first-page":"020504","DOI":"10.1103\/PhysRevLett.94.020504","volume":"94","author":"F Grosshans","year":"2005","unstructured":"Grosshans, F.: Collective attacks and unconditional security in continuous variable quantum key distribution. Phys. Rev. Lett. 94, 020504 (2005)","journal-title":"Phys. Rev. Lett."},{"key":"2495_CR4","doi-asserted-by":"publisher","first-page":"020505","DOI":"10.1103\/PhysRevLett.94.020505","volume":"94","author":"M Navascu\u00e9s","year":"2005","unstructured":"Navascu\u00e9s, M., Ac\u00edn, A.: Security bounds for continuous variables quantum key distribution. Phys. Rev. Lett. 94, 020505 (2005)","journal-title":"Phys. Rev. Lett."},{"key":"2495_CR5","doi-asserted-by":"publisher","first-page":"200504","DOI":"10.1103\/PhysRevLett.101.200504","volume":"101","author":"S Pirandola","year":"2008","unstructured":"Pirandola, S., Braunstein, S.L., Lloyd, S.: Characterization of collective gaussian attacks and security of coherent-state quantum cryptography. Phys. Rev. Lett. 101, 200504 (2008)","journal-title":"Phys. Rev. Lett."},{"key":"2495_CR6","doi-asserted-by":"publisher","first-page":"110504","DOI":"10.1103\/PhysRevLett.102.110504","volume":"102","author":"R Renner","year":"2009","unstructured":"Renner, R., Cirac, J.I.: de finetti representation theorem for infinite-dimensional quantum systems and applications to quantum cryptography. Phys. Rev. Lett. 102, 110504 (2009)","journal-title":"Phys. Rev. Lett."},{"key":"2495_CR7","doi-asserted-by":"publisher","first-page":"030502","DOI":"10.1103\/PhysRevLett.110.030502","volume":"110","author":"A Leverrier","year":"2013","unstructured":"Leverrier, A., Garc\u00eda-Patr\u00f3n, R., Renner, R., Cerf, N.J.: Security of continuous-variable quantum key distribution against general attacks. Phys. Rev. Lett. 110, 030502 (2013)","journal-title":"Phys. Rev. Lett."},{"key":"2495_CR8","doi-asserted-by":"publisher","first-page":"070501","DOI":"10.1103\/PhysRevLett.114.070501","volume":"114","author":"A Leverrier","year":"2015","unstructured":"Leverrier, A.: Composable security proof for continuous-variable quantum key distribution with coherent states. Phys. Rev. Lett. 114, 070501 (2015)","journal-title":"Phys. Rev. Lett."},{"key":"2495_CR9","doi-asserted-by":"publisher","first-page":"200501","DOI":"10.1103\/PhysRevLett.118.200501","volume":"118","author":"A Leverrier","year":"2017","unstructured":"Leverrier, A.: Security of continuous-variable quantum key distribution via a Gaussian de Finetti reduction. Phys. Rev. Lett. 118, 200501 (2017)","journal-title":"Phys. Rev. Lett."},{"key":"2495_CR10","doi-asserted-by":"publisher","first-page":"238","DOI":"10.1038\/nature01289","volume":"421","author":"F Grosshans","year":"2003","unstructured":"Grosshans, F., Assche, G., Wenger, J., Brouri, R., Cerf, N.J., Grangier, P.: Quantum key distribution using Gaussian-modulated coherent states. Nature 421, 238\u2013241 (2003)","journal-title":"Nature"},{"key":"2495_CR11","doi-asserted-by":"publisher","first-page":"042305","DOI":"10.1103\/PhysRevA.76.042305","volume":"76","author":"J Lodewyck","year":"2007","unstructured":"Lodewyck, J., Bloch, M., Fossier, S., Karpov, E., Diamanti, E., Debuisschert, T., Cerf, N.J., Tualle-Brouri, R., McLaughlin, S.W., Grangier, P.: Quantum key distribution over 25 km with an all-fiber continuous-variable system. Phys. Rev. A 76, 042305 (2007)","journal-title":"Phys. Rev. A"},{"key":"2495_CR12","doi-asserted-by":"publisher","first-page":"378","DOI":"10.1038\/nphoton.2013.63","volume":"7","author":"P Jouguet","year":"2013","unstructured":"Jouguet, P., Kunz-Jacques, S., Leverrier, A., Grangier, P., Diamanti, E.: Experimental demonstration of long-distance continuous-variable quantum key distribution. Nat. Photonics 7, 378\u2013381 (2013)","journal-title":"Nat. Photonics"},{"key":"2495_CR13","doi-asserted-by":"publisher","first-page":"19201","DOI":"10.1038\/srep19201","volume":"6","author":"D Huang","year":"2016","unstructured":"Huang, D., Huang, P., Lin, D., Zeng, G.: Long-distance continuous-variable quantum key distribution by controlling excess noise. Sci. Rep. 6, 19201 (2016)","journal-title":"Sci. Rep."},{"key":"2495_CR14","doi-asserted-by":"publisher","first-page":"035006","DOI":"10.1088\/2058-9565\/ab19d1","volume":"4","author":"YC Zhang","year":"2019","unstructured":"Zhang, Y.C., Li, Z., Chen, Z., et al.: Continuous-variable QKD over 50 km commercial fiber. Quantum Sci. Technol. 4, 035006 (2019)","journal-title":"Quantum Sci. Technol."},{"key":"2495_CR15","doi-asserted-by":"publisher","first-page":"062337","DOI":"10.1103\/PhysRevA.92.062337","volume":"92","author":"VC Usenko","year":"2015","unstructured":"Usenko, V.C., Grosshans, F.: Unidimensional continuous-variable quantum key distribution. Phys. Rev. A 92, 062337 (2015)","journal-title":"Phys. Rev. A"},{"key":"2495_CR16","first-page":"1081","volume":"16","author":"T Gehring","year":"2016","unstructured":"Gehring, T., Jacobsen, C.S., Andersen, U.L.: Single-quadrature continuous-variable quantum key distribution. Quantum Inf. Comput. 16, 1081\u20131095 (2016)","journal-title":"Quantum Inf. Comput."},{"key":"2495_CR17","doi-asserted-by":"publisher","first-page":"062330","DOI":"10.1103\/PhysRevA.95.062330","volume":"95","author":"X Wang","year":"2017","unstructured":"Wang, X., Liu, W., Pu, W., Li, Y.: Experimental study on all-fiber-based unidimensional continuous-variable quantum key distribution. Phys. Rev. A 95, 062330 (2017)","journal-title":"Phys. Rev. A"},{"key":"2495_CR18","doi-asserted-by":"publisher","first-page":"022310","DOI":"10.1103\/PhysRevA.77.022310","volume":"77","author":"R Filip","year":"2008","unstructured":"Filip, R.: Continuous-variable quantum key distribution with noisy coherent states. Phys. Rev. A 77, 022310 (2008)","journal-title":"Phys. Rev. A"},{"key":"2495_CR19","doi-asserted-by":"publisher","first-page":"022318","DOI":"10.1103\/PhysRevA.81.022318","volume":"81","author":"V Usenko","year":"2010","unstructured":"Usenko, V., Filip, R.: Feasibility of continuous-variable quantum key distribution with noisy coherent states. Phys. Rev. A 81, 022318 (2010)","journal-title":"Phys. Rev. A"},{"key":"2495_CR20","doi-asserted-by":"publisher","first-page":"623","DOI":"10.1002\/j.1538-7305.1948.tb00917.x","volume":"27","author":"C Shannon","year":"1948","unstructured":"Shannon, C.: A mathematical theory of communication. Bell Syst. Tech. J. 27, 623\u2013656 (1948)","journal-title":"Bell Syst. Tech. J."},{"key":"2495_CR21","first-page":"177","volume":"9","author":"AS Holevo","year":"1973","unstructured":"Holevo, A.S.: Bounds for the quantity of information transmitted by a quantum communication channel. Probl. Inf. Transm. 9, 177\u2013183 (1973)","journal-title":"Probl. Inf. Transm."},{"key":"2495_CR22","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1038\/s41534-018-0070-6","volume":"4","author":"M Milicevic","year":"2018","unstructured":"Milicevic, M., Feng, C., Zhang, L.M., Gulak, P.G.: Quasi-cyclic multi-edge LDPC codes for long-distance quantum cryptography. NPJ Quantum Inf. 4, 21 (2018)","journal-title":"NPJ Quantum Inf."}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-019-2495-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11128-019-2495-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-019-2495-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,12]],"date-time":"2020-11-12T00:32:28Z","timestamp":1605141148000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11128-019-2495-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,13]]},"references-count":22,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2020,1]]}},"alternative-id":["2495"],"URL":"https:\/\/doi.org\/10.1007\/s11128-019-2495-z","relation":{},"ISSN":["1570-0755","1573-1332"],"issn-type":[{"type":"print","value":"1570-0755"},{"type":"electronic","value":"1573-1332"}],"subject":[],"published":{"date-parts":[[2019,11,13]]},"assertion":[{"value":"22 July 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 October 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 November 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"3"}}