{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T13:03:10Z","timestamp":1774357390419,"version":"3.50.1"},"reference-count":32,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2020,4,13]],"date-time":"2020-04-13T00:00:00Z","timestamp":1586736000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,4,13]],"date-time":"2020-04-13T00:00:00Z","timestamp":1586736000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"published-print":{"date-parts":[[2020,6]]},"DOI":"10.1007\/s11128-020-02663-z","type":"journal-article","created":{"date-parts":[[2020,4,13]],"date-time":"2020-04-13T18:02:17Z","timestamp":1586800937000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":17,"title":["Simple analysis of security of the BB84 quantum key distribution protocol"],"prefix":"10.1007","volume":"19","author":[{"given":"Hong-Yi","family":"Su","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,4,13]]},"reference":[{"key":"2663_CR1","volume-title":"Quantum Computation and Quantum Information","author":"MA Nielsen","year":"2000","unstructured":"Nielsen, M.A., Chuang, I.L.: Quantum Computation and Quantum Information. Cambridge University Press, Cambridge (2000)"},{"key":"2663_CR2","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W Diffie","year":"1976","unstructured":"Diffie, W., Hellman, M.: New directions in cryptography. IEEE Trans. Inf. Theory 22, 644\u2013654 (1976)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"2663_CR3","doi-asserted-by":"publisher","first-page":"294","DOI":"10.1145\/359460.359473","volume":"21","author":"R Merkle","year":"1978","unstructured":"Merkle, R.: Secure communications over insecure channels. Commun. ACM 21, 294\u2013299 (1978)","journal-title":"Commun. ACM"},{"key":"2663_CR4","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"RL Rivest","year":"1978","unstructured":"Rivest, R.L., Shamir, A., Adleman, L.M.: A method of obtaining digital signatures and public-key cryptosystems. Commun. ACM 21, 120\u2013126 (1978)","journal-title":"Commun. ACM"},{"key":"2663_CR5","doi-asserted-by":"publisher","first-page":"1301","DOI":"10.1103\/RevModPhys.81.1301","volume":"81","author":"V Scarani","year":"2009","unstructured":"Scarani, V., Bechmann-Pasquinucci, H., Cerf, N.J., Du\u0161ek, M., L\u00fctkenhaus, N., Peev, M.: The security of practical quantum key distribution. Rev. Mod. Phys. 81, 1301 (2009)","journal-title":"Rev. Mod. Phys."},{"key":"2663_CR6","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1103\/RevModPhys.74.145","volume":"74","author":"N Gisin","year":"2002","unstructured":"Gisin, N., Ribordy, G., Tittel, W., Zbinden, H.: Quantum cryptography. Rev. Mod. Phys. 74, 145 (2002)","journal-title":"Rev. Mod. Phys."},{"key":"2663_CR7","first-page":"109","volume":"45","author":"GS Vernam","year":"1926","unstructured":"Vernam, G.S.: Cipher printing telegraph systems for secret wire and radio telegraphic communications. J. Am. Inst. Electr. Eng. 45, 109\u2013115 (1926)","journal-title":"J. Am. Inst. Electr. Eng."},{"key":"2663_CR8","unstructured":"Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. In: Proceedings IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, India, 1984, pp. 175\u2013179. IEEE, New York (1984)"},{"key":"2663_CR9","doi-asserted-by":"publisher","first-page":"130503","DOI":"10.1103\/PhysRevLett.108.130503","volume":"108","author":"H-K Lo","year":"2012","unstructured":"Lo, H.-K., Curty, M., Qi, B.: Measurement-device-independent quantum key distribution. Phys. Rev. Lett. 108, 130503 (2012)","journal-title":"Phys. Rev. Lett."},{"key":"2663_CR10","doi-asserted-by":"publisher","first-page":"062322","DOI":"10.1103\/PhysRevA.88.062322","volume":"88","author":"Z-Q Yin","year":"2013","unstructured":"Yin, Z.-Q., Fung, C.-H.F., Ma, X., Zhang, C.-M., Li, H.-W., Chen, W., Wang, S., Guo, G.-C., Han, Z.-F.: Measurement-device-independent quantum key distribution with uncharacterized qubit sources. Phys. Rev. A 88, 062322 (2013)","journal-title":"Phys. Rev. A"},{"key":"2663_CR11","doi-asserted-by":"publisher","first-page":"052319","DOI":"10.1103\/PhysRevA.90.052319","volume":"90","author":"Z-Q Yin","year":"2014","unstructured":"Yin, Z.-Q., Fung, C.-H.F., Ma, X., Zhang, C.-M., Li, H.-W., Chen, W., Wang, S., Guo, G.-C., Han, Z.-F.: Mismatched-basis statistics enable quantum key distribution with uncharacterized qubit sources. Phys. Rev. A 90, 052319 (2014)","journal-title":"Phys. Rev. A"},{"key":"2663_CR12","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1103\/PhysRevLett.68.557","volume":"68","author":"CH Bennett","year":"1992","unstructured":"Bennett, C.H., Brassard, G., Mermin, N.D.: Quantum cryptography without Bell\u2019s theorem. Phys. Rev. Lett. 68, 557 (1992)","journal-title":"Phys. Rev. Lett."},{"key":"2663_CR13","doi-asserted-by":"publisher","first-page":"1098","DOI":"10.1103\/PhysRevA.54.1098","volume":"54","author":"AR Calderbank","year":"1996","unstructured":"Calderbank, A.R., Shor, P.W.: Good quantum error-correcting codes exist. Phys. Rev. A 54, 1098\u20131105 (1996)","journal-title":"Phys. Rev. A"},{"key":"2663_CR14","doi-asserted-by":"publisher","first-page":"2551","DOI":"10.1098\/rspa.1996.0136","volume":"452","author":"AM Steane","year":"1996","unstructured":"Steane, A.M.: Multiple-particle interference and quantum error correction. Proc. R. Soc. Lond. A 452, 2551\u20132577 (1996)","journal-title":"Proc. R. Soc. Lond. A"},{"key":"2663_CR15","doi-asserted-by":"publisher","first-page":"2050","DOI":"10.1126\/science.283.5410.2050","volume":"283","author":"H-K Lo","year":"1999","unstructured":"Lo, H.-K., Chau, H.F.: Unconditional security of quantum key distribution over arbitrarily long distances. Science 283, 2050\u20132056 (1999)","journal-title":"Science"},{"key":"2663_CR16","doi-asserted-by":"publisher","first-page":"441","DOI":"10.1103\/PhysRevLett.85.441","volume":"85","author":"PW Shor","year":"2000","unstructured":"Shor, P.W., Preskill, J.: Simple proof of security of the BB84 quantum key distribution protocol. Phys. Rev. Lett. 85, 441 (2000)","journal-title":"Phys. Rev. Lett."},{"key":"2663_CR17","doi-asserted-by":"publisher","first-page":"3824","DOI":"10.1103\/PhysRevA.54.3824","volume":"54","author":"CH Bennett","year":"1996","unstructured":"Bennett, C.H., DiVincenzo, D.P., Smolin, J.A., Wootters, W.K.: Mixed-state entanglement and quantum error correction. Phys. Rev. A 54, 3824\u20133851 (1996)","journal-title":"Phys. Rev. A"},{"key":"2663_CR18","doi-asserted-by":"publisher","first-page":"724","DOI":"10.1109\/ACCESS.2016.2528227","volume":"4","author":"HP Yuen","year":"2016","unstructured":"Yuen, H.P.: Security of quantum key distribution. IEEE Access 4, 724\u2013749 (2016)","journal-title":"IEEE Access"},{"key":"2663_CR19","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1145\/382780.382781","volume":"48","author":"D Mayers","year":"2001","unstructured":"Mayers, D.: Unconditional security in quantum cryptography. J. ACM 48, 351\u2013406 (2001)","journal-title":"J. ACM"},{"key":"2663_CR20","doi-asserted-by":"crossref","unstructured":"Biham, E., Boyer, M., Boykin, P.O., Mor, T., Roychowdhury, V.: A proof of the security of quantum key distribution (extended abstract). In: Proceedings of the Thirty-Second Annual ACM Symposium on Theory of Computing, pp. 715\u2013724. ACM Press, New York (2000)","DOI":"10.1145\/335305.335406"},{"key":"2663_CR21","doi-asserted-by":"publisher","first-page":"3018","DOI":"10.1103\/PhysRevLett.81.3018","volume":"81","author":"D Bru\u00df","year":"1998","unstructured":"Bru\u00df, D.: Optimal eavesdropping in quantum cryptography with six states. Phys. Rev. Lett. 81, 3018 (1998)","journal-title":"Phys. Rev. Lett."},{"key":"2663_CR22","doi-asserted-by":"publisher","first-page":"4238","DOI":"10.1103\/PhysRevA.59.4238","volume":"59","author":"H Bechmann-Pasquinucci","year":"1999","unstructured":"Bechmann-Pasquinucci, H., Gisin, N.: Incoherent and coherent eavesdropping in the six-state protocol of quantum cryptography. Phys. Rev. A 59, 4238 (1999)","journal-title":"Phys. Rev. A"},{"key":"2663_CR23","doi-asserted-by":"publisher","first-page":"1838","DOI":"10.1103\/PhysRevA.54.1838","volume":"54","author":"R Horodecki","year":"1996","unstructured":"Horodecki, R., Horodecki, M.: Information-theoretic aspects of inseparability of mixed states. Phys. Rev. A 54, 1838 (1996)","journal-title":"Phys. Rev. A"},{"key":"2663_CR24","first-page":"3","volume":"9","author":"AS Holevo","year":"1973","unstructured":"Holevo, A.S.: Some estimates for the amount of information transmittable by a quantum communications channel. Probl. Peredachi Inf. 9, 3\u201311 (1973)","journal-title":"Probl. Peredachi Inf."},{"key":"2663_CR25","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1098\/rspa.2004.1372","volume":"461","author":"I Devetak","year":"2005","unstructured":"Devetak, I., Winter, A.: Distillation of secret key and entanglement from quantum states. Proc. R. Soc. A 461, 207\u2013235 (2005)","journal-title":"Proc. R. Soc. A"},{"key":"2663_CR26","unstructured":"Robert, J.-M.: Detection et Correction d\u2019Erreurs en Cryptographie, Master thesis, Universit\u00e9 de Montr\u00e9al, (1985)"},{"key":"2663_CR27","doi-asserted-by":"crossref","unstructured":"Brassard, G., Salvail, L.: Secret-key reconciliation by public discussion. In: Advances in Cryptology\u2014EUROCRYPT \u201993, pp. 410\u2013423. Springer, Berlin (1994)","DOI":"10.1007\/3-540-48285-7_35"},{"key":"2663_CR28","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1016\/0022-0000(81)90033-7","volume":"22","author":"MN Wegman","year":"1981","unstructured":"Wegman, M.N., Carter, J.L.: New hash functions and their use in authentication and set equality. J. Comput. Syst. Sci. 22, 265\u2013279 (1981)","journal-title":"J. Comput. Syst. Sci."},{"key":"2663_CR29","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1137\/0217014","volume":"17","author":"CH Bennett","year":"1988","unstructured":"Bennett, C.H., Brassard, G., Robert, J.-M.: Privacy amplification by public discussion. SIAM J. Comput. 17, 210\u2013229 (1988)","journal-title":"SIAM J. Comput."},{"key":"2663_CR30","doi-asserted-by":"publisher","first-page":"4537","DOI":"10.1063\/1.1494475","volume":"43","author":"CM Caves","year":"2002","unstructured":"Caves, C.M., Fuchs, C.A., Schack, R.: Unknown quantum states: the quantum de Finetti representation. J. Math. Phys. 43, 4537 (2002)","journal-title":"J. Math. Phys."},{"key":"2663_CR31","doi-asserted-by":"publisher","first-page":"020504","DOI":"10.1103\/PhysRevLett.102.020504","volume":"102","author":"M Christandl","year":"2009","unstructured":"Christandl, M., K\u00f6nig, R., Renner, R.: Postselection technique for quantum channels with applications to quantum cryptography. Phys. Rev. Lett. 102, 020504 (2009)","journal-title":"Phys. Rev. Lett."},{"key":"2663_CR32","first-page":"325","volume":"5","author":"D Gottesman","year":"2004","unstructured":"Gottesman, D., Lo, H.-K., L\u00fctkenhaus, N., Preskill, J.: Security of quantum key distribution with imperfect devices. Quantum Inf. Comput. 5, 325\u2013360 (2004)","journal-title":"Quantum Inf. Comput."}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-020-02663-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11128-020-02663-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-020-02663-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,13]],"date-time":"2021-04-13T00:01:54Z","timestamp":1618272114000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11128-020-02663-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,4,13]]},"references-count":32,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2020,6]]}},"alternative-id":["2663"],"URL":"https:\/\/doi.org\/10.1007\/s11128-020-02663-z","relation":{},"ISSN":["1570-0755","1573-1332"],"issn-type":[{"value":"1570-0755","type":"print"},{"value":"1573-1332","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,4,13]]},"assertion":[{"value":"24 October 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 March 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 April 2020","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"169"}}