{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,9]],"date-time":"2024-08-09T18:36:13Z","timestamp":1723228573290},"reference-count":25,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2020,5,29]],"date-time":"2020-05-29T00:00:00Z","timestamp":1590710400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,5,29]],"date-time":"2020-05-29T00:00:00Z","timestamp":1590710400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"published-print":{"date-parts":[[2020,7]]},"DOI":"10.1007\/s11128-020-02694-6","type":"journal-article","created":{"date-parts":[[2020,5,29]],"date-time":"2020-05-29T18:02:48Z","timestamp":1590775368000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Finite-key security analysis of the 1-decoy state QKD protocol with a leaky intensity modulator"],"prefix":"10.1007","volume":"19","author":[{"given":"Weilong","family":"Wang","sequence":"first","affiliation":[]},{"given":"Xiangdong","family":"Meng","sequence":"additional","affiliation":[]},{"given":"Yangyang","family":"Fei","sequence":"additional","affiliation":[]},{"given":"Zhi","family":"Ma","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,5,29]]},"reference":[{"key":"2694_CR1","unstructured":"Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. In: International Conference on Computer System and Signal Processing, pp. 175\u2013179. IEEE (1984)"},{"key":"2694_CR2","doi-asserted-by":"publisher","first-page":"1301","DOI":"10.1103\/RevModPhys.81.1301","volume":"81","author":"V Scarani","year":"2009","unstructured":"Scarani, V., Bechmann-Pasquinucci, H., Cerf, N.J., Du\u0161ek, M., L\u00fctkenhaus, N., Peev, M.: The security of practical quantum key distribution. Rev. Mod. Phys. 81, 1301 (2009)","journal-title":"Rev. Mod. Phys."},{"key":"2694_CR3","doi-asserted-by":"publisher","first-page":"595","DOI":"10.1038\/nphoton.2014.149","volume":"8","author":"H-K Lo","year":"2014","unstructured":"Lo, H.-K., Curty, M., Tamaki, K.: Secure quantum key distribution. Nat. Photonics 8, 595 (2014)","journal-title":"Nat. Photonics"},{"key":"2694_CR4","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1038\/nature23655","volume":"549","author":"S-K Liao","year":"2017","unstructured":"Liao, S.-K., et al.: Satellite-to-ground quantum key distribution. Nature 549, 43 (2017)","journal-title":"Nature"},{"key":"2694_CR5","first-page":"031030","volume":"5","author":"M Lucamarini","year":"2015","unstructured":"Lucamarini, M., Choi, I., Ward, M.B., Dynes, J.F., Yuan, Z., Shields, A.J.: Practical security bounds against the Trojan-horse attack in quantum key distribution. Phys. Rev. X 5, 031030 (2015)","journal-title":"Phys. Rev. X"},{"key":"2694_CR6","doi-asserted-by":"publisher","first-page":"065008","DOI":"10.1088\/1367-2630\/18\/6\/065008","volume":"18","author":"K Tamaki","year":"2016","unstructured":"Tamaki, K., Curty, M., Lucamarini, M.: Decoy-state quantum key distribution with a leaky source. New J. Phys. 18, 065008 (2016)","journal-title":"New J. Phys."},{"key":"2694_CR7","doi-asserted-by":"publisher","first-page":"083027","DOI":"10.1088\/1367-2630\/aad839","volume":"20","author":"W Wang","year":"2018","unstructured":"Wang, W., Tamaki, K., Curty, M.: Finite-key security analysis for quantum key distribution with leaky sources. New J. Phys. 20, 083027 (2018)","journal-title":"New J. Phys."},{"key":"2694_CR8","doi-asserted-by":"publisher","first-page":"057901","DOI":"10.1103\/PhysRevLett.91.057901","volume":"91","author":"W-Y Hwang","year":"2003","unstructured":"Hwang, W.-Y.: Quantum key distribution with high loss: toward global secure communication. Phys. Rev. Lett. 91, 057901 (2003)","journal-title":"Phys. Rev. Lett."},{"key":"2694_CR9","doi-asserted-by":"publisher","first-page":"230504","DOI":"10.1103\/PhysRevLett.94.230504","volume":"94","author":"H-K Lo","year":"2005","unstructured":"Lo, H.-K., Ma, X., Chen, K.: Decoy state quantum key distribution. Phys. Rev. Lett. 94, 230504 (2005)","journal-title":"Phys. Rev. Lett."},{"key":"2694_CR10","doi-asserted-by":"publisher","first-page":"230503","DOI":"10.1103\/PhysRevLett.94.230503","volume":"94","author":"X-B Wang","year":"2005","unstructured":"Wang, X.-B.: Beating the photon-number-splitting attack in practical quantum cryptography. Phys. Rev. Lett. 94, 230503 (2005)","journal-title":"Phys. Rev. Lett."},{"key":"2694_CR11","doi-asserted-by":"publisher","first-page":"070502","DOI":"10.1103\/PhysRevLett.96.070502","volume":"96","author":"Y Zhao","year":"2006","unstructured":"Zhao, Y., Qi, B., Ma, X., Lo, H.-K., Qian, L.: Experimental quantum key distribution with decoy states. Phys. Rev. Lett. 96, 070502 (2006)","journal-title":"Phys. Rev. Lett."},{"key":"2694_CR12","doi-asserted-by":"publisher","first-page":"010505","DOI":"10.1103\/PhysRevLett.98.010505","volume":"98","author":"C-Z Peng","year":"2007","unstructured":"Peng, C.-Z., Zhang, J., Yang, D., Gao, W.-B., Ma, H.-X., Yin, H., Zeng, H.-P., Yang, T., Wang, X.-B., Pan, J.-W.: Experimental long-distance decoy-state quantum key distribution based on polarization encoding. Phys. Rev. Lett. 98, 010505 (2007)","journal-title":"Phys. Rev. Lett."},{"key":"2694_CR13","doi-asserted-by":"publisher","first-page":"010504","DOI":"10.1103\/PhysRevLett.98.010504","volume":"98","author":"T Schmitt-Manderbach","year":"2007","unstructured":"Schmitt-Manderbach, T., et al.: Experimental demonstration of free-space decoy-state quantum key distribution over 144 km. Phys. Rev. Lett. 98, 010504 (2007)","journal-title":"Phys. Rev. Lett."},{"key":"2694_CR14","doi-asserted-by":"publisher","first-page":"011118","DOI":"10.1063\/1.2430685","volume":"90","author":"Z Yuan","year":"2007","unstructured":"Yuan, Z., Sharpe, A., Shields, A.: Unconditionally secure one-way quantum key distribution using decoy pulses. Appl. Phys. Lett. 90, 011118 (2007)","journal-title":"Appl. Phys. Lett."},{"key":"2694_CR15","doi-asserted-by":"publisher","first-page":"010503","DOI":"10.1103\/PhysRevLett.98.010503","volume":"98","author":"D Rosenberg","year":"2007","unstructured":"Rosenberg, D., Harrington, J.W., Rice, P.R., Hiskett, P.A., Peterson, C.G., Hughes, R.J., Lita, A.E., Nam, S.W., Nordholt, J.E.: Long-distance decoy-state quantum key distribution in optical fiber. Phys. Rev. Lett. 98, 010503 (2007)","journal-title":"Phys. Rev. Lett."},{"key":"2694_CR16","doi-asserted-by":"publisher","first-page":"8587","DOI":"10.1364\/OE.18.008587","volume":"18","author":"Y Liu","year":"2010","unstructured":"Liu, Y., et al.: Decoy-state quantum key distribution with polarized photons over 200 km. Opt. Express 18, 8587 (2010)","journal-title":"Opt. Express"},{"key":"2694_CR17","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1364\/OPTICA.4.000163","volume":"4","author":"B Fr\u00f6hlich","year":"2017","unstructured":"Fr\u00f6hlich, B., Lucamarini, M., Dynes, J.F., Comandar, L.C., Tam, W.W.-S., Plews, A., Sharpe, A.W., Yuan, Z., Shields, A.J.: Long-distance quantum key distribution secure against coherent attacks. Optica 4, 163 (2017)","journal-title":"Optica"},{"key":"2694_CR18","doi-asserted-by":"publisher","first-page":"171104","DOI":"10.1063\/1.5023340","volume":"112","author":"R Davide","year":"2018","unstructured":"Davide, R., Baron, A., Gr\u00fcnenfelder, F., Martin, A., Zbinden, H.: Finite-key analysis for the 1-decoy state QKD protocol. Appl. Phys. Lett. 112, 171104 (2018)","journal-title":"Appl. Phys. Lett."},{"key":"2694_CR19","doi-asserted-by":"publisher","first-page":"093011","DOI":"10.1088\/1367-2630\/17\/9\/093011","volume":"17","author":"A Mizutani","year":"2015","unstructured":"Mizutani, A., Curty, M., Lim, C.C.W., Imoto, N., Tamaki, K.: Finite-key security analysis of quantum key distribution with imperfect light sources. New J. Phys. 17, 093011 (2015)","journal-title":"New J. Phys."},{"key":"2694_CR20","volume-title":"Quantum Information and Quantum Computation","author":"MA Nielsen","year":"2000","unstructured":"Nielsen, M.A., Chuang, I.L.: Quantum Information and Quantum Computation. Cambridge University Press, Cambridge (2000)"},{"key":"2694_CR21","doi-asserted-by":"publisher","first-page":"357","DOI":"10.2748\/tmj\/1178243286","volume":"19","author":"K Azuma","year":"1967","unstructured":"Azuma, K.: Weighted sums of certain dependent random variables. Tohoku Math. J. 19, 357 (1967)","journal-title":"Tohoku Math. J."},{"key":"2694_CR22","doi-asserted-by":"publisher","first-page":"022307","DOI":"10.1103\/PhysRevA.89.022307","volume":"89","author":"CCW Lim","year":"2014","unstructured":"Lim, C.C.W., Curty, M., Walenta, N., Xu, F., Zbinden, H.: Concise security bounds for practical decoy-state quantum key distribution. Phys. Rev. A 89, 022307 (2014)","journal-title":"Phys. Rev. A"},{"key":"2694_CR23","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1214\/aos\/1176342611","volume":"2","author":"RJ Serfling","year":"1974","unstructured":"Serfling, R.J.: Probability inequalities for the sum in sampling without replacement. Ann. Stat. 2, 39 (1974)","journal-title":"Ann. Stat."},{"key":"2694_CR24","doi-asserted-by":"publisher","first-page":"634","DOI":"10.1038\/ncomms1631","volume":"3","author":"M Tomamichel","year":"2012","unstructured":"Tomamichel, M., Lim, C.C.W., Gisin, N., Renner, R.: Tight finite-key analysis for quantum cryptography. Nat. Commun. 3, 634 (2012)","journal-title":"Nat. Commun."},{"key":"2694_CR25","doi-asserted-by":"publisher","first-page":"3732","DOI":"10.1038\/ncomms4732","volume":"5","author":"M Curty","year":"2014","unstructured":"Curty, M., Xu, F., Cui, W., Lim, C.C.W., Tamaki, K., Lo, H.-K.: Finite-key analysis for measurement-device-independent quantum key distribution. Nat. Commun. 5, 3732 (2014)","journal-title":"Nat. Commun."}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-020-02694-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11128-020-02694-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-020-02694-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,28]],"date-time":"2021-05-28T23:31:59Z","timestamp":1622244719000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11128-020-02694-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,5,29]]},"references-count":25,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2020,7]]}},"alternative-id":["2694"],"URL":"https:\/\/doi.org\/10.1007\/s11128-020-02694-6","relation":{},"ISSN":["1570-0755","1573-1332"],"issn-type":[{"value":"1570-0755","type":"print"},{"value":"1573-1332","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,5,29]]},"assertion":[{"value":"29 May 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"196"}}