{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T18:03:10Z","timestamp":1773511390019,"version":"3.50.1"},"reference-count":66,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2021,2,1]],"date-time":"2021-02-01T00:00:00Z","timestamp":1612137600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,2,1]],"date-time":"2021-02-01T00:00:00Z","timestamp":1612137600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100004541","name":"Ministry of Human Resource Development","doi-asserted-by":"publisher","award":["MHRD Sanction No. F.NO. 35-8\/2017-TS.1 under the Uchchatar Avishkar Yojana"],"award-info":[{"award-number":["MHRD Sanction No. F.NO. 35-8\/2017-TS.1 under the Uchchatar Avishkar Yojana"]}],"id":[{"id":"10.13039\/501100004541","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"published-print":{"date-parts":[[2021,2]]},"DOI":"10.1007\/s11128-021-03006-2","type":"journal-article","created":{"date-parts":[[2021,2,12]],"date-time":"2021-02-12T00:04:31Z","timestamp":1613088271000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["Differential phase encoded measurement-device-independent quantum key distribution"],"prefix":"10.1007","volume":"20","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5713-0346","authenticated-orcid":false,"given":"Shashank Kumar","family":"Ranu","sequence":"first","affiliation":[]},{"given":"Anil","family":"Prabhakar","sequence":"additional","affiliation":[]},{"given":"Prabha","family":"Mandayam","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,2,11]]},"reference":[{"issue":"3","key":"3006_CR1","doi-asserted-by":"crossref","first-page":"351","DOI":"10.1145\/382780.382781","volume":"48","author":"D Mayers","year":"2001","unstructured":"Mayers, D.: Unconditional security in quantum cryptography. J. ACM (JACM) 48(3), 351 (2001)","journal-title":"J. ACM (JACM)"},{"issue":"5410","key":"3006_CR2","doi-asserted-by":"crossref","first-page":"2050","DOI":"10.1126\/science.283.5410.2050","volume":"283","author":"HK Lo","year":"1999","unstructured":"Lo, H.K., Chau, H.F.: Unconditional security of quantum key distribution over arbitrarily long distances. Science 283(5410), 2050 (1999)","journal-title":"Science"},{"issue":"2","key":"3006_CR3","doi-asserted-by":"crossref","first-page":"441","DOI":"10.1103\/PhysRevLett.85.441","volume":"85","author":"PW Shor","year":"2000","unstructured":"Shor, P.W., Preskill, J.: Simple proof of security of the BB84 quantum key distribution protocol. Phys. Rev. Lett. 85(2), 441 (2000)","journal-title":"Phys. Rev. Lett."},{"key":"3006_CR4","unstructured":"Gottesman, D., Lo, H.K., Lutkenhaus, N., Preskill, J.: Security of quantum key distribution with imperfect devices. In: Information Theory, 2004. ISIT 2004. Proceedings. International Symposium on (IEEE, 2004), p. 136"},{"issue":"4","key":"3006_CR5","doi-asserted-by":"crossref","first-page":"2651","DOI":"10.1103\/PhysRevA.54.2651","volume":"54","author":"E Biham","year":"1996","unstructured":"Biham, E., Huttner, B., Mor, T.: Quantum cryptographic network based on quantum memories. Phys. Rev. A 54(4), 2651 (1996)","journal-title":"Phys. Rev. A"},{"issue":"1","key":"3006_CR6","first-page":"73","volume":"7","author":"B Qi","year":"2007","unstructured":"Qi, B., Fung, C.H.F., Lo, H.K., Ma, X.: Time-shift attack in practical quantum cryptosystems. Quantum Inf. Comput. 7(1), 73 (2007)","journal-title":"Quantum Inf. Comput."},{"issue":"3","key":"3006_CR7","doi-asserted-by":"crossref","first-page":"032314","DOI":"10.1103\/PhysRevA.75.032314","volume":"75","author":"CHF Fung","year":"2007","unstructured":"Fung, C.H.F., Qi, B., Tamaki, K., Lo, H.K.: Phase-remapping attack in practical quantum-key-distribution systems. Phys. Rev. A 75(3), 032314 (2007)","journal-title":"Phys. Rev. A"},{"issue":"15","key":"3006_CR8","doi-asserted-by":"crossref","first-page":"9388","DOI":"10.1364\/OE.15.009388","volume":"15","author":"A Lamas-Linares","year":"2007","unstructured":"Lamas-Linares, A., Kurtsiefer, C.: Breaking a quantum key distribution system through a timing side channel. Opt. Express 15(15), 9388 (2007)","journal-title":"Opt. Express"},{"issue":"4","key":"3006_CR9","doi-asserted-by":"crossref","first-page":"042333","DOI":"10.1103\/PhysRevA.78.042333","volume":"78","author":"Y Zhao","year":"2008","unstructured":"Zhao, Y., Fung, C.H.F., Qi, B., Chen, C., Lo, H.K.: Quantum hacking: experimental demonstration of time-shift attack against practical quantum-key-distribution systems. Phys. Rev. A 78(4), 042333 (2008)","journal-title":"Phys. Rev. A"},{"issue":"6","key":"3006_CR10","doi-asserted-by":"crossref","first-page":"065001","DOI":"10.1088\/1367-2630\/11\/6\/065001","volume":"11","author":"S Nauerth","year":"2009","unstructured":"Nauerth, S., F\u00fcrst, M., Schmitt-Manderbach, T., Weier, H., Weinfurter, H.: Information leakage via side channels in freespace BB84 quantum cryptography. New J. Phys. 11(6), 065001 (2009)","journal-title":"New J. Phys."},{"issue":"11","key":"3006_CR11","doi-asserted-by":"crossref","first-page":"113026","DOI":"10.1088\/1367-2630\/12\/11\/113026","volume":"12","author":"F Xu","year":"2010","unstructured":"Xu, F., Qi, B., Lo, H.K.: Experimental demonstration of phase-remapping attack in a practical quantum key distribution system. New J. Phys. 12(11), 113026 (2010)","journal-title":"New J. Phys."},{"issue":"10","key":"3006_CR12","doi-asserted-by":"crossref","first-page":"686","DOI":"10.1038\/nphoton.2010.214","volume":"4","author":"L Lydersen","year":"2010","unstructured":"Lydersen, L., Wiechers, C., Wittmann, C., Elser, D., Skaar, J., Makarov, V.: Hacking commercial quantum cryptography systems by tailored bright illumination. Nat. Photonics 4(10), 686 (2010)","journal-title":"Nat. Photonics"},{"key":"3006_CR13","doi-asserted-by":"crossref","first-page":"349","DOI":"10.1038\/ncomms1348","volume":"2","author":"I Gerhardt","year":"2011","unstructured":"Gerhardt, I., Liu, Q., Lamas-Linares, A., Skaar, J., Kurtsiefer, C., Makarov, V.: Full-field implementation of a perfect eavesdropper on a quantum cryptography system. Nat. Commun. 2, 349 (2011)","journal-title":"Nat. Commun."},{"issue":"7","key":"3006_CR14","doi-asserted-by":"crossref","first-page":"073024","DOI":"10.1088\/1367-2630\/13\/7\/073024","volume":"13","author":"H Weier","year":"2011","unstructured":"Weier, H., Krauss, H., Rau, M., F\u00fcrst, M., Nauerth, S., Weinfurter, H.: Quantum eavesdropping without interception: an attack exploiting the dead time of single-photon detectors. New J. Phys. 13(7), 073024 (2011)","journal-title":"New J. Phys."},{"issue":"10","key":"3006_CR15","doi-asserted-by":"crossref","first-page":"4265","DOI":"10.1007\/s11128-016-1400-2","volume":"15","author":"H Ko","year":"2016","unstructured":"Ko, H., Lim, K., Oh, J., Rhee, J.K.K.: Informatic analysis for hidden pulse attack exploiting spectral characteristics of optics in plug-and-play quantum key distribution system. Quantum Inf. Process. 15(10), 4265 (2016)","journal-title":"Quantum Inf. Process."},{"issue":"1","key":"3006_CR16","first-page":"131","volume":"9","author":"CHF Fung","year":"2009","unstructured":"Fung, C.H.F., Tamaki, K., Qi, B., Lo, H.K., Ma, X.: Security proof of quantum key distribution with detection efficiency mismatch. Quantum Inf. Comput. 9(1), 131\u2013165 (2009)","journal-title":"Quantum Inf. Comput."},{"issue":"3","key":"3006_CR17","doi-asserted-by":"crossref","first-page":"032337","DOI":"10.1103\/PhysRevA.82.032337","volume":"82","author":"\u00d8 Mar\u00f8y","year":"2010","unstructured":"Mar\u00f8y, \u00d8., Lydersen, L., Skaar, J.: Security of quantum key distribution with arbitrary individual imperfections. Phys. Rev. A 82(3), 032337 (2010)","journal-title":"Phys. Rev. A"},{"issue":"1","key":"3006_CR18","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s11128-019-2494-0","volume":"19","author":"GD Kang","year":"2020","unstructured":"Kang, G.D., Zhou, Q.P., Fang, M.F.: Measurement-device-independent quantum key distribution with uncharacterized coherent sources. Quantum Inf. Process. 19(1), 1 (2020)","journal-title":"Quantum Inf. Process."},{"issue":"17","key":"3006_CR19","doi-asserted-by":"crossref","first-page":"18911","DOI":"10.1364\/OE.20.018911","volume":"20","author":"TF da Silva","year":"2012","unstructured":"da Silva, T.F., Xavier, G.B., Tempor\u00e3o, G.P., von der Weid, J.P.: Real-time monitoring of single-photon detectors against eavesdropping in quantum key distribution systems. Opt. Express 20(17), 18911 (2012)","journal-title":"Opt. Express"},{"issue":"23","key":"3006_CR20","doi-asserted-by":"crossref","first-page":"231104","DOI":"10.1063\/1.3597221","volume":"98","author":"Z Yuan","year":"2011","unstructured":"Yuan, Z., Dynes, J., Shields, A.: Resilience of gated avalanche photodiodes against bright illumination attacks in quantum cryptography. Appl. Phys. Lett. 98(23), 231104 (2011)","journal-title":"Appl. Phys. Lett."},{"key":"3006_CR21","unstructured":"Mayers, D., Yao, A.: Quantum Cryptography with Imperfect Apparatus. In: Proceedings of the 39th Annual Symposium on Foundations of Computer Science (IEEE Computer Society, USA, 1998), FOCS \u201998, p. 503"},{"issue":"4","key":"3006_CR22","doi-asserted-by":"crossref","first-page":"381","DOI":"10.1007\/s00145-005-0011-3","volume":"19","author":"E Biham","year":"2006","unstructured":"Biham, E., Boyer, M., Boykin, P.O., Mor, T., Roychowdhury, V.: A proof of the security of quantum key distribution. J. Cryptol. 19(4), 381 (2006)","journal-title":"J. Cryptol."},{"issue":"7","key":"3006_CR23","doi-asserted-by":"crossref","first-page":"070501","DOI":"10.1103\/PhysRevLett.105.070501","volume":"105","author":"N Gisin","year":"2010","unstructured":"Gisin, N., Pironio, S., Sangouard, N.: Proposal for implementing device-independent quantum key distribution based on a heralded qubit amplifier. Phys. Rev. Lett. 105(7), 070501 (2010)","journal-title":"Phys. Rev. Lett."},{"key":"3006_CR24","doi-asserted-by":"crossref","first-page":"010304","DOI":"10.1103\/PhysRevA.84.010304","volume":"84","author":"M Curty","year":"2011","unstructured":"Curty, M., Moroder, T.: Heralded-qubit amplifiers for practical device-independent quantum key distribution. Phys. Rev. A 84, 010304 (2011)","journal-title":"Phys. Rev. A"},{"issue":"13","key":"3006_CR25","doi-asserted-by":"crossref","first-page":"130503","DOI":"10.1103\/PhysRevLett.108.130503","volume":"108","author":"HK Lo","year":"2012","unstructured":"Lo, H.K., Curty, M., Qi, B.: Measurement-device-independent quantum key distribution. Phys. Rev. Lett. 108(13), 130503 (2012)","journal-title":"Phys. Rev. Lett."},{"issue":"13","key":"3006_CR26","doi-asserted-by":"crossref","first-page":"130502","DOI":"10.1103\/PhysRevLett.108.130502","volume":"108","author":"SL Braunstein","year":"2012","unstructured":"Braunstein, S.L., Pirandola, S.: Side-channel-free quantum key distribution. Phys. Rev. Lett. 108(13), 130502 (2012)","journal-title":"Phys. Rev. Lett."},{"issue":"9","key":"3006_CR27","doi-asserted-by":"crossref","first-page":"3785","DOI":"10.1007\/s11128-016-1359-z","volume":"15","author":"Q Wang","year":"2016","unstructured":"Wang, Q., Zhang, C.H., Luo, S., Guo, G.C.: An enhanced proposal on decoy-state measurement device-independent quantum key distribution. Quantum Inf. Process. 15(9), 3785 (2016)","journal-title":"Quantum Inf. Process."},{"issue":"9","key":"3006_CR28","doi-asserted-by":"crossref","first-page":"231","DOI":"10.1007\/s11128-018-1991-x","volume":"17","author":"L Wang","year":"2018","unstructured":"Wang, L., Zhou, Y.Y., Zhou, X.J., Chen, X., Zhang, Z.: New scheme for measurement-device-independent quantum key distribution. Quantum Inf. Process. 17(9), 231 (2018)","journal-title":"Quantum Inf. Process."},{"issue":"9","key":"3006_CR29","doi-asserted-by":"crossref","first-page":"3799","DOI":"10.1007\/s11128-016-1371-3","volume":"15","author":"JR Zhu","year":"2016","unstructured":"Zhu, J.R., Zhu, F., Zhou, X.Y., Wang, Q.: The enhanced measurement-device-independent quantum key distribution with two-intensity decoy states. Quantum Inf. Process. 15(9), 3799 (2016)","journal-title":"Quantum Inf. Process."},{"issue":"13","key":"3006_CR30","doi-asserted-by":"crossref","first-page":"130501","DOI":"10.1103\/PhysRevLett.111.130501","volume":"111","author":"A Rubenok","year":"2013","unstructured":"Rubenok, A., Slater, J.A., Chan, P., Lucio-Martinez, I., Tittel, W.: Real-world two-photon interference and proof-of-principle quantum key distribution immune to detector attacks. Phys. Rev. Lett. 111(13), 130501 (2013)","journal-title":"Phys. Rev. Lett."},{"issue":"13","key":"3006_CR31","doi-asserted-by":"crossref","first-page":"130502","DOI":"10.1103\/PhysRevLett.111.130502","volume":"111","author":"Y Liu","year":"2013","unstructured":"Liu, Y., Chen, T.Y., Wang, L.J., Liang, H., Shentu, G.L., Wang, J., Cui, K., Yin, H.L., Liu, N.L., Li, L., et al.: Experimental measurement-device-independent quantum key distribution. Phys. Rev. Lett. 111(13), 130502 (2013)","journal-title":"Phys. Rev. Lett."},{"issue":"4","key":"3006_CR32","doi-asserted-by":"crossref","first-page":"042307","DOI":"10.1103\/PhysRevA.85.042307","volume":"85","author":"K Tamaki","year":"2012","unstructured":"Tamaki, K., Lo, H.K., Fung, C.H.F., Qi, B.: Phase encoding schemes for measurement-device-independent quantum key distribution with basis-dependent flaw. Phys. Rev. A 85(4), 042307 (2012)","journal-title":"Phys. Rev. A"},{"key":"3006_CR33","unstructured":"Ferenczi, A.: Security proof methods for quantum key distribution protocols, University of Waterloo (2013)"},{"issue":"6","key":"3006_CR34","doi-asserted-by":"crossref","first-page":"062319","DOI":"10.1103\/PhysRevA.86.062319","volume":"86","author":"X Ma","year":"2012","unstructured":"Ma, X., Razavi, M.: Alternative schemes for measurement-device-independent quantum key distribution. Phys. Rev. A 86(6), 062319 (2012)","journal-title":"Phys. Rev. A"},{"issue":"4","key":"3006_CR35","doi-asserted-by":"crossref","first-page":"042332","DOI":"10.1103\/PhysRevA.98.042332","volume":"98","author":"J Lin","year":"2018","unstructured":"Lin, J., Lutkenhaus, N.: Simple security analysis of phase-matching measurement-device-independent quantum key distribution. Phys. Rev. A 98(4), 042332 (2018)","journal-title":"Phys. Rev. A"},{"issue":"3","key":"3006_CR36","first-page":"031043","volume":"8","author":"X Ma","year":"2018","unstructured":"Ma, X., Zeng, P., Zhou, H.: Phase-matching quantum key distribution. Phys. Rev. X 8(3), 031043 (2018)","journal-title":"Phys. Rev. X"},{"issue":"3","key":"3006_CR37","doi-asserted-by":"crossref","first-page":"148","DOI":"10.1109\/JSTQE.2014.2381460","volume":"21","author":"F Xu","year":"2014","unstructured":"Xu, F., Curty, M., Qi, B., Lo, H.K.: Measurement-device-independent quantum cryptography. IEEE J. Sel. Top. Quantum Electron. 21(3), 148 (2014)","journal-title":"IEEE J. Sel. Top. Quantum Electron."},{"issue":"3","key":"3006_CR38","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1109\/JSTQE.2014.2360362","volume":"21","author":"K Inoue","year":"2015","unstructured":"Inoue, K.: Differential phase-shift quantum key distribution systems. IEEE J. Sel. Top. Quantum Electron. 21(3), 109 (2015)","journal-title":"IEEE J. Sel. Top. Quantum Electron."},{"issue":"2","key":"3006_CR39","doi-asserted-by":"crossref","first-page":"022317","DOI":"10.1103\/PhysRevA.68.022317","volume":"68","author":"K Inoue","year":"2003","unstructured":"Inoue, K., Waks, E., Yamamoto, Y.: Differential-phase-shift quantum key distribution using coherent light. Phys. Rev. A 68(2), 022317 (2003)","journal-title":"Phys. Rev. A"},{"issue":"3","key":"3006_CR40","doi-asserted-by":"crossref","first-page":"037902","DOI":"10.1103\/PhysRevLett.89.037902","volume":"89","author":"K Inoue","year":"2002","unstructured":"Inoue, K., Waks, E., Yamamoto, Y.: Differential phase shift quantum key distribution. Phys. Rev. Lett. 89(3), 037902 (2002)","journal-title":"Phys. Rev. Lett."},{"issue":"1","key":"3006_CR41","doi-asserted-by":"crossref","first-page":"012344","DOI":"10.1103\/PhysRevA.73.012344","volume":"73","author":"E Waks","year":"2006","unstructured":"Waks, E., Takesue, H., Yamamoto, Y.: Security of differential-phase-shift quantum key distribution against individual attacks. Phys. Rev. A 73(1), 012344 (2006)","journal-title":"Phys. Rev. A"},{"issue":"17","key":"3006_CR42","doi-asserted-by":"crossref","first-page":"170503","DOI":"10.1103\/PhysRevLett.103.170503","volume":"103","author":"K Wen","year":"2009","unstructured":"Wen, K., Tamaki, K., Yamamoto, Y.: Unconditional security of single-photon differential phase shift quantum key distribution. Phys. Rev. Lett. 103(17), 170503 (2009)","journal-title":"Phys. Rev. Lett."},{"issue":"3","key":"3006_CR43","doi-asserted-by":"crossref","first-page":"599","DOI":"10.1140\/epjd\/e2007-00010-4","volume":"41","author":"H Inamori","year":"2007","unstructured":"Inamori, H., Lutkenhaus, N., Mayers, D.: Unconditional security of practical quantum key distribution. Eur. Phys. J. D 41(3), 599 (2007)","journal-title":"Eur. Phys. J. D"},{"key":"3006_CR44","doi-asserted-by":"crossref","first-page":"634","DOI":"10.1038\/ncomms1631","volume":"3","author":"M Tomamichel","year":"2012","unstructured":"Tomamichel, M., Lim, C.C.W., Gisin, N., Renner, R.: Tight finite-key analysis for quantum cryptography. Nat. Commun. 3, 634 (2012)","journal-title":"Nat. Commun."},{"issue":"6","key":"3006_CR45","doi-asserted-by":"crossref","first-page":"063009","DOI":"10.1088\/1367-2630\/16\/6\/063009","volume":"16","author":"M Hayashi","year":"2014","unstructured":"Hayashi, M., Nakayama, R.: Security analysis of the decoy method with the Bennett-brassard 1984 protocol for finite key lengths. New J. Phys. 16(6), 063009 (2014)","journal-title":"New J. Phys."},{"key":"3006_CR46","doi-asserted-by":"crossref","first-page":"022307","DOI":"10.1103\/PhysRevA.89.022307","volume":"89","author":"CCW Lim","year":"2014","unstructured":"Lim, C.C.W., Curty, M., Walenta, N., Xu, F., Zbinden, H.: Concise security bounds for practical decoy-state quantum key distribution. Phys. Rev. A 89, 022307 (2014)","journal-title":"Phys. Rev. A"},{"issue":"3","key":"3006_CR47","doi-asserted-by":"crossref","first-page":"B83","DOI":"10.1364\/JOSAB.36.000B83","volume":"36","author":"Y Wang","year":"2019","unstructured":"Wang, Y., Bao, W.S., Zhou, C., Jiang, M.S., Li, H.W.: Finite-key analysis of practical decoy-state measurement-device-independent quantum key distribution with unstable sources. JOSA B 36(3), B83 (2019)","journal-title":"JOSA B"},{"issue":"5","key":"3006_CR48","doi-asserted-by":"crossref","first-page":"052305","DOI":"10.1103\/PhysRevA.86.052305","volume":"86","author":"X Ma","year":"2012","unstructured":"Ma, X., Fung, C.H.F., Razavi, M.: Statistical fluctuation analysis for measurement-device-independent quantum key distribution. Phys. Rev. A 86(5), 052305 (2012)","journal-title":"Phys. Rev. A"},{"key":"3006_CR49","doi-asserted-by":"crossref","first-page":"3732","DOI":"10.1038\/ncomms4732","volume":"5","author":"M Curty","year":"2014","unstructured":"Curty, M., Xu, F., Cui, W., Lim, C.C.W., Tamaki, K., Lo, H.K.: Finite-key analysis for measurement-device-independent quantum key distribution. Nat. Commun 5, 3732 (2014)","journal-title":"Nat. Commun"},{"issue":"21","key":"3006_CR50","doi-asserted-by":"crossref","first-page":"3121","DOI":"10.1103\/PhysRevLett.68.3121","volume":"68","author":"CH Bennett","year":"1992","unstructured":"Bennett, C.H.: Quantum cryptography using any two nonorthogonal states. Phys. Rev. Lett. 68(21), 3121 (1992)","journal-title":"Phys. Rev. Lett."},{"key":"3006_CR51","doi-asserted-by":"crossref","unstructured":"Ranu, S.K., Shaw, G.K., Prabhakar, A., Mandayam, P.: Security with 3-pulse differential phase shift quantum key distribution. In: 2017 IEEE Workshop on Recent Advances in Photonics (WRAP). IEEE, pp. 1\u20137 (2017)","DOI":"10.1109\/WRAP.2017.8468572"},{"key":"3006_CR52","unstructured":"Diamanti, E.: Security and implementation of differential phase shift quantum key distribution systems, Stanford University (2006)"},{"key":"3006_CR53","unstructured":"Shaw, G., Sridharan, S., Ranu, S., Shingala, F., Mandayam, P., Prabhakar, A.: Equivalence of space and time-bins in DPS-QKD, arXiv preprint quant-ph, arXiv:2008.03083 (2020)"},{"key":"3006_CR54","volume-title":"Multi-photon Quantum Interference","author":"ZYJ Ou","year":"2007","unstructured":"Ou, Z.Y.J.: Multi-photon Quantum Interference. Springer, Berlin (2007)"},{"issue":"17","key":"3006_CR55","doi-asserted-by":"crossref","first-page":"19579","DOI":"10.1364\/OE.21.019579","volume":"21","author":"B Korzh","year":"2013","unstructured":"Korzh, B., Walenta, N., Houlmann, R., Zbinden, H.: A high-speed multi-protocol quantum key distribution transmitter based on a dual-drive modulator. Opt. Express 21(17), 19579\u201319592 (2013)","journal-title":"Opt. Express"},{"issue":"20","key":"3006_CR56","doi-asserted-by":"crossref","first-page":"200501","DOI":"10.1103\/PhysRevLett.100.200501","volume":"100","author":"V Scarani","year":"2008","unstructured":"Scarani, V., Renner, R.: Quantum cryptography with finite resources: unconditional security bound for discrete-variable protocols with one-way postprocessing. Phys. Rev. Lett. 100(20), 200501 (2008)","journal-title":"Phys. Rev. Lett."},{"key":"3006_CR57","doi-asserted-by":"publisher","first-page":"230504","DOI":"10.1103\/PhysRevLett.94.230504","volume":"94","author":"HK Lo","year":"2005","unstructured":"Lo, H.K., Ma, X., Chen, K.: Decoy state quantum key distribution. Phys. Rev. Lett. 94, 230504 (2005). https:\/\/doi.org\/10.1103\/PhysRevLett.94.230504","journal-title":"Phys. Rev. Lett."},{"key":"3006_CR58","doi-asserted-by":"publisher","first-page":"012326","DOI":"10.1103\/PhysRevA.72.012326","volume":"72","author":"X Ma","year":"2005","unstructured":"Ma, X., Qi, B., Zhao, Y., Lo, H.K.: Practical decoy state for quantum key distribution. Phys. Rev. A 72, 012326 (2005). https:\/\/doi.org\/10.1103\/PhysRevA.72.012326","journal-title":"Phys. Rev. A"},{"issue":"10","key":"3006_CR59","doi-asserted-by":"crossref","first-page":"626","DOI":"10.1049\/el:19890425","volume":"25","author":"J Kahn","year":"1989","unstructured":"Kahn, J., Kasper, B., Pollock, K.: Optical phaselock receiver with multigigahertz signal bandwidth. Electron. Lett. 25(10), 626 (1989)","journal-title":"Electron. Lett."},{"issue":"12","key":"3006_CR60","doi-asserted-by":"crossref","first-page":"2630","DOI":"10.1109\/T-ED.1985.22394","volume":"32","author":"LG Kazovsky","year":"1985","unstructured":"Kazovsky, L.G.: Decision-driven phase-locked loop for optical homodyne receivers: performance analysis and laser linewidth requirements. IEEE Trans. Electron Devices 32(12), 2630 (1985)","journal-title":"IEEE Trans. Electron Devices"},{"issue":"2","key":"3006_CR61","doi-asserted-by":"crossref","first-page":"818","DOI":"10.1364\/OE.16.000818","volume":"16","author":"V Ferrero","year":"2008","unstructured":"Ferrero, V., Camatel, S.: Optical phase locking techniques: an overview and a novel method based on single side sub-carrier modulation. Opt. Express 16(2), 818 (2008)","journal-title":"Opt. Express"},{"key":"3006_CR62","doi-asserted-by":"crossref","first-page":"407","DOI":"10.1007\/978-3-540-30576-7_22","volume":"3378","author":"R Renner","year":"2005","unstructured":"Renner, R., Konig, R.: Quantum cryptography and universal composability-universally composable privacy amplification against quantum adversaries. Lecture Notes Comput. Sci. 3378, 407 (2005)","journal-title":"Lecture Notes Comput. Sci."},{"key":"3006_CR63","doi-asserted-by":"crossref","unstructured":"Ben-Or, M., Horodecki, M., Leung, D.W., Mayers, D., Oppenheim, J.: The universal composable security of quantum key distribution. In: Theory of Cryptography Conference. Springer, pp. 386\u2013406 (2005)","DOI":"10.1007\/978-3-540-30576-7_21"},{"key":"3006_CR64","doi-asserted-by":"crossref","unstructured":"Devetak, I.: Proceedings of the Royal Society A 461, 207 (2005)","DOI":"10.1098\/rspa.2004.1372"},{"issue":"01","key":"3006_CR65","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1142\/S0219749908003256","volume":"6","author":"R Renner","year":"2008","unstructured":"Renner, R.: Security of quantum key distribution. Int. J. Quantum Inf. 6(01), 1 (2008)","journal-title":"Int. J. Quantum Inf."},{"issue":"3\u20134","key":"3006_CR66","first-page":"203","volume":"12","author":"X Ma","year":"2012","unstructured":"Ma, X., Lutkenhaus, N.: Improved data post-processing in quantum key distribution and application to loss thresholds in device independent QKD. Quantum Inf. Comput. 12(3\u20134), 203\u2013214 (2012)","journal-title":"Quantum Inf. Comput."}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-021-03006-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11128-021-03006-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-021-03006-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,3,5]],"date-time":"2021-03-05T09:56:38Z","timestamp":1614938198000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11128-021-03006-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,2]]},"references-count":66,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2021,2]]}},"alternative-id":["3006"],"URL":"https:\/\/doi.org\/10.1007\/s11128-021-03006-2","relation":{},"ISSN":["1570-0755","1573-1332"],"issn-type":[{"value":"1570-0755","type":"print"},{"value":"1573-1332","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,2]]},"assertion":[{"value":"17 May 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 January 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 February 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"67"}}