{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,22]],"date-time":"2025-05-22T09:07:11Z","timestamp":1747904831846},"reference-count":16,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2021,4,1]],"date-time":"2021-04-01T00:00:00Z","timestamp":1617235200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,4,1]],"date-time":"2021-04-01T00:00:00Z","timestamp":1617235200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"published-print":{"date-parts":[[2021,4]]},"DOI":"10.1007\/s11128-021-03035-x","type":"journal-article","created":{"date-parts":[[2021,4,1]],"date-time":"2021-04-01T09:07:46Z","timestamp":1617268066000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Improved statistical fluctuation analysis for twin-field quantum key distribution"],"prefix":"10.1007","volume":"20","author":[{"given":"Jooyoun","family":"Park","sequence":"first","affiliation":[]},{"given":"Jonghyun","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Jun","family":"Heo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,4,1]]},"reference":[{"key":"3035_CR1","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1016\/j.tcs.2014.05.025","volume":"560","author":"CH Bennett","year":"2014","unstructured":"Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. Theor. Comput. Sci. 560, 7\u201311 (2014). (Theoretical Aspects of Quantum Cryptography\u202f?? celebrating 30 years of BB84)","journal-title":"Theor. Comput. Sci."},{"issue":"5410","key":"3035_CR2","doi-asserted-by":"publisher","first-page":"2050","DOI":"10.1126\/science.283.5410.2050","volume":"283","author":"H-K Lo","year":"1999","unstructured":"Lo, H.-K., Chau, H.F.: Unconditional security of quantum key distribution over arbitrarily long distances. Science 283(5410), 2050\u20132056 (1999)","journal-title":"Science"},{"issue":"2","key":"3035_CR3","doi-asserted-by":"publisher","first-page":"441","DOI":"10.1103\/PhysRevLett.85.441","volume":"85","author":"PW Shor","year":"2000","unstructured":"Shor, P.W., Preskill, J.: Simple proof of security of the BB84 quantum key distribution protocol. Phys. Rev. Lett. 85(2), 441 (2000)","journal-title":"Phys. Rev. Lett."},{"issue":"3","key":"3035_CR4","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1145\/382780.382781","volume":"48","author":"D Mayers","year":"2001","unstructured":"Mayers, D.: Unconditional security in quantum cryptography. J. ACM (JACM) 48(3), 351\u2013406 (2001)","journal-title":"J. ACM (JACM)"},{"issue":"19","key":"3035_CR5","doi-asserted-by":"publisher","first-page":"190502","DOI":"10.1103\/PhysRevLett.121.190502","volume":"121","author":"A Boaron","year":"2018","unstructured":"Boaron, A., Boso, G., Rusca, D., Vulliez, C., Autebert, C., Caloz, M., Perrenoud, M., Gras, G., Bussi\u00e8res, F., Li, M.-J., et al.: Secure quantum key distribution over 421 km of optical fiber. Phys. Rev. Lett. 121(19), 190502 (2018)","journal-title":"Phys. Rev. Lett."},{"issue":"19","key":"3035_CR6","doi-asserted-by":"publisher","first-page":"190501","DOI":"10.1103\/PhysRevLett.117.190501","volume":"117","author":"H-L Yin","year":"2016","unstructured":"Yin, H.-L., Chen, T.-Y., Zong-Wen, Y., Liu, H., You, L.-X., Zhou, Y.-H., Chen, S.-J., Mao, Y., Huang, M.-Q., Zhang, W.-J., et al.: Measurement-device-independent quantum key distribution over a 404 km optical fiber. Phys. Rev. Lett. 117(19), 190501 (2016)","journal-title":"Phys. Rev. Lett."},{"issue":"1","key":"3035_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1038\/ncomms6235","volume":"5","author":"M Takeoka","year":"2014","unstructured":"Takeoka, M., Guha, S., Wilde, M.M.: Fundamental rate-loss tradeoff for optical quantum key distribution. Nat. Commun. 5(1), 1\u20137 (2014)","journal-title":"Nat. Commun."},{"issue":"1","key":"3035_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1038\/ncomms15043","volume":"8","author":"S Pirandola","year":"2017","unstructured":"Pirandola, S., Laurenza, R., Ottaviani, C., Banchi, L.: Fundamental limits of repeaterless quantum communications. Nat. Commun. 8(1), 1\u201315 (2017)","journal-title":"Nat. Commun."},{"issue":"7705","key":"3035_CR9","doi-asserted-by":"publisher","first-page":"400","DOI":"10.1038\/s41586-018-0066-6","volume":"557","author":"M Lucamarini","year":"2018","unstructured":"Lucamarini, M., Yuan, Z.L., Dynes, J.F., Shields, A.J.: Overcoming the rate-distance limit of quantum key distribution without quantum repeaters. Nature 557(7705), 400\u2013403 (2018)","journal-title":"Nature"},{"issue":"1","key":"3035_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1038\/s41534-018-0113-z","volume":"5","author":"M Curty","year":"2019","unstructured":"Curty, M., Azuma, K., Lo, H.-K.: Simple security proof of twin-field type quantum key distribution protocol. NPJ Quantum Inf. 5(1), 1\u20136 (2019)","journal-title":"NPJ Quantum Inf."},{"issue":"4","key":"3035_CR11","doi-asserted-by":"publisher","first-page":"042332","DOI":"10.1103\/PhysRevA.98.042332","volume":"98","author":"J Lin","year":"2018","unstructured":"Lin, J., L\u00fctkenhaus, N.: Simple security analysis of phase-matching measurement-device-independent quantum key distribution. Phys. Rev. A 98(4), 042332 (2018)","journal-title":"Phys. Rev. A"},{"issue":"3","key":"3035_CR12","doi-asserted-by":"publisher","first-page":"034053","DOI":"10.1103\/PhysRevApplied.11.034053","volume":"11","author":"C Cui","year":"2019","unstructured":"Cui, C., Yin, Z.-Q., Wang, R., Chen, W., Wang, S., Guo, G.-C., Han, Z.-F.: Twin-field quantum key distribution without phase postselection. Phys. Rev. Appl. 11(3), 034053 (2019)","journal-title":"Phys. Rev. Appl."},{"issue":"1","key":"3035_CR13","doi-asserted-by":"publisher","first-page":"012333","DOI":"10.1103\/PhysRevA.95.012333","volume":"95","author":"Z Zhang","year":"2017","unstructured":"Zhang, Z., Zhao, Q., Razavi, M., Ma, X.: Improved key-rate bounds for practical decoy-state quantum-key-distribution systems. Phys. Rev. A 95(1), 012333 (2017)","journal-title":"Phys. Rev. A"},{"issue":"1","key":"3035_CR14","doi-asserted-by":"publisher","first-page":"012326","DOI":"10.1103\/PhysRevA.72.012326","volume":"72","author":"X Ma","year":"2005","unstructured":"Ma, X., Qi, B., Zhao, Y., Lo, H.-K.: Practical decoy state for quantum key distribution. Phys Rev A 72(1), 012326 (2005)","journal-title":"Phys Rev A"},{"issue":"1","key":"3035_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1038\/ncomms4732","volume":"5","author":"M Curty","year":"2014","unstructured":"Curty, M., Feihu, X., Cui, W., Lim, C.C.W., Tamaki, K., Lo, H.-K.: Finite-key analysis for measurement-device-independent quantum key distribution. Nat. Commun. 5(1), 1\u20137 (2014)","journal-title":"Nat. Commun."},{"key":"3035_CR16","first-page":"021046","volume":"9","author":"S Wang","year":"2019","unstructured":"Wang, S., He, D.-Y., Yin, Z.-Q., Feng-Yu, L., Cui, C.-H., Chen, W., Zhou, Z., Guo, G.-C., Han, Z.-F.: Beating the fundamental rate-distance limit in a proof-of-principle quantum key distribution system. Phys. Rev. X 9, 021046 (2019)","journal-title":"Phys. Rev. X"}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-021-03035-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11128-021-03035-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-021-03035-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,5]],"date-time":"2021-05-05T20:16:45Z","timestamp":1620245805000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11128-021-03035-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4]]},"references-count":16,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2021,4]]}},"alternative-id":["3035"],"URL":"https:\/\/doi.org\/10.1007\/s11128-021-03035-x","relation":{},"ISSN":["1570-0755","1573-1332"],"issn-type":[{"value":"1570-0755","type":"print"},{"value":"1573-1332","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,4]]},"assertion":[{"value":"24 August 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 February 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 April 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"127"}}