{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T17:52:06Z","timestamp":1760205126262,"version":"3.37.3"},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2021,4,1]],"date-time":"2021-04-01T00:00:00Z","timestamp":1617235200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,4,1]],"date-time":"2021-04-01T00:00:00Z","timestamp":1617235200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"name":"National Key Research and Development Program of China","award":["2016YFA0302600"],"award-info":[{"award-number":["2016YFA0302600"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61675235","61605248"],"award-info":[{"award-number":["61675235","61605248"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61505261"],"award-info":[{"award-number":["61505261"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"published-print":{"date-parts":[[2021,4]]},"DOI":"10.1007\/s11128-021-03070-8","type":"journal-article","created":{"date-parts":[[2021,4,3]],"date-time":"2021-04-03T08:02:31Z","timestamp":1617436951000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Finite-key analysis of sending-or-not-sending twin-field quantum key distribution with intensity fluctuations"],"prefix":"10.1007","volume":"20","author":[{"given":"Yi-Fei","family":"Lu","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9774-1064","authenticated-orcid":false,"given":"Yang","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Mu-Sheng","family":"Jiang","sequence":"additional","affiliation":[]},{"given":"Fan","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Xiao-Xu","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Wan-Su","family":"Bao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,4,3]]},"reference":[{"key":"3070_CR1","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1016\/j.tcs.2014.05.025","volume":"560","author":"CH Bennett","year":"2014","unstructured":"Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. Theor. Comput. Sci. 560, 7 (2014)","journal-title":"Theor. Comput. Sci."},{"issue":"2","key":"3070_CR2","doi-asserted-by":"publisher","first-page":"441","DOI":"10.1103\/PhysRevLett.85.441","volume":"85","author":"PW Shor","year":"2000","unstructured":"Shor, P.W., Preskill, J.: Simple proof of security of the BB84 quantum key distribution protocol. Phys. Rev. Lett. 85(2), 441 (2000)","journal-title":"Phys. Rev. Lett."},{"issue":"2","key":"3070_CR3","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1103\/RevModPhys.92.025002","volume":"92","author":"F Xu","year":"2020","unstructured":"Xu, F., Ma, X., Zhang, Q., Lo, H.K., Pan, J.W.: Secure quantum key distribution with realistic devices. Rev. Mod. Phys. 92(2), 60 (2020)","journal-title":"Rev. Mod. Phys."},{"issue":"6","key":"3070_CR4","doi-asserted-by":"publisher","first-page":"1330","DOI":"10.1103\/PhysRevLett.85.1330","volume":"85","author":"G Brassard","year":"2000","unstructured":"Brassard, G., L\u00fctkenhaus, N., Mor, T., Sanders, B.C.: Limitations on practical quantum cryptography. Phys. Rev. Lett. 85(6), 1330 (2000)","journal-title":"Phys. Rev. Lett."},{"issue":"5","key":"3070_CR5","doi-asserted-by":"publisher","first-page":"052304","DOI":"10.1103\/PhysRevA.61.052304","volume":"61","author":"N L\u00fctkenhaus","year":"2000","unstructured":"L\u00fctkenhaus, N.: Security against individual attacks for realistic quantum key distribution. Phys. Rev. A 61(5), 052304 (2000)","journal-title":"Phys. Rev. A"},{"issue":"10","key":"3070_CR6","doi-asserted-by":"publisher","first-page":"686","DOI":"10.1038\/nphoton.2010.214","volume":"4","author":"L Lydersen","year":"2010","unstructured":"Lydersen, L., Wiechers, C., Wittmann, C., Elser, D., Skaar, J., Makarov, V.: Hacking commercial quantum cryptography systems by tailored bright illumination. Nat. Photon 4(10), 686 (2010)","journal-title":"Nat. Photon"},{"issue":"1","key":"3070_CR7","doi-asserted-by":"publisher","first-page":"349","DOI":"10.1038\/ncomms1348","volume":"2","author":"I Gerhardt","year":"2011","unstructured":"Gerhardt, I., Liu, Q., Lamas-Linares, A., Skaar, J., Kurtsiefer, C., Makarov, V.: Full-field implementation of a perfect eavesdropper on a quantum cryptography system. Nat. Commun. 2(1), 349 (2011)","journal-title":"Nat. Commun."},{"issue":"6","key":"3070_CR8","doi-asserted-by":"publisher","first-page":"062308","DOI":"10.1103\/PhysRevA.84.062308","volume":"84","author":"HW Li","year":"2011","unstructured":"Li, H.W., Wang, S., Huang, J.Z., Chen, W., Yin, Z.Q., Li, F.Y., Zhou, Z., Liu, D., Zhang, Y., Guo, G.C., Bao, W.S., Han, Z.F.: Attacking a practical quantum-key-distribution system with wavelength-dependent beam-splitter and multiwavelength sources. Phys. Rev. A 84(6), 062308 (2011)","journal-title":"Phys. Rev. A"},{"issue":"13","key":"3070_CR9","doi-asserted-by":"publisher","first-page":"130503","DOI":"10.1103\/PhysRevLett.108.130503","volume":"108","author":"HK Lo","year":"2012","unstructured":"Lo, H.K., Curty, M., Qi, B.: Measurement-device-independent quantum key distribution. Phys. Rev. Lett. 108(13), 130503 (2012)","journal-title":"Phys. Rev. Lett."},{"issue":"5","key":"3070_CR10","doi-asserted-by":"publisher","first-page":"057901","DOI":"10.1103\/PhysRevLett.91.057901","volume":"91","author":"WY Hwang","year":"2003","unstructured":"Hwang, W.Y.: Quantum key distribution with high loss: toward global secure communication. Phys. Rev. Lett. 91(5), 057901 (2003)","journal-title":"Phys. Rev. Lett."},{"issue":"23","key":"3070_CR11","doi-asserted-by":"publisher","first-page":"230503","DOI":"10.1103\/PhysRevLett.94.230503","volume":"94","author":"XB Wang","year":"2005","unstructured":"Wang, X.B.: Beating the photon-number-splitting attack in practical quantum cryptography. Phys. Rev. Lett. 94(23), 230503 (2005)","journal-title":"Phys. Rev. Lett."},{"issue":"23","key":"3070_CR12","doi-asserted-by":"publisher","first-page":"230504","DOI":"10.1103\/PhysRevLett.94.230504","volume":"94","author":"HK Lo","year":"2005","unstructured":"Lo, H.K., Ma, X., Chen, K.: Decoy state quantum key distribution. Phys. Rev. Lett. 94(23), 230504 (2005)","journal-title":"Phys. Rev. Lett."},{"issue":"7705","key":"3070_CR13","doi-asserted-by":"publisher","first-page":"400","DOI":"10.1038\/s41586-018-0066-6","volume":"557","author":"M Lucamarini","year":"2018","unstructured":"Lucamarini, M., Yuan, Z.L., Dynes, J.F., Shields, A.J.: Overcoming the rate\u2014distance limit of quantum key distribution without quantum repeaters. Nature 557(7705), 400 (2018)","journal-title":"Nature"},{"issue":"1","key":"3070_CR14","doi-asserted-by":"publisher","first-page":"5235","DOI":"10.1038\/ncomms6235","volume":"5","author":"M Takeoka","year":"2014","unstructured":"Takeoka, M., Guha, S., Wilde, M.M.: Fundamental rate-loss tradeoff for optical quantum key distribution. Nat. Commun. 5(1), 5235 (2014)","journal-title":"Nat. Commun."},{"issue":"1","key":"3070_CR15","doi-asserted-by":"publisher","first-page":"15043","DOI":"10.1038\/ncomms15043","volume":"8","author":"S Pirandola","year":"2017","unstructured":"Pirandola, S., Laurenza, R., Ottaviani, C., Banchi, L.: Fundamental limits of repeaterless quantum communications. Nat. Commun. 8(1), 15043 (2017)","journal-title":"Nat. Commun."},{"issue":"6","key":"3070_CR16","doi-asserted-by":"publisher","first-page":"062323","DOI":"10.1103\/PhysRevA.98.062323","volume":"98","author":"XB Wang","year":"2018","unstructured":"Wang, X.B., Yu, Z.W., Hu, X.L.: Twin-field quantum key distribution with large misalignment error. Phys. Rev. A 98(6), 062323 (2018)","journal-title":"Phys. Rev. A"},{"issue":"3","key":"3070_CR17","first-page":"031043","volume":"8","author":"X Ma","year":"2018","unstructured":"Ma, X., Zeng, P., Zhou, H.: Phase-matching quantum key distribution. Phys. Rev. X 8(3), 031043 (2018)","journal-title":"Phys. Rev. X"},{"key":"3070_CR18","unstructured":"Tamaki, K., Lo, H.K., Wang, W., Lucamarini, M.: Information theoretic security of quantum key distribution overcoming the repeaterless secret key capacity bound. arXiv:1805.05511 [quant-ph] (2018)"},{"issue":"1","key":"3070_CR19","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1038\/s41534-019-0175-6","volume":"5","author":"M Curty","year":"2019","unstructured":"Curty, M., Azuma, K., Lo, H.K.: Simple security proof of twin-field type quantum key distribution protocol. NPJ Quantum Inf. 5(1), 64 (2019)","journal-title":"NPJ Quantum Inf."},{"issue":"3","key":"3070_CR20","doi-asserted-by":"publisher","first-page":"034053","DOI":"10.1103\/PhysRevApplied.11.034053","volume":"11","author":"C Cui","year":"2019","unstructured":"Cui, C., Yin, Z.Q., Wang, R., Chen, W., Wang, S., Guo, G.C., Han, Z.F.: Twin-field quantum key distribution without phase postselection. Phys. Rev. Appl. 11(3), 034053 (2019)","journal-title":"Phys. Rev. Appl."},{"issue":"2","key":"3070_CR21","doi-asserted-by":"publisher","first-page":"024061","DOI":"10.1103\/PhysRevApplied.12.024061","volume":"12","author":"C Jiang","year":"2019","unstructured":"Jiang, C., Yu, Z.W., Hu, X.L., Wang, X.B.: Unconditional security of sending or not sending twin-field quantum key distribution with finite pulses. Phys. Rev. Appl. 12(2), 024061 (2019)","journal-title":"Phys. Rev. Appl."},{"issue":"10","key":"3070_CR22","doi-asserted-by":"publisher","first-page":"100505","DOI":"10.1103\/PhysRevLett.123.100505","volume":"123","author":"Y Liu","year":"2019","unstructured":"Liu, Y., Yu, Z.W., Zhang, W., Guan, J.Y., Chen, J.P., Zhang, C., Hu, X.L., Li, H., Jiang, C., Lin, J., Chen, T.Y., You, L., Wang, Z., Wang, X.B., Zhang, Q., Pan, J.W.: Experimental twin-field quantum key distribution through sending or not sending. Phys. Rev. Lett. 123(10), 100505 (2019)","journal-title":"Phys. Rev. Lett."},{"issue":"7","key":"3070_CR23","doi-asserted-by":"publisher","first-page":"070501","DOI":"10.1103\/PhysRevLett.124.070501","volume":"124","author":"JP Chen","year":"2020","unstructured":"Chen, J.P., Zhang, C., Liu, Y., Jiang, C., Zhang, W., Hu, X.L., Guan, J.Y., Yu, Z.W., Xu, H., Lin, J., Li, M.J., Chen, H., Li, H., You, L., Wang, Z., Wang, X.B., Zhang, Q., Pan, J.W.: Sending-or-not-sending with independent lasers: secure twin-field quantum key distribution over 509 km. Phys. Rev. Lett. 124(7), 070501 (2020)","journal-title":"Phys. Rev. Lett."},{"issue":"1","key":"3070_CR24","doi-asserted-by":"publisher","first-page":"3080","DOI":"10.1038\/s41598-019-39225-y","volume":"9","author":"ZW Yu","year":"2019","unstructured":"Yu, Z.W., Hu, X.L., Jiang, C., Xu, H., Wang, X.B.: Sending-or-not-sending twin-field quantum key distribution in practice. Sci. Rep. 9(1), 3080 (2019)","journal-title":"Sci. Rep."},{"issue":"6","key":"3070_CR25","doi-asserted-by":"publisher","first-page":"062316","DOI":"10.1103\/PhysRevA.99.062316","volume":"99","author":"XY Zhou","year":"2019","unstructured":"Zhou, X.Y., Zhang, C.H., Zhang, C.M., Wang, Q.: Asymmetric sending or not sending twin-field quantum key distribution in practice. Phys. Rev. A 99(6), 062316 (2019)","journal-title":"Phys. Rev. A"},{"issue":"6","key":"3070_CR26","doi-asserted-by":"publisher","first-page":"062337","DOI":"10.1103\/PhysRevA.100.062337","volume":"100","author":"XL Hu","year":"2019","unstructured":"Hu, X.L., Jiang, C., Yu, Z.W., Wang, X.B.: Sending-or-not-sending twin-field protocol for quantum key distribution with asymmetric source parameters. Phys. Rev. A 100(6), 062337 (2019)","journal-title":"Phys. Rev. A"},{"key":"3070_CR27","doi-asserted-by":"crossref","unstructured":"Jiang, C., Yu, Z.W., Hu, X.L., Wang, X.B.: Sending-or-not-sending twin-filed quantum key distribution with discrete phase modulation. arXiv:2009.00816 [quant-ph] (2020)","DOI":"10.1103\/PhysRevResearch.2.043304"},{"issue":"1","key":"3070_CR28","doi-asserted-by":"publisher","first-page":"36","DOI":"10.3390\/e22010036","volume":"22","author":"Y Qiao","year":"2019","unstructured":"Qiao, Y., Chen, Z., Zhang, Y., Xu, B., Guo, H.: Sending-or-not-sending twin-field quantum key distribution with light source monitoring. Entropy 22(1), 36 (2019)","journal-title":"Entropy"},{"issue":"4","key":"3070_CR29","doi-asserted-by":"publisher","first-page":"493","DOI":"10.1214\/aoms\/1177729330","volume":"23","author":"H Chernoff","year":"1952","unstructured":"Chernoff, H.: A measure of asymptotic efficiency for tests of a hypothesis based on the sum of observations. Ann. Math. Stat. 23(4), 493 (1952)","journal-title":"Ann. Math. Stat."},{"issue":"1","key":"3070_CR30","doi-asserted-by":"publisher","first-page":"3732","DOI":"10.1038\/ncomms4732","volume":"5","author":"M Curty","year":"2014","unstructured":"Curty, M., Xu, F., Cui, W., Lim, C.C.W., Tamaki, K., Lo, H.K.: Finite-key analysis for measurement-device-independent quantum key distribution. Nat. Commun. 5(1), 3732 (2014)","journal-title":"Nat. Commun."},{"issue":"1","key":"3070_CR31","doi-asserted-by":"publisher","first-page":"012333","DOI":"10.1103\/PhysRevA.95.012333","volume":"95","author":"Z Zhang","year":"2017","unstructured":"Zhang, Z., Zhao, Q., Razavi, M., Ma, X.: Improved key-rate bounds for practical decoy-state quantum-key-distribution systems. Phys. Rev. A 95(1), 012333 (2017)","journal-title":"Phys. Rev. A"},{"issue":"3","key":"3070_CR32","doi-asserted-by":"publisher","first-page":"357","DOI":"10.2748\/tmj\/1178243286","volume":"19","author":"K Azuma","year":"1967","unstructured":"Azuma, K.: Weighted sums of certain dependent random variables. Tohoku Math. J. 19(3), 357 (1967)","journal-title":"Tohoku Math. J."},{"issue":"3","key":"3070_CR33","doi-asserted-by":"publisher","first-page":"032335","DOI":"10.1103\/PhysRevA.94.032335","volume":"94","author":"Y Wang","year":"2016","unstructured":"Wang, Y., Bao, W.S., Zhou, C., Jiang, M.S., Li, H.W.: Tight finite-key analysis of a practical decoy-state quantum key distribution with unstable sources. Phys. Rev. A 94(3), 032335 (2016)","journal-title":"Phys. Rev. A"},{"issue":"6","key":"3070_CR34","doi-asserted-by":"publisher","first-page":"065103","DOI":"10.1088\/1572-9494\/ab8a11","volume":"72","author":"SF He","year":"2020","unstructured":"He, S.F., Wang, Y., Li, J.J., Bao, W.S.: Asymmetric twin-field quantum key distribution with both statistical and intensity fluctuations. Commun. Theor. Phys. 72(6), 065103 (2020)","journal-title":"Commun. Theor. Phys."},{"issue":"8","key":"3070_CR35","doi-asserted-by":"publisher","first-page":"085006","DOI":"10.1088\/1367-2630\/11\/8\/085006","volume":"11","author":"J M\u00fcller-Quade","year":"2009","unstructured":"M\u00fcller-Quade, J., Renner, R.: Composability in quantum cryptography. New J. Phys. 11(8), 085006 (2009)","journal-title":"New J. Phys."},{"issue":"1","key":"3070_CR36","doi-asserted-by":"publisher","first-page":"634","DOI":"10.1038\/ncomms1631","volume":"3","author":"M Tomamichel","year":"2012","unstructured":"Tomamichel, M., Lim, C.C.W., Gisin, N., Renner, R.: Tight finite-key analysis for quantum cryptography. Nat. Commun. 3(1), 634 (2012)","journal-title":"Nat. Commun."}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-021-03070-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11128-021-03070-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-021-03070-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,5]],"date-time":"2021-05-05T20:21:59Z","timestamp":1620246119000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11128-021-03070-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4]]},"references-count":36,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2021,4]]}},"alternative-id":["3070"],"URL":"https:\/\/doi.org\/10.1007\/s11128-021-03070-8","relation":{},"ISSN":["1570-0755","1573-1332"],"issn-type":[{"type":"print","value":"1570-0755"},{"type":"electronic","value":"1573-1332"}],"subject":[],"published":{"date-parts":[[2021,4]]},"assertion":[{"value":"4 October 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 March 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 April 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"135"}}