{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T11:27:05Z","timestamp":1740137225154,"version":"3.37.3"},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"9","license":[{"start":{"date-parts":[[2021,9,1]],"date-time":"2021-09-01T00:00:00Z","timestamp":1630454400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,9,1]],"date-time":"2021-09-01T00:00:00Z","timestamp":1630454400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100002322","name":"Coordena\u00e7\u00e3o de Aperfei\u00e7oamento de Pessoal de N\u00edvel Superior","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100002322","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003593","name":"Conselho Nacional de Desenvolvimento Cient\u00edfico e Tecnol\u00f3gico","doi-asserted-by":"publisher","award":["305918\/2019-2"],"award-info":[{"award-number":["305918\/2019-2"]}],"id":[{"id":"10.13039\/501100003593","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"published-print":{"date-parts":[[2021,9]]},"DOI":"10.1007\/s11128-021-03222-w","type":"journal-article","created":{"date-parts":[[2021,9,1]],"date-time":"2021-09-01T07:04:12Z","timestamp":1630479852000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["The impact of constellation cardinality on discrete unidimensional CVQKD protocols"],"prefix":"10.1007","volume":"20","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6394-9174","authenticated-orcid":false,"given":"Micael A.","family":"Dias","sequence":"first","affiliation":[]},{"given":"Francisco M.","family":"de Assis","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,9,1]]},"reference":[{"issue":"2","key":"3222_CR1","doi-asserted-by":"publisher","first-page":"394","DOI":"10.1109\/tit.2003.822618","volume":"50","author":"GV Assche","year":"2004","unstructured":"Assche, G.V., Cardinal, J., Cerf, N.J.: Reconciliation of a quantum-distributed Gaussian key. IEEE TIT 50(2), 394\u2013400 (2004). https:\/\/doi.org\/10.1109\/tit.2003.822618","journal-title":"IEEE TIT"},{"issue":"2","key":"3222_CR2","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1007\/s11128-019-2546-5","volume":"19","author":"D Bai","year":"2020","unstructured":"Bai, D., Huang, P., Zhu, Y., Ma, H., Xiao, T., Wang, T., Zeng, G.: Unidimensional continuous-variable measurement-device-independent quantum key distribution. Quantum Inf. Process. 19(2), 53 (2020). https:\/\/doi.org\/10.1007\/s11128-019-2546-5","journal-title":"Quantum Inf. Process."},{"issue":"4","key":"3222_CR3","doi-asserted-by":"publisher","first-page":"44401","DOI":"10.7567\/jjap.56.044401","volume":"56","author":"Z Bai","year":"2017","unstructured":"Bai, Z., Yang, S., Li, Y.: High-efficiency reconciliation for continuous variable quantum key distribution. Jpn. J. Appl. Phys. 56(4), 44401 (2017). https:\/\/doi.org\/10.7567\/jjap.56.044401","journal-title":"Jpn. J. Appl. Phys."},{"key":"3222_CR4","doi-asserted-by":"publisher","unstructured":"Bloch, M., Thangaraj, A., McLaughlin, S., Merolla, J.M.: LDPC-based Gaussian key reconciliation. In: 2006 IEEE Information Theory Workshop, pp. 116\u2013120. IEEE, Punta del Este, Uruguay (2006). https:\/\/doi.org\/10.1109\/ITW.2006.1633793","DOI":"10.1109\/ITW.2006.1633793"},{"issue":"2","key":"3222_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1103\/PhysRevA.97.022310","volume":"97","author":"K Br\u00e1dler","year":"2018","unstructured":"Br\u00e1dler, K., Weedbrook, C.: Security proof of continuous-variable quantum key distribution using three coherent states. Phys. Rev. A 97(2), 1\u201316 (2018). https:\/\/doi.org\/10.1103\/PhysRevA.97.022310","journal-title":"Phys. Rev. A"},{"key":"3222_CR6","doi-asserted-by":"publisher","unstructured":"Brassard, G., Salvail, L.: Secret-key reconciliation by public discussion. In: EUROCRYPT, pp. 410\u2013423. Springer, Berlin (1994). https:\/\/doi.org\/10.1007\/3-540-48285-735","DOI":"10.1007\/3-540-48285-735"},{"key":"3222_CR7","doi-asserted-by":"publisher","DOI":"10.1142\/P489","author":"NJ Cerf","year":"2007","unstructured":"Cerf, N.J., Leuchs, G., Polzik, E.S.: Quantum information with continuous variables of atoms and light. Icp (2007). https:\/\/doi.org\/10.1142\/P489","journal-title":"Icp"},{"issue":"5","key":"3222_CR8","doi-asserted-by":"publisher","first-page":"1714","DOI":"10.1109\/18.259663","volume":"39","author":"F-W Sun","year":"1993","unstructured":"Sun, F.-W., van Tilborg, H.: Approaching capacity by equiprobable signaling on the Gaussian channel. IEEE Tran. Inf. Theory 39(5), 1714\u20131716 (1993). https:\/\/doi.org\/10.1109\/18.259663","journal-title":"IEEE Tran. Inf. Theory"},{"issue":"2","key":"3222_CR9","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevX.9.021059","volume":"9","author":"S Ghorai","year":"2019","unstructured":"Ghorai, S., Grangier, P., Diamanti, E., Leverrier, A.: Asymptotic security of continuous-variable quantum key distribution with a discrete modulation. Phys. Rev. X 9(2), 021059 (2019). https:\/\/doi.org\/10.1103\/PhysRevX.9.021059","journal-title":"Phys. Rev. X"},{"issue":"5","key":"3222_CR10","doi-asserted-by":"publisher","first-page":"57902","DOI":"10.1103\/PhysRevLett.88.057902","volume":"88","author":"F Grosshans","year":"2002","unstructured":"Grosshans, F., Grangier, P.: Continuous variable quantum cryptography using coherent states. Phys. Rev. Lett. 88(5), 57902 (2002). https:\/\/doi.org\/10.1103\/PhysRevLett.88.057902","journal-title":"Phys. Rev. Lett."},{"issue":"4","key":"3222_CR11","doi-asserted-by":"publisher","first-page":"42329","DOI":"10.1103\/PhysRevA.90.042329","volume":"90","author":"P Jouguet","year":"2014","unstructured":"Jouguet, P., Elkouss, D., Kunz-Jacques, S.: High-bit-rate continuous-variable quantum key distribution. Phys. Rev. A 90(4), 42329 (2014)","journal-title":"Phys. Rev. A"},{"issue":"1","key":"3222_CR12","doi-asserted-by":"publisher","first-page":"1800011","DOI":"10.1002\/qute.201800011","volume":"1","author":"F Laudenbach","year":"2018","unstructured":"Laudenbach, F., Pacher, C., Fung, C.H.F., Poppe, A., Peev, M., Schrenk, B., Hentschel, M., Walther, P., H\u00fcbel, H.: Continuous-variable quantum key distribution with Gaussian modulation-the theory of practical implementations. Adv. Quantum Technol. 1(1), 1800011 (2018). https:\/\/doi.org\/10.1002\/qute.201800011","journal-title":"Adv. Quantum Technol."},{"key":"3222_CR13","unstructured":"Leonhardt, U.: Measuring the Quantum State of Light No.\u00a022 in Cambridge Studies in Modern Optics. Cambridge University Press, New York (1997)"},{"key":"3222_CR14","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.102.180504","author":"A Leverrier","year":"2009","unstructured":"Leverrier, A., Grangier, P.: Unconditional security proof of long-distance continuous-variable quantum key distribution with discrete modulation. Phys. Rev. Lett. (2009). https:\/\/doi.org\/10.1103\/PhysRevLett.102.180504","journal-title":"Phys. Rev. Lett."},{"issue":"5","key":"3222_CR15","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1007\/s11128-018-1881-2","volume":"17","author":"Q Liao","year":"2018","unstructured":"Liao, Q., Guo, Y., Xie, C., Huang, D., Huang, P., Zeng, G.: Composable security of unidimensional continuous-variable quantum key distribution. Quantum Inf. Process. 17(5), 113 (2018). https:\/\/doi.org\/10.1007\/s11128-018-1881-2","journal-title":"Quantum Inf. Process."},{"issue":"1","key":"3222_CR16","doi-asserted-by":"publisher","first-page":"12316","DOI":"10.1103\/PhysRevA.95.012316","volume":"95","author":"A Marie","year":"2017","unstructured":"Marie, A., All\u00e9aume, R.: Self-coherent phase reference sharing for continuous-variable quantum key distribution. Phys. Rev. A 95(1), 12316 (2017). https:\/\/doi.org\/10.1103\/PhysRevA.95.012316","journal-title":"Phys. Rev. A"},{"key":"3222_CR17","unstructured":"Nguyen, K.C., Van Assche, G., Cerf, N.J.: Side-information coding with turbo codes and its application to quantum key distribution. In: International Symposium on Information Theory and Its Applications. Parma, Italy (2004)"},{"issue":"1","key":"3222_CR18","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.98.012340","volume":"98","author":"P Papanastasiou","year":"2018","unstructured":"Papanastasiou, P., Lupo, C., Weedbrook, C., Pirandola, S.: Quantum key distribution with phase-encoded coherent states: asymptotic security analysis in thermal-loss channels. Phys. Rev. A 98(1), 012340 (2018). https:\/\/doi.org\/10.1103\/PhysRevA.98.012340","journal-title":"Phys. Rev. A"},{"key":"3222_CR19","unstructured":"Pilori, D.: Advanced Digital Signal Processing Techniques for High-Speed Optical Communications Links. Ph.D. Thesis, Politecnico di Torino (2019)"},{"issue":"9","key":"3222_CR20","doi-asserted-by":"publisher","first-page":"1889","DOI":"10.3390\/app9091889","volume":"9","author":"Z Qu","year":"2019","unstructured":"Qu, Z., Djordjevic, I.B., Anderson, J.: Two-dimensional constellation shaping in fiber-optic communications. Appl. Sci. 9(9), 1889 (2019). https:\/\/doi.org\/10.3390\/app9091889","journal-title":"Appl. Sci."},{"key":"3222_CR21","doi-asserted-by":"publisher","DOI":"10.1103\/physreva.61.010303","author":"TC Ralph","year":"1999","unstructured":"Ralph, T.C.: Continuous variable quantum cryptography. Phys. Rev. A (1999). https:\/\/doi.org\/10.1103\/physreva.61.010303","journal-title":"Phys. Rev. A"},{"key":"3222_CR22","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1948.tb00917.x","author":"CE Shannon","year":"1948","unstructured":"Shannon, C.E.: A mathematical theory of communication. Bell Syst. Tech. J. (1948). https:\/\/doi.org\/10.1002\/j.1538-7305.1948.tb00917.x","journal-title":"Bell Syst. Tech. J."},{"issue":"1","key":"3222_CR23","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1109\/TIT.1982.1056454","volume":"28","author":"G Ungerboeck","year":"1982","unstructured":"Ungerboeck, G.: Channel coding with multilevel\/phase signals. IEEE Trans. Inf. Theory 28(1), 55\u201367 (1982). https:\/\/doi.org\/10.1109\/TIT.1982.1056454","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"6","key":"3222_CR24","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.92.062337","volume":"92","author":"VC Usenko","year":"2015","unstructured":"Usenko, V.C., Grosshans, F.: Unidimensional continuous-variable quantum key distribution. Phys. Rev. A 92(6), 062337 (2015). https:\/\/doi.org\/10.1103\/PhysRevA.92.062337","journal-title":"Phys. Rev. A"},{"issue":"23","key":"3222_CR25","doi-asserted-by":"publisher","first-page":"27995","DOI":"10.1364\/OE.25.027995","volume":"25","author":"P Wang","year":"2017","unstructured":"Wang, P., Wang, X., Li, J., Li, Y.: Finite-size analysis of unidimensional continuous-variable quantum key distribution under realistic conditions. Opt. Express 25(23), 27995 (2017). https:\/\/doi.org\/10.1364\/OE.25.027995","journal-title":"Opt. Express"},{"issue":"8","key":"3222_CR26","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.96.080502","volume":"96","author":"MM Wolf","year":"2006","unstructured":"Wolf, M.M., Giedke, G., Cirac, J.I.: Extremality of Gaussian quantum states. Phys. Rev. Lett. 96(8), 080502 (2006). https:\/\/doi.org\/10.1103\/PhysRevLett.96.080502","journal-title":"Phys. Rev. Lett."},{"key":"3222_CR27","doi-asserted-by":"publisher","unstructured":"Wu, Y., Verd\u00fa, S.: The impact of constellation cardinality on Gaussian channel capacity. In: 2010 48th Annual Allerton Conference on Communication, Control, and Computing, Allerton 2010, pp. 620\u2013628 (2010). https:\/\/doi.org\/10.1109\/ALLERTON.2010.5706965","DOI":"10.1109\/ALLERTON.2010.5706965"},{"issue":"1","key":"3222_CR28","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1038\/s41598-018-36366-4","volume":"9","author":"HL Yin","year":"2019","unstructured":"Yin, H.L., Zhu, W., Fu, Y.: Phase self-aligned continuous-variable measurement-device-independent quantum key distribution. Sci. Rep. 9(1), 49 (2019). https:\/\/doi.org\/10.1038\/s41598-018-36366-4","journal-title":"Sci. Rep."},{"issue":"3","key":"3222_CR29","doi-asserted-by":"publisher","first-page":"1838","DOI":"10.1364\/OE.27.001838","volume":"27","author":"W Zhao","year":"2019","unstructured":"Zhao, W., Guo, Y., Zhang, L., Huang, D.: Phase noise estimation using Bayesian inference for continuous-variable quantum key distribution. Opt. Express 27(3), 1838 (2019). https:\/\/doi.org\/10.1364\/OE.27.001838","journal-title":"Opt. Express"},{"issue":"2","key":"3222_CR30","doi-asserted-by":"publisher","DOI":"10.1016\/j.physleta.2019.126061","volume":"384","author":"W Zhao","year":"2020","unstructured":"Zhao, W., Shi, R., Feng, Y., Huang, D.: Unidimensional continuous-variable quantum key distribution with discrete modulation. Phys. Lett. A 384(2), 126061 (2020). https:\/\/doi.org\/10.1016\/j.physleta.2019.126061","journal-title":"Phys. Lett. A"},{"issue":"1","key":"3222_CR31","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1103\/PhysRevA.79.012307","volume":"79","author":"YB Zhao","year":"2009","unstructured":"Zhao, Y.B., Heid, M., Rigas, J., L\u00fctkenhaus, N.: Asymptotic security of binary modulated continuous-variable quantum key distribution under collective attacks. Phys. Rev. A 79(1), 1\u201314 (2009). https:\/\/doi.org\/10.1103\/PhysRevA.79.012307","journal-title":"Phys. Rev. A"}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-021-03222-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11128-021-03222-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-021-03222-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,5]],"date-time":"2021-10-05T02:34:53Z","timestamp":1633401293000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11128-021-03222-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9]]},"references-count":31,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2021,9]]}},"alternative-id":["3222"],"URL":"https:\/\/doi.org\/10.1007\/s11128-021-03222-w","relation":{},"ISSN":["1570-0755","1573-1332"],"issn-type":[{"type":"print","value":"1570-0755"},{"type":"electronic","value":"1573-1332"}],"subject":[],"published":{"date-parts":[[2021,9]]},"assertion":[{"value":"18 February 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 August 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 September 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no con ict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"284"}}