{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,2]],"date-time":"2025-12-02T15:06:14Z","timestamp":1764687974750,"version":"3.37.3"},"reference-count":43,"publisher":"Springer Science and Business Media LLC","issue":"10","license":[{"start":{"date-parts":[[2021,10,1]],"date-time":"2021-10-01T00:00:00Z","timestamp":1633046400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,10,1]],"date-time":"2021-10-01T00:00:00Z","timestamp":1633046400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/100000001","name":"national science foundation","doi-asserted-by":"publisher","award":["2006126"],"award-info":[{"award-number":["2006126"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"published-print":{"date-parts":[[2021,10]]},"DOI":"10.1007\/s11128-021-03276-w","type":"journal-article","created":{"date-parts":[[2021,10,15]],"date-time":"2021-10-15T14:28:36Z","timestamp":1634308116000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Analysis of a High-Dimensional Extended B92 Protocol"],"prefix":"10.1007","volume":"20","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5069-1012","authenticated-orcid":false,"given":"Hasan","family":"Iqbal","sequence":"first","affiliation":[]},{"given":"Walter O.","family":"Krawec","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,10,15]]},"reference":[{"key":"3276_CR1","unstructured":"Bennett, C.H., Brassard, G.: Quantum cryptography: Public key distribution and coin tossing. In: Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, volume 175. New York, 1984"},{"issue":"4","key":"3276_CR2","doi-asserted-by":"publisher","first-page":"1012","DOI":"10.1364\/AOP.361502","volume":"12","author":"S Pirandola","year":"2020","unstructured":"Pirandola, S., Andersen, U.L., Banchi, L., Berta, M., Bunandar, D., Colbeck, R., Englund, D., Gehring, T., Lupo, C., Ottaviani, C., et al.: Advances in quantum cryptography. Adv. Optics Photon. 12(4), 1012\u20131236 (2020)","journal-title":"Adv. Optics Photon."},{"key":"3276_CR3","doi-asserted-by":"publisher","first-page":"1301","DOI":"10.1103\/RevModPhys.81.1301","volume":"81","author":"V Scarani","year":"2009","unstructured":"Scarani, V., Bechmann-Pasquinucci, H., Cerf, N.J., Du\u0161ek, M., L\u00fctkenhaus, N., Peev, M.: The security of practical quantum key distribution. Rev. Mod. Phys. 81, 1301\u20131350 (2009)","journal-title":"Rev. Mod. Phys."},{"issue":"1","key":"3276_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.12743\/quanta.v6i1.57","volume":"6","author":"A Shenoy-Hejamadi","year":"2017","unstructured":"Shenoy-Hejamadi, A., Pathak, A., Radhakrishna, S.: Quantum cryptography: key distribution and beyond. Quanta 6(1), 1\u201347 (2017)","journal-title":"Quanta"},{"issue":"21","key":"3276_CR5","doi-asserted-by":"publisher","first-page":"3121","DOI":"10.1103\/PhysRevLett.68.3121","volume":"68","author":"CH Bennett","year":"1992","unstructured":"Bennett, C.H.: Quantum cryptography using any two nonorthogonal states. Phys. Rev. Lett. 68(21), 3121 (1992)","journal-title":"Phys. Rev. Lett."},{"issue":"16","key":"3276_CR6","doi-asserted-by":"publisher","first-page":"167904","DOI":"10.1103\/PhysRevLett.90.167904","volume":"90","author":"K Tamaki","year":"2003","unstructured":"Tamaki, K., Koashi, M., Imoto, N.: Unconditionally secure key distribution based on two nonorthogonal states. Phys. Rev. Lett. 90(16), 167904 (2003)","journal-title":"Phys. Rev. Lett."},{"key":"3276_CR7","doi-asserted-by":"crossref","unstructured":"Matsumoto, R.: Improved asymptotic key rate of the b92 protocol. In: 2013 IEEE International Symposium on Information Theory, pages 351\u2013353. IEEE, 2013","DOI":"10.1109\/ISIT.2013.6620246"},{"issue":"3","key":"3276_CR8","doi-asserted-by":"publisher","first-page":"032327","DOI":"10.1103\/PhysRevA.80.032327","volume":"80","author":"M Lucamarini","year":"2009","unstructured":"Lucamarini, M., Giuseppe, D., Giovanni, T.K.: Robust unconditionally secure quantum key distribution with two nonorthogonal and uninformative states. Phys. Rev. A 80(3), 032327 (2009)","journal-title":"Phys. Rev. A"},{"key":"3276_CR9","doi-asserted-by":"crossref","unstructured":"Amer, Omar, Krawec, Walter\u00a0O: Finite key analysis of the extended b92 protocol. In: 2020 IEEE International Symposium on Information Theory (ISIT), pages 1944\u20131948. IEEE, 2020","DOI":"10.1109\/ISIT44484.2020.9174018"},{"issue":"12","key":"3276_CR10","doi-asserted-by":"publisher","first-page":"1900038","DOI":"10.1002\/qute.201900038","volume":"2","author":"D Cozzolino","year":"2019","unstructured":"Cozzolino, D., Lio, D., Beatrice, B., Davide, O., Leif, K.: High-dimensional quantum communication: benefits, progress, and future challenges. Adv. Quant. Technol. 2(12), 1900038 (2019)","journal-title":"Adv. Quant. Technol."},{"issue":"6","key":"3276_CR11","doi-asserted-by":"publisher","first-page":"062308","DOI":"10.1103\/PhysRevA.61.062308","volume":"61","author":"H Bechmann-Pasquinucci","year":"2000","unstructured":"Bechmann-Pasquinucci, H.: Quantum cryptography using larger alphabets. Phys. Rev. A 61(6), 062308 (2000)","journal-title":"Phys. Rev. A"},{"issue":"4","key":"3276_CR12","doi-asserted-by":"publisher","first-page":"1451","DOI":"10.1109\/TIT.2005.844076","volume":"51","author":"HF Chau","year":"2005","unstructured":"Chau, H.F.: Unconditionally secure key distribution in higher dimensions by depolarization. IEEE Trans. Inf. Theory 51(4), 1451\u20131468 (2005)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"3","key":"3276_CR13","doi-asserted-by":"publisher","first-page":"030301","DOI":"10.1103\/PhysRevA.82.030301","volume":"82","author":"L Sheridan","year":"2010","unstructured":"Sheridan, L., Scarani, V.: Security proof for quantum key distribution using qudit systems. Phys. Rev. A 82(3), 030301 (2010)","journal-title":"Phys. Rev. A"},{"issue":"11","key":"3276_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11128-018-2055-y","volume":"17","author":"C Vlachou","year":"2018","unstructured":"Vlachou, C., Krawec, W., Mateus, P., Paunkovi\u0107, N., Souto, A.: Quantum key distribution with quantum walks. Quant. Inf. Process. 17(11), 1\u201337 (2018)","journal-title":"Quant. Inf. Process."},{"issue":"7501","key":"3276_CR15","doi-asserted-by":"publisher","first-page":"475","DOI":"10.1038\/nature13303","volume":"509","author":"T Sasaki","year":"2014","unstructured":"Sasaki, T., Yamamoto, Y., Koashi, M.: Practical quantum key distribution protocol without monitoring signal disturbance. Nature 509(7501), 475\u2013478 (2014)","journal-title":"Nature"},{"issue":"3","key":"3276_CR16","doi-asserted-by":"publisher","first-page":"032340","DOI":"10.1103\/PhysRevA.101.032340","volume":"101","author":"F Wang","year":"2020","unstructured":"Wang, F., Zeng, P., Zhao, J., Braverman, B., Zhou, Y., Mirhosseini, M., Wang, X., Gao, H., Li, F., Boyd, R.W., et al.: High-dimensional quantum key distribution based on mutually partially unbiased bases. Phys. Rev. A 101(3), 032340 (2020)","journal-title":"Phys. Rev. A"},{"issue":"11","key":"3276_CR17","doi-asserted-by":"publisher","first-page":"e1701491","DOI":"10.1126\/sciadv.1701491","volume":"3","author":"NT Islam","year":"2017","unstructured":"Islam, N.T., Lim, C.C., Cahall, C., Kim, J., Gauthier, D.J.: Provably secure and high-rate quantum key distribution with time-bin qudits. Sci. Adv. 3(11), e1701491 (2017)","journal-title":"Sci. Adv."},{"issue":"6","key":"3276_CR18","doi-asserted-by":"publisher","first-page":"062322","DOI":"10.1103\/PhysRevA.87.062322","volume":"87","author":"J Mower","year":"2013","unstructured":"Mower, J., Zhang, Z., Desjardins, P., Lee, C., Shapiro, J.H., Englund, D.: High-dimensional quantum key distribution using dispersive optics. Phys. Rev. A 87(6), 062322 (2013)","journal-title":"Phys. Rev. A"},{"key":"3276_CR19","doi-asserted-by":"crossref","unstructured":"Da\u00a0Lio, B, Cozzolino, D, Biagi, N, Ding, Y, Rottwitt, K, Zavatta, D Bacco, A, Oxenl\u00f8we, LK: Path-encoded high-dimensional quantum communication over a 2 km multicore fiber. arXiv preprintarXiv:2103.05992, 2021","DOI":"10.1038\/s41534-021-00398-y"},{"key":"3276_CR20","doi-asserted-by":"crossref","unstructured":"Lee, C Bunandar, D, Zhang Z, Steinbrecher, GR, Dixon, PB, Wong, FN, Shapiro, JH, Hamilton, SA, Englund, D, : Large-alphabet encoding for higher-rate quantum key distribution. Optics Exp. 27(13), 17539\u201317549 (2019)","DOI":"10.1364\/OE.27.017539"},{"issue":"3&4","key":"3276_CR21","first-page":"209","volume":"17","author":"WO Krawec","year":"2017","unstructured":"Krawec, W.O.: Quantum key distribution with mismatched measurements over arbitrary channels. Quant. Inf. Comput. 17(3 & 4), 209\u2013241 (2017)","journal-title":"Quant. Inf. Comput."},{"issue":"12","key":"3276_CR22","doi-asserted-by":"publisher","first-page":"2501","DOI":"10.1080\/09500349314552491","volume":"40","author":"SM Barnett","year":"1993","unstructured":"Barnett, S.M., Huttner, B., Phoenix, S.J.D.: Eavesdropping strategies and rejected-data protocols in quantum cryptography. J. Modern Optics 40(12), 2501\u20132513 (1993)","journal-title":"J. Modern Optics"},{"issue":"4","key":"3276_CR23","doi-asserted-by":"publisher","first-page":"042316","DOI":"10.1103\/PhysRevA.78.042316","volume":"78","author":"S Watanabe","year":"2008","unstructured":"Watanabe, S., Matsumoto, R., Uyematsu, T.: Tomography increases key rates of quantum-key-distribution protocols. Phys. Rev. A 78(4), 042316 (2008)","journal-title":"Phys. Rev. A"},{"issue":"10","key":"3276_CR24","doi-asserted-by":"publisher","first-page":"2870","DOI":"10.1093\/ietfec\/e91-a.10.2870","volume":"91","author":"R Matsumoto","year":"2008","unstructured":"Matsumoto, R., Watanabe, S.: Key rate available from mismatched measurements in the bb84 protocol and the uncertainty principle. IEICE Trans. Fund. Electron. Commun. Comp. Sci. 91(10), 2870\u20132873 (2008)","journal-title":"IEICE Trans. Fund. Electron. Commun. Comp. Sci."},{"key":"3276_CR25","doi-asserted-by":"crossref","unstructured":"Krawec, Walter\u00a0O: Asymptotic analysis of a three state quantum cryptographic protocol. In: 2016 IEEE International Symposium on Information Theory (ISIT), pp. 2489\u20132493. IEEE, 2016","DOI":"10.1109\/ISIT.2016.7541747"},{"issue":"5","key":"3276_CR26","doi-asserted-by":"publisher","first-page":"052314","DOI":"10.1103\/PhysRevA.90.052314","volume":"90","author":"K Tamaki","year":"2014","unstructured":"Tamaki, K., Curty, M., Kato, G., Lo, H.K., Azuma, K.: Loss-tolerant quantum cryptography with imperfect sources. Phys. Rev. A 90(5), 052314 (2014)","journal-title":"Phys. Rev. A"},{"issue":"12","key":"3276_CR27","doi-asserted-by":"publisher","first-page":"122108","DOI":"10.1063\/1.2146188","volume":"46","author":"R K\u00f6nig","year":"2005","unstructured":"K\u00f6nig, R., Renner, R.: A de finetti representation for finite symmetric quantum states. J. Math. Phys. 46(12), 122108 (2005)","journal-title":"J. Math. Phys."},{"issue":"2","key":"3276_CR28","doi-asserted-by":"publisher","first-page":"020504","DOI":"10.1103\/PhysRevLett.102.020504","volume":"102","author":"M Christandl","year":"2009","unstructured":"Christandl, M., K\u00f6nig, R., Renner, R.: Postselection technique for quantum channels with applications to quantum cryptography. Phys. Rev. Lett. 102(2), 020504 (2009)","journal-title":"Phys. Rev. Lett."},{"issue":"2053","key":"3276_CR29","first-page":"207","volume":"461","author":"I Devetak","year":"2005","unstructured":"Devetak, I., Winter, A.: Distillation of secret key and entanglement from quantum states. Proc. R. Soc. A Math. Phys. Eng. Sci. 461(2053), 207\u2013235 (2005)","journal-title":"Proc. R. Soc. A Math. Phys. Eng. Sci."},{"issue":"1","key":"3276_CR30","doi-asserted-by":"publisher","first-page":"012332","DOI":"10.1103\/PhysRevA.72.012332","volume":"72","author":"R Renner","year":"2005","unstructured":"Renner, R., Gisin, N., Nicolas, K., Kraus, B.: Information-theoretic security proof for quantum-key-distribution protocols. Phys. Rev. A 72(1), 012332 (2005)","journal-title":"Phys. Rev. A"},{"issue":"4","key":"3276_CR31","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1007\/BF01646490","volume":"31","author":"M Fannes","year":"1973","unstructured":"Fannes, M.: A continuity property of the entropy density for spin lattice systems. Commun. Math. Phys. 31(4), 291\u2013294 (1973)","journal-title":"Commun. Math. Phys."},{"issue":"28","key":"3276_CR32","doi-asserted-by":"publisher","first-page":"8127","DOI":"10.1088\/1751-8113\/40\/28\/S18","volume":"40","author":"KMR Audenaert","year":"2007","unstructured":"Audenaert, K.M.R.: A sharp continuity estimate for the von neumann entropy. J. Phys. A Math. Theor. 40(28), 8127 (2007)","journal-title":"J. Phys. A Math. Theor."},{"issue":"1","key":"3276_CR33","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1007\/s00220-016-2609-8","volume":"347","author":"A Winter","year":"2016","unstructured":"Winter, A.: Tight uniform continuity bounds for quantum entropies: conditional entropy, relative entropy distance and energy constraints. Commun. Math. Phys. 347(1), 291\u2013313 (2016)","journal-title":"Commun. Math. Phys."},{"issue":"3","key":"3276_CR34","doi-asserted-by":"publisher","first-page":"032316","DOI":"10.1103\/PhysRevA.69.032316","volume":"69","author":"K Tamaki","year":"2004","unstructured":"Tamaki, K., L\u00fctkenhaus, N.: Unconditional security of the bennett 1992 quantum key-distribution protocol over a lossy and noisy channel. Phys. Rev. A 69(3), 032316 (2004)","journal-title":"Phys. Rev. A"},{"issue":"20","key":"3276_CR35","doi-asserted-by":"publisher","first-page":"200501","DOI":"10.1103\/PhysRevLett.100.200501","volume":"100","author":"V Scarani","year":"2008","unstructured":"Scarani, V., Renner, R.: Quantum cryptography with finite resources: unconditional security bound for discrete-variable protocols with one-way postprocessing. Phys. Rev. Lett. 100(20), 200501 (2008)","journal-title":"Phys. Rev. Lett."},{"issue":"12","key":"3276_CR36","doi-asserted-by":"publisher","first-page":"127902","DOI":"10.1103\/PhysRevLett.88.127902","volume":"88","author":"NJ Cerf","year":"2002","unstructured":"Cerf, N.J., Bourennane, M., Karlsson, A., Gisin, N.: Security of quantum key distribution using d-level systems. Phys. Rev. Lett. 88(12), 127902 (2002)","journal-title":"Phys. Rev. Lett."},{"key":"3276_CR37","doi-asserted-by":"publisher","first-page":"441","DOI":"10.1103\/PhysRevLett.85.441","volume":"85","author":"PW Shor","year":"2000","unstructured":"Shor, P.W., Preskill, J.: Simple proof of security of the bb84 quantum key distribution protocol. Phys. Rev. Lett. 85, 441\u2013444 (2000)","journal-title":"Phys. Rev. Lett."},{"issue":"4","key":"3276_CR38","doi-asserted-by":"publisher","first-page":"045018","DOI":"10.1088\/1367-2630\/11\/4\/045018","volume":"11","author":"M Koashi","year":"2009","unstructured":"Koashi, M.: Simple security proof of quantum key distribution based on complementarity. New J. Phys. 11(4), 045018 (2009)","journal-title":"New J. Phys."},{"issue":"9","key":"3276_CR39","doi-asserted-by":"publisher","first-page":"659","DOI":"10.1038\/nphys1734","volume":"6","author":"M Berta","year":"2010","unstructured":"Berta, M., Christandl, M., Colbeck, R., Renes, J.M., Renner, R.: The uncertainty principle in the presence of quantum memory. Nature Phys. 6(9), 659\u2013662 (2010)","journal-title":"Nature Phys."},{"issue":"2","key":"3276_CR40","doi-asserted-by":"publisher","first-page":"022610","DOI":"10.1103\/PhysRevA.103.022610","volume":"103","author":"JL Pereira","year":"2021","unstructured":"Pereira, J.L., Pirandola, S.: Bounds on amplitude-damping-channel discrimination. Phys. Rev. A 103(2), 022610 (2021)","journal-title":"Phys. Rev. A"},{"key":"3276_CR41","unstructured":"Zhan, Yongtao, Lo, Hoi-Kwong: Tomography-based quantum key distribution. arXiv preprintarXiv:2008.11628, 2020"},{"issue":"6","key":"3276_CR42","doi-asserted-by":"publisher","first-page":"062311","DOI":"10.1103\/PhysRevA.100.062311","volume":"100","author":"A Fonseca","year":"2019","unstructured":"Fonseca, A.: High-dimensional quantum teleportation under noisy environments. Phys. Rev. A 100(6), 062311 (2019)","journal-title":"Phys. Rev. A"},{"issue":"6","key":"3276_CR43","doi-asserted-by":"publisher","first-page":"4674","DOI":"10.1109\/TIT.2018.2790423","volume":"64","author":"M Grassl","year":"2018","unstructured":"Grassl, M., Kong, L., Wei, Z., Yin, Z.-Q., Zeng, B.: Quantum error-correcting codes for qudit amplitude damping. IEEE Trans. Inf. Theory 64(6), 4674\u20134685 (2018)","journal-title":"IEEE Trans. Inf. Theory"}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-021-03276-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11128-021-03276-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-021-03276-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,30]],"date-time":"2021-10-30T08:34:19Z","timestamp":1635582859000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11128-021-03276-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10]]},"references-count":43,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2021,10]]}},"alternative-id":["3276"],"URL":"https:\/\/doi.org\/10.1007\/s11128-021-03276-w","relation":{},"ISSN":["1570-0755","1573-1332"],"issn-type":[{"type":"print","value":"1570-0755"},{"type":"electronic","value":"1573-1332"}],"subject":[],"published":{"date-parts":[[2021,10]]},"assertion":[{"value":"22 June 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 September 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 October 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"344"}}