{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T01:23:23Z","timestamp":1775179403701,"version":"3.50.1"},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2024,4,12]],"date-time":"2024-04-12T00:00:00Z","timestamp":1712880000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,4,12]],"date-time":"2024-04-12T00:00:00Z","timestamp":1712880000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U2130205"],"award-info":[{"award-number":["U2130205"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"DOI":"10.1007\/s11128-024-04354-5","type":"journal-article","created":{"date-parts":[[2024,4,12]],"date-time":"2024-04-12T14:01:45Z","timestamp":1712930505000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Improving the security of quantum key distribution with multi-step advantage distillation"],"prefix":"10.1007","volume":"23","author":[{"given":"Chen-Peng","family":"Hao","sequence":"first","affiliation":[]},{"given":"Yang","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Yang","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Chun","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Yan-Yang","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Wan-Su","family":"Bao","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2392-3233","authenticated-orcid":false,"given":"Hong-Wei","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,4,12]]},"reference":[{"issue":"5410","key":"4354_CR1","doi-asserted-by":"publisher","first-page":"2050","DOI":"10.1126\/science.283.5410.2050","volume":"283","author":"HK Lo","year":"1999","unstructured":"Lo, H.K., Chau, H.F.: Unconditional security of quantum key distribution over arbitrarily long distances. Science 283(5410), 2050\u20132056 (1999)","journal-title":"Science"},{"issue":"2","key":"4354_CR2","doi-asserted-by":"publisher","first-page":"441","DOI":"10.1103\/PhysRevLett.85.441","volume":"85","author":"PW Shor","year":"2000","unstructured":"Shor, P.W., Preskill, J.: Simple proof of security of the BB84 quantum key distribution protocol. Phys. Rev. Lett. 85(2), 441 (2000)","journal-title":"Phys. Rev. Lett."},{"issue":"01","key":"4354_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1142\/S0219749908003256","volume":"6","author":"R Renner","year":"2008","unstructured":"Renner, R.: Security of quantum key distribution. Int. J. Quantum Inf. 6(01), 1\u2013127 (2008)","journal-title":"Int. J. Quantum Inf."},{"issue":"3","key":"4354_CR4","doi-asserted-by":"publisher","first-page":"733","DOI":"10.1109\/18.256484","volume":"39","author":"UM Maurer","year":"1993","unstructured":"Maurer, U.M.: Secret key agreement by public discussion from common information. IEEE Trans. Inf. Theory 39(3), 733\u2013742 (1993)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"4354_CR5","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1016\/j.tcs.2014.05.025","volume":"560","author":"CH Bennett","year":"2014","unstructured":"Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. Theor. Comput. Sci. 560, 7\u201311 (2014)","journal-title":"Theor. Comput. Sci."},{"issue":"14","key":"4354_CR6","doi-asserted-by":"publisher","first-page":"3018","DOI":"10.1103\/PhysRevLett.81.3018","volume":"81","author":"D Bru\u00df","year":"1998","unstructured":"Bru\u00df, D.: Optimal eavesdropping in quantum cryptography with six states. Phys. Rev. Lett. 81(14), 3018 (1998)","journal-title":"Phys. Rev. Lett."},{"issue":"1","key":"4354_CR7","doi-asserted-by":"publisher","first-page":"012332","DOI":"10.1103\/PhysRevA.72.012332","volume":"72","author":"R Renner","year":"2005","unstructured":"Renner, R., Gisin, N., Kraus, B.: Information-theoretic security proof for quantum-key-distribution protocols. Phys. Rev. A 72(1), 012332 (2005)","journal-title":"Phys. Rev. A"},{"issue":"6","key":"4354_CR8","doi-asserted-by":"publisher","first-page":"062321","DOI":"10.1103\/PhysRevA.101.062321","volume":"101","author":"G Murta","year":"2020","unstructured":"Murta, G., Rozp\u0119dek, F., Ribeiro, J., et al.: Key rates for quantum key distribution protocols with asymmetric noise. Phys. Rev. A 101(6), 062321 (2020)","journal-title":"Phys. Rev. A"},{"issue":"1","key":"4354_CR9","doi-asserted-by":"publisher","first-page":"012327","DOI":"10.1103\/PhysRevA.73.012327","volume":"73","author":"A Ac\u00edn","year":"2006","unstructured":"Ac\u00edn, A., Bae, J., Bagan, E., et al.: Secrecy properties of quantum channels. Phys. Rev. A 73(1), 012327 (2006)","journal-title":"Phys. Rev. A"},{"issue":"6","key":"4354_CR10","doi-asserted-by":"publisher","first-page":"060302","DOI":"10.1103\/PhysRevA.66.060302","volume":"66","author":"HF Chau","year":"2002","unstructured":"Chau, H.F.: Practical scheme to share a secret key through a quantum channel with a 27.6% bit error rate. Phys. Rev. A 66(6), 060302 (2002)","journal-title":"Phys. Rev. A"},{"issue":"2","key":"4354_CR11","doi-asserted-by":"publisher","first-page":"020502","DOI":"10.1103\/PhysRevLett.124.020502","volume":"124","author":"EYZ Tan","year":"2020","unstructured":"Tan, E.Y.Z., Lim, C.C.W., Renner, R.: Advantage distillation for device-independent quantum key distribution. Phys. Rev. Lett. 124(2), 020502 (2020)","journal-title":"Phys. Rev. Lett."},{"key":"4354_CR12","unstructured":"Stasiuk, M., Lutkenhaus, N., Tan, E.Y.Z.: The quantum Chernoff divergence in advantage distillation for QKD and DIQKD. arXiv:2212.06975 (2022)"},{"issue":"1","key":"4354_CR13","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1088\/1367-2630\/4\/1\/344","volume":"4","author":"N L\u00fctkenhaus","year":"2002","unstructured":"L\u00fctkenhaus, N., Jahma, M.: Quantum key distribution with realistic states: photon-number statistics in the photon-number splitting attack. New J. Phys. 4(1), 44 (2002)","journal-title":"New J. Phys."},{"issue":"5","key":"4354_CR14","doi-asserted-by":"publisher","first-page":"057901","DOI":"10.1103\/PhysRevLett.91.057901","volume":"91","author":"WY Hwang","year":"2003","unstructured":"Hwang, W.Y.: Quantum key distribution with high loss: toward global secure communication. Phys. Rev. Lett. 91(5), 057901 (2003)","journal-title":"Phys. Rev. Lett."},{"issue":"23","key":"4354_CR15","doi-asserted-by":"publisher","first-page":"230503","DOI":"10.1103\/PhysRevLett.94.230503","volume":"94","author":"XB Wang","year":"2005","unstructured":"Wang, X.B.: Beating the photon-number-splitting attack in practical quantum cryptography. Phys. Rev. Lett. 94(23), 230503 (2005)","journal-title":"Phys. Rev. Lett."},{"issue":"23","key":"4354_CR16","doi-asserted-by":"publisher","first-page":"230504","DOI":"10.1103\/PhysRevLett.94.230504","volume":"94","author":"HK Lo","year":"2005","unstructured":"Lo, H.K., Ma, X.F., Chen, K.: Decoy state quantum key distribution. Phys. Rev. Lett. 94(23), 230504 (2005)","journal-title":"Phys. Rev. Lett."},{"issue":"1","key":"4354_CR17","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1038\/s42005-022-00831-4","volume":"5","author":"HW Li","year":"2022","unstructured":"Li, H.W., Zhang, C.M., Jiang, M.S., et al.: Improving the performance of practical decoy-state quantum key distribution with advantage distillation technology. Commun. Phys. 5(1), 53 (2022)","journal-title":"Commun. Phys."},{"issue":"5","key":"4354_CR18","doi-asserted-by":"publisher","first-page":"052333","DOI":"10.1103\/PhysRevA.89.052333","volume":"89","author":"FH Xu","year":"2014","unstructured":"Xu, F.H., Xu, H., Lo, H.K.: Protocol choice and parameter optimization in decoy-state measurement-device-independent quantum key distribution. Phys. Rev. A 89(5), 052333 (2014)","journal-title":"Phys. Rev. A"},{"issue":"19","key":"4354_CR19","doi-asserted-by":"publisher","first-page":"3762","DOI":"10.1063\/1.1738173","volume":"84","author":"C Gobby","year":"2004","unstructured":"Gobby, C., Yuan, Z.L., Shields, A.J.: Quantum key distribution over 122 km of standard telecom fiber. Appl. Phys. Lett. 84(19), 3762\u20133764 (2004)","journal-title":"Appl. Phys. Lett."},{"issue":"7","key":"4354_CR20","doi-asserted-by":"publisher","first-page":"481","DOI":"10.1038\/nphys629","volume":"3","author":"R Ursin","year":"2007","unstructured":"Ursin, R., Tiefenbacher, F., Schmitt-Manderbach, T., et al.: Entanglement-based quantum communication over 144 km. Nat. Phys. 3(7), 481\u2013486 (2007)","journal-title":"Nat. Phys."},{"issue":"7","key":"4354_CR21","doi-asserted-by":"publisher","first-page":"073049","DOI":"10.1088\/1367-2630\/ac8115","volume":"24","author":"RQ Wang","year":"2022","unstructured":"Wang, R.Q., Zhang, C.M., Yin, Z.Q., et al.: Phase-matching quantum key distribution with advantage distillation. New J. Phys. 24(7), 073049 (2022)","journal-title":"New J. Phys."},{"issue":"1","key":"4354_CR22","doi-asserted-by":"publisher","first-page":"15043","DOI":"10.1038\/ncomms15043","volume":"8","author":"S Pirandola","year":"2017","unstructured":"Pirandola, S., Laurenza, R., Ottaviani, C., et al.: Fundamental limits of repeaterless quantum communications. Nat. Commun. 8(1), 15043 (2017)","journal-title":"Nat. Commun."},{"issue":"3","key":"4354_CR23","doi-asserted-by":"publisher","first-page":"1301","DOI":"10.1103\/RevModPhys.81.1301","volume":"81","author":"V Scarani","year":"2009","unstructured":"Scarani, V., Bechmann-Pasquinucci, H., Cerf, N.J., et al.: The security of practical quantum key distribution. Rev. Modern Phys. 81(3), 1301 (2009)","journal-title":"Rev. Modern Phys."},{"issue":"11","key":"4354_CR24","doi-asserted-by":"publisher","first-page":"1237","DOI":"10.1360\/132012-761","volume":"42","author":"HW Li","year":"2012","unstructured":"Li, H.W., Chen, W., Yao, Y., et al.: Security of quantum key distribution. SCIENTIA SINICA Phys. Mech. Astron. 42(11), 1237\u201355 (2012)","journal-title":"SCIENTIA SINICA Phys. Mech. Astron."},{"issue":"5","key":"4354_CR25","first-page":"325","volume":"4","author":"D Gottesman","year":"2004","unstructured":"Gottesman, D., Lo, H.K., Lutkenhaus, N., et al.: Security of quantum key distribution with imperfect devices. Quantum Inf. Comput. 4(5), 325\u201360 (2004)","journal-title":"Quantum Inf. Comput."},{"issue":"7841","key":"4354_CR26","doi-asserted-by":"publisher","first-page":"214","DOI":"10.1038\/s41586-020-03093-8","volume":"589","author":"YA Chen","year":"2021","unstructured":"Chen, Y.A., Zhang, Q., Chen, T.Y., et al.: An integrated space-to-ground quantum communication network over 4600 km. Nature 589(7841), 214\u2013219 (2021)","journal-title":"Nature"}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-024-04354-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11128-024-04354-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-024-04354-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,30]],"date-time":"2024-04-30T18:19:19Z","timestamp":1714501159000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11128-024-04354-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4,12]]},"references-count":26,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2024,4]]}},"alternative-id":["4354"],"URL":"https:\/\/doi.org\/10.1007\/s11128-024-04354-5","relation":{},"ISSN":["1573-1332"],"issn-type":[{"value":"1573-1332","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,4,12]]},"assertion":[{"value":"5 April 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 March 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 April 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"We declare that we have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"148"}}