{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,11]],"date-time":"2026-05-11T10:27:53Z","timestamp":1778495273692,"version":"3.51.4"},"reference-count":56,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2025,2,1]],"date-time":"2025-02-01T00:00:00Z","timestamp":1738368000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,2,1]],"date-time":"2025-02-01T00:00:00Z","timestamp":1738368000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100004281","name":"Narodowe Centrum Nauki","doi-asserted-by":"publisher","award":["2018\/31\/B\/ST6\/00820"],"award-info":[{"award-number":["2018\/31\/B\/ST6\/00820"]}],"id":[{"id":"10.13039\/501100004281","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001870","name":"Fundacja na rzecz Nauki Polskiej","doi-asserted-by":"publisher","award":["2018\/MAB\/5"],"award-info":[{"award-number":["2018\/MAB\/5"]}],"id":[{"id":"10.13039\/501100001870","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100005632","name":"Narodowe Centrum Bada\u0144 i Rozwoju","doi-asserted-by":"publisher","award":["QUANTERA\/2\/2020"],"award-info":[{"award-number":["QUANTERA\/2\/2020"]}],"id":[{"id":"10.13039\/501100005632","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100020625","name":"Wallenberg Center for Quantum Technology, Chalmers University of Technology","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100020625","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"DOI":"10.1007\/s11128-025-04650-8","type":"journal-article","created":{"date-parts":[[2025,2,1]],"date-time":"2025-02-01T08:42:39Z","timestamp":1738399359000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["How decoherence affects the security of BB84 quantum key distribution protocol"],"prefix":"10.1007","volume":"24","author":[{"given":"Robert","family":"Oku\u0142a","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Piotr","family":"Mironowicz","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2025,2,1]]},"reference":[{"issue":"4","key":"4650_CR1","doi-asserted-by":"publisher","first-page":"1012","DOI":"10.1364\/AOP.361502","volume":"12","author":"S Pirandola","year":"2020","unstructured":"Pirandola, S., Andersen, U.L., Banchi, L., Berta, M., Bunandar, D., Colbeck, R., Englund, D., Gehring, T., Lupo, C., Ottaviani, C., et al.: Advances in quantum cryptography. Adv. Opt. Photonics 12(4), 1012\u20131236 (2020). https:\/\/doi.org\/10.1364\/AOP.361502","journal-title":"Adv. Opt. Photonics"},{"issue":"01","key":"4650_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1142\/S0219749908003256","volume":"6","author":"R Renner","year":"2008","unstructured":"Renner, R.: Security of quantum key distribution. Int. J. Quantum Inf. 6(01), 1\u2013127 (2008). https:\/\/doi.org\/10.1142\/S0219749908003256","journal-title":"Int. J. Quantum Inf."},{"issue":"6","key":"4650_CR3","doi-asserted-by":"publisher","first-page":"661","DOI":"10.1103\/PhysRevLett.67.661","volume":"67","author":"AK Ekert","year":"1991","unstructured":"Ekert, A.K.: Quantum cryptography based on Bell\u2019s theorem. Phys. Rev. Lett. 67(6), 661 (1991). https:\/\/doi.org\/10.1103\/PhysRevLett.67.661","journal-title":"Phys. Rev. Lett."},{"issue":"1","key":"4650_CR4","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.95.010503","volume":"95","author":"J Barrett","year":"2005","unstructured":"Barrett, J., Hardy, L., Kent, A.: No signaling and quantum key distribution. Phys. Rev. Lett. 95(1), 010503 (2005). https:\/\/doi.org\/10.1103\/PhysRevLett.95.010503","journal-title":"Phys. Rev. Lett."},{"key":"4650_CR5","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1016\/j.tcs.2011.08.039","volume":"560","author":"C Bennett","year":"1984","unstructured":"Bennett, C., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. Theoret. Comput. Sci. 560, 175\u2013179 (1984). https:\/\/doi.org\/10.1016\/j.tcs.2011.08.039","journal-title":"Theoret. Comput. Sci."},{"key":"4650_CR6","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/BF00191318","volume":"5","author":"CH Bennett","year":"1992","unstructured":"Bennett, C.H., Bessette, F., Brassard, G., Salvail, L., Smolin, J.: Experimental quantum cryptography. J. Cryptol. 5, 3\u201328 (1992). https:\/\/doi.org\/10.1007\/BF00191318","journal-title":"J. Cryptol."},{"issue":"21","key":"4650_CR7","doi-asserted-by":"publisher","first-page":"3121","DOI":"10.1103\/PhysRevLett.68.3121","volume":"68","author":"CH Bennett","year":"1992","unstructured":"Bennett, C.H.: Quantum cryptography using any two nonorthogonal states. Phys. Rev. Lett. 68(21), 3121 (1992). https:\/\/doi.org\/10.1103\/PhysRevLett.68.3121","journal-title":"Phys. Rev. Lett."},{"issue":"1","key":"4650_CR8","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.84.010302","volume":"84","author":"M Paw\u0142owski","year":"2011","unstructured":"Paw\u0142owski, M., Brunner, N.: Semi-device-independent security of one-way quantum key distribution. Phys. Rev. A 84(1), 010302 (2011). https:\/\/doi.org\/10.1103\/PhysRevA.84.010302","journal-title":"Phys. Rev. A"},{"key":"4650_CR9","series-title":"The Frontiers Collection","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-35775-9","volume-title":"Decoherence: And The Quantum-to-Classical Transition","author":"M Schlosshauer","year":"2007","unstructured":"Schlosshauer, M.: Decoherence: And The Quantum-to-Classical Transition. The Frontiers Collection, Springer, Berlin Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-3-540-35775-9"},{"issue":"5711","key":"4650_CR10","doi-asserted-by":"publisher","first-page":"871","DOI":"10.1126\/science.1109541","volume":"307","author":"AJ Leggett","year":"2005","unstructured":"Leggett, A.J.: The quantum measurement problem. Science 307(5711), 871\u2013872 (2005). https:\/\/doi.org\/10.1126\/science.1109541","journal-title":"Science"},{"issue":"4","key":"4650_CR11","doi-asserted-by":"publisher","first-page":"1267","DOI":"10.1103\/revmodphys.76.1267","volume":"76","author":"M Schlosshauer","year":"2005","unstructured":"Schlosshauer, M.: Decoherence, the measurement problem, and interpretations of quantum mechanics. Rev. Mod. Phys. 76(4), 1267\u20131305 (2005). https:\/\/doi.org\/10.1103\/revmodphys.76.1267","journal-title":"Rev. Mod. Phys."},{"issue":"1","key":"4650_CR12","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1119\/1.1969254","volume":"31","author":"EP Wigner","year":"1963","unstructured":"Wigner, E.P.: The problem of measurement. Am. J. Phys. 31(1), 6\u201315 (1963). https:\/\/doi.org\/10.1119\/1.1969254","journal-title":"Am. J. Phys."},{"key":"4650_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/BF00670071","volume":"24","author":"D Deutsch","year":"1985","unstructured":"Deutsch, D.: Quantum theory as a universal physical theory. Int. J. Theor. Phys. 24, 1\u201341 (1985). https:\/\/doi.org\/10.1007\/BF00670071","journal-title":"Int. J. Theor. Phys."},{"issue":"3","key":"4650_CR14","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1038\/nphys1202","volume":"5","author":"WH \u017burek","year":"2009","unstructured":"\u017burek, W.H.: Quantum darwinism. Nat. Phys. 5(3), 181\u2013188 (2009). https:\/\/doi.org\/10.1038\/nphys1202","journal-title":"Nat. Phys."},{"key":"4650_CR15","doi-asserted-by":"publisher","first-page":"1516","DOI":"10.1103\/PhysRevD.24.1516","volume":"24","author":"WH \u017burek","year":"1981","unstructured":"\u017burek, W.H.: Pointer basis of quantum apparatus: into what mixture does the wave packet collapse? Phys. Rev. D 24, 1516\u20131525 (1981). https:\/\/doi.org\/10.1103\/PhysRevD.24.1516","journal-title":"Phys. Rev. D"},{"key":"4650_CR16","doi-asserted-by":"publisher","first-page":"1862","DOI":"10.1103\/PhysRevD.26.1862","volume":"26","author":"WH \u017burek","year":"1982","unstructured":"\u017burek, W.H.: Environment-induced superselection rules. Phys. Rev. D 26, 1862\u20131880 (1982). https:\/\/doi.org\/10.1103\/PhysRevD.26.1862","journal-title":"Phys. Rev. D"},{"key":"4650_CR17","series-title":"Synthese Library","doi-asserted-by":"publisher","first-page":"386","DOI":"10.1007\/978-94-010-1120-4","volume-title":"The Scientific World-Perspective and Other Essays 1931\u20131963","author":"K Ajdukiewicz","year":"1977","unstructured":"Ajdukiewicz, K.: The Scientific World-Perspective and Other Essays 1931\u20131963. Synthese Library, 1st edn., p. 386. Springer, Dordrecht (1977). https:\/\/doi.org\/10.1007\/978-94-010-1120-4","edition":"1"},{"issue":"2","key":"4650_CR18","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.98.022124","volume":"98","author":"P Mironowicz","year":"2018","unstructured":"Mironowicz, P., Nale\u017cyty, P., Horodecki, P., Korbicz, J.K.: System information propagation for composite structures. Phys. Rev. A 98(2), 022124 (2018). https:\/\/doi.org\/10.1103\/PhysRevA.98.022124","journal-title":"Phys. Rev. A"},{"issue":"3","key":"4650_CR19","doi-asserted-by":"publisher","first-page":"715","DOI":"10.1103\/RevModPhys.75.715","volume":"75","author":"WH \u017burek","year":"2003","unstructured":"\u017burek, W.H.: Decoherence, einselection, and the quantum origins of the classical. Rev. Mod. Phys. 75(3), 715 (2003). https:\/\/doi.org\/10.1103\/RevModPhys.75.715","journal-title":"Rev. Mod. Phys."},{"issue":"11","key":"4650_CR20","doi-asserted-by":"publisher","DOI":"10.1088\/1367-2630\/aca558","volume":"24","author":"P Mironowicz","year":"2022","unstructured":"Mironowicz, P.: Quantum security and theory of decoherence. New J. Phys. 24(11), 113054 (2022). https:\/\/doi.org\/10.1088\/1367-2630\/aca558","journal-title":"New J. Phys."},{"issue":"4","key":"4650_CR21","doi-asserted-by":"publisher","first-page":"269","DOI":"10.1016\/0167-4048(85)90046-X","volume":"4","author":"W Van Eck","year":"1985","unstructured":"Van Eck, W.: Electromagnetic radiation from video display units: an eavesdropping risk? Comput. Secur. 4(4), 269\u2013286 (1985). https:\/\/doi.org\/10.1016\/0167-4048(85)90046-X","journal-title":"Comput. Secur."},{"key":"4650_CR22","series-title":"Secure Integrated Circuits and Systems","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1007\/978-0-387-71829-3_2","volume-title":"Introduction to Side-Channel Attacks","author":"F-X Standaert","year":"2010","unstructured":"Standaert, F.-X.: Introduction to Side-Channel Attacks. Secure Integrated Circuits and Systems, pp. 27\u201342. Springer, Cham (2010). https:\/\/doi.org\/10.1007\/978-0-387-71829-3_2"},{"key":"4650_CR23","doi-asserted-by":"publisher","first-page":"151","DOI":"10.5555\/1267115.1267132","volume":"99","author":"TS Messerges","year":"1999","unstructured":"Messerges, T.S., Dabbish, E.A., Sloan, R.H.: Investigations of power analysis attacks on smartcards. Smartcard 99, 151\u2013161 (1999). https:\/\/doi.org\/10.5555\/1267115.1267132","journal-title":"Smartcard"},{"issue":"3","key":"4650_CR24","doi-asserted-by":"publisher","first-page":"262","DOI":"10.1145\/545186.545189","volume":"5","author":"J Loughry","year":"2002","unstructured":"Loughry, J., Umphress, D.A.: Information leakage from optical emanations. ACM Trans. Inf. Syst. Secur. (TISSEC) 5(3), 262\u2013289 (2002). https:\/\/doi.org\/10.1145\/545186.545189","journal-title":"ACM Trans. Inf. Syst. Secur. (TISSEC)"},{"key":"4650_CR25","doi-asserted-by":"publisher","unstructured":"Kuhn, M.G.: Security limits for compromising emanations. In: Cryptographic Hardware and Embedded Systems\u2013CHES 2005: 7th International Workshop, Edinburgh, UK, August 29\u2013September 1, 2005. Proceedings 7, pp. 265\u2013279. Springer. https:\/\/doi.org\/10.1007\/11545262_20 (2005)","DOI":"10.1007\/11545262_20"},{"key":"4650_CR26","doi-asserted-by":"publisher","unstructured":"Tanaka, H.: Information leakage via electromagnetic emanations and evaluation of tempest countermeasures. In: Information Systems Security: Third International Conference, ICISS 2007, Delhi, India, December 16\u201320, 2007. Proceedings 3, pp. 167\u2013179. Springer. https:\/\/doi.org\/10.1007\/978-3-540-77086-2_13 (2007)","DOI":"10.1007\/978-3-540-77086-2_13"},{"issue":"5\u20136","key":"4650_CR27","doi-asserted-by":"publisher","first-page":"367","DOI":"10.1016\/j.compeleceng.2007.05.009","volume":"33","author":"E De Mulder","year":"2007","unstructured":"De Mulder, E., \u00d6rs, S.B., Preneel, B., Verbauwhede, I.: Differential power and electromagnetic attacks on a FPGA implementation of elliptic curve cryptosystems. Comput. Electr. Eng. 33(5\u20136), 367\u2013382 (2007). https:\/\/doi.org\/10.1016\/j.compeleceng.2007.05.009","journal-title":"Comput. Electr. Eng."},{"issue":"3","key":"4650_CR28","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3351256","volume":"3","author":"A Maiti","year":"2019","unstructured":"Maiti, A., Jadliwala, M.: Light ears: information leakage via smart lights. Proc. ACM Interact. Mobile Wearable Ubiquitous Technol. 3(3), 1\u201327 (2019). https:\/\/doi.org\/10.1145\/3351256","journal-title":"Proc. ACM Interact. Mobile Wearable Ubiquitous Technol."},{"key":"4650_CR29","doi-asserted-by":"publisher","unstructured":"Morales-Aguilar, S., Kasmi, C., Meriac, M., Vega, F., Alyafei, F.: Digital images preprocessing for optical character recognition in video frames reconstructed from compromising electromagnetic emanations from video cables. In: 2020 XXXIIIrd General Assembly and Scientific Symposium of the International Union of Radio Science, pp. 1\u20134. IEEE. https:\/\/doi.org\/10.23919\/URSIGASS49373.2020.9232388 (2020)","DOI":"10.23919\/URSIGASS49373.2020.9232388"},{"key":"4650_CR30","doi-asserted-by":"publisher","unstructured":"Nassi, B., Pirutin, Y., Galor, T., Elovici, Y., Zadov, B.: Glowworm attack: optical tempest sound recovery via a device\u2019s power indicator led. In: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, pp. 1900\u20131914. https:\/\/doi.org\/10.1145\/3460120.3484775 (2021)","DOI":"10.1145\/3460120.3484775"},{"key":"4650_CR31","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1007\/s41635-021-00112-6","volume":"5","author":"C Lavaud","year":"2021","unstructured":"Lavaud, C., Gerzaguet, R., Gautier, M., Berder, O., Nogues, E., Molton, S.: Whispering devices: a survey on how side-channels lead to compromised information. J. Hardw. Syst. Secur. 5, 143\u2013168 (2021). https:\/\/doi.org\/10.1007\/s41635-021-00112-6","journal-title":"J. Hardw. Syst. Secur."},{"key":"4650_CR32","doi-asserted-by":"publisher","first-page":"73997","DOI":"10.1109\/ACCESS.2022.3184294","volume":"10","author":"E Lee","year":"2022","unstructured":"Lee, E., Choi, D.-H., Nam, T., Yook, J.-G.: A quantitative analysis of compromising emanation from TMDS interface and possibility of sensitive information leakage. IEEE Access 10, 73997\u201374011 (2022). https:\/\/doi.org\/10.1109\/ACCESS.2022.3184294","journal-title":"IEEE Access"},{"key":"4650_CR33","doi-asserted-by":"publisher","unstructured":"Paz, J.P., \u017burek, W.H.: Environment-induced decoherence and the transition from quantum to classical. In: Fundamentals of Quantum Information: Quantum Computation, Communication, Decoherence and All That, pp. 77\u2013148. Springer. https:\/\/doi.org\/10.1007\/3-540-45933-2 (2002)","DOI":"10.1007\/3-540-45933-2"},{"key":"4650_CR34","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1017\/CBO9780511814990.010","volume-title":"Quantum Darwinism and Envariance","author":"WH \u017burek","year":"2004","unstructured":"\u017burek, W.H.: Quantum Darwinism and Envariance, pp. 121\u2013137. Cambridge University Press, Cambridge (2004). https:\/\/doi.org\/10.1017\/CBO9780511814990.010"},{"issue":"22","key":"4650_CR35","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.93.220401","volume":"93","author":"H Ollivier","year":"2004","unstructured":"Ollivier, H., Poulin, D., \u017burek, W.H.: Objective properties from subjective quantum states: environment as a witness. Phys. Rev. Lett. 93(22), 220401 (2004). https:\/\/doi.org\/10.1103\/PhysRevLett.93.220401","journal-title":"Phys. Rev. Lett."},{"key":"4650_CR36","doi-asserted-by":"publisher","unstructured":"Herbut, F.: A review of unitary quantum premeasurement theory an algebraic study of basic kinds of premeasurements. arXiv:1412.7862, https:\/\/doi.org\/10.48550\/arXiv.1412.7862 (2014)","DOI":"10.48550\/arXiv.1412.7862"},{"issue":"1743","key":"4650_CR37","doi-asserted-by":"publisher","first-page":"1793","DOI":"10.1098\/rsta.1998.0250","volume":"356","author":"WH \u017burek","year":"1998","unstructured":"\u017burek, W.H.: Decoherence, einselection and the existential interpretation (the rough guide). Philos. Trans. R. Soc. Lond. Ser. A Math. Phys. Eng. Sci. 356(1743), 1793\u20131821 (1998). https:\/\/doi.org\/10.1098\/rsta.1998.0250","journal-title":"Philos. Trans. R. Soc. Lond. Ser. A Math. Phys. Eng. Sci."},{"issue":"11\u201312","key":"4650_CR38","doi-asserted-by":"publisher","first-page":"855","DOI":"10.1002\/andp.200051211-1204","volume":"512","author":"WH \u017burek","year":"2000","unstructured":"\u017burek, W.H.: Einselection and decoherence from an information theory perspective. Ann. Phys. 512(11\u201312), 855\u2013864 (2000). https:\/\/doi.org\/10.1002\/andp.200051211-1204","journal-title":"Ann. Phys."},{"key":"4650_CR39","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.118.150501","volume":"118","author":"P Mironowicz","year":"2017","unstructured":"Mironowicz, P., Korbicz, J.K., Horodecki, P.: Monitoring of the process of system information broadcasting in time. Phys. Rev. Lett. 118, 150501 (2017). https:\/\/doi.org\/10.1103\/PhysRevLett.118.150501","journal-title":"Phys. Rev. Lett."},{"issue":"04","key":"4650_CR40","doi-asserted-by":"publisher","first-page":"535","DOI":"10.1142\/S0219749910006502","volume":"8","author":"T Durt","year":"2010","unstructured":"Durt, T., Englert, B.-G., Bengtsson, I., \u017byczkowski, K.: On mutually unbiased bases. Int. J. Quantum Inf. 8(04), 535\u2013640 (2010). https:\/\/doi.org\/10.1142\/S0219749910006502","journal-title":"Int. J. Quantum Inf."},{"issue":"8","key":"4650_CR41","doi-asserted-by":"publisher","first-page":"4973","DOI":"10.1109\/TIT.2014.2329417","volume":"60","author":"L Masanes","year":"2014","unstructured":"Masanes, L., Renner, R., Christandl, M., Winter, A., Barrett, J.: Full security of quantum key distribution from no-signaling constraints. IEEE Trans. Inf. Theory 60(8), 4973\u20134986 (2014). https:\/\/doi.org\/10.1109\/TIT.2014.2329417","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"5","key":"4650_CR42","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.72.052113","volume":"72","author":"F Cucchietti","year":"2005","unstructured":"Cucchietti, F., Paz, J.P., \u017burek, W.: Decoherence from spin environments. Phys. Rev. A 72(5), 052113 (2005). https:\/\/doi.org\/10.1103\/PhysRevA.72.052113","journal-title":"Phys. Rev. A"},{"issue":"1","key":"4650_CR43","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.128.010401","volume":"128","author":"A Touil","year":"2022","unstructured":"Touil, A., Yan, B., Girolami, D., Deffner, S., \u017burek, W.H.: Eavesdropping on the decohering environment: quantum darwinism, amplification, and the origin of objective classical reality. Phys. Rev. Lett. 128(1), 010401 (2022). https:\/\/doi.org\/10.1103\/PhysRevLett.128.010401","journal-title":"Phys. Rev. Lett."},{"issue":"4","key":"4650_CR44","doi-asserted-by":"publisher","first-page":"269","DOI":"10.1016\/0167-4048(85)90046-X","volume":"4","author":"W van Eck","year":"1985","unstructured":"van Eck, W.: Electromagnetic radiation from video display units: an eavesdropping risk? Comput. Secur. 4(4), 269\u2013286 (1985). https:\/\/doi.org\/10.1016\/0167-4048(85)90046-X","journal-title":"Comput. Secur."},{"issue":"2","key":"4650_CR45","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1007\/BF01007479","volume":"1","author":"CW Helstrom","year":"1969","unstructured":"Helstrom, C.W.: Quantum detection and estimation theory. J. Stat. Phys. 1(2), 231\u2013252 (1969). https:\/\/doi.org\/10.1007\/BF01007479","journal-title":"J. Stat. Phys."},{"issue":"4","key":"4650_CR46","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1016\/0047-259X(73)90028-6","volume":"3","author":"AS Holevo","year":"1973","unstructured":"Holevo, A.S.: Statistical decision theory for quantum systems. J. Multivar. Anal. 3(4), 337\u2013394 (1973). https:\/\/doi.org\/10.1016\/0047-259X(73)90028-6","journal-title":"J. Multivar. Anal."},{"issue":"3","key":"4650_CR47","doi-asserted-by":"publisher","first-page":"339","DOI":"10.1109\/TIT.1978.1055892","volume":"24","author":"I Csiszar","year":"1978","unstructured":"Csiszar, I., Korner, J.: Broadcast channels with confidential messages. IEEE Trans. Inf. Theory 24(3), 339\u2013348 (1978). https:\/\/doi.org\/10.1109\/TIT.1978.1055892","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"11","key":"4650_CR48","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.103.110402","volume":"103","author":"M Zwolak","year":"2009","unstructured":"Zwolak, M., Quan, H.T., \u017burek, W.H.: Quantum darwinism in a mixed environment. Phys. Rev. Lett. 103(11), 110402 (2009). https:\/\/doi.org\/10.1103\/PhysRevLett.103.110402","journal-title":"Phys. Rev. Lett."},{"issue":"6","key":"4650_CR49","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.81.062110","volume":"81","author":"M Zwolak","year":"2010","unstructured":"Zwolak, M., Quan, H., \u017burek, W.H.: Redundant imprinting of information in nonideal environments: objective reality via a noisy channel. Phys. Rev. A 81(6), 062110 (2010). https:\/\/doi.org\/10.1103\/PhysRevA.81.062110","journal-title":"Phys. Rev. A"},{"key":"4650_CR50","doi-asserted-by":"publisher","first-page":"1857","DOI":"10.1007\/s10701-005-7352-5","volume":"35","author":"R Blume-Kohout","year":"2005","unstructured":"Blume-Kohout, R., Zurek, W.H.: A simple example of quantum darwinism: redundant information storage in many-spin environments. Found. Phys. 35, 1857\u20131876 (2005). https:\/\/doi.org\/10.1007\/s10701-005-7352-5","journal-title":"Found. Phys."},{"issue":"9","key":"4650_CR51","doi-asserted-by":"publisher","first-page":"580","DOI":"10.1016\/j.scib.2019.03.032","volume":"64","author":"M-C Chen","year":"2019","unstructured":"Chen, M.-C., Zhong, H.-S., Li, Y., Wu, D., Wang, X.-L., Li, L., Liu, N.-L., Lu, C.-Y., Pan, J.-W.: Emergence of classical objectivity of quantum Darwinism in a photonic quantum simulator. Sci. Bull. 64(9), 580\u2013585 (2019). https:\/\/doi.org\/10.1016\/j.scib.2019.03.032","journal-title":"Sci. Bull."},{"issue":"1","key":"4650_CR52","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.100.012101","volume":"100","author":"N Milazzo","year":"2019","unstructured":"Milazzo, N., Lorenzo, S., Paternostro, M., Palma, G.M.: Role of information backflow in the emergence of quantum darwinism. Phys. Rev. A 100(1), 012101 (2019). https:\/\/doi.org\/10.1103\/PhysRevA.100.012101","journal-title":"Phys. Rev. A"},{"issue":"8","key":"4650_CR53","doi-asserted-by":"publisher","first-page":"995","DOI":"10.3390\/e23080995","volume":"23","author":"B \u00c7akmak","year":"2021","unstructured":"\u00c7akmak, B., M\u00fcstecapl\u0131o\u011flu, \u00d6.E., Paternostro, M., Vacchini, B., Campbell, S.: Quantum darwinism in a composite system: objectivity versus classicality. Entropy 23(8), 995 (2021). https:\/\/doi.org\/10.3390\/e23080995","journal-title":"Entropy"},{"key":"4650_CR54","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1007\/978-1-4613-2181-1_10","volume-title":"Frontiers of Nonequilibrium Statistical Physics","author":"WH Zurek","year":"1986","unstructured":"Zurek, W.H.: Reduction of the wavepacket: how long does it take? In: Frontiers of Nonequilibrium Statistical Physics, pp. 145\u2013149. Springer, Cham (1986)"},{"key":"4650_CR55","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1007\/11423409_7","volume-title":"Privacy Enhancing Technologies","author":"MG Kuhn","year":"2005","unstructured":"Kuhn, M.G.: Electromagnetic eavesdropping risks of flat-panel displays. In: Martin, D., Serjantov, A. (eds.) Privacy Enhancing Technologies, pp. 88\u2013107. Springer, Berlin, Heidelberg (2005)"},{"key":"4650_CR56","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.98.020101","volume":"98","author":"MA Ciampini","year":"2018","unstructured":"Ciampini, M.A., Pinna, G., Mataloni, P., Paternostro, M.: Experimental signature of quantum darwinism in photonic cluster states. Phys. Rev. A 98, 020101 (2018). https:\/\/doi.org\/10.1103\/PhysRevA.98.020101","journal-title":"Phys. Rev. A"}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-025-04650-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11128-025-04650-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-025-04650-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,17]],"date-time":"2025-03-17T04:01:23Z","timestamp":1742184083000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11128-025-04650-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,2,1]]},"references-count":56,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2025,2]]}},"alternative-id":["4650"],"URL":"https:\/\/doi.org\/10.1007\/s11128-025-04650-8","relation":{},"ISSN":["1573-1332"],"issn-type":[{"value":"1573-1332","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,2,1]]},"assertion":[{"value":"7 May 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 January 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 February 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"50"}}