{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T03:13:41Z","timestamp":1775618021197,"version":"3.50.1"},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2025,6,3]],"date-time":"2025-06-03T00:00:00Z","timestamp":1748908800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,6,3]],"date-time":"2025-06-03T00:00:00Z","timestamp":1748908800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100006407","name":"Natural Science Foundation of Henan Province","doi-asserted-by":"publisher","award":["242300421219"],"award-info":[{"award-number":["242300421219"]}],"id":[{"id":"10.13039\/501100006407","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100006407","name":"Natural Science Foundation of Henan Province","doi-asserted-by":"publisher","award":["242300421219"],"award-info":[{"award-number":["242300421219"]}],"id":[{"id":"10.13039\/501100006407","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100006407","name":"Natural Science Foundation of Henan Province","doi-asserted-by":"publisher","award":["242300421219"],"award-info":[{"award-number":["242300421219"]}],"id":[{"id":"10.13039\/501100006407","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100006407","name":"Natural Science Foundation of Henan Province","doi-asserted-by":"publisher","award":["242300421219"],"award-info":[{"award-number":["242300421219"]}],"id":[{"id":"10.13039\/501100006407","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100006407","name":"Natural Science Foundation of Henan Province","doi-asserted-by":"publisher","award":["242300421219"],"award-info":[{"award-number":["242300421219"]}],"id":[{"id":"10.13039\/501100006407","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100006407","name":"Natural Science Foundation of Henan Province","doi-asserted-by":"publisher","award":["242300421219"],"award-info":[{"award-number":["242300421219"]}],"id":[{"id":"10.13039\/501100006407","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100016307","name":"National Safety Academic Fund","doi-asserted-by":"publisher","award":["U2130205"],"award-info":[{"award-number":["U2130205"]}],"id":[{"id":"10.13039\/501100016307","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100016307","name":"National Safety Academic Fund","doi-asserted-by":"publisher","award":["U2130205"],"award-info":[{"award-number":["U2130205"]}],"id":[{"id":"10.13039\/501100016307","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100016307","name":"National Safety Academic Fund","doi-asserted-by":"publisher","award":["U2130205"],"award-info":[{"award-number":["U2130205"]}],"id":[{"id":"10.13039\/501100016307","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100016307","name":"National Safety Academic Fund","doi-asserted-by":"publisher","award":["U2130205"],"award-info":[{"award-number":["U2130205"]}],"id":[{"id":"10.13039\/501100016307","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100016307","name":"National Safety Academic Fund","doi-asserted-by":"publisher","award":["U2130205"],"award-info":[{"award-number":["U2130205"]}],"id":[{"id":"10.13039\/501100016307","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100016307","name":"National Safety Academic Fund","doi-asserted-by":"publisher","award":["U2130205"],"award-info":[{"award-number":["U2130205"]}],"id":[{"id":"10.13039\/501100016307","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62371244"],"award-info":[{"award-number":["62371244"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"DOI":"10.1007\/s11128-025-04780-z","type":"journal-article","created":{"date-parts":[[2025,6,3]],"date-time":"2025-06-03T05:56:26Z","timestamp":1748930186000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Improving the performance of quantum key distribution with weak-randomness basis selection"],"prefix":"10.1007","volume":"24","author":[{"given":"Zhi-Jiang","family":"Chen","sequence":"first","affiliation":[]},{"given":"Chen-Peng","family":"Hao","sequence":"additional","affiliation":[]},{"given":"Li","family":"Gong","sequence":"additional","affiliation":[]},{"given":"Jian-Sheng","family":"Guo","sequence":"additional","affiliation":[]},{"given":"Yang","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Chun-Mei","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Hong-Wei","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,6,3]]},"reference":[{"key":"4780_CR1","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1016\/j.tcs.2014.05.025","volume":"560","author":"CH Bennett","year":"2014","unstructured":"Bennett, C.H., Brassard, G.: Quantum cryptography: Public key distribution and coin tossing. Theoretical computer science 560, 7\u201311 (2014)","journal-title":"Theoretical computer science"},{"issue":"01","key":"4780_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1142\/S0219749908003256","volume":"6","author":"R Renner","year":"2008","unstructured":"Renner, R.: Security of quantum key distribution. International Journal of Quantum Information 6(01), 1\u2013127 (2008)","journal-title":"International Journal of Quantum Information"},{"issue":"5410","key":"4780_CR3","doi-asserted-by":"publisher","first-page":"2050","DOI":"10.1126\/science.283.5410.2050","volume":"283","author":"H-K Lo","year":"1999","unstructured":"Lo, H.-K., Chau, H.F.: Unconditional security of quantum key distribution over arbitrarily long distances. science 283(5410), 2050\u20132056 (1999)","journal-title":"science"},{"issue":"2","key":"4780_CR4","doi-asserted-by":"publisher","first-page":"441","DOI":"10.1103\/PhysRevLett.85.441","volume":"85","author":"PW Shor","year":"2000","unstructured":"Shor, P.W., Preskill, J.: Simple proof of security of the BB84 quantum key distribution protocol. Physical review letters 85(2), 441 (2000)","journal-title":"Physical review letters"},{"issue":"8","key":"4780_CR5","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.95.080501","volume":"95","author":"B Kraus","year":"2005","unstructured":"Kraus, B., Gisin, N., Renner, R.: Lower and upper bounds on the secret-key rate for quantum key distribution protocols using one-way classical communication. Physical review letters 95(8), 080501 (2005)","journal-title":"Physical review letters"},{"issue":"1","key":"4780_CR6","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.72.012332","volume":"72","author":"R Renner","year":"2005","unstructured":"Renner, R., Gisin, N., Kraus, B.: Information-theoretic security proof for quantum-key-distribution protocols. Physical Review A-Atomic, Molecular, and Optical Physics 72(1), 012332 (2005)","journal-title":"Physical Review A-Atomic, Molecular, and Optical Physics"},{"issue":"5","key":"4780_CR7","doi-asserted-by":"publisher","first-page":"3301","DOI":"10.1103\/PhysRevA.59.3301","volume":"59","author":"N L\u00fctkenhaus","year":"1999","unstructured":"L\u00fctkenhaus, N.: Estimates for practical quantum cryptography. Physical Review A 59(5), 3301 (1999)","journal-title":"Physical Review A"},{"issue":"5","key":"4780_CR8","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.61.052304","volume":"61","author":"N L\u00fctkenhaus","year":"2000","unstructured":"L\u00fctkenhaus, N.: Security against individual attacks for realistic quantum key distribution. Phys Rev. A 61(5), 052304 (2000)","journal-title":"Phys Rev. A"},{"issue":"6","key":"4780_CR9","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.87.062329","volume":"87","author":"J-Z Huang","year":"2013","unstructured":"Huang, J.-Z., Weedbrook, C., Yin, Z.-Q., Wang, S., Li, H.-W., Chen, W., Guo, G.-C., Han, Z.-F.: Quantum hacking of a continuous-variable quantum-key distribution system using a wavelength attack. Physical Review A 87(6), 062329 (2013)","journal-title":"Physical Review A"},{"issue":"12","key":"4780_CR10","doi-asserted-by":"publisher","first-page":"800","DOI":"10.1038\/nphoton.2010.269","volume":"4","author":"Z Yuan","year":"2010","unstructured":"Yuan, Z., Dynes, J.F., Shields, A.J.: Avoiding the blinding attack in QKD. Nature Photonics 4(12), 800\u2013801 (2010)","journal-title":"Nature Photonics"},{"issue":"3","key":"4780_CR11","doi-asserted-by":"publisher","first-page":"1301","DOI":"10.1103\/RevModPhys.81.1301","volume":"81","author":"V Scarani","year":"2009","unstructured":"Scarani, V., Bechmann-Pasquinucci, H., Cerf, N.J., Du\u0161ek, M., L\u00fctkenhaus, N., Peev, M.: The security of practical quantum key distribution. Reviews of modern physics 81(3), 1301 (2009)","journal-title":"Reviews of modern physics"},{"issue":"1","key":"4780_CR12","doi-asserted-by":"publisher","first-page":"16200","DOI":"10.1038\/srep16200","volume":"5","author":"H-W Li","year":"2015","unstructured":"Li, H.-W., Yin, Z.-Q., Wang, S., Qian, Y.-J., Chen, W., Guo, G.-C., Han, Z.-F.: Randomness determines practical security of BB84 quantum key distribution. Scientific reports 5(1), 16200 (2015)","journal-title":"Scientific reports"},{"issue":"6","key":"4780_CR13","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.98.062325","volume":"98","author":"H-W Li","year":"2018","unstructured":"Li, H.-W., Xu, Z.-M., Cai, Q.-Y.: Small imperfect randomness restricts security of quantum key distribution. Physical Review A 98(6), 062325 (2018)","journal-title":"Physical Review A"},{"issue":"2","key":"4780_CR14","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.102.022605","volume":"102","author":"H-W Li","year":"2020","unstructured":"Li, H.-W., Xu, Z.-M., Yin, Z.-Q., Cai, Q.-Y.: Security of practical quantum key distribution with weak-randomness basis selection. Physical Review A 102(2), 022605 (2020)","journal-title":"Physical Review A"},{"issue":"1","key":"4780_CR15","doi-asserted-by":"publisher","first-page":"18145","DOI":"10.1038\/s41598-020-75159-6","volume":"10","author":"S-H Sun","year":"2020","unstructured":"Sun, S.-H., Tian, Z.-Y., Zhao, M.-S., Ma, Y.: Security evaluation of quantum key distribution with weak basis-choice flaws. Scientific Reports 10(1), 18145 (2020)","journal-title":"Scientific Reports"},{"issue":"5","key":"4780_CR16","doi-asserted-by":"publisher","first-page":"1226","DOI":"10.1364\/OL.44.001226","volume":"44","author":"C-M Zhang","year":"2019","unstructured":"Zhang, C.-M., Wang, W.-B., Li, H.-W., Wang, Q.: Weak randomness impacts the security of reference-frame-independent quantum key distribution. Optics Letters 44(5), 1226\u20131229 (2019)","journal-title":"Optics Letters"},{"key":"4780_CR17","doi-asserted-by":"publisher","first-page":"1101631","DOI":"10.3389\/fphy.2023.1101631","volume":"11","author":"X-L Jiang","year":"2023","unstructured":"Jiang, X.-L., Wang, Y., Lu, Y.-F., Li, J.-J., Zhang, H.-L., Jiang, M.-S., Zhou, C., Bao, W.-S.: Security analysis of measurement-device-independent quantum conference key agreement with weak randomness. Frontiers in Physics 11, 1101631 (2023)","journal-title":"Frontiers in Physics"},{"key":"4780_CR18","doi-asserted-by":"crossref","unstructured":"Jiang, X.-L., Deng, X.-Q., Wang, Y., Lu, Y.-F., Li, J.-J., Zhou, C., Bao, W.-S.: Weak randomness analysis of measurement-device-independent quantum key distribution with finite resources. In: Photonics, vol. 9, p. 356. MDPI (2022)","DOI":"10.3390\/photonics9050356"},{"issue":"10","key":"4780_CR19","doi-asserted-by":"publisher","first-page":"1339","DOI":"10.3390\/e24101339","volume":"24","author":"X-L Jiang","year":"2022","unstructured":"Jiang, X.-L., Wang, Y., Lu, Y.-F., Li, J.-J., Zhou, C., Bao, W.-S.: Security analysis of sending or not-sending twin-field quantum key distribution with weak randomness. Entropy 24(10), 1339 (2022)","journal-title":"Entropy"},{"key":"4780_CR20","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1016\/j.tcs.2019.11.026","volume":"816","author":"L Gyongyosi","year":"2020","unstructured":"Gyongyosi, L.: Multicarrier continuous-variable quantum key distribution. Theoretical Computer Science 816, 67\u201395 (2020)","journal-title":"Theoretical Computer Science"},{"key":"4780_CR21","doi-asserted-by":"publisher","first-page":"491","DOI":"10.1016\/j.chaos.2018.07.006","volume":"114","author":"L Gyongyosi","year":"2018","unstructured":"Gyongyosi, L., Imre, S.: Multiple access multicarrier continuous-variable quantum key distribution. Chaos, Solitons & Fractals 114, 491\u2013505 (2018)","journal-title":"Chaos, Solitons & Fractals"},{"issue":"2","key":"4780_CR22","doi-asserted-by":"publisher","first-page":"1149","DOI":"10.1109\/COMST.2017.2786748","volume":"20","author":"L Gyongyosi","year":"2018","unstructured":"Gyongyosi, L., Imre, S., Nguyen, H.V.: A survey on quantum channel capacities. IEEE Communications Surveys & Tutorials 20(2), 1149\u20131205 (2018)","journal-title":"IEEE Communications Surveys & Tutorials"},{"issue":"8","key":"4780_CR23","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1145\/3524455","volume":"65","author":"L Gyongyosi","year":"2022","unstructured":"Gyongyosi, L., Imre, S.: Advances in the quantum internet. Communications of the ACM 65(8), 52\u201363 (2022)","journal-title":"Communications of the ACM"},{"issue":"1","key":"4780_CR24","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.75.012334","volume":"75","author":"J Bae","year":"2007","unstructured":"Bae, J., Ac\u00edn, A.: Key distillation from quantum channels using two-way communication protocols. Physical Review A 75(1), 012334 (2007)","journal-title":"Physical Review A"},{"issue":"1","key":"4780_CR25","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.75.012316","volume":"75","author":"B Kraus","year":"2007","unstructured":"Kraus, B., Branciard, C., Renner, R.: Security of quantum-key-distribution protocols using two-way classical communication or weak coherent pulses. Physical Review A-Atomic, Molecular, and Optical Physics 75(1), 012316 (2007)","journal-title":"Physical Review A-Atomic, Molecular, and Optical Physics"},{"issue":"6","key":"4780_CR26","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.101.062321","volume":"101","author":"G Murta","year":"2020","unstructured":"Murta, G., Rozp\u0229dek, F., Ribeiro, J., Elkouss, D., Wehner, S.: Key rates for quantum key distribution protocols with asymmetric noise. Physical Review A 101(6), 062321 (2020)","journal-title":"Physical Review A"},{"key":"4780_CR27","unstructured":"Gottesman, D., Lo, H.-K., Lutkenhaus, N., Preskill, J.: Security of quantum key distribution with imperfect devices. In: International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings., p. 136. IEEE (2004)"},{"issue":"5","key":"4780_CR28","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.91.057901","volume":"91","author":"W-Y Hwang","year":"2003","unstructured":"Hwang, W.-Y.: Quantum key distribution with high loss: toward global secure communication. Physical review letters 91(5), 057901 (2003)","journal-title":"Physical review letters"},{"issue":"23","key":"4780_CR29","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.94.230504","volume":"94","author":"H-K Lo","year":"2005","unstructured":"Lo, H.-K., Ma, X., Chen, K.: Decoy state quantum key distribution. Physical review letters 94(23), 230504 (2005)","journal-title":"Physical review letters"},{"issue":"1","key":"4780_CR30","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.72.012326","volume":"72","author":"X Ma","year":"2005","unstructured":"Ma, X., Qi, B., Zhao, Y., Lo, H.-K.: Practical decoy state for quantum key distribution. Physical Review A 72(1), 012326 (2005)","journal-title":"Physical Review A"},{"issue":"19","key":"4780_CR31","doi-asserted-by":"publisher","first-page":"3762","DOI":"10.1063\/1.1738173","volume":"84","author":"C Gobby","year":"2004","unstructured":"Gobby, C., Yuan, Z.L., Shields, A.J.: Quantum key distribution over 122-km of standard telecom fiber. Appl. Phys. Lett. 84(19), 3762\u20133764 (2004)","journal-title":"Appl. Phys. Lett."}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-025-04780-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11128-025-04780-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-025-04780-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,5]],"date-time":"2025-07-05T04:02:29Z","timestamp":1751688149000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11128-025-04780-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,3]]},"references-count":31,"journal-issue":{"issue":"6","published-online":{"date-parts":[[2025,6]]}},"alternative-id":["4780"],"URL":"https:\/\/doi.org\/10.1007\/s11128-025-04780-z","relation":{},"ISSN":["1573-1332"],"issn-type":[{"value":"1573-1332","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,6,3]]},"assertion":[{"value":"20 September 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 May 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 June 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"We declare that we have no Conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"162"}}