{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,23]],"date-time":"2026-02-23T11:13:24Z","timestamp":1771845204007,"version":"3.50.1"},"reference-count":51,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2026,2,9]],"date-time":"2026-02-09T00:00:00Z","timestamp":1770595200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,2,9]],"date-time":"2026-02-09T00:00:00Z","timestamp":1770595200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62201252"],"award-info":[{"award-number":["62201252"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["NS2025030"],"award-info":[{"award-number":["NS2025030"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"DOI":"10.1007\/s11128-026-05082-8","type":"journal-article","created":{"date-parts":[[2026,2,9]],"date-time":"2026-02-09T04:59:13Z","timestamp":1770613153000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A measurement-device-independent quantum auction protocol based on identity authentication"],"prefix":"10.1007","volume":"25","author":[{"given":"Yu","family":"Yang","sequence":"first","affiliation":[]},{"given":"Baichang","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Xiuqi","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Yunguang","family":"Han","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,2,9]]},"reference":[{"key":"5082_CR1","doi-asserted-by":"publisher","unstructured":"Nurhadi, A.I., Syambas, N.R.: Quantum key distribution (qkd) protocols: a survey. In: 2018 4th International Conference on Wireless and Telematics (ICWT), pp. 1\u20135 (2018). https:\/\/doi.org\/10.1109\/ICWT.2018.8527822","DOI":"10.1109\/ICWT.2018.8527822"},{"key":"5082_CR2","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1016\/j.tcs.2014.09.018","volume":"560","author":"R All\u00e9aume","year":"2014","unstructured":"All\u00e9aume, R., Branciard, C., Bouda, J., Debuisschert, T., Dianati, M., Gisin, N., Godfrey, M., Grangier, P., L\u00e4nger, T., L\u00fctkenhaus, N., Monyk, C., Painchault, P., Peev, M., Poppe, A., Pornin, T., Rarity, J., Renner, R., Ribordy, G., Riguidel, M., Salvail, L., Shields, A., Weinfurter, H., Zeilinger, A.: Using quantum key distribution for cryptographic purposes: a survey. Theoret. Comput. Sci. 560, 62\u201381 (2014). https:\/\/doi.org\/10.1016\/j.tcs.2014.09.018","journal-title":"Theoret. Comput. Sci."},{"key":"5082_CR3","doi-asserted-by":"publisher","DOI":"10.1103\/RevModPhys.92.025002","volume":"92","author":"F Xu","year":"2020","unstructured":"Xu, F., Ma, X., Zhang, Q., Lo, H.-K., Pan, J.-W.: Secure quantum key distribution with realistic devices. Rev. Mod. Phys. 92, 025002 (2020). https:\/\/doi.org\/10.1103\/RevModPhys.92.025002","journal-title":"Rev. Mod. Phys."},{"key":"5082_CR4","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1016\/j.tcs.2014.05.025","volume":"560","author":"CH Bennett","year":"2014","unstructured":"Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. Theoret. Comput. Sci. 560, 7\u201311 (2014)","journal-title":"Theoret. Comput. Sci."},{"key":"5082_CR5","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.108.130503","volume":"108","author":"H-K Lo","year":"2012","unstructured":"Lo, H.-K., Curty, M., Qi, B.: Measurement-device-independent quantum key distribution. Phys. Rev. Lett. 108, 130503 (2012). https:\/\/doi.org\/10.1103\/PhysRevLett.108.130503","journal-title":"Phys. Rev. Lett."},{"issue":"11","key":"5082_CR6","doi-asserted-by":"publisher","DOI":"10.1088\/1367-2630\/15\/11\/113007","volume":"15","author":"F Xu","year":"2013","unstructured":"Xu, F., Curty, M., Qi, B., Lo, H.-K.: Practical aspects of measurement-device-independent quantum key distribution. New J. Phys. 15(11), 113007 (2013)","journal-title":"New J. Phys."},{"issue":"1","key":"5082_CR7","doi-asserted-by":"publisher","first-page":"4612","DOI":"10.1038\/srep04612","volume":"4","author":"Q Wang","year":"2014","unstructured":"Wang, Q., Wang, X.-B.: Simulating of the measurement-device independent quantum key distribution with phase randomized general sources. Sci. Rep. 4(1), 4612 (2014)","journal-title":"Sci. Rep."},{"issue":"4","key":"5082_CR8","doi-asserted-by":"publisher","first-page":"880","DOI":"10.1364\/OL.39.000880","volume":"39","author":"M Li","year":"2014","unstructured":"Li, M., Zhang, C.-M., Yin, Z.-Q., Chen, W., Wang, S., Guo, G.-C., Han, Z.-F.: Measurement-device-independent quantum key distribution with modified coherent state. Opt. Lett. 39(4), 880\u2013883 (2014)","journal-title":"Opt. Lett."},{"issue":"1","key":"5082_CR9","doi-asserted-by":"publisher","first-page":"1678","DOI":"10.1038\/s41598-021-81003-2","volume":"11","author":"W Wang","year":"2021","unstructured":"Wang, W., Tamaki, K., Curty, M.: Measurement-device-independent quantum key distribution with leaky sources. Sci. Rep. 11(1), 1678 (2021)","journal-title":"Sci. Rep."},{"issue":"8","key":"5082_CR10","doi-asserted-by":"publisher","first-page":"2400060","DOI":"10.1002\/qute.202400060","volume":"7","author":"X-Q Cai","year":"2024","unstructured":"Cai, X.-Q., Li, S., Liu, Z.-F., Wang, T.-Y.: Measurement-device-independent quantum secret sharing. Adv. Quantum Technol. 7(8), 2400060 (2024). https:\/\/doi.org\/10.1002\/qute.202400060","journal-title":"Adv. Quantum Technol."},{"issue":"6","key":"5082_CR11","doi-asserted-by":"publisher","first-page":"60001","DOI":"10.1209\/0295-5075\/131\/60001","volume":"131","author":"T Li","year":"2020","unstructured":"Li, T., Gao, Z., Li, Z.: Measurement-device-independent quantum secure direct communication: direct quantum communication with imperfect measurement device and untrusted operator. Europhys. Lett. 131(6), 60001 (2020)","journal-title":"Europhys. Lett."},{"key":"5082_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11128-020-02864-6","volume":"19","author":"X-D Wu","year":"2020","unstructured":"Wu, X.-D., Zhou, L., Zhong, W., Sheng, Y.-B.: High-capacity measurement-device-independent quantum secure direct communication. Quantum Inf. Process. 19, 1\u201314 (2020)","journal-title":"Quantum Inf. Process."},{"issue":"12","key":"5082_CR13","doi-asserted-by":"publisher","DOI":"10.1007\/s11433-020-1603-7","volume":"63","author":"Z Gao","year":"2020","unstructured":"Gao, Z., Li, T., Li, Z.: Deterministic measurement-device-independent quantum secret sharing. Sci. China Phys. Mech. Astron. 63(12), 120311 (2020)","journal-title":"Sci. China Phys. Mech. Astron."},{"issue":"3","key":"5082_CR14","doi-asserted-by":"publisher","DOI":"10.1007\/s11433-019-1450-8","volume":"63","author":"Z Zhou","year":"2020","unstructured":"Zhou, Z., Sheng, Y., Niu, P., Yin, L., Long, G., Hanzo, L.: Measurement-device-independent quantum secure direct communication. Sci. China Phys. Mech. Astron. 63(3), 230362 (2020)","journal-title":"Sci. China Phys. Mech. Astron."},{"issue":"12","key":"5082_CR15","doi-asserted-by":"publisher","DOI":"10.1088\/1674-1056\/ac8f37","volume":"31","author":"J-W Ying","year":"2022","unstructured":"Ying, J.-W., Zhou, L., Zhong, W., Sheng, Y.-B.: Measurement-device-independent one-step quantum secure direct communication. Chin. Phys. B 31(12), 120303 (2022). https:\/\/doi.org\/10.1088\/1674-1056\/ac8f37","journal-title":"Chin. Phys. B"},{"issue":"6","key":"5082_CR16","doi-asserted-by":"publisher","DOI":"10.1007\/s11433-021-1692-5","volume":"64","author":"Y-G Yang","year":"2021","unstructured":"Yang, Y.-G., Wang, Y.-C., Yang, Y.-L., Chen, X.-B., Li, D., Zhou, Y.-H., Shi, W.-M.: Participant attack on the deterministic measurement-device-independent quantum secret sharing protocol. Sci. China Phys. Mech. Astron. 64(6), 260321 (2021)","journal-title":"Sci. China Phys. Mech. Astron."},{"key":"5082_CR17","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.114.090501","volume":"114","author":"Y Fu","year":"2015","unstructured":"Fu, Y., Yin, H.-L., Chen, T.-Y., Chen, Z.-B.: Long-distance measurement-device-independent multiparty quantum communication. Phys. Rev. Lett. 114, 090501 (2015). https:\/\/doi.org\/10.1103\/PhysRevLett.114.090501","journal-title":"Phys. Rev. Lett."},{"issue":"7","key":"5082_CR18","doi-asserted-by":"publisher","first-page":"72501","DOI":"10.1007\/s11432-018-9705-x","volume":"62","author":"Y Wang","year":"2019","unstructured":"Wang, Y., Tian, C., Su, Q., Wang, M., Su, X.: Measurement-device-independent quantum secret sharing and quantum conference based on gaussian cluster state. Sci. China Inf. Sci. 62(7), 72501 (2019)","journal-title":"Sci. China Inf. Sci."},{"key":"5082_CR19","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.111.012602","volume":"111","author":"C Zhang","year":"2025","unstructured":"Zhang, C., Zhang, Q., Zhong, W., Du, M.-M., Shen, S.-T., Li, X.-Y., Zhang, A.-L., Zhou, L., Sheng, Y.-B.: Memory-assisted measurement-device-independent quantum secret sharing. Phys. Rev. A 111, 012602 (2025). https:\/\/doi.org\/10.1103\/PhysRevA.111.012602","journal-title":"Phys. Rev. A"},{"key":"5082_CR20","doi-asserted-by":"crossref","unstructured":"Dreier, J., Jonker, H., Lafourcade, P.: Defining verifiability in e-auction protocols. In: Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security, pp. 547\u2013552 (2013)","DOI":"10.1145\/2484313.2484387"},{"key":"5082_CR21","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11128-021-03173-2","volume":"20","author":"Y Xu","year":"2021","unstructured":"Xu, Y., Li, Z., Wang, C., Zhu, H.: Quantum sealed-bid auction protocol for simultaneous ascending auction with ghz states. Quantum Inf. Process. 20, 1\u201314 (2021)","journal-title":"Quantum Inf. Process."},{"issue":"05","key":"5082_CR22","doi-asserted-by":"publisher","first-page":"751","DOI":"10.1142\/S0219749907003183","volume":"5","author":"T Hogg","year":"2007","unstructured":"Hogg, T., Harsha, P., Chen, K.-Y.: Quantum auctions. Int. J. Quantum Inform. 5(05), 751\u2013780 (2007)","journal-title":"Int. J. Quantum Inform."},{"issue":"9","key":"5082_CR23","doi-asserted-by":"publisher","first-page":"1939","DOI":"10.1016\/j.optcom.2009.01.026","volume":"282","author":"M Naseri","year":"2009","unstructured":"Naseri, M.: Secure quantum sealed-bid auction. Opt. Commun. 282(9), 1939\u20131943 (2009)","journal-title":"Opt. Commun."},{"issue":"10","key":"5082_CR24","doi-asserted-by":"publisher","first-page":"4221","DOI":"10.1109\/TCSI.2021.3103857","volume":"68","author":"R-H Shi","year":"2021","unstructured":"Shi, R.-H.: Quantum sealed-bid auction without a trusted third party. IEEE Trans. Circuits Syst. I Regul. Pap. 68(10), 4221\u20134231 (2021)","journal-title":"IEEE Trans. Circuits Syst. I Regul. Pap."},{"key":"5082_CR25","doi-asserted-by":"crossref","unstructured":"Ye, C.-Q., Li, J., Chen, X.-B., Dong, M., Ota, K.: Measurement-based quantum sealed-bid auction. Regular Papers, IEEE Transactions on Circuits and Systems I (2023)","DOI":"10.1109\/TCSI.2023.3314646"},{"key":"5082_CR26","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.69.012309","volume":"69","author":"A Ac\u00edn","year":"2004","unstructured":"Ac\u00edn, A., Gisin, N., Scarani, V.: Coherent-pulse implementations of quantum cryptography protocols resistant to photon-number-splitting attacks. Phys. Rev. A 69, 012309 (2004). https:\/\/doi.org\/10.1103\/PhysRevA.69.012309","journal-title":"Phys. Rev. A"},{"issue":"4","key":"5082_CR27","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.71.042316","volume":"71","author":"A Niederberger","year":"2005","unstructured":"Niederberger, A., Scarani, V., Gisin, N.: Photon-number-splitting versus cloning attacks in practical implementations of the Bennett-brassard 1984 protocol for quantum cryptography. Phys. Rev. A Atom. Mol. Opt. Phys. 71(4), 042316 (2005)","journal-title":"Phys. Rev. A Atom. Mol. Opt. Phys."},{"issue":"3","key":"5082_CR28","doi-asserted-by":"publisher","first-page":"192","DOI":"10.1109\/JSTQE.2015.2389528","volume":"21","author":"CCW Lim","year":"2015","unstructured":"Lim, C.C.W., Walenta, N., Legr\u00e9, M., Gisin, N., Zbinden, H.: Random variation of detector efficiency: a countermeasure against detector blinding attacks for quantum key distribution. IEEE J. Sel. Top. Quantum Electron. 21(3), 192\u2013196 (2015). https:\/\/doi.org\/10.1109\/JSTQE.2015.2389528","journal-title":"IEEE J. Sel. Top. Quantum Electron."},{"issue":"12","key":"5082_CR29","doi-asserted-by":"publisher","first-page":"800","DOI":"10.1038\/nphoton.2010.269","volume":"4","author":"Z Yuan","year":"2010","unstructured":"Yuan, Z., Dynes, J.F., Shields, A.J.: Avoiding the blinding attack in qkd. Nat. Photonics 4(12), 800\u2013801 (2010)","journal-title":"Nat. Photonics"},{"issue":"4","key":"5082_CR30","doi-asserted-by":"publisher","first-page":"367","DOI":"10.1016\/j.scib.2021.11.002","volume":"67","author":"Y-B Sheng","year":"2022","unstructured":"Sheng, Y.-B., Zhou, L., Long, G.-L.: One-step quantum secure direct communication. Sci. Bullet. 67(4), 367\u2013374 (2022)","journal-title":"Sci. Bullet."},{"key":"5082_CR31","doi-asserted-by":"crossref","unstructured":"Qi, R., Sun, Z., Lin, Z., Niu, P., Hao, W., Song, L., Huang, Q., Gao, J., Yin, L., Long, G.-L.: Implementation and security analysis of practical quantum secure direct communication. Light Sci. Appl. 8(1), 22 (2019)","DOI":"10.1038\/s41377-019-0132-3"},{"issue":"22","key":"5082_CR32","doi-asserted-by":"publisher","first-page":"1519","DOI":"10.1016\/j.scib.2017.10.023","volume":"62","author":"F Zhu","year":"2017","unstructured":"Zhu, F., Zhang, W., Sheng, Y., Huang, Y.: Experimental long-distance quantum secure direct communication. Sci. Bullet. 62(22), 1519\u20131524 (2017)","journal-title":"Sci. Bullet."},{"key":"5082_CR33","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.65.032302","author":"GL Long","year":"2002","unstructured":"Long, G.L., Liu, X.S.: Theoretically efficient high-capacity quantum-key-distribution scheme. Phys. Rev. A (2002). https:\/\/doi.org\/10.1103\/PhysRevA.65.032302","journal-title":"Phys. Rev. A"},{"key":"5082_CR34","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.68.042317","volume":"68","author":"F-G Deng","year":"2003","unstructured":"Deng, F.-G., Long, G.L., Liu, X.-S.: Two-step quantum direct communication protocol using the Einstein\u2013Podolsky\u2013Rosen pair block. Phys. Rev. A 68, 042317 (2003). https:\/\/doi.org\/10.1103\/PhysRevA.68.042317","journal-title":"Phys. Rev. A"},{"key":"5082_CR35","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevApplied.22.024040","volume":"22","author":"J-W Ying","year":"2024","unstructured":"Ying, J.-W., Zhao, P., Zhong, W., Du, M.-M., Li, X.-Y., Shen, S.-T., Zhang, A.-L., Zhou, L., Sheng, Y.-B.: Passive decoy-state quantum secure direct communication with a heralded single-photon source. Phys. Rev. Appl. 22, 024040 (2024). https:\/\/doi.org\/10.1103\/PhysRevApplied.22.024040","journal-title":"Phys. Rev. Appl."},{"issue":"4","key":"5082_CR36","doi-asserted-by":"publisher","DOI":"10.1007\/s11433-024-2578-0","volume":"68","author":"J-W Ying","year":"2025","unstructured":"Ying, J.-W., Wang, J.-Y., Xiao, Y.-X., Gu, S.-P., Wang, X.-F., Zhong, W., Du, M.-M., Li, X.-Y., Shen, S.-T., Zhang, A.-L., et al.: Passive-state preparation for quantum secure direct communication. Sci. China Phys. Mech. Astron. 68(4), 240312 (2025)","journal-title":"Sci. China Phys. Mech. Astron."},{"issue":"11","key":"5082_CR37","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1007\/s11128-023-04129-4","volume":"22","author":"N Basak","year":"2023","unstructured":"Basak, N., Das, N., Paul, G., Nandi, K., Patel, N.: Quantum secret sharing protocol using ghz state: implementation on ibm qiskit. Quantum Inf. Process. 22(11), 393 (2023)","journal-title":"Quantum Inf. Process."},{"key":"5082_CR38","doi-asserted-by":"crossref","unstructured":"Li, G.-D., Liu, J.-C., Wang, Q.-L., Sun, W.-Q.: Employing single photons for measurement-device-independent quantum secure direct communication with identity authentication. IEEE Commun. Lett. (2024)","DOI":"10.1109\/LCOMM.2024.3354250"},{"issue":"1","key":"5082_CR39","doi-asserted-by":"publisher","first-page":"7626","DOI":"10.1038\/s41598-019-44030-8","volume":"9","author":"R-H Shi","year":"2019","unstructured":"Shi, R.-H., Zhang, M.: Privacy-preserving quantum sealed-bid auction based on Grover\u2019s search algorithm. Sci. Rep. 9(1), 7626 (2019)","journal-title":"Sci. Rep."},{"key":"5082_CR40","doi-asserted-by":"crossref","unstructured":"Mittelbach, A., Fischlin, M.: The theory of hash functions and random oracles. Springer Nature, An Approach to Modern Cryptography, Cham (2021)","DOI":"10.1007\/978-3-030-63287-8"},{"key":"5082_CR41","doi-asserted-by":"crossref","unstructured":"Grassi, L., Khovratovich, D., L\u00fcftenegger, R., Rechberger, C., Schofnegger, M., Walch, R.: Reinforced concrete: a fast hash function for verifiable computation. In: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, pp. 1323\u20131335 (2022)","DOI":"10.1145\/3548606.3560686"},{"issue":"4","key":"5082_CR42","doi-asserted-by":"publisher","first-page":"431","DOI":"10.1002\/ett.4460050406","volume":"5","author":"B Preneel","year":"1994","unstructured":"Preneel, B.: Cryptographic hash functions. Eur. Trans. Telecommun. 5(4), 431\u2013448 (1994)","journal-title":"Eur. Trans. Telecommun."},{"key":"5082_CR43","doi-asserted-by":"crossref","unstructured":"Rogaway, P., Shrimpton, T.: Cryptographic hash-function basics: Definitions, implications, and separations for preimage resistance, second-preimage resistance, and collision resistance. In: Fast Software Encryption: 11th International Workshop, FSE 2004, Delhi, India, February 5-7, 2004. Revised Papers 11, pp. 371\u2013388 (2004). Springer","DOI":"10.1007\/978-3-540-25937-4_24"},{"key":"5082_CR44","doi-asserted-by":"crossref","unstructured":"Aumasson, J.-P., Neves, S., Wilcox-O\u2019Hearn, Z., Winnerlein, C.: Blake2: simpler, smaller, fast as md5. In: Applied Cryptography and Network Security: 11th International Conference, ACNS 2013, Banff, AB, Canada, June 25-28, 2013. Proceedings 11, pp. 119\u2013135 (2013). Springer","DOI":"10.1007\/978-3-642-38980-1_8"},{"key":"5082_CR45","doi-asserted-by":"crossref","unstructured":"Aumasson, J.-P., Meier, W., Phan, R.C.-W., Henzen, L., Aumasson, J.-P., Meier, W., Phan, R.C.-W., Henzen, L.: Blake2. The Hash Function BLAKE, 165\u2013183 (2014)","DOI":"10.1007\/978-3-662-44757-4_9"},{"key":"5082_CR46","doi-asserted-by":"crossref","unstructured":"Ye, C.-Q., Li, J., Chen, X.-B., Dong, M., Ota, K.: Measurement-based quantum sealed-bid auction. Regular Papers, IEEE Transactions on Circuits and Systems I (2023)","DOI":"10.1109\/TCSI.2023.3314646"},{"issue":"8","key":"5082_CR47","doi-asserted-by":"publisher","first-page":"728","DOI":"10.1016\/S0167-4048(03)00013-0","volume":"22","author":"C-C Chang","year":"2003","unstructured":"Chang, C.-C., Chang, Y.-F.: Efficient anonymous auction protocols with freewheeling bids. Comput. Sec. 22(8), 728\u2013734 (2003)","journal-title":"Comput. Sec."},{"issue":"3","key":"5082_CR48","doi-asserted-by":"publisher","first-page":"339","DOI":"10.1109\/TIT.1978.1055892","volume":"24","author":"I Csisz\u00e1r","year":"1978","unstructured":"Csisz\u00e1r, I., Korner, J.: Broadcast channels with confidential messages. IEEE Trans. Inf. Theory 24(3), 339\u2013348 (1978)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"9","key":"5082_CR49","doi-asserted-by":"publisher","first-page":"645","DOI":"10.1038\/nphys684","volume":"3","author":"R Renner","year":"2007","unstructured":"Renner, R.: Symmetry of large physical systems implies independence of subsystems. Nat. Phys. 3(9), 645\u2013649 (2007)","journal-title":"Nat. Phys."},{"key":"5082_CR50","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.95.080501","volume":"95","author":"B Kraus","year":"2005","unstructured":"Kraus, B., Gisin, N., Renner, R.: Lower and upper bounds on the secret-key rate for quantum key distribution protocols using one-way classical communication. Phys. Rev. Lett. 95, 080501 (2005). https:\/\/doi.org\/10.1103\/PhysRevLett.95.080501","journal-title":"Phys. Rev. Lett."},{"issue":"3","key":"5082_CR51","first-page":"3","volume":"9","author":"AS Holevo","year":"1973","unstructured":"Holevo, A.S.: Bounds for the quantity of information transmitted by a quantum communication channel. Problemy Peredachi Informatsii 9(3), 3\u201311 (1973)","journal-title":"Problemy Peredachi Informatsii"}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-026-05082-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11128-026-05082-8","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-026-05082-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,23]],"date-time":"2026-02-23T10:51:46Z","timestamp":1771843906000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11128-026-05082-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,2,9]]},"references-count":51,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2026,2]]}},"alternative-id":["5082"],"URL":"https:\/\/doi.org\/10.1007\/s11128-026-05082-8","relation":{},"ISSN":["1573-1332"],"issn-type":[{"value":"1573-1332","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,2,9]]},"assertion":[{"value":"1 October 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 January 2026","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 February 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"55"}}