{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T08:53:24Z","timestamp":1774601604950,"version":"3.50.1"},"reference-count":47,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T00:00:00Z","timestamp":1774569600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T00:00:00Z","timestamp":1774569600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["No.12574535 and 62401067"],"award-info":[{"award-number":["No.12574535 and 62401067"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"DOI":"10.1007\/s11128-026-05135-y","type":"journal-article","created":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T06:14:39Z","timestamp":1774592079000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Mode-pairing quantum key distribution with the single-photon-added coherent source"],"prefix":"10.1007","volume":"25","author":[{"given":"Kaiyi","family":"Shi","sequence":"first","affiliation":[]},{"given":"Haoyang","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Yujia","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Duo","family":"Ma","sequence":"additional","affiliation":[]},{"given":"Fangze","family":"Ma","sequence":"additional","affiliation":[]},{"given":"Haiqiang","family":"Ma","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,3,27]]},"reference":[{"key":"5135_CR1","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1016\/j.tcs.2014.05.025","volume":"560","author":"CH Bennett","year":"2014","unstructured":"Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. Theor. Comput. Sci. 560, 7\u201311 (2014)","journal-title":"Theor. Comput. Sci."},{"issue":"2","key":"5135_CR2","doi-asserted-by":"publisher","first-page":"441","DOI":"10.1103\/PhysRevLett.85.441","volume":"85","author":"PW Shor","year":"2000","unstructured":"Shor, P.W., Preskill, J.: Simple proof of security of the bb84 quantum key distribution protocol. Phys. Rev. Lett. 85(2), 441 (2000)","journal-title":"Phys. Rev. Lett."},{"key":"5135_CR3","doi-asserted-by":"crossref","unstructured":"Gottesman, D., Preskill, J.: Secure quantum key distribution using squeezed states. Quantum Inf. Contin. Var. 317\u2013356 (2003)","DOI":"10.1007\/978-94-015-1258-9_22"},{"issue":"8","key":"5135_CR4","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.95.080501","volume":"95","author":"B Kraus","year":"2005","unstructured":"Kraus, B., Gisin, N., Renner, R.: Lower and upper bounds on the secret-key rate for quantum key distribution protocols using one-way classical communication. Phys. Rev. Lett. 95(8), 080501 (2005)","journal-title":"Phys. Rev. Lett."},{"issue":"1","key":"5135_CR5","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.72.012332","volume":"72","author":"R Renner","year":"2005","unstructured":"Renner, R., Gisin, N., Kraus, B.: Information-theoretic security proof for quantum-key-distribution protocols. Phys. Rev. A 72(1), 012332 (2005)","journal-title":"Phys. Rev. A"},{"issue":"3","key":"5135_CR6","doi-asserted-by":"publisher","first-page":"1301","DOI":"10.1103\/RevModPhys.81.1301","volume":"81","author":"V Scarani","year":"2009","unstructured":"Scarani, V., Bechmann-Pasquinucci, H., Cerf, N.J., Du\u0161ek, M., L\u00fctkenhaus, N., Peev, M.: The security of practical quantum key distribution. Rev. Mod. Phys. 81(3), 1301 (2009)","journal-title":"Rev. Mod. Phys."},{"issue":"5","key":"5135_CR7","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.77.052327","volume":"77","author":"Y Zhao","year":"2008","unstructured":"Zhao, Y., Qi, B., Lo, H.-K.: Quantum key distribution with an unknown and untrusted source. Phys. Rev. A 77(5), 052327 (2008)","journal-title":"Phys. Rev. A"},{"issue":"3","key":"5135_CR8","doi-asserted-by":"publisher","DOI":"10.1063\/1.2431718","volume":"90","author":"X-B Wang","year":"2007","unstructured":"Wang, X.-B., Peng, C.-Z., Pan, J.-W.: Simple protocol for secure decoy-state quantum key distribution with a loosely controlled source. Appl. Phys. Lett. 90(3), 031110 (2007)","journal-title":"Appl. Phys. Lett."},{"issue":"5","key":"5135_CR9","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.75.052301","volume":"75","author":"X-B Wang","year":"2007","unstructured":"Wang, X.-B.: Decoy-state quantum key distribution with large random errors of light intensity. Phys. Rev. A 75(5), 052301 (2007)","journal-title":"Phys. Rev. A"},{"issue":"4","key":"5135_CR10","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.77.042311","volume":"77","author":"X-B Wang","year":"2008","unstructured":"Wang, X.-B., Peng, C.-Z., Zhang, J., Yang, L., Pan, J.-W.: General theory of decoy-state quantum cryptography with source errors. Phys. Rev. A 77(4), 042311 (2008)","journal-title":"Phys. Rev. A"},{"issue":"18","key":"5135_CR11","doi-asserted-by":"publisher","first-page":"2077","DOI":"10.1364\/OL.33.002077","volume":"33","author":"X Peng","year":"2008","unstructured":"Peng, X., Jiang, H., Xu, B., Ma, X., Guo, H.: Experimental quantum-key distribution with an untrusted source. Opt. Lett. 33(18), 2077\u20132079 (2008)","journal-title":"Opt. Lett."},{"issue":"2","key":"5135_CR12","doi-asserted-by":"publisher","DOI":"10.1088\/1367-2630\/12\/2\/023024","volume":"12","author":"Y Zhao","year":"2010","unstructured":"Zhao, Y., Qi, B., Lo, H.-K., Qian, L.: Security analysis of an untrusted source for quantum key distribution: passive approach. New J. Phys. 12(2), 023024 (2010)","journal-title":"New J. Phys."},{"issue":"21","key":"5135_CR13","doi-asserted-by":"publisher","first-page":"2167","DOI":"10.1016\/j.scib.2022.10.010","volume":"67","author":"J Gu","year":"2022","unstructured":"Gu, J., Cao, X.-Y., Fu, Y., He, Z.-W., Yin, Z.-J., Yin, H.-L., Chen, Z.-B.: Experimental measurement-device-independent type quantum key distribution with flawed and correlated sources. Sci. Bull. 67(21), 2167\u20132175 (2022)","journal-title":"Sci. Bull."},{"issue":"4","key":"5135_CR14","doi-asserted-by":"publisher","DOI":"10.1088\/1367-2630\/11\/4\/045025","volume":"11","author":"C Erven","year":"2009","unstructured":"Erven, C., Ma, X., Laflamme, R., Weihs, G.: Entangled quantum key distribution with a biased basis choice. New J. Phys. 11(4), 045025 (2009)","journal-title":"New J. Phys."},{"issue":"1","key":"5135_CR15","doi-asserted-by":"publisher","first-page":"2453","DOI":"10.1038\/srep02453","volume":"3","author":"Z Wei","year":"2013","unstructured":"Wei, Z., Wang, W., Zhang, Z., Gao, M., Ma, Z., Ma, X.: Decoy-state quantum key distribution with biased basis choice. Sci. Rep. 3(1), 2453 (2013)","journal-title":"Sci. Rep."},{"issue":"5","key":"5135_CR16","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.89.052333","volume":"89","author":"F Xu","year":"2014","unstructured":"Xu, F., Xu, H., Lo, H.-K.: Protocol choice and parameter optimization in decoy-state measurement-device-independent quantum key distribution. Phys. Rev. A 89(5), 052333 (2014)","journal-title":"Phys. Rev. A"},{"issue":"1","key":"5135_CR17","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.82.012304","volume":"82","author":"A Laing","year":"2010","unstructured":"Laing, A., Scarani, V., Rarity, J.G., O\u2019Brien, J.L.: Reference-frame-independent quantum key distribution. Phys. Rev. A 82(1), 012304 (2010)","journal-title":"Phys. Rev. A"},{"issue":"13","key":"5135_CR18","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.108.130503","volume":"108","author":"H-K Lo","year":"2012","unstructured":"Lo, H.-K., Curty, M., Qi, B.: Measurement-device-independent quantum key distribution. Phys. Rev. Lett. 108(13), 130503 (2012)","journal-title":"Phys. Rev. Lett."},{"issue":"4","key":"5135_CR19","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.85.042307","volume":"85","author":"K Tamaki","year":"2012","unstructured":"Tamaki, K., Lo, H.-K., Fung, C.-H.F., Qi, B.: Phase encoding schemes for measurement-device-independent quantum key distribution with basis-dependent flaw. Phys. Rev. A 85(4), 042307 (2012)","journal-title":"Phys. Rev. A"},{"issue":"6","key":"5135_CR20","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.86.062319","volume":"86","author":"X Ma","year":"2012","unstructured":"Ma, X., Razavi, M.: Alternative schemes for measurement-device-independent quantum key distribution. Phys. Rev. A 86(6), 062319 (2012)","journal-title":"Phys. Rev. A"},{"issue":"11","key":"5135_CR21","doi-asserted-by":"publisher","DOI":"10.1088\/1367-2630\/15\/11\/113007","volume":"15","author":"F Xu","year":"2013","unstructured":"Xu, F., Curty, M., Qi, B., Lo, H.-K.: Practical aspects of measurement-device-independent quantum key distribution. New J. Phys. 15(11), 113007 (2013)","journal-title":"New J. Phys."},{"issue":"10","key":"5135_CR22","doi-asserted-by":"publisher","first-page":"4253","DOI":"10.1007\/s11128-016-1393-x","volume":"15","author":"D Chen","year":"2016","unstructured":"Chen, D., Shang-Hong, Z., Lei, S.: Measurement device-independent quantum key distribution with heralded pair coherent state. Quantum Inf. Process. 15(10), 4253\u20134263 (2016)","journal-title":"Quantum Inf. Process."},{"issue":"13","key":"5135_CR23","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.111.130502","volume":"111","author":"Y Liu","year":"2013","unstructured":"Liu, Y., Chen, T.-Y., Wang, L.-J., Liang, H., Shentu, G.-L., Wang, J., Cui, K., Yin, H.-L., Liu, N.-L., Li, L., et al.: Experimental measurement-device-independent quantum key distribution. Phys. Rev. Lett. 111(13), 130502 (2013)","journal-title":"Phys. Rev. Lett."},{"issue":"1","key":"5135_CR24","volume":"6","author":"Y-L Tang","year":"2016","unstructured":"Tang, Y.-L., Yin, H.-L., Zhao, Q., Liu, H., Sun, X.-X., Huang, M.-Q., Zhang, W.-J., Chen, S.-J., Zhang, L., You, L.-X., et al.: Measurement-device-independent quantum key distribution over untrustful metropolitan network. Phys. Rev. X 6(1), 011024 (2016)","journal-title":"Phys. Rev. X"},{"issue":"6","key":"5135_CR25","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.88.062339","volume":"88","author":"Z-W Yu","year":"2013","unstructured":"Yu, Z.-W., Zhou, Y.-H., Wang, X.-B.: Three-intensity decoy-state method for measurement-device-independent quantum key distribution. Phys. Rev. A 88(6), 062339 (2013)","journal-title":"Phys. Rev. A"},{"issue":"10","key":"5135_CR26","doi-asserted-by":"publisher","DOI":"10.1088\/1367-2630\/11\/10\/103037","volume":"11","author":"M McKague","year":"2009","unstructured":"McKague, M.: Device independent quantum key distribution secure against coherent attacks with memoryless measurement devices. New J. Phys. 11(10), 103037 (2009)","journal-title":"New J. Phys."},{"issue":"6862","key":"5135_CR27","doi-asserted-by":"publisher","first-page":"413","DOI":"10.1038\/35106500","volume":"414","author":"L-M Duan","year":"2001","unstructured":"Duan, L.-M., Lukin, M.D., Cirac, J.I., Zoller, P.: Long-distance quantum communication with atomic ensembles and linear optics. Nature 414(6862), 413\u2013418 (2001)","journal-title":"Nature"},{"issue":"1","key":"5135_CR28","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1103\/RevModPhys.83.33","volume":"83","author":"N Sangouard","year":"2011","unstructured":"Sangouard, N., Simon, C., De Riedmatten, H., Gisin, N.: Quantum repeaters based on atomic ensembles and linear optics. Rev. Mod. Phys. 83(1), 33 (2011)","journal-title":"Rev. Mod. Phys."},{"issue":"1","key":"5135_CR29","doi-asserted-by":"publisher","first-page":"5235","DOI":"10.1038\/ncomms6235","volume":"5","author":"M Takeoka","year":"2014","unstructured":"Takeoka, M., Guha, S., Wilde, M.M.: Fundamental rate-loss tradeoff for optical quantum key distribution. Nat. Commun. 5(1), 5235 (2014)","journal-title":"Nat. Commun."},{"issue":"7705","key":"5135_CR30","doi-asserted-by":"publisher","first-page":"400","DOI":"10.1038\/s41586-018-0066-6","volume":"557","author":"M Lucamarini","year":"2018","unstructured":"Lucamarini, M., Yuan, Z.L., Dynes, J.F., Shields, A.J.: Overcoming the rate-distance limit of quantum key distribution without quantum repeaters. Nature 557(7705), 400\u2013403 (2018)","journal-title":"Nature"},{"issue":"3","key":"5135_CR31","volume":"8","author":"X Ma","year":"2018","unstructured":"Ma, X., Zeng, P., Zhou, H.: Phase-matching quantum key distribution. Phys. Rev. X 8(3), 031043 (2018)","journal-title":"Phys. Rev. X"},{"issue":"4","key":"5135_CR32","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.98.042332","volume":"98","author":"J Lin","year":"2018","unstructured":"Lin, J., L\u00fctkenhaus, N.: Simple security analysis of phase-matching measurement-device-independent quantum key distribution. Phys. Rev. A 98(4), 042332 (2018)","journal-title":"Phys. Rev. A"},{"issue":"6","key":"5135_CR33","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.98.062323","volume":"98","author":"X-B Wang","year":"2018","unstructured":"Wang, X.-B., Yu, Z.-W., Hu, X.-L.: Twin-field quantum key distribution with large misalignment error. Phys. Rev. A 98(6), 062323 (2018)","journal-title":"Phys. Rev. A"},{"issue":"1","key":"5135_CR34","doi-asserted-by":"publisher","first-page":"3903","DOI":"10.1038\/s41467-022-31534-7","volume":"13","author":"P Zeng","year":"2022","unstructured":"Zeng, P., Zhou, H., Wu, W., Ma, X.: Mode-pairing quantum key distribution. Nat. Commun. 13(1), 3903 (2022)","journal-title":"Nat. Commun."},{"issue":"1","key":"5135_CR35","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1038\/s42005-023-01382-y","volume":"6","author":"Z-H Wang","year":"2023","unstructured":"Wang, Z.-H., Wang, R., Yin, Z.-Q., Wang, S., Lu, F.-Y., Chen, W., He, D.-Y., Guo, G.-C., Han, Z.-F.: Tight finite-key analysis for mode-pairing quantum key distribution. Commun. Phys. 6(1), 265 (2023)","journal-title":"Commun. Phys."},{"issue":"6","key":"5135_CR36","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.107.062613","volume":"107","author":"X Liu","year":"2023","unstructured":"Liu, X., Luo, D., Zhang, Z., Wei, K.: Mode-pairing quantum key distribution with advantage distillation. Phys. Rev. A 107(6), 062613 (2023)","journal-title":"Phys. Rev. A"},{"issue":"1","key":"5135_CR37","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.109.012401","volume":"109","author":"Z Lu","year":"2024","unstructured":"Lu, Z., Wang, G., Li, C., Cao, Z.: Asymmetric mode-pairing quantum key distribution. Phys. Rev. A 109(1), 012401 (2024)","journal-title":"Phys. Rev. A"},{"key":"5135_CR38","doi-asserted-by":"publisher","first-page":"2300387","DOI":"10.1002\/qute.202300387","volume":"7","author":"Y Li","year":"2024","unstructured":"Li, Y., Sun, Z., Liu, X., Li, Z., Li, J., Wang, H., Shi, K., Liu, C., Ma, H.: Reference-frame-independent mode-pairing quantum key distribution with advantage distillation. Adv. Quantum Technol. 7, 2300387 (2024)","journal-title":"Adv. Quantum Technol."},{"key":"5135_CR39","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijleo.2022.170367","volume":"272","author":"Y-H Zhou","year":"2023","unstructured":"Zhou, Y.-H., Yang, L., Shi, W.-M., Yang, Y.-G.: Mode-pairing quantum key distribution based on pulse-position modulation. Optik 272, 170367 (2023)","journal-title":"Optik"},{"issue":"23","key":"5135_CR40","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.94.230503","volume":"94","author":"X-B Wang","year":"2005","unstructured":"Wang, X.-B.: Beating the photon-number-splitting attack in practical quantum cryptography. Phys. Rev. Lett. 94(23), 230503 (2005)","journal-title":"Phys. Rev. Lett."},{"issue":"5","key":"5135_CR41","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.61.052304","volume":"61","author":"N L\u00fctkenhaus","year":"2000","unstructured":"L\u00fctkenhaus, N.: Security against individual attacks for realistic quantum key distribution. Phys. Rev. A 61(5), 052304 (2000)","journal-title":"Phys. Rev. A"},{"issue":"6","key":"5135_CR42","doi-asserted-by":"publisher","first-page":"1330","DOI":"10.1103\/PhysRevLett.85.1330","volume":"85","author":"G Brassard","year":"2000","unstructured":"Brassard, G., L\u00fctkenhaus, N., Mor, T., Sanders, B.C.: Limitations on practical quantum cryptography. Phys. Rev. Lett. 85(6), 1330 (2000)","journal-title":"Phys. Rev. Lett."},{"issue":"1","key":"5135_CR43","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1088\/1367-2630\/4\/1\/344","volume":"4","author":"N L\u00fctkenhaus","year":"2002","unstructured":"L\u00fctkenhaus, N., Jahma, M.: Quantum key distribution with realistic states: photon-number statistics in the photon-number splitting attack. New J. Phys. 4(1), 44 (2002)","journal-title":"New J. Phys."},{"key":"5135_CR44","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.90.062315","volume":"90","author":"D Wang","year":"2014","unstructured":"Wang, D., Li, M., Zhu, F., Yin, Z.-Q., Chen, W., Han, Z.-F., Guo, G.-C., Wang, Q.: Quantum key distribution with the single-photon-added coherent source. Phys. Rev. A 90, 062315 (2014)","journal-title":"Phys. Rev. A"},{"key":"5135_CR45","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11128-020-02695-5","volume":"19","author":"J-J Chen","year":"2020","unstructured":"Chen, J.-J., Zhang, C.-H., Chen, J.-M., Zhang, C.-M., Wang, Q.: Improving the performance of decoy-state quantum digital signature with single-photon-added coherent sources. Quantum Inf. Process. 19, 1\u201313 (2020)","journal-title":"Quantum Inf. Process."},{"key":"5135_CR46","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11128-018-2063-y","volume":"17","author":"J-R Zhu","year":"2018","unstructured":"Zhu, J.-R., Wang, C.-Y., Liu, K., Zhang, C.-M., Wang, Q.: Decoy-state reference-frame-independent quantum key distribution with the single-photon-added coherent source. Quantum Inf. Process. 17, 1\u20139 (2018)","journal-title":"Quantum Inf. Process."},{"issue":"8","key":"5135_CR47","doi-asserted-by":"publisher","first-page":"2108","DOI":"10.1364\/JOSAB.493859","volume":"40","author":"J Li","year":"2023","unstructured":"Li, J., Li, Z., Sun, Z., Zhou, L., Li, Y., Wang, H., Ma, H.: Phase-matching quantum key distribution with the single-photon-added coherent source. JOSA B 40(8), 2108\u20132113 (2023)","journal-title":"JOSA B"}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-026-05135-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11128-026-05135-y","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-026-05135-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T08:02:43Z","timestamp":1774598563000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11128-026-05135-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,3,27]]},"references-count":47,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2026,4]]}},"alternative-id":["5135"],"URL":"https:\/\/doi.org\/10.1007\/s11128-026-05135-y","relation":{},"ISSN":["1573-1332"],"issn-type":[{"value":"1573-1332","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,3,27]]},"assertion":[{"value":"22 September 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 March 2026","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 March 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"115"}}