{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,20]],"date-time":"2025-10-20T18:58:30Z","timestamp":1760986710322},"reference-count":13,"publisher":"Springer Science and Business Media LLC","issue":"9","license":[{"start":{"date-parts":[[2009,9,1]],"date-time":"2009-09-01T00:00:00Z","timestamp":1251763200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sci. China Ser. F-Inf. Sci."],"published-print":{"date-parts":[[2009,9]]},"DOI":"10.1007\/s11432-009-0147-0","type":"journal-article","created":{"date-parts":[[2009,9,12]],"date-time":"2009-09-12T07:11:46Z","timestamp":1252739506000},"page":"1598-1604","source":"Crossref","is-referenced-by-count":5,"title":["Realization of error correction and reconciliation of continuous quantum key distribution in detail"],"prefix":"10.1007","volume":"52","author":[{"given":"XuDong","family":"Qian","sequence":"first","affiliation":[]},{"given":"GuangQiang","family":"He","sequence":"additional","affiliation":[]},{"given":"GuiHua","family":"Zeng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2009,9,13]]},"reference":[{"key":"147_CR1","volume-title":"Quantum Cryptography (in Chinese)","author":"G. H. Zeng","year":"2006","unstructured":"Zeng G H. Quantum Cryptography (in Chinese). Beijing: Science Press, 2006"},{"key":"147_CR2","doi-asserted-by":"crossref","first-page":"145","DOI":"10.1103\/RevModPhys.74.145","volume":"74","author":"N. Gisin","year":"2002","unstructured":"Gisin N, Ribordy G, Tittel W, et al. Quantum cryptography. Rev Mod Phys, 2002, 74: 145\u2013195","journal-title":"Rev Mod Phys"},{"key":"147_CR3","unstructured":"Bennett C H, Brassard G. Publish\u2014key distribution and coin tossing. In: Proceedings of the IEEE International Conference, on Computers, Systems and Signal Processing. Bangalore, India, 1984. 175\u2013179"},{"key":"147_CR4","doi-asserted-by":"crossref","first-page":"441","DOI":"10.1103\/PhysRevLett.85.441","volume":"85","author":"P. W. Shor","year":"2000","unstructured":"Shor P W, Preskill J. Simple proof of security of the BB84 quantum key distribution protocol. Phys Rev Lett, 2000, 85: 441\u2013444","journal-title":"Phys Rev Lett"},{"key":"147_CR5","doi-asserted-by":"crossref","first-page":"2050","DOI":"10.1126\/science.283.5410.2050","volume":"283","author":"H. K. Lo","year":"1999","unstructured":"Lo H K, Chau H F. Unconditional security of quantum key distribution over arbitrarily long distances. Science, 1999, 283: 2050\u20132056","journal-title":"Science"},{"key":"147_CR6","doi-asserted-by":"crossref","first-page":"351","DOI":"10.1145\/382780.382781","volume":"48","author":"D. Mayers","year":"2001","unstructured":"Mayers D. Unconditional security in quantum cryptography. J ACM, 2001, 48: 351\u2013406","journal-title":"J ACM"},{"key":"147_CR7","doi-asserted-by":"crossref","unstructured":"Grosshans F, Grangier P. Continuous variable quantum cryptography using coherent states. Phys Rev Lett, 2002, 88: 057902","DOI":"10.1103\/PhysRevLett.88.057902"},{"key":"147_CR8","doi-asserted-by":"crossref","first-page":"238","DOI":"10.1038\/nature01289","volume":"421","author":"F. Grosshans","year":"2003","unstructured":"Grosshans F, Assche G V, Wenger J, et al. Quantum key distribution using Gaussian-modulated coherent states. Nature, 2003, 421: 238\u2013241","journal-title":"Nature"},{"key":"147_CR9","doi-asserted-by":"crossref","unstructured":"Assche G V, Cardinal J, Cerf N J. Reconciliation of a quantum-distributed Gaussian key. IEEE Trans Inf Theory, 2004(2): 394\u2013400","DOI":"10.1109\/TIT.2003.822618"},{"issue":"3","key":"147_CR10","doi-asserted-by":"crossref","first-page":"733","DOI":"10.1109\/18.256484","volume":"39","author":"U. M. Maurer","year":"1993","unstructured":"Maurer U M. Secret key agreement by public discussion from common information. IEEE Trans Inf Theory, 1993, 39(3): 733\u2013742","journal-title":"IEEE Trans Inf Theory"},{"key":"147_CR11","first-page":"217","volume-title":"Unconditional Security in Cryptography","author":"S. Wolf","year":"1999","unstructured":"Wolf S. Unconditional Security in Cryptography. Berlin: Springer-Verlag, 1999. 217\u2013250"},{"key":"147_CR12","unstructured":"Cardinal J, Assche G V. Construction of a shared secret key using continuous variables. In: Proc 2003 IEEE Information Theory Workshop (ITW2003), Paris, France, Mar.\/Apr. 2003"},{"issue":"7","key":"147_CR13","doi-asserted-by":"crossref","first-page":"471","DOI":"10.1109\/TIT.1973.1055037","volume":"19","author":"D. Slepian","year":"1973","unstructured":"Slepian D, Wolf J K. Noiseless coding of correlated information sources. IEEE Trans Inf Theory, 1973, 19(7): 471\u2013480","journal-title":"IEEE Trans Inf Theory"}],"container-title":["Science in China Series F: Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-009-0147-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11432-009-0147-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-009-0147-0","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T15:36:00Z","timestamp":1559403360000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11432-009-0147-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,9]]},"references-count":13,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2009,9]]}},"alternative-id":["147"],"URL":"https:\/\/doi.org\/10.1007\/s11432-009-0147-0","relation":{},"ISSN":["1009-2757","1862-2836"],"issn-type":[{"value":"1009-2757","type":"print"},{"value":"1862-2836","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009,9]]}}}