{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T16:01:23Z","timestamp":1773417683737,"version":"3.50.1"},"reference-count":119,"publisher":"Springer Science and Business Media LLC","issue":"11","license":[{"start":{"date-parts":[[2018,9,15]],"date-time":"2018-09-15T00:00:00Z","timestamp":1536969600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"name":"Funda\u00e7\u00e3o para a Ci\u00eancia e a Tecnologia","award":["PD\/BD\/ 52652\/2014"],"award-info":[{"award-number":["PD\/BD\/ 52652\/2014"]}]},{"name":"Funda\u00e7\u00e3o para a Ci\u00eancia e a Tecnologia","award":["PEst-OE\/ EEI\/LA0008\/2013"],"award-info":[{"award-number":["PEst-OE\/ EEI\/LA0008\/2013"]}]},{"name":"Funda\u00e7\u00e3o para a Ci\u00eancia e a Tecnologia","award":["PTDC\/EEI-CTP\/4503\/2014"],"award-info":[{"award-number":["PTDC\/EEI-CTP\/4503\/2014"]}]},{"name":"Instituto de telecomunica\u00e7\u00f5es","award":["UID\/EEA\/50008\/2013"],"award-info":[{"award-number":["UID\/EEA\/50008\/2013"]}]},{"name":"Lasige","award":["UID\/CEC\/00408\/201"],"award-info":[{"award-number":["UID\/CEC\/00408\/201"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"published-print":{"date-parts":[[2018,11]]},"DOI":"10.1007\/s11128-018-2055-y","type":"journal-article","created":{"date-parts":[[2018,9,16]],"date-time":"2018-09-16T09:21:38Z","timestamp":1537089698000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":50,"title":["Quantum key distribution with quantum walks"],"prefix":"10.1007","volume":"17","author":[{"given":"Chrysoula","family":"Vlachou","sequence":"first","affiliation":[]},{"given":"Walter","family":"Krawec","sequence":"additional","affiliation":[]},{"given":"Paulo","family":"Mateus","sequence":"additional","affiliation":[]},{"given":"Nikola","family":"Paunkovi\u0107","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8792-959X","authenticated-orcid":false,"given":"Andr\u00e9","family":"Souto","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,9,15]]},"reference":[{"key":"2055_CR1","doi-asserted-by":"crossref","unstructured":"Aharonov, D., Ambainis, A., Kempe, J., Vazirani, U.: Quantum walks on graphs. In: Proceedings of ACM Symposium on Theory of Computation (STOC \u201901), pp. 50\u201359 (2001)","DOI":"10.1145\/380752.380758"},{"key":"2055_CR2","doi-asserted-by":"publisher","first-page":"1687","DOI":"10.1103\/PhysRevA.48.1687","volume":"48","author":"Y Aharonov","year":"1993","unstructured":"Aharonov, Y., Davidovich, L., Zagury, N.: Quantum random walks. Phys. Rev. A 48, 1687\u20131690 (1993). \n                    https:\/\/doi.org\/10.1103\/PhysRevA.48.1687","journal-title":"Phys. Rev. A"},{"issue":"04","key":"2055_CR3","doi-asserted-by":"publisher","first-page":"507","DOI":"10.1142\/S0219749903000383","volume":"01","author":"A Ambainis","year":"2003","unstructured":"Ambainis, A.: Quantum walks and their algorithmic applications. Int. J. Quantum Inf. 01(04), 507\u2013518 (2003). \n                    https:\/\/doi.org\/10.1142\/S0219749903000383","journal-title":"Int. J. Quantum Inf."},{"key":"2055_CR4","unstructured":"Ashwin, N., Ashvin, V.: Quantum walk on the line. Tech. Rep. \n                    arXiv:quant-ph\/0010117\n                    \n                   (2000)"},{"key":"2055_CR5","doi-asserted-by":"publisher","first-page":"012,334","DOI":"10.1103\/PhysRevA.75.012334","volume":"75","author":"J Bae","year":"2007","unstructured":"Bae, J., Ac\u00edn, A.: Key distillation from quantum channels using two-way communication protocols. Phys. Rev. A 75, 012,334 (2007). \n                    https:\/\/doi.org\/10.1103\/PhysRevA.75.012334","journal-title":"Phys. Rev. A"},{"key":"2055_CR6","doi-asserted-by":"crossref","unstructured":"Bavaresco, J., Herrera Valencia, N., Klckl, C., Pivoluska, M., Friis, N., Malik, M., Huber, M.: Two measurements are sufficient for certifying high-dimensional entanglement. \n                    arXiv:1709.07344\n                    \n                   (2017)","DOI":"10.1038\/s41567-018-0203-z"},{"issue":"6","key":"2055_CR7","doi-asserted-by":"publisher","first-page":"062,302","DOI":"10.1103\/PhysRevA.88.062302","volume":"88","author":"NJ Beaudry","year":"2013","unstructured":"Beaudry, N.J., Lucamarini, M., Mancini, S., Renner, R.: Security of two-way quantum key distribution. Phys. Rev. A 88(6), 062,302 (2013)","journal-title":"Phys. Rev. A"},{"key":"2055_CR8","doi-asserted-by":"publisher","first-page":"062,308","DOI":"10.1103\/PhysRevA.61.062308","volume":"61","author":"H Bechmann-Pasquinucci","year":"2000","unstructured":"Bechmann-Pasquinucci, H., Tittel, W.: Quantum cryptography using larger alphabets. Phys. Rev. A 61, 062,308 (2000). \n                    https:\/\/doi.org\/10.1103\/PhysRevA.61.062308","journal-title":"Phys. Rev. A"},{"key":"2055_CR9","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1038\/s41534-017-0031-5","volume":"3","author":"R Bedington","year":"2017","unstructured":"Bedington, R., Arrazola, J.M., Ling, A.: Progress in satellite quantum key distribution. Npj Quantum Inf. 3, 30 (2017). \n                    https:\/\/doi.org\/10.1038\/s41534-017-0031-5","journal-title":"Npj Quantum Inf."},{"key":"2055_CR10","unstructured":"Bennett, C., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. In: Proceedings of the IEEE International Conference on Computers, Systems and Signal Processing, pp. 175\u2013179. IEEE Press, New York (1984)"},{"key":"2055_CR11","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1103\/PhysRevLett.68.557","volume":"68","author":"CH Bennett","year":"1992","unstructured":"Bennett, C.H., Brassard, G., Mermin, N.D.: Quantum cryptography without bell\u2019s theorem. Phys. Rev. Lett. 68, 557\u2013559 (1992). \n                    https:\/\/doi.org\/10.1103\/PhysRevLett.68.557","journal-title":"Phys. Rev. Lett."},{"key":"2055_CR12","doi-asserted-by":"publisher","first-page":"659","DOI":"10.1038\/nphys1734","volume":"6","author":"M Berta","year":"2010","unstructured":"Berta, M., Christandl, M., Colbeck, R., Renes, J.M., Renner, R.: The uncertainty principle in the presence of quantum memory. Nat. Phys. 6, 659\u2013662 (2010). \n                    https:\/\/doi.org\/10.1038\/nphys1734","journal-title":"Nat. Phys."},{"key":"2055_CR13","doi-asserted-by":"publisher","first-page":"032,341","DOI":"10.1103\/PhysRevA.79.032341","volume":"79","author":"M Boyer","year":"2009","unstructured":"Boyer, M., Gelles, R., Kenigsberg, D., Mor, T.: Semiquantum key distribution. Phys. Rev. A 79, 032,341 (2009). \n                    https:\/\/doi.org\/10.1103\/PhysRevA.79.032341","journal-title":"Phys. Rev. A"},{"key":"2055_CR14","doi-asserted-by":"publisher","first-page":"140,501","DOI":"10.1103\/PhysRevLett.99.140501","volume":"99","author":"M Boyer","year":"2007","unstructured":"Boyer, M., Kenigsberg, D., Mor, T.: Quantum key distribution with classical bob. Phys. Rev. Lett. 99, 140,501 (2007). \n                    https:\/\/doi.org\/10.1103\/PhysRevLett.99.140501","journal-title":"Phys. Rev. Lett."},{"key":"2055_CR15","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1007\/3-540-45539-6_20","volume-title":"Advances in Cryptology \u2014 EUROCRYPT 2000","author":"Gilles Brassard","year":"2000","unstructured":"Brassard, G., L\u00fctkenhaus, N., Mor, T., Sanders, B.: Security aspects of practical quantum cryptography. In: In Advances in Cryptology? EUROCRYPT\u20192000, pp. 289\u2013299 (2000)"},{"key":"2055_CR16","doi-asserted-by":"publisher","first-page":"153,602","DOI":"10.1103\/PhysRevLett.104.153602","volume":"104","author":"MA Broome","year":"2010","unstructured":"Broome, M.A., Fedrizzi, A., Lanyon, B.P., Kassal, I., Aspuru-Guzik, A., White, A.G.: Discrete single-photon quantum walks with tunable decoherence. Phys. Rev. Lett. 104, 153,602 (2010). \n                    https:\/\/doi.org\/10.1103\/PhysRevLett.104.153602","journal-title":"Phys. Rev. Lett."},{"key":"2055_CR17","doi-asserted-by":"publisher","first-page":"052,317","DOI":"10.1103\/PhysRevA.67.052317","volume":"67","author":"TA Brun","year":"2003","unstructured":"Brun, T.A., Carteret, H.A., Ambainis, A.: Quantum walks driven by many coins. Phys. Rev. A 67, 052,317 (2003). \n                    https:\/\/doi.org\/10.1103\/PhysRevA.67.052317","journal-title":"Phys. Rev. A"},{"key":"2055_CR18","doi-asserted-by":"publisher","first-page":"097,901","DOI":"10.1103\/PhysRevLett.91.097901","volume":"91","author":"D Bruss","year":"2003","unstructured":"Bruss, D., Christandl, M., Ekert, A., Englert, B.G., Kaszlikowski, D., Macchiavello, C.: Tomographic quantum cryptography: equivalence of quantum and classical key distillation. Phys. Rev. Lett. 91, 097,901 (2003). \n                    https:\/\/doi.org\/10.1103\/PhysRevLett.91.097901","journal-title":"Phys. Rev. Lett."},{"key":"2055_CR19","doi-asserted-by":"publisher","first-page":"e1500,087","DOI":"10.1126\/sciadv.1500087","volume":"1","author":"F Cardano","year":"2015","unstructured":"Cardano, F., Massa, F., Qassim, H., Karimi, E., Slussarenko, S., Paparo, D., de Lisio, C., Sciarrino, F., Santamato, E., Boyd, R.W., Marrucci, L.: Quantum walks and wavepacket dynamics on a lattice with twisted photons. Sci. Adv. 1, e1500,087 (2015). \n                    https:\/\/doi.org\/10.1126\/sciadv.1500087","journal-title":"Sci. Adv."},{"key":"2055_CR20","doi-asserted-by":"publisher","first-page":"127,902","DOI":"10.1103\/PhysRevLett.88.127902","volume":"88","author":"NJ Cerf","year":"2002","unstructured":"Cerf, N.J., Bourennane, M., Karlsson, A., Gisin, N.: Security of quantum key distribution using d-level systems. Phys. Rev. Lett. 88, 127,902 (2002). \n                    https:\/\/doi.org\/10.1103\/PhysRevLett.88.127902","journal-title":"Phys. Rev. Lett."},{"key":"2055_CR21","doi-asserted-by":"publisher","first-page":"1451","DOI":"10.1109\/TIT.2005.844076","volume":"51","author":"HF Chau","year":"2005","unstructured":"Chau, H.F.: Unconditionally secure key distribution in higher dimensions by depolarization. IEEE Trans. Inf. Theory 51, 1451\u20131468 (2005). \n                    https:\/\/doi.org\/10.1109\/TIT.2005.844076","journal-title":"IEEE Trans. Inf. Theory"},{"key":"2055_CR22","doi-asserted-by":"publisher","first-page":"062,324","DOI":"10.1103\/PhysRevA.92.062324","volume":"92","author":"HF Chau","year":"2015","unstructured":"Chau, H.F.: Quantum key distribution using qudits that each encode one bit of raw key. Phys. Rev. A 92, 062,324 (2015). \n                    https:\/\/doi.org\/10.1103\/PhysRevA.92.062324","journal-title":"Phys. Rev. A"},{"key":"2055_CR23","doi-asserted-by":"crossref","unstructured":"Childs, A., Cleve, R., Deotto, E., Farhi, E., Gutmann, S., Spielman, D.: Exponential algorithmic speedup by a quantum walk. In: Proceedings of the Thirty-Fifth Annual ACM Symposium on Theory of Computing, STOC \u201903, pp. 59\u201368. ACM, New York, NY, USA (2003)","DOI":"10.1145\/780542.780552"},{"key":"2055_CR24","doi-asserted-by":"publisher","first-page":"180,501","DOI":"10.1103\/PhysRevLett.102.180501","volume":"102","author":"AM Childs","year":"2009","unstructured":"Childs, A.M.: Universal computation by quantum walk. Phys. Rev. Lett. 102, 180,501 (2009). \n                    https:\/\/doi.org\/10.1103\/PhysRevLett.102.180501","journal-title":"Phys. Rev. Lett."},{"issue":"6121","key":"2055_CR25","doi-asserted-by":"publisher","first-page":"791","DOI":"10.1126\/science.1229957","volume":"339","author":"AM Childs","year":"2013","unstructured":"Childs, A.M., Gosset, D., Webb, Z.: Universal computation by multiparticle quantum walk. Science 339(6121), 791\u2013794 (2013). \n                    https:\/\/doi.org\/10.1126\/science.1229957","journal-title":"Science"},{"key":"2055_CR26","doi-asserted-by":"publisher","first-page":"020,504","DOI":"10.1103\/PhysRevLett.102.020504","volume":"102","author":"M Christandl","year":"2009","unstructured":"Christandl, M., K\u00f6nig, R., Renner, R.: Postselection technique for quantum channels with applications to quantum cryptography. Phys. Rev. Lett. 102, 020,504 (2009). \n                    https:\/\/doi.org\/10.1103\/PhysRevLett.102.020504","journal-title":"Phys. Rev. Lett."},{"key":"2055_CR27","doi-asserted-by":"publisher","first-page":"022,306","DOI":"10.1103\/PhysRevA.71.022306","volume":"71","author":"M Curty","year":"2005","unstructured":"Curty, M., Guhne, O., Lewenstein, M., Lutkenhaus, N.: Detecting two-party quantum correlations in quantum-key-distribution protocols. Phys. Rev. A 71, 022,306 (2005). \n                    https:\/\/doi.org\/10.1103\/PhysRevA.71.022306","journal-title":"Phys. Rev. A"},{"key":"2055_CR28","doi-asserted-by":"publisher","first-page":"217,903","DOI":"10.1103\/PhysRevLett.92.217903","volume":"92","author":"M Curty","year":"2004","unstructured":"Curty, M., Lewenstein, M., Lutkenhaus, N.: Entanglement as a precondition for secure quantum key distribution. Phys. Rev. Lett. 92, 217,903 (2004). \n                    https:\/\/doi.org\/10.1103\/PhysRevLett.92.217903","journal-title":"Phys. Rev. Lett."},{"key":"2055_CR29","doi-asserted-by":"publisher","first-page":"677","DOI":"10.1038\/nphys1996","volume":"7","author":"AC Dada","year":"2011","unstructured":"Dada, A.C., Leach, J., Buller, G.S., Padgett, M.J., Andersson, E.: Experimental high-dimensional two-photon entanglement and violations of generalized bell inequalities. Nat. Phys. 7, 677\u2013680 (2011). \n                    https:\/\/doi.org\/10.1038\/nphys1996","journal-title":"Nat. Phys."},{"issue":"2053","key":"2055_CR30","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1098\/rspa.2004.1372","volume":"461","author":"I Devetak","year":"2005","unstructured":"Devetak, I., Winter, A.: Distillation of secret key and entanglement from quantum states. Proc. R. Soc. Lond. A Math. Phys. Eng. Sci. 461(2053), 207\u2013235 (2005). \n                    https:\/\/doi.org\/10.1098\/rspa.2004.1372","journal-title":"Proc. R. Soc. Lond. A Math. Phys. Eng. Sci."},{"key":"2055_CR31","doi-asserted-by":"publisher","first-page":"16,025","DOI":"10.1038\/npjqi.2016.25","volume":"2","author":"E Diamanti","year":"2016","unstructured":"Diamanti, E., Lo, H.K., Qi, B., Yuan, Z.: Practical challenges in quantum key distribution. Npj Quantum Inf. 2, 16,025 (2016). \n                    https:\/\/doi.org\/10.1038\/npjqi.2016.25","journal-title":"Npj Quantum Inf."},{"key":"2055_CR32","doi-asserted-by":"publisher","first-page":"1978","DOI":"10.1038\/s41598-017-01884-0","volume":"7","author":"AR Dixon","year":"2017","unstructured":"Dixon, A.R., Dynes, J.F., Lucamarini, M., Frhlich, B., Sharpe, A.W., Plews, A., Tam, W., Yuan, Z.L., Tanizawa, Y., Sato, H., Kawamura, S., Fujiwara, M., Sasaki, M., Shields, A.J.: Quantum key distribution with hacking countermeasures and long term field trial. Sci. Rep. 7, 1978 (2017). \n                    https:\/\/doi.org\/10.1038\/s41598-017-01884-0","journal-title":"Sci. Rep."},{"key":"2055_CR33","doi-asserted-by":"publisher","first-page":"661","DOI":"10.1103\/PhysRevLett.67.661","volume":"67","author":"AK Ekert","year":"1991","unstructured":"Ekert, A.K.: Quantum cryptography based on bell\u2019s theorem. Phys. Rev. Lett. 67, 661\u2013663 (1991). \n                    https:\/\/doi.org\/10.1103\/PhysRevLett.67.661","journal-title":"Phys. Rev. Lett."},{"key":"2055_CR34","doi-asserted-by":"publisher","first-page":"10,002","DOI":"10.1051\/epjconf\/201510310002","volume":"103","author":"M Elezov","year":"2015","unstructured":"Elezov, M., Ozhegov, R., Kurochkin, Y., Goltsman, G., Makarov, V.: Countermeasures against blinding attack on superconducting nanowire detectors for QKD. EPJ Web Conf. 103, 10,002 (2015). \n                    https:\/\/doi.org\/10.1051\/epjconf\/201510310002","journal-title":"EPJ Web Conf."},{"key":"2055_CR35","unstructured":"Erhard, M., Malik, M., Krenn, M., Zeilinger, A.: Experimental ghz entanglement beyond qubits. \n                    arXiv:1708.03881\n                    \n                   (2017)"},{"key":"2055_CR36","doi-asserted-by":"publisher","first-page":"915","DOI":"10.1103\/PhysRevA.58.915","volume":"58","author":"E Farhi","year":"1998","unstructured":"Farhi, E., Gutmann, S.: Quantum computation and decision trees. Phys. Rev. A 58, 915\u2013928 (1998). \n                    https:\/\/doi.org\/10.1103\/PhysRevA.58.915","journal-title":"Phys. Rev. A"},{"key":"2055_CR37","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1016\/j.physa.2014.01.002","volume":"399","author":"M Gettrick","year":"2014","unstructured":"Gettrick, M., Miszczak, J.A.: Quantum walks with memory on cycles. Phys. A Stat. Mech. Its Appl. 399, 163\u2013170 (2014). \n                    https:\/\/doi.org\/10.1016\/j.physa.2014.01.002","journal-title":"Phys. A Stat. Mech. Its Appl."},{"key":"2055_CR38","doi-asserted-by":"publisher","first-page":"022,320","DOI":"10.1103\/PhysRevA.73.022320","volume":"73","author":"N Gisin","year":"2006","unstructured":"Gisin, N., Fasel, S., Kraus, B., Zbinden, H., Ribordy, G.: Trojan-horse attacks on quantum-key-distribution systems. Phys. Rev. A 73, 022,320 (2006). \n                    https:\/\/doi.org\/10.1103\/PhysRevA.73.022320","journal-title":"Phys. Rev. A"},{"key":"2055_CR39","doi-asserted-by":"publisher","first-page":"263,602","DOI":"10.1103\/PhysRevLett.110.263602","volume":"110","author":"SK Goyal","year":"2013","unstructured":"Goyal, S.K., Roux, F.S., Forbes, A., Konrad, T.: Implementing quantum walks using orbital angular momentum of classical light. Phys. Rev. Lett. 110, 263,602 (2013). \n                    https:\/\/doi.org\/10.1103\/PhysRevLett.110.263602","journal-title":"Phys. Rev. Lett."},{"key":"2055_CR40","doi-asserted-by":"publisher","first-page":"040,302","DOI":"10.1103\/PhysRevA.92.040302","volume":"92","author":"SK Goyal","year":"2015","unstructured":"Goyal, S.K., Roux, F.S., Forbes, A., Konrad, T.: Implementation of multidimensional quantum walks using linear optics and classical light. Phys. Rev. A 92, 040,302 (2015). \n                    https:\/\/doi.org\/10.1103\/PhysRevA.92.040302","journal-title":"Phys. Rev. A"},{"key":"2055_CR41","unstructured":"Harrington, J.W., Ettinger, J.M., Hughes, R.J., Nordholt, J.E.: Enhancing practical security of quantum key distribution with a few decoy states. \n                    arXiv:quant-ph\/0503002\n                    \n                   (2005)"},{"key":"2055_CR42","doi-asserted-by":"publisher","first-page":"073,601","DOI":"10.1103\/PhysRevLett.116.073601","volume":"116","author":"BC Hiesmayr","year":"2016","unstructured":"Hiesmayr, B.C., de Dood, M.J.A., L\u00f6ffler, W.: Observation of four-photon orbital angular momentum entanglement. Phys. Rev. Lett. 116, 073,601 (2016). \n                    https:\/\/doi.org\/10.1103\/PhysRevLett.116.073601","journal-title":"Phys. Rev. Lett."},{"key":"2055_CR43","doi-asserted-by":"publisher","first-page":"057,901","DOI":"10.1103\/PhysRevLett.91.057901","volume":"91","author":"WY Hwang","year":"2003","unstructured":"Hwang, W.Y.: Quantum key distribution with high loss: toward global secure communication. Phys. Rev. Lett. 91, 057,901 (2003). \n                    https:\/\/doi.org\/10.1103\/PhysRevLett.91.057901","journal-title":"Phys. Rev. Lett."},{"key":"2055_CR44","doi-asserted-by":"publisher","first-page":"044,010","DOI":"10.1103\/PhysRevApplied.7.044010","volume":"7","author":"NT Islam","year":"2017","unstructured":"Islam, N.T., Cahall, C., Aragoneses, A., Lezama, A., Kim, J., Gauthier, D.J.: Robust and stable delay interferometers with application to \n                    \n                      \n                    \n                    $$d$$\n                    \n                      \n                        d\n                      \n                    \n                  -dimensional time-frequency quantum key distribution. Phys. Rev. Appl. 7, 044,010 (2017). \n                    https:\/\/doi.org\/10.1103\/PhysRevApplied.7.044010","journal-title":"Phys. Rev. Appl."},{"issue":"3","key":"2055_CR45","doi-asserted-by":"publisher","first-page":"366","DOI":"10.1080\/00107514.2016.1148333","volume":"57","author":"N Jain","year":"2016","unstructured":"Jain, N., Stiller, B., Khan, I., Elser, D., Marquardt, C., Leuchs, G.: Attacks on practical quantum key distribution systems (and how to prevent them). Contemp. Phys. 57(3), 366\u2013387 (2016). \n                    https:\/\/doi.org\/10.1080\/00107514.2016.1148333","journal-title":"Contemp. Phys."},{"key":"2055_CR46","doi-asserted-by":"publisher","first-page":"180,405","DOI":"10.1103\/PhysRevLett.101.180405","volume":"101","author":"AK Jha","year":"2008","unstructured":"Jha, A.K., Malik, M., Boyd, R.W.: Exploring energy-time entanglement using geometric phase. Phys. Rev. Lett. 101, 180,405 (2008). \n                    https:\/\/doi.org\/10.1103\/PhysRevLett.101.180405","journal-title":"Phys. Rev. Lett."},{"issue":"4","key":"2055_CR47","doi-asserted-by":"publisher","first-page":"307","DOI":"10.1080\/00107151031000110776","volume":"44","author":"J Kempe","year":"2003","unstructured":"Kempe, J.: Quantum random walks: an introductory overview. Contemp. Phys. 44(4), 307\u2013327 (2003). \n                    https:\/\/doi.org\/10.1080\/00107151031000110776","journal-title":"Contemp. Phys."},{"key":"2055_CR48","doi-asserted-by":"publisher","first-page":"020,301","DOI":"10.1103\/PhysRevA.68.020301","volume":"68","author":"PL Knight","year":"2003","unstructured":"Knight, P.L., Roldan, E., Sipe, J.E.: Quantum walk on the line as an interference phenomenon. Phys. Rev. A 68, 020,301 (2003). \n                    https:\/\/doi.org\/10.1103\/PhysRevA.68.020301","journal-title":"Phys. Rev. A"},{"issue":"11","key":"2055_CR49","doi-asserted-by":"publisher","first-page":"2417","DOI":"10.1007\/s11128-014-0802-2","volume":"13","author":"WO Krawec","year":"2014","unstructured":"Krawec, W.O.: Restricted attacks on semi-quantum key distribution protocols. Quantum Inf. Process. 13(11), 2417\u20132436 (2014). \n                    https:\/\/doi.org\/10.1007\/s11128-014-0802-2","journal-title":"Quantum Inf. Process."},{"key":"2055_CR50","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1016\/j.physa.2015.02.061","volume":"428","author":"WO Krawec","year":"2015","unstructured":"Krawec, W.O.: History dependent quantum walk on the cycle with an unbalanced coin. Phys. A Stat. Mech. Its Appl. 428, 319\u2013331 (2015). \n                    https:\/\/doi.org\/10.1016\/j.physa.2015.02.061","journal-title":"Phys. A Stat. Mech. Its Appl."},{"key":"2055_CR51","doi-asserted-by":"crossref","unstructured":"Krawec, W.O.: Security proof of a semi-quantum key distribution protocol. In: 2015 IEEE International Symposium on Information Theory (ISIT), pp. 686\u2013690. IEEE (2015)","DOI":"10.1109\/ISIT.2015.7282542"},{"key":"2055_CR52","unstructured":"Krawec, W.O.: Quantum key distribution with mismatched measurements over arbitrary channels. \n                    arXiv:1608.07728\n                    \n                   (2016)"},{"issue":"5","key":"2055_CR53","doi-asserted-by":"publisher","first-page":"2067","DOI":"10.1007\/s11128-016-1266-3","volume":"15","author":"WO Krawec","year":"2016","unstructured":"Krawec, W.O.: Security of a semi-quantum protocol where reflections contribute to the secret key. Quantum Inf. Process. 15(5), 2067\u20132090 (2016)","journal-title":"Quantum Inf. Process."},{"key":"2055_CR54","doi-asserted-by":"publisher","first-page":"6243","DOI":"10.1073\/pnas.1402365111","volume":"111","author":"M Krenn","year":"2014","unstructured":"Krenn, M., Huber, M., Fickler, R., Lapkiewicz, R., Ramelow, S., Zeilinger, A.: Generation and confirmation of a (\n                    \n                      \n                    \n                    $$100 \\times 100$$\n                    \n                      \n                        \n                          100\n                          \u00d7\n                          100\n                        \n                      \n                    \n                  )-dimensional entangled quantum system. Proc. Natl. Acad. Sci. USA 111, 6243\u20136247 (2014). \n                    https:\/\/doi.org\/10.1073\/pnas.1402365111","journal-title":"Proc. Natl. Acad. Sci. USA"},{"key":"2055_CR55","doi-asserted-by":"publisher","first-page":"090,405","DOI":"10.1103\/PhysRevLett.116.090405","volume":"116","author":"M Krenn","year":"2016","unstructured":"Krenn, M., Malik, M., Fickler, R., Lapkiewicz, R., Zeilinger, A.: Automated search for new quantum experiments. Phys. Rev. Lett. 116, 090,405 (2016). \n                    https:\/\/doi.org\/10.1103\/PhysRevLett.116.090405","journal-title":"Phys. Rev. Lett."},{"issue":"13","key":"2055_CR56","doi-asserted-by":"publisher","first-page":"2039","DOI":"10.1080\/09500340108240905","volume":"48","author":"C Kurtsiefer","year":"2001","unstructured":"Kurtsiefer, C., Zarda, P., Mayer, S., Weinfurter, H.: The breakdown flash of silicon avalanche photodiodes-back door for eavesdropper attacks? J. Mod. Opt. 48(13), 2039\u20132047 (2001). \n                    https:\/\/doi.org\/10.1080\/09500340108240905","journal-title":"J. Mod. Opt."},{"key":"2055_CR57","doi-asserted-by":"publisher","first-page":"9388","DOI":"10.1364\/OE.15.009388","volume":"15","author":"A Lamas-Linares","year":"2007","unstructured":"Lamas-Linares, A., Kurtsiefer, C.: Breaking a quantum key distribution system through a timing side channel. Opt. Express 15, 9388\u20139393 (2007). \n                    https:\/\/doi.org\/10.1364\/OE.15.009388","journal-title":"Opt. Express"},{"key":"2055_CR58","doi-asserted-by":"publisher","first-page":"2110","DOI":"10.1364\/OE.20.002110","volume":"20","author":"MPJ Lavery","year":"2012","unstructured":"Lavery, M.P.J., Robertson, D.J., Berkhout, G.C.G., Love, G.D., Padgett, M.J., Courtial, J.: Refractive elements for the measurement of the orbital angular momentum of a single photon. Opt. Express 20, 2110\u20132115 (2012). \n                    https:\/\/doi.org\/10.1364\/OE.20.002110","journal-title":"Opt. Express"},{"key":"2055_CR59","doi-asserted-by":"publisher","first-page":"062,321","DOI":"10.1103\/PhysRevA.94.062321","volume":"94","author":"MS Lee","year":"2016","unstructured":"Lee, M.S., Park, B.K., Woo, M.K., Park, C.H., Kim, Y.S., Han, S.W., Moon, S.: Countermeasure against blinding attacks on low-noise detectors with a background-noise-cancellation scheme. Phys. Rev. A 94, 062,321 (2016). \n                    https:\/\/doi.org\/10.1103\/PhysRevA.94.062321","journal-title":"Phys. Rev. A"},{"issue":"1","key":"2055_CR60","doi-asserted-by":"publisher","first-page":"013,108","DOI":"10.1063\/1.4854615","volume":"85","author":"Q Liu","year":"2014","unstructured":"Liu, Q., Lamas-Linares, A., Kurtsiefer, C., Skaar, J., Makarov, V., Gerhardt, I.: A universal setup for active control of a single-photon detector. Rev. Sci. Instrum. 85(1), 013,108 (2014). \n                    https:\/\/doi.org\/10.1063\/1.4854615","journal-title":"Rev. Sci. Instrum."},{"issue":"1","key":"2055_CR61","doi-asserted-by":"publisher","first-page":"4","DOI":"10.3390\/e19010004","volume":"19","author":"LA Lizama-Prez","year":"2016","unstructured":"Lizama-Prez, L.A., Lpez, J.M., De\u00a0Carlos\u00a0Lpez, E.: Quantum key distribution in the presence of the intercept-resend with faked states attack. Entropy 19(1), 4 (2016). \n                    https:\/\/doi.org\/10.3390\/e19010004","journal-title":"Entropy"},{"issue":"5410","key":"2055_CR62","doi-asserted-by":"publisher","first-page":"2050","DOI":"10.1126\/science.283.5410.2050","volume":"283","author":"HK Lo","year":"1999","unstructured":"Lo, H.K., Chau, H.: Unconditional security of quantum key distribution over arbitrarily long distances. Science 283(5410), 2050\u20132056 (1999). \n                    https:\/\/doi.org\/10.1126\/science.283.5410.2050\n                    \n                  . Please check and confirm the inserted publication year is correct for the references [61, 68]","journal-title":"Science"},{"issue":"2","key":"2055_CR63","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1007\/s00145-004-0142-y","volume":"18","author":"HK Lo","year":"2005","unstructured":"Lo, H.K., Chau, H.F., Ardehali, M.: Efficient quantum key distribution scheme and a proof of its unconditional security. J. Cryptol. 18(2), 133\u2013165 (2005). \n                    https:\/\/doi.org\/10.1007\/s00145-004-0142-y","journal-title":"J. Cryptol."},{"key":"2055_CR64","doi-asserted-by":"publisher","first-page":"230,504","DOI":"10.1103\/PhysRevLett.94.230504","volume":"94","author":"HK Lo","year":"2005","unstructured":"Lo, H.K., Ma, X., Chen, K.: Decoy state quantum key distribution. Phys. Rev. Lett. 94, 230,504 (2005). \n                    https:\/\/doi.org\/10.1103\/PhysRevLett.94.230504","journal-title":"Phys. Rev. Lett."},{"key":"2055_CR65","doi-asserted-by":"publisher","first-page":"042,330","DOI":"10.1103\/PhysRevA.81.042330","volume":"81","author":"NB Lovett","year":"2010","unstructured":"Lovett, N.B., Cooper, S., Everitt, M., Trevers, M., Kendon, V.: Universal quantum computation using the discrete-time quantum walk. Phys. Rev. A 81, 042,330 (2010). \n                    https:\/\/doi.org\/10.1103\/PhysRevA.81.042330","journal-title":"Phys. Rev. A"},{"key":"2055_CR66","doi-asserted-by":"publisher","first-page":"042,344","DOI":"10.1103\/PhysRevA.84.042344","volume":"84","author":"H Lu","year":"2011","unstructured":"Lu, H., Fung, C.H.F., Ma, X., Cai, Q.Y.: Unconditional security proof of a deterministic quantum key distribution with a two-way quantum channel. Phys. Rev. A 84, 042,344 (2011). \n                    https:\/\/doi.org\/10.1103\/PhysRevA.84.042344","journal-title":"Phys. Rev. A"},{"key":"2055_CR67","doi-asserted-by":"publisher","first-page":"031,030","DOI":"10.1103\/PhysRevX.5.031030","volume":"5","author":"M Lucamarini","year":"2015","unstructured":"Lucamarini, M., Choi, I., Ward, M.B., Dynes, J.F., Yuan, Z.L., Shields, A.J.: Practical security bounds against the trojan-horse attack in quantum key distribution. Phys. Rev. X 5, 031,030 (2015). \n                    https:\/\/doi.org\/10.1103\/PhysRevX.5.031030","journal-title":"Phys. Rev. X"},{"issue":"3","key":"2055_CR68","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/JSTQE.2015.2394774","volume":"21","author":"M Lucamarini","year":"2015","unstructured":"Lucamarini, M., Dynes, J.F., Frohlich, B., Yuan, Z., Shields, A.J.: Security bounds for efficient decoy-state quantum key distribution. IEEE J. Sel. Top. Quantum Electron. 21(3), 1\u20138 (2015). \n                    https:\/\/doi.org\/10.1109\/JSTQE.2015.2394774","journal-title":"IEEE J. Sel. Top. Quantum Electron."},{"key":"2055_CR69","doi-asserted-by":"publisher","first-page":"052,304","DOI":"10.1103\/PhysRevA.61.052304","volume":"61","author":"N Lutkenhaus","year":"2000","unstructured":"Lutkenhaus, N.: Security against individual attacks for realistic quantum key distribution. Phys. Rev. A 61, 052,304 (2000). \n                    https:\/\/doi.org\/10.1103\/PhysRevA.61.052304","journal-title":"Phys. Rev. A"},{"issue":"1","key":"2055_CR70","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1088\/1367-2630\/4\/1\/344","volume":"4","author":"N Lutkenhaus","year":"2002","unstructured":"Lutkenhaus, N., Jahma, M.: Quantum key distribution with realistic states: photon-number statistics in the photon-number splitting attack. New J. Phys. 4(1), 44 (2002)","journal-title":"New J. Phys."},{"key":"2055_CR71","doi-asserted-by":"publisher","first-page":"686","DOI":"10.1038\/nphoton.2010.214","volume":"4","author":"L Lydersen","year":"2010","unstructured":"Lydersen, L., Wiechers, C., Wittmann, C., Elser, D., Skaar, J., Makarov, V.: Hacking commercial quantum cryptography systems by tailored bright illumination. Nat. Photon. 4, 686 (2010). \n                    https:\/\/doi.org\/10.1038\/nphoton.2010.214","journal-title":"Nat. Photon."},{"key":"2055_CR72","doi-asserted-by":"publisher","first-page":"012,326","DOI":"10.1103\/PhysRevA.72.012326","volume":"72","author":"X Ma","year":"2005","unstructured":"Ma, X., Qi, B., Zhao, Y., Lo, H.K.: Practical decoy state for quantum key distribution. Phys. Rev. A 72, 012,326 (2005). \n                    https:\/\/doi.org\/10.1103\/PhysRevA.72.012326","journal-title":"Phys. Rev. A"},{"key":"2055_CR73","doi-asserted-by":"publisher","first-page":"022,313","DOI":"10.1103\/PhysRevA.74.022313","volume":"74","author":"V Makarov","year":"2006","unstructured":"Makarov, V., Anisimov, A., Skaar, J.: Effects of detector efficiency mismatch on security of quantum cryptosystems. Phys. Rev. A 74, 022,313 (2006). \n                    https:\/\/doi.org\/10.1103\/PhysRevA.74.022313","journal-title":"Phys. Rev. A"},{"key":"2055_CR74","doi-asserted-by":"publisher","first-page":"248","DOI":"10.1038\/nphoton.2016.12","volume":"10","author":"M Malik","year":"2016","unstructured":"Malik, M., Erhard, M., Huber, M., Krenn, M., Fickler, R., Zeilinger, A.: Multi-photon entanglement in high dimensions. Nat. Photon. 10, 248\u2013252 (2016). \n                    https:\/\/doi.org\/10.1038\/nphoton.2016.12","journal-title":"Nat. Photon."},{"key":"2055_CR75","volume-title":"Physical Implementation of Quantum Walks","author":"K Manouchehri","year":"2013","unstructured":"Manouchehri, K., Wang, J.: Physical Implementation of Quantum Walks. Springer Publishing Company, Incorporated, New York (2013)"},{"key":"2055_CR76","doi-asserted-by":"publisher","first-page":"110,501","DOI":"10.1103\/PhysRevLett.118.110501","volume":"118","author":"A Martin","year":"2017","unstructured":"Martin, A., Guerreiro, T., Tiranov, A., Designolle, S., Frowis, F., Brunner, N., Huber, M., Gisin, N.: Quantifying photonic high-dimensional entanglement. Phys. Rev. Lett. 118, 110,501 (2017). \n                    https:\/\/doi.org\/10.1103\/PhysRevLett.118.110501","journal-title":"Phys. Rev. Lett."},{"issue":"5","key":"2055_CR77","first-page":"509","volume":"10","author":"M McGettrick","year":"2010","unstructured":"McGettrick, M.: One dimensional quantum walks with memory. Quantum Inf. Comput. 10(5), 509\u2013524 (2010)","journal-title":"Quantum Inf. Comput."},{"key":"2055_CR78","doi-asserted-by":"publisher","first-page":"2781","DOI":"10.1038\/ncomms3781","volume":"4","author":"M Mirhosseini","year":"2013","unstructured":"Mirhosseini, M., Malik, M., Shi, Z., Boyd, R.W.: Efficient separation of the orbital angular momentum eigenstates of light. Nat. Commun. 4, 2781 (2013). \n                    https:\/\/doi.org\/10.1038\/ncomms3781","journal-title":"Nat. Commun."},{"key":"2055_CR79","doi-asserted-by":"publisher","first-page":"032,348","DOI":"10.1103\/PhysRevA.77.032348","volume":"77","author":"G Nikolopoulos","year":"2008","unstructured":"Nikolopoulos, G.: Applications of single-qubit rotations in quantum public-key cryptography. Phys. Rev. A 77, 032,348 (2008). \n                    https:\/\/doi.org\/10.1103\/PhysRevA.77.032348","journal-title":"Phys. Rev. A"},{"key":"2055_CR80","doi-asserted-by":"publisher","first-page":"032,320","DOI":"10.1103\/PhysRevA.72.032320","volume":"72","author":"GM Nikolopoulos","year":"2005","unstructured":"Nikolopoulos, G.M., Alber, G.: Security bound of two-basis quantum-key-distribution protocols using qudits. Phys. Rev. A 72, 032,320 (2005). \n                    https:\/\/doi.org\/10.1103\/PhysRevA.72.032320","journal-title":"Phys. Rev. A"},{"key":"2055_CR81","doi-asserted-by":"publisher","first-page":"032,325","DOI":"10.1103\/PhysRevA.73.032325","volume":"73","author":"GM Nikolopoulos","year":"2006","unstructured":"Nikolopoulos, G.M., Ranade, K.S., Alber, G.: Error tolerance of two-basis quantum-key-distribution protocols using qudits and two-way classical communication. Phys. Rev. A 73, 032,325 (2006). \n                    https:\/\/doi.org\/10.1103\/PhysRevA.73.032325","journal-title":"Phys. Rev. A"},{"key":"2055_CR82","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-6336-8","volume-title":"Quantum Walks and Search Algorithms. Quantum Science and Technology","author":"R Portugal","year":"2013","unstructured":"Portugal, R.: Quantum Walks and Search Algorithms. Quantum Science and Technology. Springer, New York, NY (2013). \n                    https:\/\/doi.org\/10.1007\/978-1-4614-6336-8"},{"key":"2055_CR83","doi-asserted-by":"publisher","first-page":"024,009","DOI":"10.1088\/2058-9565\/aa701f","volume":"2","author":"CJ Pugh","year":"2017","unstructured":"Pugh, C.J., Kaiser, S., Bourgoin, J.P., Jin, J., Sultana, N., Agne, S., Anisimova, E., Makarov, V., Choi, E., Higgins, B.L., Jennewein, T.: Airborne demonstration of a quantum key distribution receiver payload. Quantum Sci. Technol. 2, 024,009 (2017). \n                    https:\/\/doi.org\/10.1088\/2058-9565\/aa701f","journal-title":"Quantum Sci. Technol."},{"key":"2055_CR84","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1103\/PhysRevX.5.031030","volume":"7","author":"B Qi","year":"2007","unstructured":"Qi, B., Fung, C.H.F., Lo, H.K., Ma, X.: Time-shift attack in practical quantum cryptosystems. Quantum Inf. Comput. 7, 73\u201382 (2007). \n                    https:\/\/doi.org\/10.1103\/PhysRevX.5.031030","journal-title":"Quantum Inf. Comput."},{"key":"2055_CR85","unstructured":"Quantique, I.: Quantum key distribution record (2017). \n                    https:\/\/www.idquantique.com\/clavis3-quantum-key-distribution-platform\/\n                    \n                  . Accessed 12 Sept 2018"},{"key":"2055_CR86","doi-asserted-by":"publisher","first-page":"645","DOI":"10.1038\/nphys684","volume":"3","author":"R Renner","year":"2007","unstructured":"Renner, R.: Symmetry of large physical systems implies independence of subsystems. Nat. Phys. 3, 645\u2013649 (2007). \n                    https:\/\/doi.org\/10.1038\/nphys684","journal-title":"Nat. Phys."},{"key":"2055_CR87","doi-asserted-by":"publisher","first-page":"012,332","DOI":"10.1103\/PhysRevA.72.012332","volume":"72","author":"R Renner","year":"2005","unstructured":"Renner, R., Gisin, N., Kraus, B.: Information-theoretic security proof for quantum-key-distribution protocols. Phys. Rev. A 72, 012,332 (2005). \n                    https:\/\/doi.org\/10.1103\/PhysRevA.72.012332","journal-title":"Phys. Rev. A"},{"key":"2055_CR88","doi-asserted-by":"publisher","first-page":"052,302","DOI":"10.1103\/PhysRevA.87.052302","volume":"87","author":"PP Rohde","year":"2013","unstructured":"Rohde, P.P., Brennen, G.K., Gilchrist, A.: Quantum walks with memory provided by recycled coins and a memory of the coin-flip history. Phys. Rev. A 87, 052,302 (2013). \n                    https:\/\/doi.org\/10.1103\/PhysRevA.87.052302","journal-title":"Phys. Rev. A"},{"issue":"15","key":"2055_CR89","doi-asserted-by":"publisher","first-page":"150,501","DOI":"10.1103\/PhysRevLett.109.150501","volume":"109","author":"PP Rohde","year":"2012","unstructured":"Rohde, P.P., Fitzsimons, J.F., Gilchrist, A.: Quantum walks with encrypted data. Phys. Rev. Lett. 109(15), 150,501 (2012)","journal-title":"Phys. Rev. Lett."},{"key":"2055_CR90","doi-asserted-by":"publisher","first-page":"2649","DOI":"10.1080\/09500340500309873","volume":"52","author":"E Roldan","year":"2006","unstructured":"Roldan, E., Soriano, J.C.: Optical implementability of the two-dimensional quantum walk. J. Mod. Opt. 52, 2649\u20132657 (2006). \n                    https:\/\/doi.org\/10.1080\/09500340500309873","journal-title":"J. Mod. Opt."},{"issue":"4","key":"2055_CR91","doi-asserted-by":"publisher","first-page":"045,009","DOI":"10.1088\/1367-2630\/11\/4\/045009","volume":"11","author":"D Rosenberg","year":"2009","unstructured":"Rosenberg, D., Peterson, C.G., Harrington, J.W., Rice, P.R., Dallmann, N., Tyagi, K.T., McCabe, K.P., Nam, S., Baek, B., Hadfield, R.H., Hughes, R.J., Nordholt, J.E.: Practical long-distance quantum key distribution system using decoy levels. New J. Phys. 11(4), 045,009 (2009)","journal-title":"New J. Phys."},{"key":"2055_CR92","doi-asserted-by":"publisher","first-page":"8403","DOI":"10.1038\/s41598-017-08279-1","volume":"7","author":"S Sajeed","year":"2017","unstructured":"Sajeed, S., Minshull, C., Jain, N., Makarov, V.: Invisible Trojan-horse attack. Sci. Rep. 7, 8403 (2017). \n                    https:\/\/doi.org\/10.1038\/s41598-017-08279-1","journal-title":"Sci. Rep."},{"key":"2055_CR93","doi-asserted-by":"publisher","first-page":"010,502","DOI":"10.1103\/PhysRevLett.108.010502","volume":"108","author":"L Sansoni","year":"2012","unstructured":"Sansoni, L., Sciarrino, F., Vallone, G., Mataloni, P., Crespi, A., Ramponi, R., Osellame, R.: Two-particle bosonic-fermionic quantum walk via integrated photonics. Phys. Rev. Lett. 108, 010,502 (2012). \n                    https:\/\/doi.org\/10.1103\/PhysRevLett.108.010502","journal-title":"Phys. Rev. Lett."},{"key":"2055_CR94","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1007\/978-3-540-79228-4-3","volume-title":"Theory and Applications of Models of Computation, Lecture Notes in Computer Science","author":"M Santha","year":"2008","unstructured":"Santha, M.: Quantum walk based search algorithms. In: Agrawal, M., Du, D., Duan, Z., Li, A. (eds.) Theory and Applications of Models of Computation, Lecture Notes in Computer Science, vol. 4978, pp. 31\u201346. Springer, Berlin (2008). \n                    https:\/\/doi.org\/10.1007\/978-3-540-79228-4-3"},{"key":"2055_CR95","doi-asserted-by":"publisher","first-page":"1301","DOI":"10.1103\/RevModPhys.81.1301","volume":"81","author":"V Scarani","year":"2009","unstructured":"Scarani, V., Bechmann-Pasquinucci, H., Cerf, N., Du\u0161ek, M., Lutkenhaus, N., Peev, M.: The security of practical quantum key distribution. Rev. Mod. Phys. 81, 1301\u20131350 (2009). \n                    https:\/\/doi.org\/10.1103\/RevModPhys.81.1301","journal-title":"Rev. Mod. Phys."},{"key":"2055_CR96","doi-asserted-by":"publisher","first-page":"1301","DOI":"10.1103\/RevModPhys.81.1301","volume":"81","author":"V Scarani","year":"2009","unstructured":"Scarani, V., Bechmann-Pasquinucci, H., Cerf, N.J., Du\u0161ek, M., L\u00fctkenhaus, N., Peev, M.: The security of practical quantum key distribution. Rev. Mod. Phys. 81, 1301\u20131350 (2009). \n                    https:\/\/doi.org\/10.1103\/RevModPhys.81.1301","journal-title":"Rev. Mod. Phys."},{"key":"2055_CR97","doi-asserted-by":"publisher","first-page":"050,502","DOI":"10.1103\/PhysRevLett.104.050502","volume":"104","author":"A Schreiber","year":"2010","unstructured":"Schreiber, A., Cassemiro, K.N., Potocek, V., Gabris, A., Mosley, P.J., Andersson, E., Jex, I., Silberhorn, C.: Photons walking the line: a quantum walk with adjustable coin operations. Phys. Rev. Lett. 104, 050,502 (2010). \n                    https:\/\/doi.org\/10.1103\/PhysRevLett.104.050502","journal-title":"Phys. Rev. Lett."},{"key":"2055_CR98","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1126\/science.1218448","volume":"336","author":"A Schreiber","year":"2012","unstructured":"Schreiber, A., Gabris, A., Rohde, P.P., Laiho, K., Stefanak, M., Potocek, V., Hamilton, C., Jex, I., Silberhorn, C.: A 2D quantum walk simulation of two-particle dynamics. Science 336, 55\u201358 (2012). \n                    https:\/\/doi.org\/10.1126\/science.1218448","journal-title":"Science"},{"issue":"2","key":"2055_CR99","doi-asserted-by":"publisher","first-page":"022,342","DOI":"10.1103\/PhysRevA.85.022342","volume":"85","author":"U Seyfarth","year":"2012","unstructured":"Seyfarth, U., Nikolopoulos, G., Alber, G.: Symmetries and security of a quantum-public-key encryption based on single-qubit rotations. Phys. Rev. A 85(2), 022,342 (2012)","journal-title":"Phys. Rev. A"},{"key":"2055_CR100","doi-asserted-by":"publisher","first-page":"030,301","DOI":"10.1103\/PhysRevA.82.030301","volume":"82","author":"L Sheridan","year":"2010","unstructured":"Sheridan, L., Scarani, V.: Security proof for quantum key distribution using qudit systems. Phys. Rev. A 82, 030,301 (2010). \n                    https:\/\/doi.org\/10.1103\/PhysRevA.82.030301","journal-title":"Phys. Rev. A"},{"key":"2055_CR101","unstructured":"Stipcevi\u0107, M.: Preventing detector blinding attack and other random number generator attacks on quantum cryptography by use of an explicit random number generator. \n                    arXiv:1403.0143\n                    \n                   (2014)"},{"key":"2055_CR102","doi-asserted-by":"publisher","first-page":"827","DOI":"10.1038\/nphoton.2015.173","volume":"9","author":"H Takesue","year":"2015","unstructured":"Takesue, H., Sasaki, T., Tamaki, K., Koashi, M.: Experimental quantum key distribution without monitoring signal disturbance. Nat. Photon. 9, 827\u2013831 (2015). \n                    https:\/\/doi.org\/10.1038\/nphoton.2015.173","journal-title":"Nat. Photon."},{"key":"2055_CR103","doi-asserted-by":"publisher","first-page":"481","DOI":"10.1038\/nphys629","volume":"3","author":"R Ursin","year":"2007","unstructured":"Ursin, R., Tiefenbacher, F., Schmitt-Manderbach, T., Weier, H., Scheidl, T., Lindenthal, M., Blauensteiner, B., Jennewein, T., Perdigues, J., Trojek, P., Omer, B., Furst, M., Meyenburg, M., Rarity, J., Sodnik, Z., Barbieri, C., Weinfurter, H., Zeilinger, A.: Entanglement-based quantum communication over 144\u00a0km. Nat. Phys. 3, 481\u2013486 (2007). \n                    https:\/\/doi.org\/10.1038\/nphys629","journal-title":"Nat. Phys."},{"issue":"13","key":"2055_CR104","doi-asserted-by":"publisher","first-page":"2023","DOI":"10.1080\/09500340108240904","volume":"48","author":"A Vakhitov","year":"2001","unstructured":"Vakhitov, A., Makarov, V., Hjelme, D.R.: Large pulse attack as a method of conventional optical eavesdropping in quantum cryptography. J. Mod. Opt. 48(13), 2023\u20132038 (2001). \n                    https:\/\/doi.org\/10.1080\/09500340108240904","journal-title":"J. Mod. Opt."},{"issue":"5","key":"2055_CR105","doi-asserted-by":"publisher","first-page":"1015","DOI":"10.1007\/s11128-012-0432-5","volume":"11","author":"SE Venegas-Andraca","year":"2012","unstructured":"Venegas-Andraca, S.E.: Quantum walks: a comprehensive review. Quantum Inf. Process. 11(5), 1015\u20131106 (2012). \n                    https:\/\/doi.org\/10.1007\/s11128-012-0432-5","journal-title":"Quantum Inf. Process."},{"issue":"07","key":"2055_CR106","doi-asserted-by":"publisher","first-page":"1550,050","DOI":"10.1142\/S0219749915500501","volume":"13","author":"C Vlachou","year":"2015","unstructured":"Vlachou, C., Rodrigues, J., Mateus, P., Paunkovi\u0107, N., Souto, A.: Quantum walk public-key cryptographic system. Int. J. Quantum Inf. 13(07), 1550,050 (2015)","journal-title":"Int. J. Quantum Inf."},{"key":"2055_CR107","doi-asserted-by":"publisher","first-page":"1462","DOI":"10.1364\/OPTICA.4.001462","volume":"4","author":"F Wang","year":"2017","unstructured":"Wang, F., Erhard, M., Babazadeh, A., Malik, M., Krenn, M., Zeilinger, A.: Generation of the complete four-dimensional bell basis. Optica 4, 1462\u20131467 (2017). \n                    https:\/\/doi.org\/10.1364\/OPTICA.4.001462","journal-title":"Optica"},{"issue":"1","key":"2055_CR108","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1140\/epjd\/e2015-60469-8","volume":"70","author":"J Wang","year":"2016","unstructured":"Wang, J., Wang, H., Qin, X., Wei, Z., Zhang, Z.: The countermeasures against the blinding attack in quantum key distribution. Eur. Phys. J. D 70(1), 5 (2016). \n                    https:\/\/doi.org\/10.1140\/epjd\/e2015-60469-8","journal-title":"Eur. Phys. J. D"},{"issue":"4","key":"2055_CR109","doi-asserted-by":"publisher","first-page":"40,001","DOI":"10.1209\/0295-5075\/79\/40001","volume":"79","author":"Q Wang","year":"2007","unstructured":"Wang, Q., Wang, X.B., Bjrk, G., Karlsson, A.: Improved practical decoy state method in quantum key distribution with parametric down-conversion source. EPL Europhys. Lett. 79(4), 40,001 (2007)","journal-title":"EPL Europhys. Lett."},{"key":"2055_CR110","doi-asserted-by":"publisher","first-page":"230,503","DOI":"10.1103\/PhysRevLett.94.230503","volume":"94","author":"XB Wang","year":"2005","unstructured":"Wang, X.B.: Beating the photon-number-splitting attack in practical quantum cryptography. Phys. Rev. Lett. 94, 230,503 (2005). \n                    https:\/\/doi.org\/10.1103\/PhysRevLett.94.230503","journal-title":"Phys. Rev. Lett."},{"key":"2055_CR111","doi-asserted-by":"publisher","first-page":"012,322","DOI":"10.1103\/PhysRevA.72.012322","volume":"72","author":"XB Wang","year":"2005","unstructured":"Wang, X.B.: Decoy-state protocol for quantum cryptography with four different intensities of coherent light. Phys. Rev. A 72, 012,322 (2005). \n                    https:\/\/doi.org\/10.1103\/PhysRevA.72.012322","journal-title":"Phys. Rev. A"},{"issue":"1","key":"2055_CR112","doi-asserted-by":"publisher","first-page":"013043","DOI":"10.1088\/1367-2630\/13\/1\/013043","volume":"13","author":"C Wiechers","year":"2011","unstructured":"Wiechers, C., Lydersen, L., Wittmann, C., Elser, D., Skaar, J., Marquardt, C., Makarov, V., Leuchs, G.: After-gate attack on a quantum cryptosystem. New J. Phys. 13(1), 013043 (2011)","journal-title":"New J. Phys."},{"key":"2055_CR113","doi-asserted-by":"publisher","first-page":"150,501","DOI":"10.1103\/PhysRevLett.115.150501","volume":"115","author":"E Woodhead","year":"2015","unstructured":"Woodhead, E., Pironio, S.: Secrecy in prepare-and-measure clauser-horne-shimony-holt tests with a qubit bound. Phys. Rev. Lett. 115, 150,501 (2015). \n                    https:\/\/doi.org\/10.1103\/PhysRevLett.115.150501","journal-title":"Phys. Rev. Lett."},{"issue":"8","key":"2055_CR114","doi-asserted-by":"publisher","first-page":"2959","DOI":"10.1007\/s11128-015-1021-1","volume":"14","author":"G Xu","year":"2015","unstructured":"Xu, G., Chen, X.B., Dou, Z., Yang, Y.X., Li, Z.: A novel protocol for multiparty quantum key management. Quantum Inf. Process. 14(8), 2959\u20132980 (2015). \n                    https:\/\/doi.org\/10.1007\/s11128-015-1021-1","journal-title":"Quantum Inf. Process."},{"key":"2055_CR115","unstructured":"Yao, A.C.: How to generate and exchange secrets. In: 27th Annual Symposium on Foundations of Computer Science, 1986., pp. 162\u2013167. IEEE (1986)"},{"key":"2055_CR116","doi-asserted-by":"publisher","first-page":"1140","DOI":"10.1126\/science.aan3211","volume":"356","author":"J Yin","year":"2017","unstructured":"Yin, J., Cao, Y., Li, Y.H., Liao, S.K., Zhang, L., Ren, J.G., Cai, W.Q., Liu, W.Y., Li, B., Dai, H., Li, G.B., Lu, Q.M., Gong, Y.H., Xu, Y., Li, S.L., Li, F.Z., Yin, Y.Y., Jiang, Z.Q., Li, M., Jia, J.J., Ren, G., He, D., Zhou, Y.L., Zhang, X.X., Wang, N., Chang, X., Zhu, Z.C., Liu, N.L., Chen, Y.A., Lu, C.Y., Shu, R., Peng, C.Z., Wang, J.Y., Pan, J.W.: Satellite-based entanglement distribution over 1200 kilometers. Science 356, 1140\u20131144 (2017). \n                    https:\/\/doi.org\/10.1126\/science.aan3211","journal-title":"Science"},{"key":"2055_CR117","unstructured":"Zhang, W., Qiu, D., Mateus, P.: Security of a single-state semi-quantum key distribution protocol. \n                    arXiv:1612.03170\n                    \n                   (2016)"},{"key":"2055_CR118","doi-asserted-by":"publisher","first-page":"042,333","DOI":"10.1103\/PhysRevA.78.042333","volume":"78","author":"Y Zhao","year":"2008","unstructured":"Zhao, Y., Fung, C.H.F., Qi, B., Chen, C., Lo, H.K.: Quantum hacking: experimental demonstration of time-shift attack against practical quantum-key-distribution systems. Phys. Rev. A 78, 042,333 (2008). \n                    https:\/\/doi.org\/10.1103\/PhysRevA.78.042333","journal-title":"Phys. Rev. A"},{"key":"2055_CR119","doi-asserted-by":"publisher","first-page":"052,312","DOI":"10.1103\/PhysRevA.79.052312","volume":"79","author":"X Zou","year":"2009","unstructured":"Zou, X., Qiu, D., Li, L., Wu, L., Li, L.: Semiquantum-key distribution using less than four quantum states. Phys. Rev. A 79, 052,312 (2009). \n                    https:\/\/doi.org\/10.1103\/PhysRevA.79.052312","journal-title":"Phys. Rev. A"}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11128-018-2055-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-018-2055-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-018-2055-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,20]],"date-time":"2020-05-20T03:31:16Z","timestamp":1589945476000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11128-018-2055-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,9,15]]},"references-count":119,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2018,11]]}},"alternative-id":["2055"],"URL":"https:\/\/doi.org\/10.1007\/s11128-018-2055-y","relation":{},"ISSN":["1570-0755","1573-1332"],"issn-type":[{"value":"1570-0755","type":"print"},{"value":"1573-1332","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,9,15]]},"assertion":[{"value":"18 December 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 September 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 September 2018","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"288"}}