{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T11:41:48Z","timestamp":1761824508945,"version":"3.44.0"},"reference-count":8,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,1,6]],"date-time":"2025-01-06T00:00:00Z","timestamp":1736121600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,1,6]],"date-time":"2025-01-06T00:00:00Z","timestamp":1736121600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,1,6]]},"DOI":"10.1109\/comsnets63942.2025.10885575","type":"proceedings-article","created":{"date-parts":[[2025,2,20]],"date-time":"2025-02-20T15:05:58Z","timestamp":1740063958000},"page":"1085-1090","source":"Crossref","is-referenced-by-count":1,"title":["New Multi-Qubit CHSH Games and their application to Device-Independent Quantum Key Distribution protocols"],"prefix":"10.1109","author":[{"given":"Venugopal","family":"S","sequence":"first","affiliation":[{"name":"National Institute of Technology Tiruchirappalli,Department of Computer Science and Engineering,Trichy,Tamil Nadu,India,620 015"}]},{"given":"Kunwar","family":"Singh","sequence":"additional","affiliation":[{"name":"National Institute of Technology Tiruchirappalli,Department of Computer Science and Engineering,Trichy,Tamil Nadu,India,620 015"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.26421\/qic24.5-6-4"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-35423-7_23"},{"key":"ref3","first-page":"8","article-title":"Quantum cryptography: public key distribution and coin tossing","volume-title":"Proceedings of IEEE International Conference on Computers, Systems and Signal Processing","volume":"175","author":"Bennett"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45078-8_1"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1103\/physrevlett.23.880"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1103\/physrev.47.777"},{"key":"ref7","first-page":"661","article-title":"Quantum cryptography based on Bell\u2019s theorem","volume-title":"Phys. Rev.Lett","volume":"67","author":"Ekert","year":"1991"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1103\/physrevlett.113.140501"}],"event":{"name":"2025 17th International Conference on COMmunication Systems and NETworks (COMSNETS)","start":{"date-parts":[[2025,1,6]]},"location":"Bengaluru, India","end":{"date-parts":[[2025,1,10]]}},"container-title":["2025 17th International Conference on COMmunication Systems and NETworks (COMSNETS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10885406\/10885547\/10885575.pdf?arnumber=10885575","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,18]],"date-time":"2025-08-18T19:36:22Z","timestamp":1755545782000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10885575\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,1,6]]},"references-count":8,"URL":"https:\/\/doi.org\/10.1109\/comsnets63942.2025.10885575","relation":{},"subject":[],"published":{"date-parts":[[2025,1,6]]}}}