{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:45:21Z","timestamp":1767339921549,"version":"3.28.0"},"reference-count":28,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,8]]},"DOI":"10.1109\/iswcs.2017.8108093","type":"proceedings-article","created":{"date-parts":[[2017,11,16]],"date-time":"2017-11-16T21:50:59Z","timestamp":1510869059000},"page":"112-116","source":"Crossref","is-referenced-by-count":1,"title":["Quantum key distribution with a control key"],"prefix":"10.1109","author":[{"given":"Junaid","family":"ur Rehman","sequence":"first","affiliation":[]},{"given":"Youngmin","family":"Jeong","sequence":"additional","affiliation":[]},{"given":"Hyundong","family":"Shin","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"The Code Book The Science of Secrecy from Ancient Egypt to Quantum Cryptography","year":"2011","author":"singh","key":"ref10"},{"key":"ref11","first-page":"175","article-title":"Quantum cryptography: Public key distribution and coin tossing","author":"bennett","year":"1984","journal-title":"Proceedings of IEEE International Conference on Computers Systems and Signal Processing"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.67.661"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.68.557"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.108.130503"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.85.1330"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.91.057901"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.94.230504"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/S0375-9601(98)00358-2"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/JSTQE.2009.2025698"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1364\/OE.15.009388"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1364\/OE.18.008587"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1038\/nphoton.2010.214"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1088\/1367-2630\/11\/7\/075003"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.98.010504"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1063\/1.2430685"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/BF01397280"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1038\/299802a0"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1038\/nphoton.2014.149"},{"key":"ref9","first-page":"109","article-title":"Cipher printing telegraph systems for secret wire and radio telegraphic communications","volume":"45","author":"vernam","year":"1926","journal-title":"J Am Inst Elec Eng"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1103\/RevModPhys.74.145"},{"journal-title":"KCQ A New Approach to Quantum Cryptography I General Principles and Key Generation","year":"2004","author":"yuen","key":"ref20"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.64.062305"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1142\/S0217984917501196"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.58.R2623"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1093\/ptep\/ptx034"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.78.042333"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.73.022320"}],"event":{"name":"2017 International Symposium on Wireless Communication Systems (ISWCS)","start":{"date-parts":[[2017,8,28]]},"location":"Bologna","end":{"date-parts":[[2017,8,31]]}},"container-title":["2017 International Symposium on Wireless Communication Systems (ISWCS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8095275\/8108089\/08108093.pdf?arnumber=8108093","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,12,18]],"date-time":"2017-12-18T23:05:31Z","timestamp":1513638331000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8108093\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,8]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/iswcs.2017.8108093","relation":{},"subject":[],"published":{"date-parts":[[2017,8]]}}}