{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,5]],"date-time":"2026-03-05T21:30:25Z","timestamp":1772746225355,"version":"3.50.1"},"reference-count":37,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100000266","name":"U.K. Engineering and Physical Sciences Research Council","doi-asserted-by":"crossref","award":["EP\/Y037421\/1"],"award-info":[{"award-number":["EP\/Y037421\/1"]}],"id":[{"id":"10.13039\/501100000266","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100000266","name":"U.K. Engineering and Physical Sciences Research Council","doi-asserted-by":"crossref","award":["EP\/X040518\/1"],"award-info":[{"award-number":["EP\/X040518\/1"]}],"id":[{"id":"10.13039\/501100000266","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Doctoral Scholarship offered by School of Electronic and Electrical Engineering, University of Leeds."}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE J. Sel. Areas Commun."],"published-print":{"date-parts":[[2026]]},"DOI":"10.1109\/jsac.2026.3667484","type":"journal-article","created":{"date-parts":[[2026,2,24]],"date-time":"2026-02-24T20:58:10Z","timestamp":1771966690000},"page":"3608-3619","source":"Crossref","is-referenced-by-count":0,"title":["Analytical Bounds for Decoy-State Quantum Key Distribution With Discrete Phase Randomization"],"prefix":"10.1109","volume":"44","author":[{"ORCID":"https:\/\/orcid.org\/0009-0008-1235-9914","authenticated-orcid":false,"given":"Zhaohui","family":"Liu","sequence":"first","affiliation":[{"name":"School of Electronic and Electrical Engineering, University of Leeds, Leeds, U.K."}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3571-4110","authenticated-orcid":false,"given":"Ahmed","family":"Lawey","sequence":"additional","affiliation":[{"name":"School of Electronic and Electrical Engineering, University of Leeds, Leeds, U.K."}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4172-2125","authenticated-orcid":false,"given":"Mohsen","family":"Razavi","sequence":"additional","affiliation":[{"name":"School of Electronic and Electrical Engineering, University of Leeds, Leeds, U.K."}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1126\/science.283.5410.2050"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.85.441"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1103\/physrevlett.94.230504"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1364\/OE.22.001645"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.112.190503"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-023-42445-y"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevApplied.20.064031"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1038\/s41377-024-01488-0"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.72.012326"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.26421\/qic7.5-6-2"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.51.1863"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.94.230503"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.88.022308"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1088\/2058-9565\/ad141c"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1364\/OE.20.012366"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevX.9.021046"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1038\/s41566-021-00928-2"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevApplied.15.014016"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1088\/1367-2630\/17\/5\/053014"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.87.052329"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1038\/s42005-022-00831-4"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.101.062325"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.3390\/e25020258"},{"key":"ref24","article-title":"QKD security proofs for decoy-state BB84: Protocol variations, proof techniques, gaps and limitations","author":"Tupkary","year":"2025","journal-title":"arXiv:2502.10340"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1088\/978-1-6817-4653-1"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.86.062319"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2004.1365172"},{"key":"ref28","article-title":"Simple security proof of quantum key distribution via uncertainty principle","author":"Koashi","year":"2005","journal-title":"arXiv:quant-ph\/0505108"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.90.167904"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1063\/1.1738173"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1088\/1367-2630\/16\/4\/043005"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.86.052305"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/s11128-024-04520-9"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1038\/s41586-018-0066-6"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1038\/s41467-022-31534-7"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.130.220801"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.131.110802"}],"container-title":["IEEE Journal on Selected Areas in Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/49\/11372474\/11408821.pdf?arnumber=11408821","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,5]],"date-time":"2026-03-05T20:43:52Z","timestamp":1772743432000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11408821\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"references-count":37,"URL":"https:\/\/doi.org\/10.1109\/jsac.2026.3667484","relation":{},"ISSN":["1558-0008","0733-8716"],"issn-type":[{"value":"1558-0008","type":"electronic"},{"value":"0733-8716","type":"print"}],"subject":[],"published":{"date-parts":[[2026]]}}}