{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,28]],"date-time":"2026-03-28T05:45:44Z","timestamp":1774676744843,"version":"3.50.1"},"reference-count":60,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2009,4,1]],"date-time":"2009-04-01T00:00:00Z","timestamp":1238544000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Inform. Theory"],"published-print":{"date-parts":[[2009,4]]},"DOI":"10.1109\/tit.2008.2009798","type":"journal-article","created":{"date-parts":[[2009,3,19]],"date-time":"2009-03-19T19:18:03Z","timestamp":1237490283000},"page":"1898-1929","source":"Crossref","is-referenced-by-count":113,"title":["General Paradigm for Distilling Classical Key From Quantum States"],"prefix":"10.1109","volume":"55","author":[{"given":"Karol","family":"Horodecki","sequence":"first","affiliation":[]},{"given":"Michal","family":"Horodecki","sequence":"additional","affiliation":[]},{"given":"Pawel","family":"Horodecki","sequence":"additional","affiliation":[]},{"given":"Jonathan","family":"Oppenheim","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.89.240403"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.71.062307"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2008.921870"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.94.200501"},{"key":"ref31","author":"horodecki","year":"2009","journal-title":"General paradigm for distilling classical key from quantum states on quantum entanglement and security"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2002.807289"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.80.5239"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.84.2014"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.94.160502"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.100.110502"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.58.883"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.83.4200"},{"key":"ref27","author":"fukuda","year":"2005","journal-title":"?On weyl-covariant channels ?"},{"key":"ref29","first-page":"482","author":"gisin","year":"2000","journal-title":"Algorithmica"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1088\/0305-4470\/37\/5\/L01"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"167901","DOI":"10.1103\/PhysRevLett.91.167901","article-title":"Equivalence between two qubit entanglement and secure key distribution","volume":"91","author":"ac\ufffdn","year":"2003","journal-title":"Phys Rev Lett"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/18.985948"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.89.097905"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1063\/1.1495917"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.67.661"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRev.47.777"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/18.761271"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/BF01646490"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.85.441"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1088\/0305-4470\/39\/26\/L02"},{"key":"ref59","doi-asserted-by":"crossref","first-page":"4277","DOI":"10.1103\/PhysRevA.40.4277","article-title":"Quantum states with Einstein-Podolsky-Rosen correlations admitting a hidden-variable model","volume":"40","author":"werner","year":"1989","journal-title":"Phys Rev A Gen Math"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.64.032112"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.65.032314"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.78.2275"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.57.1619"},{"key":"ref54","author":"tucci","year":"2002","journal-title":"?Entanglement of distillation and conditional mutual information ?"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.86.5807"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.90.167904"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.67.042317"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.74.010302"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.91.097901"},{"key":"ref12","author":"christandl","year":"2002","journal-title":"The quantum analog to intrinsic information"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"456","DOI":"10.1007\/978-3-540-70936-7_25","volume":"4392","author":"christandl","year":"2007","journal-title":"Lecture Notes in Computer Science"},{"key":"ref14","author":"christandl","year":"2006","journal-title":"The structure of bipartite quantum statesInsights from group theory and cryptography"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1063\/1.1643788"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1002\/0471200611"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"217903","DOI":"10.1103\/PhysRevLett.92.217903","article-title":"Entanglement as a precondition for secure quantum key distribution","volume":"92","author":"curty","year":"2004","journal-title":"Phys Rev Lett"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"2818","DOI":"10.1103\/PhysRevLett.77.2818","article-title":"Quantum privacy amplification and the security of quantum cryptography over noisy channels","volume":"77","author":"deutsch","year":"1996","journal-title":"Phys Rev Lett"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1098\/rspa.2004.1372"},{"key":"ref4","author":"ben-or","year":"2004","journal-title":"?General security definition and composability for quantum and classical protocols ?"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"386","DOI":"10.1007\/978-3-540-30576-7_21","article-title":"The universal composable security of quantum key distribution","author":"ben-or","year":"2005","journal-title":"Proc 2nd Theory Cryptography Conf"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.53.2046"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.68.3121"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.54.3824"},{"key":"ref7","first-page":"175","article-title":"quantum cryptography: public key distribution and coin tossing","author":"bennett","year":"1984","journal-title":"Proc IEEE Int Conf Comput Syst Signal Process"},{"key":"ref49","author":"renner","year":"2003","journal-title":"Lecture Notes in Computer Science"},{"key":"ref9","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4612-0653-8","volume":"169","author":"bhatia","year":"1997","journal-title":"Matrix Analysis"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-57997-4"},{"key":"ref45","author":"mosca","year":"2000","journal-title":"?Private quantum channels and the cost of randomizing quantum information ?"},{"key":"ref48","volume":"3378","author":"renner","year":"2005","journal-title":"Lecture Notes in Computer Science"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/18.959270"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.98.140502"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.63.022310"},{"key":"ref44","doi-asserted-by":"crossref","first-page":"351","DOI":"10.1007\/3-540-45539-6_24","volume":"1807","author":"maurer","year":"2000","journal-title":"Lecture Notes in Computer Science"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1007\/s11128-005-4608-0"}],"container-title":["IEEE Transactions on Information Theory"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/18\/4802290\/04802308.pdf?arnumber=4802308","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,12,23]],"date-time":"2021-12-23T04:37:20Z","timestamp":1640234240000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4802308\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,4]]},"references-count":60,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tit.2008.2009798","relation":{},"ISSN":["0018-9448","1557-9654"],"issn-type":[{"value":"0018-9448","type":"print"},{"value":"1557-9654","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009,4]]}}}