{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,28]],"date-time":"2026-04-28T17:35:50Z","timestamp":1777397750004,"version":"3.51.4"},"reference-count":43,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"8","license":[{"start":{"date-parts":[[2014,8,1]],"date-time":"2014-08-01T00:00:00Z","timestamp":1406851200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"name":"CatalunyaCaixa"},{"name":"European Union (EU), European Research Council (ERC) Advanced Grant through the Nonlocality in Space and Time","award":["PHYS RQ8784"],"award-info":[{"award-number":["PHYS RQ8784"]}]},{"name":"EU Qessence Project"},{"name":"Templeton Foundation"},{"name":"Swiss National Science Foundation through the National Centre of Competence in Research Quantum Science and Technology (QSIT)","award":["200020-135048"],"award-info":[{"award-number":["200020-135048"]}]},{"name":"European Research Council","award":["258932"],"award-info":[{"award-number":["258932"]}]},{"name":"CHIST-ERA Project DIQIP"},{"name":"German Science Foundation","award":["CH 843\/2-1"],"award-info":[{"award-number":["CH 843\/2-1"]}]},{"name":"Swiss National Science Foundation through the CHIST-ERA Project CQC","award":["PP00P2-128455"],"award-info":[{"award-number":["PP00P2-128455"]}]},{"name":"Swiss National Science Foundation through the CHIST-ERA Project CQC","award":["20CH21-138799"],"award-info":[{"award-number":["20CH21-138799"]}]},{"name":"Swiss National Center of Competence in Research QSIT"},{"name":"Swiss State Secretariat for Education and Research supporting COST action","award":["MP1006"],"award-info":[{"award-number":["MP1006"]}]},{"name":"ERC through the EU Seventh Framework Program (FP\/2007-2013)","award":["337603"],"award-info":[{"award-number":["337603"]}]},{"name":"European Commission STREP QCS"},{"name":"ERC Advanced Grant IRQUAT"},{"name":"Philip Leverhulme Trust"},{"name":"Engineering and Physical Sciences Research Council"},{"name":"CHIST-ERA DIQIP Projects"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Inform. Theory"],"published-print":{"date-parts":[[2014,8]]},"DOI":"10.1109\/tit.2014.2329417","type":"journal-article","created":{"date-parts":[[2014,6,30]],"date-time":"2014-06-30T18:32:16Z","timestamp":1404153136000},"page":"4973-4986","source":"Crossref","is-referenced-by-count":37,"title":["Full Security of Quantum Key Distribution From No-Signaling Constraints"],"prefix":"10.1109","volume":"60","author":[{"given":"Lluis","family":"Masanes","sequence":"first","affiliation":[]},{"given":"Renato","family":"Renner","sequence":"additional","affiliation":[]},{"given":"Matthias","family":"Christandl","sequence":"additional","affiliation":[]},{"given":"Andreas","family":"Winter","sequence":"additional","affiliation":[]},{"given":"Jonathan","family":"Barrett","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.102.020504"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1088\/1367-2630\/8\/8\/126"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.97.170409"},{"key":"ref32","first-page":"329","article-title":"Some results and problems on quantum Bell-type inequalities","volume":"8","author":"tsirelson","year":"1993","journal-title":"Hadronic J Supplement"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.73.022110"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRev.47.777"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.40.7113"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.74.4101"},{"key":"ref35","article-title":"Security of quantum key distribution","author":"renner","year":"2005"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1088\/1367-2630\/11\/8\/085006"},{"key":"ref10","article-title":"A generic security proof for quantum key distribution","author":"christandl","year":"0"},{"key":"ref40","first-page":"66","article-title":"Simplifying information-theoretic arguments by postselection","volume":"26","author":"renner","year":"2010","journal-title":"Quantum Cryptography and Computing"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.72.012332"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1088\/1367-2630\/12\/11\/113026"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1038\/nphoton.2010.214"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"195","DOI":"10.1103\/PhysicsPhysiqueFizika.1.195","article-title":"On the Einstein Podolsky Rosen paradox","volume":"1","author":"bell","year":"1964","journal-title":"Physics"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"273","DOI":"10.26421\/QIC4.4-3","article-title":"Self testing quantum apparatus","volume":"4","author":"mayers","year":"2004","journal-title":"Quantum Inform Comput"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.98.230501"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1038\/ncomms1244"},{"key":"ref18","article-title":"Device-independent quantum key distribution with commuting measurements","author":"h\u00e4nggi","year":"0"},{"key":"ref19","first-page":"407","volume":"3378","author":"renner","year":"2005","journal-title":"Universally Composable Privacy Amplification Against Quantum Adversaries (Lecture Notes in Computer Science)"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.23.880"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.98.230501"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.73.012112"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.97.120405"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1126\/science.283.5410.2050"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/0003-4916(90)90339-P"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.95.010503"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.85.441"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/382780.382781"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.67.661"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.78.2256"},{"key":"ref1","first-page":"175","article-title":"Quantum cryptography: Public key distribution and coin tossing","author":"bennett","year":"1984","journal-title":"Proc Int Conf Comput Syst Signal Process"},{"key":"ref20","first-page":"386","volume":"3378","author":"ben-or","year":"2005","journal-title":"Theory of Cryptography Second Theory of Cryptography Conference (Lecture Notes in Computer Science)"},{"key":"ref22","first-page":"31007","article-title":"Device-independent quantum key distribution secure against adversaries with no longterm quantum memory","volume":"3","author":"pironio","year":"2013","journal-title":"Phys Rev X"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.102.140501"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2009.2025545"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.113.140501"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/18.476316"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.86.062326"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.71.022101"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1002\/0471200611"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/BF02058098"}],"container-title":["IEEE Transactions on Information Theory"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/18\/6851961\/06846344.pdf?arnumber=6846344","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,10]],"date-time":"2022-04-10T00:31:58Z","timestamp":1649550718000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6846344\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,8]]},"references-count":43,"journal-issue":{"issue":"8"},"URL":"https:\/\/doi.org\/10.1109\/tit.2014.2329417","relation":{},"ISSN":["0018-9448","1557-9654"],"issn-type":[{"value":"0018-9448","type":"print"},{"value":"1557-9654","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,8]]}}}