{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T06:39:46Z","timestamp":1775284786614,"version":"3.50.1"},"reference-count":65,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2015,2,1]],"date-time":"2015-02-01T00:00:00Z","timestamp":1422748800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"DOI":"10.13039\/501100001732","name":"Danish National Research Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001732","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National Science Foundation of China through the Sino-Danish Center for the Theory of Interactive Computation","award":["61061130540"],"award-info":[{"award-number":["61061130540"]}]},{"name":"CFEM Research Center through the Danish Strategic Research Council"},{"DOI":"10.13039\/501100000781","name":"European Research Council","doi-asserted-by":"publisher","award":["258932"],"award-info":[{"award-number":["258932"]}],"id":[{"id":"10.13039\/501100000781","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001321","name":"National Research Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001321","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001459","name":"Ministry of Education, Singapore","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100001459","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Inform. Theory"],"published-print":{"date-parts":[[2015,2]]},"DOI":"10.1109\/tit.2014.2371464","type":"journal-article","created":{"date-parts":[[2014,11,26]],"date-time":"2014-11-26T20:58:03Z","timestamp":1417035483000},"page":"1093-1112","source":"Crossref","is-referenced-by-count":81,"title":["Entanglement Sampling and Applications"],"prefix":"10.1109","volume":"61","author":[{"given":"Frederic","family":"Dupuis","sequence":"first","affiliation":[]},{"given":"Omar","family":"Fawzi","sequence":"additional","affiliation":[]},{"given":"Stephanie","family":"Wehner","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2011.2177772"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2009.2025545"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/s00220-006-0118-x"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1088\/1126-6708\/2007\/09\/120"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1142\/S1230161208000043"},{"key":"ref30","author":"hayashi","year":"2006","journal-title":"Quantum Information"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2011.2146730"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2005.1523643"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/73007.73009"},{"key":"ref34","author":"hutter","year":"2011","journal-title":"Understanding Equipartition and Thermalization From Decoupling"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-003-0237-x"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1088\/1367-2630\/12\/2\/025009"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.100.220502"},{"key":"ref63","author":"wolf","year":"2012","journal-title":"Quantum Channels and Operations Guided Tour"},{"key":"ref28","author":"guruswami","year":"2010","journal-title":"Introduction to Coding Theory"},{"key":"ref64","author":"wullschleger","year":"2010","journal-title":"Bitwise quantum min-entropy sampling and new lower bounds for random access codes"},{"key":"ref27","first-page":"126","article-title":"On generating the initial key in the bounded-storage model","volume":"3027","author":"dziembowski","year":"2004","journal-title":"Advances in Cryptology"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1145\/225058.225085"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1080\/09500349414552221"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/581771.581773"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1098\/rspa.2009.0202"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74143-5_19"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1038\/nature10123"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.76.032328"},{"key":"ref24","article-title":"The decoupling approach to quantum information theory","author":"dupuis","year":"2010"},{"key":"ref23","author":"del rio","year":"2014","journal-title":"Relative Thermalization"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40084-1_19"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/s00220-014-1990-4"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1038\/nphys2048"},{"key":"ref51","article-title":"Security of quantum key distribution","author":"renner","year":"2005"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1561\/0400000010"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.106.110506"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1038\/ncomms1631"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2009.2032797"},{"key":"ref55","article-title":"A framework for non-asymptotic quantum information theory","author":"tomamichel","year":"2012"},{"key":"ref54","doi-asserted-by":"crossref","first-page":"52202","DOI":"10.1063\/1.4804995","article-title":"Quantum logarithmic Sobolev inequalities and rapid mixing","volume":"54","author":"temme","year":"2013","journal-title":"J Math Phys"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1088\/1367-2630\/15\/5\/053022"},{"key":"ref52","first-page":"963","article-title":"Robust cryptography in the noisy-quantum-storage model","volume":"9","author":"schaffner","year":"2009","journal-title":"Quantum Inf Comput"},{"key":"ref10","author":"berta","year":"2013","journal-title":"An equality between entanglement and uncertainty"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2013.2291780"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.79.061103"},{"key":"ref12","first-page":"29","article-title":"An allbut-one entropic uncertainty relation, and application to password-based identification","author":"bouman","year":"2013","journal-title":"Proc TQC"},{"key":"ref13","author":"brown","year":"2013","journal-title":"Decoupling with random quantum circuits"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.78.022316"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.109.160501"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"292","DOI":"10.1007\/BFb0052243","article-title":"Unconditional security against memory-bounded adversaries","volume":"1294","author":"cachin","year":"1997","journal-title":"Advances in Cryptology"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1521-3978(199806)46:4\/5<507::AID-PROP507>3.0.CO;2-4"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74143-5_20"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.2005.30"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1063\/1.1459754"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"512","DOI":"10.1007\/s00453-002-0980-7","article-title":"A new proof for the existence of mutually unbiased bases","volume":"34","author":"bandyopadhyay","year":"2002","journal-title":"Algorithmica"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2008.45"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/18.850671"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2013.2268533"},{"key":"ref7","first-page":"175","article-title":"Quantum cryptography: Public key distribution and coin tossing","author":"bennett","year":"1984","journal-title":"Proc Int Conf Comput Syst Signal Process"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1038\/nphys444"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1038\/nphys1734"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/301250.301347"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.78.3414"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1006\/jcss.1996.0004"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1038\/ncomms2268"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.78.3410"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.56.1154"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/BF00191321"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.83.022329"}],"container-title":["IEEE Transactions on Information Theory"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/18\/7012129\/06967820.pdf?arnumber=6967820","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:27:43Z","timestamp":1642004863000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6967820"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,2]]},"references-count":65,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tit.2014.2371464","relation":{},"ISSN":["0018-9448","1557-9654"],"issn-type":[{"value":"0018-9448","type":"print"},{"value":"1557-9654","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,2]]}}}