{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,21]],"date-time":"2026-03-21T00:08:26Z","timestamp":1774051706286,"version":"3.50.1"},"reference-count":65,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Inform. Theory"],"published-print":{"date-parts":[[2017,1]]},"DOI":"10.1109\/tit.2016.2615847","type":"journal-article","created":{"date-parts":[[2016,10,7]],"date-time":"2016-10-07T19:21:19Z","timestamp":1475868079000},"page":"715-727","source":"Crossref","is-referenced-by-count":61,"title":["Strong Converse Rates for Quantum Communication"],"prefix":"10.1109","volume":"63","author":[{"given":"Marco","family":"Tomamichel","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3916-4462","authenticated-orcid":false,"given":"Mark M.","family":"Wilde","sequence":"additional","affiliation":[]},{"given":"Andreas","family":"Winter","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","article-title":"From classical to quantum Shannon theory","author":"wilde","year":"2015"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/s00220-014-1953-9"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/0034-4877(76)90060-4"},{"key":"ref32","author":"hayashi","year":"2006","journal-title":"Quantum Information An Introduction"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2008.928269"},{"key":"ref30","first-page":"1","article-title":"Strong converse for the quantum capacity of the erasure channel for almost all codes","author":"wilde","year":"2014","journal-title":"Proc 9th Conf Theory Quantum Comput Commun Cryptogr"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.54.3824"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/S0375-9601(96)00706-2"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.77.1413"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.40.4277"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2013.2276628"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2014.2366994"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1007\/s00220-015-2382-0"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1007\/s11128-016-1272-5"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2013.2268533"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1038\/ncomms11419"},{"key":"ref27","first-page":"33","article-title":"Strong converse theorems in quantum information theory","author":"nagaoka","year":"2001","journal-title":"Proc ERATO Workshop Quantum Inf Sci"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2009.2032797"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2013.2288971"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.54.2629"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.52.R2493"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/s00220-014-2212-9"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.66.032310"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/18.959270"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.59.4206"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1088\/0305-4470\/33\/22\/101"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ALLERTON.2010.5707067"},{"key":"ref25","article-title":"On the strong converses for the quantum channel capacity theorems","author":"sharma","year":"2012"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2008.924665"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2008.924726"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1007\/s11128-011-0310-6"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1063\/1.4908102"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2014.2330313"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1063\/1.4892761"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.78.3217"},{"key":"ref54","article-title":"Fundamental limits of repeaterless quantum communications","author":"pirandola","year":"2015"},{"key":"ref53","first-page":"391","article-title":"Properties of conjugate channels with applications to additivity and multiplicativity","volume":"13","author":"king","year":"2007","journal-title":"Markov Process Rel Fields"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.81.062312"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/s00220-005-1317-6"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-00237-7"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.60.179"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1973.1055007"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/18.796386"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/18.796385"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.103.070504"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/s00220-014-2122-x"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1134\/S003294601402001X"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2014.2309968"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/s00220-011-1309-7"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.57.4153"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/18.850671"},{"key":"ref6","article-title":"The quantum channel capacity and coherent information","author":"shor","year":"2002","journal-title":"Proc Lect Notes MSRI Workshop Quantum Comput"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.55.1613"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1142\/S1230161208000055"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2004.839515"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/ITW.2008.4578688"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1142\/S1230161208000079"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1080\/09500340008244047"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.108.230507"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.102.020504"},{"key":"ref47","article-title":"Security of quantum key distribution","author":"renner","year":"2005"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1063\/1.4838835"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1063\/1.4838856"},{"key":"ref44","article-title":"Quantum hypothesis testing and the operational interpretation of the quantum R&#x00E9;nyi relative entropies","author":"mosonyi","year":"2013"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1063\/1.4838855"}],"container-title":["IEEE Transactions on Information Theory"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/18\/7792231\/07586115.pdf?arnumber=7586115","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:12:59Z","timestamp":1642003979000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7586115\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,1]]},"references-count":65,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/tit.2016.2615847","relation":{},"ISSN":["0018-9448","1557-9654"],"issn-type":[{"value":"0018-9448","type":"print"},{"value":"1557-9654","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,1]]}}}