{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,21]],"date-time":"2026-04-21T09:47:45Z","timestamp":1776764865065,"version":"3.51.2"},"reference-count":64,"publisher":"MDPI AG","issue":"4","license":[{"start":{"date-parts":[[2022,3,26]],"date-time":"2022-03-26T00:00:00Z","timestamp":1648252800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62101597, 61605248, 61675235 and 61505261"],"award-info":[{"award-number":["62101597, 61605248, 61675235 and 61505261"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2020YFA0309702"],"award-info":[{"award-number":["2020YFA0309702"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002858","name":"China Postdoctoral Science Foundation","doi-asserted-by":"publisher","award":["2021M691536"],"award-info":[{"award-number":["2021M691536"]}],"id":[{"id":"10.13039\/501100002858","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Natural Science Foundation of Henan","award":["202300410534, 202300410532"],"award-info":[{"award-number":["202300410534, 202300410532"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Entropy"],"abstract":"<jats:p>Quantum key distribution (QKD) has attracted much attention due to its unconditional security. High-dimensional quantum key distribution (HD-QKD) is a brand-new type of QKD protocol that has many excellent advantages. Nonetheless, practical imperfections in realistic devices that are not considered in the theoretical security proof may have an impact on the practical security of realistic HD-QKD systems. In this paper, we research the influence of a realistic intensity modulator on the practical security of HD-QKD systems with the decoy-state method and finite-key effects. We demonstrate that there is a certain impact in the secret key rate and the transmission distance when taking practical factors into security analysis.<\/jats:p>","DOI":"10.3390\/e24040460","type":"journal-article","created":{"date-parts":[[2022,3,27]],"date-time":"2022-03-27T21:27:51Z","timestamp":1648416471000},"page":"460","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Practical Security of High-Dimensional Quantum Key Distribution with Intensity Modulator Extinction"],"prefix":"10.3390","volume":"24","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9774-1064","authenticated-orcid":false,"given":"Yang","family":"Wang","sequence":"first","affiliation":[{"name":"National Laboratory of Solid State Microstructures, School of Physics and Collaborative Innovation Center of Advanced Microstructures, Nanjing University, Nanjing 210093, China"},{"name":"Henan Key Laboratory of Quantum Information and Cryptography, SSF IEU, Zhengzhou 450001, China"},{"name":"Synergetic Innovation Center of Quantum Information and Quantum Physics, University of Science and Technology of China, Hefei 230026, China"}]},{"given":"Ge-Hai","family":"Du","sequence":"additional","affiliation":[{"name":"Henan Key Laboratory of Quantum Information and Cryptography, SSF IEU, Zhengzhou 450001, China"},{"name":"Synergetic Innovation Center of Quantum Information and Quantum Physics, University of Science and Technology of China, Hefei 230026, China"}]},{"given":"Yang-Bin","family":"Xu","sequence":"additional","affiliation":[{"name":"Henan Key Laboratory of Quantum Information and Cryptography, SSF IEU, Zhengzhou 450001, China"},{"name":"Synergetic Innovation Center of Quantum Information and Quantum Physics, University of Science and Technology of China, Hefei 230026, China"}]},{"given":"Chun","family":"Zhou","sequence":"additional","affiliation":[{"name":"Henan Key Laboratory of Quantum Information and Cryptography, SSF IEU, Zhengzhou 450001, China"},{"name":"Synergetic Innovation Center of Quantum Information and Quantum Physics, University of Science and Technology of China, Hefei 230026, China"}]},{"given":"Mu-Sheng","family":"Jiang","sequence":"additional","affiliation":[{"name":"Henan Key Laboratory of Quantum Information and Cryptography, SSF IEU, Zhengzhou 450001, China"},{"name":"Synergetic Innovation Center of Quantum Information and Quantum Physics, University of Science and Technology of China, Hefei 230026, China"}]},{"given":"Hong-Wei","family":"Li","sequence":"additional","affiliation":[{"name":"Henan Key Laboratory of Quantum Information and Cryptography, SSF IEU, Zhengzhou 450001, China"},{"name":"Synergetic Innovation Center of Quantum Information and Quantum Physics, University of Science and Technology of China, Hefei 230026, China"}]},{"given":"Wan-Su","family":"Bao","sequence":"additional","affiliation":[{"name":"Henan Key Laboratory of Quantum Information and Cryptography, SSF IEU, Zhengzhou 450001, China"},{"name":"Synergetic Innovation Center of Quantum Information and Quantum Physics, University of Science and Technology of China, Hefei 230026, China"}]}],"member":"1968","published-online":{"date-parts":[[2022,3,26]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1016\/j.tcs.2014.05.025","article-title":"Quantum cryptography: Public key distribution and coin tossing","volume":"560","author":"Bennett","year":"2014","journal-title":"Theor. Comput. Sci."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"661","DOI":"10.1103\/PhysRevLett.67.661","article-title":"Quantum cryptography based on Bell\u2019s theorem","volume":"67","author":"Ekert","year":"1991","journal-title":"Phys. Rev. Lett."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"025002","DOI":"10.1103\/RevModPhys.92.025002","article-title":"Secure quantum key distribution with realistic devices","volume":"92","author":"Xu","year":"2020","journal-title":"Rev. Mod. Phys."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"1012","DOI":"10.1364\/AOP.361502","article-title":"Advances in quantum cryptography","volume":"12","author":"Pirandola","year":"2020","journal-title":"Adv. Opt. Photon."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"2050","DOI":"10.1126\/science.283.5410.2050","article-title":"Unconditional security of quantum key distribution over arbitrarily long distances","volume":"283","author":"Lo","year":"1999","journal-title":"Science"},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"441","DOI":"10.1103\/PhysRevLett.85.441","article-title":"Simple proof of security of the BB84 quantum key distribution protocol","volume":"85","author":"Shor","year":"2000","journal-title":"Phys. Rev. Lett."},{"key":"ref_7","unstructured":"Renner, R. (2005). Security of Quantum Key Distribution. [Ph.D. Dissertation, Department of Physics, Swiss Federal Insititute of Technology (ETH)]."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"060503","DOI":"10.1103\/PhysRevLett.98.060503","article-title":"Large-Alphabet Quantum Key Distribution Using Energy-Time Entangled Bipartite States","volume":"98","author":"Broadbent","year":"2007","journal-title":"Phys. Rev. Lett."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"062322","DOI":"10.1103\/PhysRevA.87.062322","article-title":"High-dimensional quantum key distribution using dispersive optics","volume":"87","author":"Mower","year":"2013","journal-title":"Phys. Rev. A"},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"1393","DOI":"10.1016\/j.physleta.2017.01.058","article-title":"High-dimensional quantum key distribution with the entangled single-photon-added coherent state","volume":"381","author":"Wang","year":"2017","journal-title":"Phys. Lett. A"},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"e1701491","DOI":"10.1126\/sciadv.1701491","article-title":"Provably secure and high-rate quantum key distribution with time-bin qudits","volume":"3","author":"Islam","year":"2017","journal-title":"Sci. Adv."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"014051","DOI":"10.1103\/PhysRevApplied.14.014051","article-title":"Efficient time-bin encoding for practical high-dimensional quantum key distribution","volume":"14","author":"Vagniluca","year":"2020","journal-title":"Phys. Rev. Appl."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1038\/s41534-021-00398-y","article-title":"Path-encoded high-dimensional quantum communication over a 2-km multicore fiber","volume":"7","author":"Lio","year":"2021","journal-title":"NPJ Quantum Inf."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1038\/s41534-017-0026-2","article-title":"High-dimensional quantum key distribution based on multicore fiber using silicon photonic integrated circuits","volume":"3","author":"Ding","year":"2017","journal-title":"NPJ Quantum Inf."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"064034","DOI":"10.1103\/PhysRevApplied.15.064034","article-title":"High-dimensional quantum cryptography with hybrid orbital-angular-momentum states through 25 km of ring-core fiber: A proof-of-concept demonstration","volume":"15","author":"Wang","year":"2021","journal-title":"Phys. Rev. Appl."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"064058","DOI":"10.1103\/PhysRevApplied.11.064058","article-title":"Orbital angular momentum states enabling fiber-based high-dimensional quantum communication","volume":"11","author":"Cozzolino","year":"2019","journal-title":"Phys. Rev. Appl."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"1006","DOI":"10.1364\/OPTICA.4.001006","article-title":"High-dimensional intracity quantum cryptography with structured photons","volume":"4","author":"Sit","year":"2017","journal-title":"Optica"},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"127902","DOI":"10.1103\/PhysRevLett.88.127902","article-title":"Security of Quantum Key Distribution Using d-Level Systems","volume":"88","author":"Cerf","year":"2002","journal-title":"Phys. Rev. Lett."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"030301","DOI":"10.1103\/PhysRevA.82.030301","article-title":"Security proof for quantum key distribution using qudit systems","volume":"82","author":"Sheridan","year":"2010","journal-title":"Phys. Rev. A"},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"11712","DOI":"10.1038\/ncomms11712","article-title":"Numerical approach for unstructured quantum key distribution","volume":"7","author":"Coles","year":"2016","journal-title":"Nat. Commun."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"025006","DOI":"10.1088\/2058-9565\/aaace4","article-title":"Proof-of-principle experimental realization of a qubit-like qudit-based quantum key distribution scheme","volume":"3","author":"Wang","year":"2018","journal-title":"Quantum Sci. Technol."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"17539","DOI":"10.1364\/OE.27.017539","article-title":"Large-alphabet encoding for higher-rate quantum key distribution","volume":"27","author":"Lee","year":"2019","journal-title":"Opt. Express"},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"035008","DOI":"10.1088\/2058-9565\/ab21a4","article-title":"Scalable high-rate, high-dimensional time-bin encoding quantum key distribution","volume":"4","author":"Islam","year":"2019","journal-title":"Quantum Sci. Technol."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"595","DOI":"10.1038\/nphoton.2014.149","article-title":"Secure quantum key distribution","volume":"8","author":"Lo","year":"2014","journal-title":"Nat. Photon."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"16025","DOI":"10.1038\/npjqi.2016.25","article-title":"Practical challenges in quantum key distribution","volume":"2","author":"Diamanti","year":"2016","journal-title":"NPJ Quantum Inf."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"032314","DOI":"10.1103\/PhysRevA.75.032314","article-title":"Phase-remapping attack in practical quantum-key-distribution systems","volume":"75","author":"Fung","year":"2007","journal-title":"Phys. Rev. A"},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"062308","DOI":"10.1103\/PhysRevA.84.062308","article-title":"Attacking a practical quantum-key-distribution system with wavelength-dependent beam-splitter and multiwavelength sources","volume":"84","author":"Li","year":"2011","journal-title":"Phys. Rev. A"},{"key":"ref_28","first-page":"73","article-title":"Time-shift attack in practical quantum cryptosystems","volume":"7","author":"Qi","year":"2007","journal-title":"Quantum Inf. Comput."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"691","DOI":"10.1080\/09500340410001730986","article-title":"Faked states attack on quantum cryptosystems","volume":"52","author":"Makarov","year":"2005","journal-title":"J. Mod. Opt."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"686","DOI":"10.1038\/nphoton.2010.214","article-title":"Hacking commercial quantum cryptography systems by tailored bright illumination","volume":"4","author":"Lydersen","year":"2010","journal-title":"Nat. Photon."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"349","DOI":"10.1038\/ncomms1348","article-title":"Full-field implementation of a perfect eavesdropper on a quantum cryptography system","volume":"2","author":"Gerhardt","year":"2011","journal-title":"Nat. Commun."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"030304","DOI":"10.1103\/PRXQuantum.2.030304","article-title":"Securing Practical Quantum Communication Systems with Optical Power Limiters","volume":"2","author":"Zhang","year":"2021","journal-title":"PRX Quantum"},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"1178","DOI":"10.1364\/OPTICA.6.001178","article-title":"Robust countermeasure against detector control attack in a practical quantum key distribution system","volume":"6","author":"Qian","year":"2019","journal-title":"Optica"},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"800","DOI":"10.1038\/nphoton.2010.269","article-title":"Avoiding the blinding attack in QKD","volume":"4","author":"Yuan","year":"2010","journal-title":"Nat. Photon."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"130503","DOI":"10.1103\/PhysRevLett.108.130503","article-title":"Measurement-device-independent quantum key distribution","volume":"108","author":"Lo","year":"2012","journal-title":"Phys. Rev. Lett."},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"130502","DOI":"10.1103\/PhysRevLett.108.130502","article-title":"Side-channel-free quantum key distribution","volume":"108","author":"Braunstein","year":"2012","journal-title":"Phys. Rev. Lett."},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"400","DOI":"10.1038\/s41586-018-0066-6","article-title":"Overcoming the rate\u2013distance limit of quantum key distribution without quantum repeaters","volume":"557","author":"Lucamarini","year":"2018","journal-title":"Nature"},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"062323","DOI":"10.1103\/PhysRevA.98.062323","article-title":"Twin-field quantum key distribution with large misalignment error","volume":"98","author":"Wang","year":"2018","journal-title":"Phys. Rev. A"},{"key":"ref_39","first-page":"031043","article-title":"Phase-matching quantum key distribution","volume":"8","author":"Ma","year":"2018","journal-title":"Phys. Rev. X"},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"034053","DOI":"10.1103\/PhysRevApplied.11.034053","article-title":"Twin-field quantum key distribution without phase postselection","volume":"11","author":"Cui","year":"2019","journal-title":"Phys. Rev. Appl."},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"8","DOI":"10.1038\/s41534-017-0057-8","article-title":"Quantum key distribution with an efficient countermeasure against correlated intensity fluctuations in optical pulses","volume":"4","author":"Yoshino","year":"2018","journal-title":"NPJ Quantum Inf."},{"key":"ref_42","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1038\/s41534-021-00418-x","article-title":"Intensity modulator for secure, stable, and high-performance decoy-state quantum key distribution","volume":"7","author":"Lu","year":"2021","journal-title":"NPJ Quantum Inf."},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"1330","DOI":"10.1103\/PhysRevLett.85.1330","article-title":"Limitations on practical quantum cryptography","volume":"85","author":"Brassard","year":"2000","journal-title":"Phys. Rev. Lett."},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"44","DOI":"10.1088\/1367-2630\/4\/1\/344","article-title":"Quantum key distribution with realistic states: Photon-number statistics in the photon-number splitting attack","volume":"4","author":"Jahma","year":"2002","journal-title":"New J. Phys."},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"120506","DOI":"10.1103\/PhysRevLett.112.120506","article-title":"Unconditional security of time-energy entanglement quantum key distribution using dual-basis interferometry","volume":"112","author":"Zhang","year":"2014","journal-title":"Phys. Rev. Lett."},{"key":"ref_46","doi-asserted-by":"crossref","first-page":"057901","DOI":"10.1103\/PhysRevLett.91.057901","article-title":"Quantum key distribution with high loss: Towards global secure communication","volume":"91","author":"Hwang","year":"2003","journal-title":"Phys. Rev. Lett."},{"key":"ref_47","doi-asserted-by":"crossref","first-page":"230503","DOI":"10.1103\/PhysRevLett.94.230503","article-title":"Beating the photon-number-splitting attack in practical quantum cryptography","volume":"94","author":"Wang","year":"2005","journal-title":"Phys. Rev. Lett."},{"key":"ref_48","doi-asserted-by":"crossref","first-page":"230504","DOI":"10.1103\/PhysRevLett.94.230504","article-title":"Decoy state quantum key distribution","volume":"94","author":"Lo","year":"2005","journal-title":"Phys. Rev. Lett."},{"key":"ref_49","doi-asserted-by":"crossref","first-page":"022336","DOI":"10.1103\/PhysRevA.91.022336","article-title":"Practical high-dimensional quantum key distribution with decoy states","volume":"91","author":"Bunandar","year":"2015","journal-title":"Phys. Rev. A"},{"key":"ref_50","doi-asserted-by":"crossref","first-page":"200501","DOI":"10.1103\/PhysRevLett.100.200501","article-title":"Quantum cryptography with finite resources: Unconditional security bound for discrete-variable protocols with one-way postprocessing","volume":"100","author":"Scarani","year":"2008","journal-title":"Phys. Rev. Lett."},{"key":"ref_51","doi-asserted-by":"crossref","first-page":"634","DOI":"10.1038\/ncomms1631","article-title":"Tight finite-key analysis for quantum cryptography","volume":"3","author":"Tomamichel","year":"2012","journal-title":"Nat. Commun."},{"key":"ref_52","doi-asserted-by":"crossref","first-page":"205301","DOI":"10.1088\/1751-8113\/49\/20\/205301","article-title":"Finite-key analysis of a practical decoy-state high-dimensional quantum key distribution","volume":"49","author":"Bao","year":"2016","journal-title":"J. Phys. A Math. Theor."},{"key":"ref_53","doi-asserted-by":"crossref","first-page":"052323","DOI":"10.1103\/PhysRevA.94.052323","article-title":"Finite-key analysis for time-energy high-dimensional quantum key distribution","volume":"94","author":"Niu","year":"2016","journal-title":"Phys. Rev. A"},{"key":"ref_54","doi-asserted-by":"crossref","first-page":"052301","DOI":"10.1103\/PhysRevA.75.052301","article-title":"Decoy-state quantum key distribution with large random errors of light intensity","volume":"75","author":"Wang","year":"2007","journal-title":"Phys. Rev. A"},{"key":"ref_55","doi-asserted-by":"crossref","first-page":"042311","DOI":"10.1103\/PhysRevA.77.042311","article-title":"General theory of decoy-state quantum cryptography with source errors","volume":"77","author":"Wang","year":"2008","journal-title":"Phys. Rev. A"},{"key":"ref_56","doi-asserted-by":"crossref","first-page":"075006","DOI":"10.1088\/1367-2630\/11\/7\/075006","article-title":"Decoy-state quantum key distribution with both source errors and statistical fluctuations","volume":"11","author":"Wang","year":"2009","journal-title":"New J. Phys."},{"key":"ref_57","doi-asserted-by":"crossref","first-page":"042307","DOI":"10.1103\/PhysRevA.86.042307","article-title":"Decoy-state method of quantum key distribution with both source errors and statistics fluctuations","volume":"86","author":"Chi","year":"2012","journal-title":"Phys. Rev. A"},{"key":"ref_58","doi-asserted-by":"crossref","first-page":"032335","DOI":"10.1103\/PhysRevA.94.032335","article-title":"Tight finite-key analysis of a practical decoy-state quantum key distribution with unstable sources","volume":"94","author":"Wang","year":"2016","journal-title":"Phys. Rev. A"},{"key":"ref_59","doi-asserted-by":"crossref","first-page":"245502","DOI":"10.1088\/1361-6455\/aaf015","article-title":"Finite-key analysis for high-dimensional quantum key distribution with intensity fluctuations","volume":"51","author":"Gan","year":"2018","journal-title":"J. Phys. B At. Mol. Opt."},{"key":"ref_60","doi-asserted-by":"crossref","first-page":"B83","DOI":"10.1364\/JOSAB.36.000B83","article-title":"Finite-key analysis of practical decoy-state measurement-device-independent quantum key distribution with unstable sources","volume":"36","author":"Wang","year":"2019","journal-title":"J. Opt. Soc. Am. B"},{"key":"ref_61","doi-asserted-by":"crossref","first-page":"159","DOI":"10.1140\/epjd\/e2012-20757-5","article-title":"Effect of intensity modulator extinction on practical quantum key distribution system","volume":"66","author":"Huang","year":"2012","journal-title":"Eur. Phys. J. D"},{"key":"ref_62","first-page":"325","article-title":"Security of quantum key distribution with imperfect devices","volume":"4","author":"Gottesman","year":"2004","journal-title":"Quant. Inf. Comput."},{"key":"ref_63","doi-asserted-by":"crossref","first-page":"012333","DOI":"10.1103\/PhysRevA.95.012333","article-title":"Improved key-rate bounds for practical decoy-state quantum-key-distribution systems","volume":"95","author":"Zhang","year":"2017","journal-title":"Phys. Rev. A"},{"key":"ref_64","doi-asserted-by":"crossref","first-page":"357","DOI":"10.2748\/tmj\/1178243286","article-title":"Weighted sums of certain dependent random variables","volume":"19","author":"Azuma","year":"1967","journal-title":"Tohoku Math. J."}],"container-title":["Entropy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1099-4300\/24\/4\/460\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T22:43:55Z","timestamp":1760136235000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1099-4300\/24\/4\/460"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,3,26]]},"references-count":64,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2022,4]]}},"alternative-id":["e24040460"],"URL":"https:\/\/doi.org\/10.3390\/e24040460","relation":{},"ISSN":["1099-4300"],"issn-type":[{"value":"1099-4300","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,3,26]]}}}