{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T11:27:28Z","timestamp":1740137248093,"version":"3.37.3"},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2020,2,3]],"date-time":"2020-02-03T00:00:00Z","timestamp":1580688000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,2,3]],"date-time":"2020-02-03T00:00:00Z","timestamp":1580688000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"NSFC","doi-asserted-by":"crossref","award":["61572532"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"published-print":{"date-parts":[[2020,3]]},"DOI":"10.1007\/s11128-020-2591-0","type":"journal-article","created":{"date-parts":[[2020,2,3]],"date-time":"2020-02-03T20:03:41Z","timestamp":1580760221000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Thermal states quantum cryptography with linear optics cloning machine"],"prefix":"10.1007","volume":"19","author":[{"given":"Fangli","family":"Yang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1275-7599","authenticated-orcid":false,"given":"Daowen","family":"Qiu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,2,3]]},"reference":[{"issue":"1","key":"2591_CR1","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1103\/RevModPhys.74.145","volume":"74","author":"N Gisin","year":"2001","unstructured":"Gisin, N., Ribordy, G., Tittel, W., Zbinden, H.: Quantum cryptography. Rev. Mod. Phys. 74(1), 145\u2013195 (2001)","journal-title":"Rev. Mod. Phys."},{"issue":"2","key":"2591_CR2","doi-asserted-by":"publisher","first-page":"441","DOI":"10.1103\/PhysRevLett.85.441","volume":"85","author":"PW Shor","year":"2000","unstructured":"Shor, P.W., Preskill, J.: Simple proof of security of the BB84 quantum key distribution protocol. Phys. Rev. Lett. 85(2), 441\u2013444 (2000)","journal-title":"Phys. Rev. Lett."},{"issue":"3","key":"2591_CR3","doi-asserted-by":"publisher","first-page":"1301","DOI":"10.1103\/RevModPhys.81.1301","volume":"81","author":"V Scarani","year":"2009","unstructured":"Scarani, V., Bechmann-Pasquinucci, H., Cerf, N., Du\u0161ek, M., Lutkenhaus, N., Peev, M.: The security of practical quantum key distribution. Rev. Mod. Phys. 81(3), 1301\u20131350 (2009)","journal-title":"Rev. Mod. Phys."},{"issue":"2","key":"2591_CR4","doi-asserted-by":"publisher","first-page":"020504","DOI":"10.1103\/PhysRevLett.94.020504","volume":"94","author":"F Grosshans","year":"2005","unstructured":"Grosshans, F.: Collectiveattacks and unconditional security in continuous variable quantum key distribution. Phys. Rev. Lett. 94(2), 020504 (2005)","journal-title":"Phys. Rev. Lett."},{"issue":"2","key":"2591_CR5","doi-asserted-by":"publisher","first-page":"022316","DOI":"10.1103\/PhysRevA.73.022316","volume":"73","author":"C Weedbrook","year":"2005","unstructured":"Weedbrook, C., Lance, A.M., Bowen, W.P., Symul, T., Ralph, T.C., Lam, P.K.: Coherent-state quantum key distribution without random basis switching. Phys. Rev. A 73(2), 022316 (2005)","journal-title":"Phys. Rev. A"},{"issue":"8","key":"2591_CR6","doi-asserted-by":"publisher","first-page":"3041","DOI":"10.1007\/s11128-015-1020-2","volume":"14","author":"F Yang","year":"2015","unstructured":"Yang, F., Shi, R., Guo, Y., Shi, J., Zeng, G.: Continuous-variable quantum key distribution under the local oscillator intensity attack with noiseless linear amplifier. Quantum. Inf. Process 14(8), 3041\u20133056 (2015)","journal-title":"Quantum. Inf. Process"},{"issue":"17","key":"2591_CR7","doi-asserted-by":"publisher","first-page":"1149","DOI":"10.1016\/j.physleta.2018.03.004","volume":"382","author":"Y Wang","year":"2018","unstructured":"Wang, Y., Wang, X., Li, J.: Self-referenced continuous-variable measurement-device-independent quantum key distribution. Phys. Lett. A 382(17), 1149\u20131156 (2018)","journal-title":"Phys. Lett. A"},{"issue":"2","key":"2591_CR8","doi-asserted-by":"publisher","first-page":"022309","DOI":"10.1103\/PhysRevA.61.022309","volume":"61","author":"M Hillery","year":"2000","unstructured":"Hillery, M.: Quantum cryptography with squeezed states. Phys. Rev. A 61(2), 022309 (2000)","journal-title":"Phys. Rev. A"},{"issue":"2","key":"2591_CR9","doi-asserted-by":"publisher","first-page":"022315","DOI":"10.1103\/PhysRevA.95.022315","volume":"95","author":"R Corvaja","year":"2017","unstructured":"Corvaja, R.: Phase-noise limitations in continuous-variable quantum key distribution with homodyne detection. Phys. Rev. A 95(2), 022315 (2017)","journal-title":"Phys. Rev. A"},{"issue":"86","key":"2591_CR10","first-page":"12510","volume":"86","author":"NJ Cerf","year":"2012","unstructured":"Cerf, N.J., Fiurasek, J.: Virtual noiseless amplification and Gaussian post-selection in continuous-variable quantum key distribution. Phys. Rev. A 86(86), 12510\u201312517 (2012)","journal-title":"Phys. Rev. A"},{"issue":"2","key":"2591_CR11","doi-asserted-by":"publisher","first-page":"621","DOI":"10.1103\/RevModPhys.84.621","volume":"84","author":"C Weedbrook","year":"2012","unstructured":"Weedbrook, C., Pirandola, S., Garc\u00eda-Patr\u00f3n, R., Cerf, N.J., Ralph, T.C., Shapiro, J.H., Lloyd, S.: Gaussian quantum information. Rev. Mod. Phys. 84(2), 621\u2013669 (2012)","journal-title":"Rev. Mod. Phys."},{"issue":"1","key":"2591_CR12","doi-asserted-by":"publisher","first-page":"103031","DOI":"10.1103\/PhysRevA.61.010303","volume":"61","author":"TC Ralph","year":"1999","unstructured":"Ralph, T.C.: Continuous variable quantum cryptography. Phys. Rev. A 61(1), 103031\u2013103034 (1999)","journal-title":"Phys. Rev. A"},{"issue":"17","key":"2591_CR13","doi-asserted-by":"publisher","first-page":"170504","DOI":"10.1103\/PhysRevLett.93.170504","volume":"93","author":"C Weedbrook","year":"2004","unstructured":"Weedbrook, C., Lance, A.M., Bowen, W.P., et al.: Quantum cryptography without switching. Phys. Rev. Lett. 93(17), 170504 (2004)","journal-title":"Phys. Rev. Lett."},{"issue":"13","key":"2591_CR14","doi-asserted-by":"publisher","first-page":"130501","DOI":"10.1103\/PhysRevLett.102.130501","volume":"102","author":"R Garc\u00eda-Patr\u00f3n","year":"2009","unstructured":"Garc\u00eda-Patr\u00f3n, R., Cerf, N.J.: Continuous-variable quantum key distribution protocols over noisy channels. Phys. Rev. Lett. 102(13), 130501 (2009)","journal-title":"Phys. Rev. Lett."},{"issue":"2","key":"2591_CR15","doi-asserted-by":"publisher","first-page":"022310","DOI":"10.1103\/PhysRevA.77.022310","volume":"77","author":"R Filip","year":"2008","unstructured":"Filip, R.: Continuous-variable quantum key distribution with noisy coherent states. Phys. Rev. A 77(2), 022310 (2008)","journal-title":"Phys. Rev. A"},{"issue":"2","key":"2591_CR16","doi-asserted-by":"publisher","first-page":"022318","DOI":"10.1103\/PhysRevA.81.022318","volume":"81","author":"VC Usenko","year":"2010","unstructured":"Usenko, V.C., Filip, R.: Feasibility of continuous-variable quantum key distribution with noisy coherent states. Phys. Rev. A 81(2), 022318 (2010)","journal-title":"Phys. Rev. A"},{"issue":"2","key":"2591_CR17","doi-asserted-by":"publisher","first-page":"022318","DOI":"10.1103\/PhysRevA.86.022318","volume":"86","author":"C Weedbrook","year":"2012","unstructured":"Weedbrook, C., Pirandola, S., Ralph, T.C.: Continuous-variable quantum key distribution using thermal states. Phys. Rev. A 86(2), 022318 (2012)","journal-title":"Phys. Rev. A"},{"issue":"1","key":"2591_CR18","doi-asserted-by":"publisher","first-page":"012309","DOI":"10.1103\/PhysRevA.89.012309","volume":"89","author":"C Weedbrook","year":"2014","unstructured":"Weedbrook, C., Ottaviani, C., Pirandola, S.: Two-way quantum cryptography at different wavelengths. Phys. Rev. A 89(1), 012309 (2014)","journal-title":"Phys. Rev. A"},{"issue":"3","key":"2591_CR19","doi-asserted-by":"publisher","first-page":"032314","DOI":"10.1103\/PhysRevA.98.032314","volume":"98","author":"P Panagiotis","year":"2018","unstructured":"Panagiotis, P., Carlo, O., Stefano, P.: Gaussian one-way thermal quantum cryptography with finite-size effects. Phys. Rev. A 98(3), 032314 (2018)","journal-title":"Phys. Rev. A"},{"issue":"1","key":"2591_CR20","doi-asserted-by":"publisher","first-page":"20","DOI":"10.3390\/e18010020","volume":"18","author":"VC Usenko","year":"2016","unstructured":"Usenko, V.C., Filip, R.: Trusted noise in Continuous-Variable quantum key distribution: a threat and a defense. Entropy 18(1), 20 (2016)","journal-title":"Entropy"},{"issue":"11","key":"2591_CR21","doi-asserted-by":"publisher","first-page":"4323","DOI":"10.1007\/s11128-015-1100-3","volume":"14","author":"Y Guo","year":"2015","unstructured":"Guo, Y., Lv, G., Zeng, G.: Balancing continuous-variable quantum key distribution with source-tunable linear optics cloning machine. Quantum. Inf. Process. 14(11), 4323\u20134338 (2015)","journal-title":"Quantum. Inf. Process."},{"issue":"2","key":"2591_CR22","doi-asserted-by":"publisher","first-page":"415","DOI":"10.1007\/s10773-016-3183-8","volume":"56","author":"XD Wu","year":"2017","unstructured":"Wu, X.D., Chen, F., Wu, X.H., et al.: Controlling continuous-variable quantum key distribution with entanglement in the middle using tunable linear optics cloning machines. Int. J. Theor. Phys. 56(2), 415\u2013426 (2017)","journal-title":"Int. J. Theor. Phys."},{"issue":"20","key":"2591_CR23","doi-asserted-by":"publisher","first-page":"200504","DOI":"10.1103\/PhysRevLett.101.200504","volume":"101","author":"S Pirandola","year":"2008","unstructured":"Pirandola, S., Braunstein, S.L., Lloyd, S.: Characterization of collective gaussian attacks and security of coherent-state quantum cryptography. Phys. Rev. Lett. 101(20), 200504 (2008)","journal-title":"Phys. Rev. Lett."},{"issue":"2","key":"2591_CR24","doi-asserted-by":"publisher","first-page":"020504","DOI":"10.1103\/PhysRevLett.94.020504","volume":"94","author":"F Grosshans","year":"2005","unstructured":"Grosshans, F.: Collective attacks and unconditional security in continuous variable quantum key distribution. Phys. Rev. Lett. 94(2), 020504 (2005)","journal-title":"Phys. Rev. Lett."},{"issue":"2","key":"2591_CR25","doi-asserted-by":"publisher","first-page":"020505","DOI":"10.1103\/PhysRevLett.94.020505","volume":"94","author":"M Navascus","year":"2005","unstructured":"Navascus, M., Acn, A.: Securitybounds for continuous variables quantum key distribution. Phys. Rev. Lett. 94(2), 020505 (2005)","journal-title":"Phys. Rev. Lett."},{"issue":"19","key":"2591_CR26","doi-asserted-by":"publisher","first-page":"190503","DOI":"10.1103\/PhysRevLett.97.190503","volume":"97","author":"R Garc\u00eda-Patr\u00f3n","year":"2006","unstructured":"Garc\u00eda-Patr\u00f3n, R., Cerf, N.J.: Unconditional optimality of gaussian attacks against continuous-variable quantum key distribution. Phys. Rev. Lett. 97(19), 190503 (2006)","journal-title":"Phys. Rev. Lett."},{"issue":"2","key":"2591_CR27","doi-asserted-by":"publisher","first-page":"022308","DOI":"10.1103\/PhysRevA.87.022308","volume":"87","author":"C Weedbrook","year":"2013","unstructured":"Weedbrook, C.: Continuous-variable quantum key distribution with entanglement in the middle. Phys. Rev. A 87(2), 022308 (2013)","journal-title":"Phys. Rev. A"},{"issue":"4","key":"2591_CR28","doi-asserted-by":"publisher","first-page":"042325","DOI":"10.1103\/PhysRevA.90.042325","volume":"90","author":"F Furrer","year":"2014","unstructured":"Furrer, F.: Reverse reconciliation continuous variable quantum key distribution based on the uncertainty principle. Phys. Rev. A 90(4), 042325 (2014)","journal-title":"Phys. Rev. A"},{"key":"2591_CR29","unstructured":"Garc\u00eda-Patr\u00f3n, R.: Quantum Information with Optical Continuous Variables: from Bell Tests to Key Distribution. Ph.D. thesis, Universit\u2019e Libre de Bruxelles, (2007)"},{"issue":"1","key":"2591_CR30","first-page":"219","volume":"89","author":"C Weedbrook","year":"2013","unstructured":"Weedbrook, C., Ottaviani, C., Pirandola, S.: Two-way quantum cryptography at different wavelengths. Phys. Rev. A 89(1), 219\u2013228 (2013)","journal-title":"Phys. Rev. A"},{"issue":"4","key":"2591_CR31","doi-asserted-by":"publisher","first-page":"042332","DOI":"10.1103\/PhysRevA.96.042332","volume":"96","author":"P Papanastasiou","year":"2017","unstructured":"Papanastasiou, P., Ottaviani, C., Pirandola, S.: Finite-size analysis of measurement-device-independent quantum cryptography with continuous variables. Phys. Rev. A 96(4), 042332 (2017)","journal-title":"Phys. Rev. A"}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-020-2591-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11128-020-2591-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-020-2591-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,2,2]],"date-time":"2021-02-02T00:37:34Z","timestamp":1612226254000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11128-020-2591-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,2,3]]},"references-count":31,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2020,3]]}},"alternative-id":["2591"],"URL":"https:\/\/doi.org\/10.1007\/s11128-020-2591-0","relation":{},"ISSN":["1570-0755","1573-1332"],"issn-type":[{"type":"print","value":"1570-0755"},{"type":"electronic","value":"1573-1332"}],"subject":[],"published":{"date-parts":[[2020,2,3]]},"assertion":[{"value":"21 April 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 January 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 February 2020","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"99"}}