{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T11:50:37Z","timestamp":1726055437852},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030322151"},{"type":"electronic","value":"9783030322168"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-32216-8_25","type":"book-chapter","created":{"date-parts":[[2019,10,23]],"date-time":"2019-10-23T16:14:33Z","timestamp":1571847273000},"page":"258-266","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Design and Simulation of a Deterministic Quantum Secure Direct Communication and Authentication Protocol Based on Three-Particle Asymmetric Entangled State"],"prefix":"10.1007","author":[{"given":"Yanyan","family":"Hou","sequence":"first","affiliation":[]},{"given":"Jian","family":"Li","sequence":"additional","affiliation":[]},{"given":"Qinghui","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Hengji","family":"Li","sequence":"additional","affiliation":[]},{"given":"Xinjie","family":"Lv","sequence":"additional","affiliation":[]},{"given":"Xuhong","family":"Li","sequence":"additional","affiliation":[]},{"given":"Yu","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,10,24]]},"reference":[{"issue":"18","key":"25_CR1","doi-asserted-by":"publisher","first-page":"187902","DOI":"10.1103\/PhysRevLett.89.187902","volume":"89","author":"K Bostrom","year":"2002","unstructured":"Bostrom, K., Felbinger, T.: Deterministic secure direct communication using entanglement. Phys. Rev. Lett 89(18), 187902 (2002)","journal-title":"Phys. Rev. Lett"},{"issue":"12","key":"25_CR2","first-page":"1853","volume":"51","author":"F Gao","year":"2008","unstructured":"Gao, F., Guo, F.Z., Wen, Q.Y., et al.: Comparing the efficiencies of different detect strategies in the ping-pong protocol. Sci. China 51(12), 1853\u20131860 (2008)","journal-title":"Sci. China"},{"issue":"1","key":"25_CR3","first-page":"111","volume":"9","author":"J Li","year":"2012","unstructured":"Li, J., Guo, X.J., Song, D.J., et al.: Improved quantum \u201cPing-Pong\u201d protocol based on extended three-particle GHz state. China Commun. 9(1), 111\u2013116 (2012)","journal-title":"China Commun."},{"issue":"4","key":"25_CR4","doi-asserted-by":"crossref","first-page":"2493","DOI":"10.7498\/aps.59.2493","volume":"59","author":"DX Quan","year":"2010","unstructured":"Quan, D.X., Pei, C.X., Liu, D., et al.: One-way deterministic secure quantum communication protocol based on single photons. Acta Physica Sinica 59(4), 2493\u20132497 (2010)","journal-title":"Acta Physica Sinica"},{"issue":"1","key":"25_CR5","doi-asserted-by":"publisher","first-page":"569","DOI":"10.1007\/s11128-012-0403-x","volume":"12","author":"P Zawadzki","year":"2013","unstructured":"Zawadzki, P., Pucha\u0142a, Z., Miszczak, J.A.: Increasing the security of the ping-pong protocol by using many mutually unbiased bases. Quantum Inf. Process. 12(1), 569\u2013576 (2013)","journal-title":"Quantum Inf. Process."},{"issue":"10","key":"25_CR6","first-page":"101","volume":"21","author":"W Huang","year":"2012","unstructured":"Huang, W., Wen, Q.-Y., Jia, H.-Y., et al.: Fault tolerant quantum secure direct communication with quantum encryption against collective noise. Chin. Phys. B 21(10), 101\u2013109 (2012)","journal-title":"Chin. Phys. B"},{"issue":"9","key":"25_CR7","doi-asserted-by":"publisher","first-page":"e16144","DOI":"10.1038\/lsa.2016.144","volume":"5","author":"JY Hu","year":"2016","unstructured":"Hu, J.Y., Yu, B., Jing, M.Y., et al.: Experimental quantum secure direct communication with single photons. Light Sci. Appl. 5(9), e16144 (2016)","journal-title":"Light Sci. Appl."},{"issue":"10","key":"25_CR8","doi-asserted-by":"publisher","first-page":"252","DOI":"10.1007\/s11128-017-1703-y","volume":"16","author":"YF He","year":"2017","unstructured":"He, Y.F., Ma, W.P.: Three-party quantum secure direct communication against collective noise. Quantum Inf. Process. 16(10), 252 (2017)","journal-title":"Quantum Inf. Process."},{"issue":"12","key":"25_CR9","doi-asserted-by":"publisher","first-page":"3941","DOI":"10.1007\/s10773-012-1286-4","volume":"51","author":"CW Yang","year":"2012","unstructured":"Yang, C.W., Hwang, T.: Improved QSDC protocol over a collective-dephasing noise channel. Int. J. Theor. Phys. 51(12), 3941\u20133950 (2012)","journal-title":"Int. J. Theor. Phys."},{"issue":"07n08","key":"25_CR10","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1142\/S0219749915600205","volume":"12","author":"S Aravinda","year":"2014","unstructured":"Aravinda, S., Banerjee, A., Pathak, A., Srikanth, R., et al.: Orthogonal-state-based cryptography in quantum mechanics and local post-quantum theories. Int. J. Quantum Inf. 12(07n08), 175\u2013179 (2014)","journal-title":"Int. J. Quantum Inf."},{"issue":"7","key":"25_CR11","doi-asserted-by":"publisher","first-page":"2436","DOI":"10.1007\/s10773-014-2466-1","volume":"54","author":"SJ Xu","year":"2015","unstructured":"Xu, S.J., Chen, X.B., Wang, L.H., et al.: Two quantum direct communication protocols based on quantum search algorithm. Int. J. Theor. Phys. 54(7), 2436\u20132445 (2015)","journal-title":"Int. J. Theor. Phys."},{"key":"25_CR12","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1016\/j.optcom.2014.11.032","volume":"340","author":"ZF Feng","year":"2015","unstructured":"Feng, Z.F., Yang, O.Y., Zhou, L., et al.: Entanglement assisted single-photon W state amplification. Opt. Commun. 340, 80\u201385 (2015)","journal-title":"Opt. Commun."},{"issue":"12","key":"25_CR13","doi-asserted-by":"publisher","first-page":"120313","DOI":"10.1007\/s11433-017-9100-9","volume":"60","author":"FZ Wu","year":"2017","unstructured":"Wu, F.Z., Yang, G.J., Wang, H.B., et al.: High-capacity quantum secure direct communication with two-photon six-qubit hyperentangled states. Sci. China (Phys. Mech. Astron.) 60(12), 120313 (2017)","journal-title":"Sci. China (Phys. Mech. Astron.)"},{"key":"25_CR14","doi-asserted-by":"publisher","first-page":"28767","DOI":"10.1038\/srep28767","volume":"6","author":"J Li","year":"2016","unstructured":"Li, J., Li, N., Li, L.L., Wang, T.: One step quantum key distribution based on EPR entanglement. Sci. Rep. 6, 28767 (2016)","journal-title":"Sci. Rep."},{"issue":"6","key":"25_CR15","doi-asserted-by":"publisher","first-page":"1914","DOI":"10.1007\/s10773-012-1331-3","volume":"52","author":"SK Chang","year":"2013","unstructured":"Chang, S.K.: Improved protocols of secure quantum communication using W states. Int. J. Theor. Phys. 52(6), 1914\u20131924 (2013)","journal-title":"Int. J. Theor. Phys."},{"issue":"10","key":"25_CR16","doi-asserted-by":"publisher","first-page":"1903","DOI":"10.1007\/s11433-013-5191-5","volume":"56","author":"T Chia-Wei","year":"2013","unstructured":"Chia-Wei, T., Tzonelih, H.: Deterministic quantum communication using the symmetric W state. Sci. China (Phys. Mech. Astron.) 56(10), 1903\u20131908 (2013)","journal-title":"Sci. China (Phys. Mech. Astron.)"},{"issue":"7","key":"25_CR17","first-page":"972","volume":"15","author":"C Shukla","year":"2015","unstructured":"Shukla, C.: Design and analysis of quantum communication protocols. Chem. Res. Toxicol. 15(7), 972\u2013978 (2015)","journal-title":"Chem. Res. Toxicol."},{"issue":"1","key":"25_CR18","first-page":"321","volume":"165","author":"K Toshinai","year":"2015","unstructured":"Toshinai, K., Mondal, M.S., Nakazato, M., et al.: On optimising quantum communication in verifiable quantum computing. J. Bacteriol. 165(1), 321\u2013323 (2015)","journal-title":"J. Bacteriol."},{"issue":"2","key":"25_CR19","first-page":"2325","volume":"86","author":"Y Wu","year":"2016","unstructured":"Wu, Y., Zhou, J., Gong, X., et al.: Continuous-variable measurement-device-independent multipartite quantum communication. J. Phys. Soc. Jpn. 86(2), 2325 (2016)","journal-title":"J. Phys. Soc. Jpn."},{"issue":"5","key":"25_CR20","doi-asserted-by":"publisher","first-page":"1457","DOI":"10.1016\/j.optcom.2010.10.084","volume":"284","author":"YY Nie","year":"2011","unstructured":"Nie, Y.Y., Li, Y.H., Liu, J.C., et al.: Quantum state sharing of an arbitrary three-qubit state by using four sets of W-class states. Opt. Commun. 284(5), 1457\u20131460 (2011)","journal-title":"Opt. Commun."},{"issue":"24","key":"25_CR21","doi-asserted-by":"publisher","first-page":"1450194","DOI":"10.1142\/S0217984914501942","volume":"28","author":"M Wang","year":"2014","unstructured":"Wang, M., Ma, W., Shen, D., et al.: A new controlled quantum secure direct communication protocol based on a four-qubit cluster state. Mod. Phys. Lett. B 28(24), 1450194 (2014)","journal-title":"Mod. Phys. Lett. B"},{"issue":"2","key":"25_CR22","doi-asserted-by":"publisher","first-page":"589","DOI":"10.1007\/s10773-014-2251-1","volume":"54","author":"YB Li","year":"2015","unstructured":"Li, Y.B., Song, T.T., Huang, W., et al.: Fault-tolerant quantum secure direct communication protocol based on decoherence-free states. Int. J. Theor. Phys. 54(2), 589\u2013597 (2015)","journal-title":"Int. J. Theor. Phys."},{"issue":"9","key":"25_CR23","doi-asserted-by":"publisher","first-page":"090301","DOI":"10.1088\/0256-307X\/30\/9\/090301","volume":"30","author":"Y Chang","year":"2013","unstructured":"Chang, Y., Zhang, S.B., Yan, L.L.: A bidirectional quantum secure direct communication protocol based on five-particle cluster state. China Phys. Lett. 30(9), 090301 (2013)","journal-title":"China Phys. Lett."},{"issue":"10","key":"25_CR24","doi-asserted-by":"publisher","first-page":"4564","DOI":"10.1007\/s10773-016-3079-7","volume":"55","author":"Z Liu","year":"2016","unstructured":"Liu, Z., Chen, H., Liu, W.: Cryptanalysis of controlled quantum secure direct communication and authentication protocol based on five-particle cluster state and quantum one-time pad. Int. J. Theor. Phys. 55(10), 4564\u20134576 (2016)","journal-title":"Int. J. Theor. Phys."},{"issue":"5","key":"25_CR25","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1007\/s11128-017-1573-3","volume":"16","author":"MH Zhang","year":"2017","unstructured":"Zhang, M.H., Li, H.F., Xia, Z.Q., et al.: Semiquantum secure direct communication using EPR pairs. Quantum Inf. Process. 16(5), 117 (2017)","journal-title":"Quantum Inf. Process."}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Simulation Tools and Techniques"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-32216-8_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,1,25]],"date-time":"2021-01-25T22:28:07Z","timestamp":1611613687000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-32216-8_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030322151","9783030322168"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-32216-8_25","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"24 October 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SIMUtools","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Simulation Tools and Techniques","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Chengdu","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 July 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 July 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"simutools2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/simutools.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Confy","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"156","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"97","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"62% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}