{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T14:01:50Z","timestamp":1742997710787,"version":"3.40.3"},"publisher-location":"Cham","reference-count":27,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030322151"},{"type":"electronic","value":"9783030322168"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-32216-8_27","type":"book-chapter","created":{"date-parts":[[2019,10,23]],"date-time":"2019-10-23T12:14:33Z","timestamp":1571832873000},"page":"278-287","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Design and Simulation of a Quantum Key Distribution Protocol Based on Single-Particle and EPR Entanglement"],"prefix":"10.1007","author":[{"given":"Leilei","family":"Li","sequence":"first","affiliation":[]},{"given":"Jian","family":"Li","sequence":"additional","affiliation":[]},{"given":"Hengji","family":"Li","sequence":"additional","affiliation":[]},{"given":"Chaoyang","family":"Li","sequence":"additional","affiliation":[]},{"given":"Yan","family":"Zheng","sequence":"additional","affiliation":[]},{"given":"Yuguang","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,10,24]]},"reference":[{"key":"27_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"475","DOI":"10.1007\/3-540-39568-7_39","volume-title":"Advances in Cryptology","author":"CH Bennett","year":"1985","unstructured":"Bennett, C.H., Brassard, G.: An update on quantum cryptography. In: Blakley, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 475\u2013480. Springer, Heidelberg (1985). \n                  https:\/\/doi.org\/10.1007\/3-540-39568-7_39"},{"issue":"18","key":"27_CR2","doi-asserted-by":"publisher","first-page":"187902","DOI":"10.1103\/PhysRevLett.89.187902","volume":"89","author":"K BostroM","year":"2002","unstructured":"BostroM, K., Felbinger, T.: Secure direct communication using entanglement. Phys. Rev. Lett. 89(18), 187902 (2002)","journal-title":"Phys. Rev. Lett."},{"issue":"6","key":"27_CR3","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1016\/j.physrep.2007.05.006","volume":"452","author":"P Busch","year":"2006","unstructured":"Busch, P., Heinonen, T., Lahti, P.: Heisenberg\u2019s uncertainty principle. Phys. Rep. 452(6), 155\u2013176 (2006)","journal-title":"Phys. Rep."},{"issue":"3","key":"27_CR4","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1007\/s11128-017-1518-x","volume":"16","author":"Y Chang","year":"2017","unstructured":"Chang, Y., Zhang, S.B., Zhu, J.M.: Comment on \u201cflexible protocol for quantum private query based on B92 protocol\u201d. Quantum Inf. Process. 16(3), 86 (2017)","journal-title":"Quantum Inf. Process."},{"issue":"6","key":"27_CR5","doi-asserted-by":"publisher","first-page":"1192","DOI":"10.1016\/j.optcom.2009.11.007","volume":"283","author":"SK Chong","year":"2010","unstructured":"Chong, S.K., Hwang, T.: Quantum key agreement protocol based on BB84. Opt. Commun. 283(6), 1192\u20131195 (2010)","journal-title":"Opt. Commun."},{"issue":"4","key":"27_CR6","first-page":"113","volume":"68","author":"FG Deng","year":"2003","unstructured":"Deng, F.G., Gui, L.L., Liu, X.S.: Two-step quantum direct communication protocol using the Einstein-Podolsky-Rosen pair block. Phys. Rev. A 68(4), 113\u2013114 (2003)","journal-title":"Phys. Rev. A"},{"issue":"18","key":"27_CR7","doi-asserted-by":"publisher","first-page":"3333","DOI":"10.1016\/j.physleta.2008.01.043","volume":"372","author":"F Gao","year":"2008","unstructured":"Gao, F., Qin, S.J., Wen, Q.Y., Zhu, F.C.: Three-party quantum secure direct communication based on GHZ states. Phys. Lett. A 372(18), 3333\u20133336 (2008)","journal-title":"Phys. Lett. A"},{"issue":"358","key":"27_CR8","first-page":"120","volume":"3","author":"RA Howard","year":"1960","unstructured":"Howard, R.A.: Dynamic programming and Markov process. Math. Gaz. 3(358), 120 (1960)","journal-title":"Math. Gaz."},{"issue":"4","key":"27_CR9","doi-asserted-by":"publisher","first-page":"925","DOI":"10.1007\/s11128-013-0702-x","volume":"13","author":"T Hwang","year":"2014","unstructured":"Hwang, T., Luo, Y.P., Yang, C.W., Lin, T.H.: Quantum authencryption: one-step authenticated quantum secure direct communications for off-line communicants. Quantum Inf. Process. 13(4), 925\u2013933 (2014)","journal-title":"Quantum Inf. Process."},{"key":"27_CR10","doi-asserted-by":"publisher","first-page":"28767","DOI":"10.1038\/srep28767","volume":"6","author":"L Jian","year":"2016","unstructured":"Jian, L., Na, L., Li, L.L., Tao, W.: One step quantum key distribution based on EPR entanglement. Sci. Rep. 6, 28767 (2016)","journal-title":"Sci. Rep."},{"key":"27_CR11","doi-asserted-by":"publisher","first-page":"31738","DOI":"10.1038\/srep31738","volume":"6","author":"L Jian","year":"2016","unstructured":"Jian, L., Yang, Y.G., Chen, X.B., Zhou, Y.H., Shi, W.M.: Practical quantum private database queries based on passive round-robin differential phase-shift quantum key distribution. Sci. Rep. 6, 31738 (2016)","journal-title":"Sci. Rep."},{"issue":"4","key":"27_CR12","doi-asserted-by":"publisher","first-page":"689","DOI":"10.1049\/cje.2015.10.005","volume":"24","author":"J Li","year":"2015","unstructured":"Li, J., Pan, Z., Zheng, J., Sun, F., Xinxin, Y.E., Yuan, K.: The security analysis of quantum SAGR04 protocol in collective-rotation noise channel. Chin. J. Electron. 24(4), 689\u2013693 (2015)","journal-title":"Chin. J. Electron."},{"issue":"7670","key":"27_CR13","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1038\/nature23655","volume":"549","author":"SK Liao","year":"2017","unstructured":"Liao, S.K., et al.: Satellite-to-ground quantum key distribution. Nature 549(7670), 43\u201347 (2017)","journal-title":"Nature"},{"issue":"5410","key":"27_CR14","doi-asserted-by":"publisher","first-page":"2050","DOI":"10.1126\/science.283.5410.2050","volume":"283","author":"HK Lo","year":"1999","unstructured":"Lo, H.K., Chau, H.F.: Unconditional security of quantum key distribution over arbitrarily long distances. Science 283(5410), 2050\u20132056 (1999)","journal-title":"Science"},{"key":"27_CR15","doi-asserted-by":"crossref","unstructured":"Long, G.L., Liu, X.S.: Theoretically efficient high-capacity quantum-key-distribution scheme. Phys. Rev. A 65(3) (2002)","DOI":"10.1103\/PhysRevA.65.032302"},{"issue":"1","key":"27_CR16","first-page":"88","volume":"20","author":"V Padmavathi","year":"2018","unstructured":"Padmavathi, V., Vardhan, B.V., Krishna, A.: Provably secure quantum key distribution by applying quantum gate. Int. J. Netw. Secur. 20(1), 88\u201394 (2018)","journal-title":"Int. J. Netw. Secur."},{"issue":"1","key":"27_CR17","first-page":"57","volume":"15","author":"CE Shannon","year":"1998","unstructured":"Shannon, C.E.: Communication theory of secrecy systems. M.D. Comput. Comput. Med. Pract. 15(1), 57 (1998)","journal-title":"M.D. Comput. Comput. Med. Pract."},{"issue":"2","key":"27_CR18","doi-asserted-by":"publisher","first-page":"441","DOI":"10.1103\/PhysRevLett.85.441","volume":"85","author":"PW Shor","year":"2000","unstructured":"Shor, P.W., Preskill, J.: Simple proof of security of the BB84 quantum key distribution protocol. Phys. Rev. Lett. 85(2), 441\u2013444 (2000)","journal-title":"Phys. Rev. Lett."},{"issue":"2","key":"27_CR19","first-page":"295","volume":"XLV","author":"GS Vernam","year":"2009","unstructured":"Vernam, G.S.: Cipher printing telegraph systems for secret wire and radio telegraphic communications. Trans. Am. Inst. Electr. Eng. XLV(2), 295\u2013301 (2009)","journal-title":"Trans. Am. Inst. Electr. Eng."},{"key":"27_CR20","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1016\/j.physb.2017.01.016","volume":"510","author":"L Wan","year":"2017","unstructured":"Wan, L., Huang, Y., Huang, C.: Quantum noise theory for phonon transport through nanostructures. Phys. B 510, 22\u201328 (2017)","journal-title":"Phys. B"},{"issue":"4","key":"27_CR21","doi-asserted-by":"publisher","first-page":"44305","DOI":"10.1103\/PhysRevA.71.044305","volume":"71","author":"C Wang","year":"2005","unstructured":"Wang, C., Deng, F.G., Li, Y.S., Liu, X.S., Long, G.L.: Quantum secure direct communication with high-dimension quantum superdense coding. Phys. Rev. A 71(4), 44305 (2005)","journal-title":"Phys. Rev. A"},{"issue":"1","key":"27_CR22","first-page":"15","volume":"253","author":"C Wang","year":"2006","unstructured":"Wang, C., Deng, F.G., Long, G.L.: Multi-step quantum secure direct communication using multi-particle Green-Horne-Zeilinger state. Opt. Commun. 253(1), 15\u201320 (2006)","journal-title":"Opt. Commun."},{"issue":"3","key":"27_CR23","doi-asserted-by":"publisher","first-page":"553","DOI":"10.1109\/18.54902","volume":"36","author":"MJ Wiener","year":"1989","unstructured":"Wiener, M.J.: Cryptanalysis of short RSA secret exponents. IEEE Trans. Inf. Theory 36(3), 553\u2013558 (1989)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"7","key":"27_CR24","doi-asserted-by":"publisher","first-page":"2230","DOI":"10.1007\/s10773-013-1498-2","volume":"52","author":"CW Yang","year":"2013","unstructured":"Yang, C.W., Hwang, T., Lin, T.H.: Modification attack on QSDC with authentication and the improvement. Int. J. Theor. Phys. 52(7), 2230\u20132234 (2013)","journal-title":"Int. J. Theor. Phys."},{"issue":"3","key":"27_CR25","doi-asserted-by":"publisher","first-page":"317","DOI":"10.1007\/s11128-010-0199-5","volume":"10","author":"YG Yang","year":"2011","unstructured":"Yang, Y.G., Teng, Y.W., Chai, H.P., Wen, Q.Y.: Revisiting the security of secure direct communication based on ping-pong protocol [quantum inf. process. 8, 347 (2009)]. Quantum Inf. Process. 10(3), 317\u2013323 (2011)","journal-title":"Quantum Inf. Process."},{"issue":"9","key":"27_CR26","first-page":"1358","volume":"60","author":"NP Zhao","year":"2011","unstructured":"Zhao, N.P.: Quantum key distribution secure threshold based on BB84 protocol. Acta Phys. Sin. 60(9), 1358\u20131364 (2011)","journal-title":"Acta Phys. Sin."},{"issue":"5","key":"27_CR27","doi-asserted-by":"publisher","first-page":"052337","DOI":"10.1103\/PhysRevA.96.052337","volume":"96","author":"XY Zhou","year":"2017","unstructured":"Zhou, X.Y., Zhang, C.H., Zhang, C.M., Wang, Q.: Obtaining better performance in the measurement-device-independent quantum key distribution with heralded single-photon sources. Phys. Rev. A 96(5), 052337 (2017)","journal-title":"Phys. Rev. A"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Simulation Tools and Techniques"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-32216-8_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,2,6]],"date-time":"2020-02-06T05:07:53Z","timestamp":1580965673000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-32216-8_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030322151","9783030322168"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-32216-8_27","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"24 October 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SIMUtools","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Simulation Tools and Techniques","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Chengdu","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 July 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 July 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"simutools2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/simutools.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Confy","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"156","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"97","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"62% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}