{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T14:07:16Z","timestamp":1725977236259},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319907741"},{"type":"electronic","value":"9783319907758"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-90775-8_14","type":"book-chapter","created":{"date-parts":[[2018,5,8]],"date-time":"2018-05-08T04:43:57Z","timestamp":1525754637000},"page":"164-177","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Quantum Authentication Scheme Based on Fingerprint-Encoded Graph States"],"prefix":"10.1007","author":[{"given":"Fei","family":"Li","sequence":"first","affiliation":[]},{"given":"Ying","family":"Guo","sequence":"additional","affiliation":[]},{"given":"Jiankun","family":"Hu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,5,9]]},"reference":[{"key":"14_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10773-015-2628-9","volume":"55","author":"P Niu","year":"2016","unstructured":"Niu, P., Chen, Y., Li, C.: Quantum authentication scheme based on entanglement swapping. Int. J. Theor. Phys. 55, 1\u201311 (2016)","journal-title":"Int. J. Theor. Phys."},{"key":"14_CR2","first-page":"1327","volume":"4","author":"Z Jin","year":"2010","unstructured":"Jin, Z., Teoh, A.B.J., Ong, T., Tee, C.: A revocable fingerprint template for security and privacy preserving. KISS Trans. Internet Inf. Syst. 4, 1327\u20131342 (2010)","journal-title":"KISS Trans. Internet Inf. Syst."},{"key":"14_CR3","doi-asserted-by":"publisher","first-page":"100301","DOI":"10.1007\/s11433-015-5714-3","volume":"58","author":"B Liu","year":"2015","unstructured":"Liu, B., Gao, F., Huang, W., Wen, Q.Y.: QKD-based quantum private query without a failure probability. Sci. China Phys. Mech. Astron. 58, 100301 (2015)","journal-title":"Sci. China Phys. Mech. Astron."},{"key":"14_CR4","doi-asserted-by":"publisher","first-page":"1550057","DOI":"10.1142\/S0219749915500574","volume":"13","author":"M Gaudiano","year":"2015","unstructured":"Gaudiano, M., Osenda, O.: Entanglement in a spin ring with anisotropic interactions. Int. J. Quant. Inf. 13, 1550057 (2015)","journal-title":"Int. J. Quant. Inf."},{"key":"14_CR5","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1103\/PhysRevA.60.149","volume":"60","author":"M Du\u0161ek","year":"1998","unstructured":"Du\u0161ek, M., Haderka, O., Hendrych, M., My\u0161ka, R.: Quantum identification system. Phys. Rev. A 60, 149\u2013156 (1998)","journal-title":"Phys. Rev. A"},{"key":"14_CR6","doi-asserted-by":"publisher","first-page":"299","DOI":"10.1103\/PhysRevA.62.022305","volume":"62","author":"D Ljunggren","year":"2000","unstructured":"Ljunggren, D., Bourennane, M., Karlsson, A.: Authority-based user authentication and quantum key distribution. Phys. Rev. A 62, 299\u2013302 (2000)","journal-title":"Phys. Rev. A"},{"key":"14_CR7","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1016\/j.physleta.2006.03.048","volume":"356","author":"ZS Zhang","year":"2006","unstructured":"Zhang, Z.S., Zeng, G.H., Zhou, N.R., Xiong, J.: Quantum identity authentication based on Ping-pong technique for photons. Phys. Lett. A 356, 199\u2013205 (2006)","journal-title":"Phys. Lett. A"},{"key":"14_CR8","doi-asserted-by":"publisher","first-page":"2535","DOI":"10.1007\/s11128-014-0808-9","volume":"13","author":"H Yuan","year":"2014","unstructured":"Yuan, H., Liu, Y., Pan, G., Zhang, G., Zhou, J., Zhang, Z.: Quantum identity authentication based on Ping-pong technique without entanglements. Quant. Inf. Process. 13, 2535\u20132549 (2014)","journal-title":"Quant. Inf. Process."},{"key":"14_CR9","doi-asserted-by":"publisher","first-page":"2835","DOI":"10.1007\/s11434-014-0333-3","volume":"59","author":"Y Chang","year":"2014","unstructured":"Chang, Y., Zhang, S., Yan, L., Li, J.: Deterministic secure quantum communication and authentication protocol based on three-particle W state and quantum one-time pad. Sci. Bull. 59, 2835\u20132840 (2014)","journal-title":"Sci. Bull."},{"key":"14_CR10","doi-asserted-by":"publisher","first-page":"2428","DOI":"10.1007\/s10773-015-2880-z","volume":"55","author":"M Naseri","year":"2016","unstructured":"Naseri, M.: Revisiting quantum authentication scheme based on entanglement swapping. Int. J. Theoret. Phys. 55, 2428\u20132435 (2016)","journal-title":"Int. J. Theoret. Phys."},{"key":"14_CR11","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-84882-254-2","volume-title":"Handbook of Fingerprint Recognition","author":"D Maltoni","year":"2009","unstructured":"Maltoni, D., Maio, D., Jain, A., Prabhakar, K.S.: Handbook of Fingerprint Recognition. Springer, London (2009). \nhttps:\/\/doi.org\/10.1007\/978-1-84882-254-2"},{"key":"14_CR12","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1109\/TPAMI.2010.73","volume":"33","author":"Y Wang","year":"2011","unstructured":"Wang, Y., Hu, J.: Global ridge orientation modeling for partial fingerprint identification. IEEE Trans. Pattern Anal. Mach. Intell. 33, 72 (2011)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"14_CR13","unstructured":"Jin, Z., Teoh, A.B.J., Ong, T.S., Tee, C.: Generating revocable fingerprint template using minutiae pair representation. In: 2nd International Conference on Education Technology and Computer, pp. 22\u201324. IEEE Press, New York (2010)"},{"key":"14_CR14","doi-asserted-by":"publisher","first-page":"1179","DOI":"10.1109\/TIFS.2014.2328095","volume":"9","author":"W Yang","year":"2014","unstructured":"Yang, W., Hu, J., Wang, S.: A Delaunay quadrangle-based fingerprint authentication system with template protection using topology code for local registration and security enhancement. IEEE Trans. Inf. Forensics Secur. 9, 1179\u20131192 (2014)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"14_CR15","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1016\/j.patcog.2015.09.032","volume":"51","author":"WJ Wong","year":"2016","unstructured":"Wong, W.J., Teoh, A.B., Kho, Y.H., Wong, M.L.D.: Kernel PCA enabled bit-string representation for minutiae-based cancellable fingerprint template. Pattern Recogn. 51, 197\u2013208 (2016)","journal-title":"Pattern Recogn."},{"key":"14_CR16","doi-asserted-by":"publisher","first-page":"561","DOI":"10.1109\/TPAMI.2007.1004","volume":"29","author":"NK Ratha","year":"2007","unstructured":"Ratha, N.K., Chikkerur, S., Connell, J.H., Bolle, R.M.: Generating cancelable fingerprint templates. IEEE Trans. Pattern Anal. Mach. Intell. 29, 561\u2013572 (2007)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"14_CR17","doi-asserted-by":"publisher","first-page":"980","DOI":"10.1109\/TSMCB.2007.896999","volume":"37","author":"CH Lee","year":"2007","unstructured":"Lee, C.H., Choi, C.Y., Toh, K.A.: Alignment-free cancelable fingerprint templates based on local minutiae information. IEEE Trans. Syst. Man Cybern. 37, 980\u2013992 (2007)","journal-title":"IEEE Trans. Syst. Man Cybern."},{"key":"14_CR18","doi-asserted-by":"crossref","unstructured":"Thomas, A.O., Ratha, N.K., Connell, J.H., Bolle, R.M.: Comparative analysis of registration based and registration free methods for cancelable fingerprint biometrics. In: 19th International Conference on Pattern Recognition, pp. 8\u201311. IEEE Press, New York (2008)","DOI":"10.1109\/ICPR.2008.4761461"},{"key":"14_CR19","doi-asserted-by":"publisher","first-page":"042309","DOI":"10.1103\/PhysRevA.78.042309","volume":"78","author":"D Markham","year":"2011","unstructured":"Markham, D., Sanders, B.C.: Graph states for quantum secret sharing. Phys. Rev. A 78, 042309 (2011)","journal-title":"Phys. Rev. A"},{"key":"14_CR20","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1038\/nphys507","volume":"3","author":"CY Lu","year":"2007","unstructured":"Lu, C.Y., Zhou, X.Q., G\u00fchne, O., Gao, W.B., Zhang, J., Yuan, Z.S., Goebe, A., Yang, T., Pan, J.: Experimental entanglement of six photons in graph states. Nat. Phys. 3, 91\u201395 (2007)","journal-title":"Nat. Phys."},{"key":"14_CR21","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1038\/nature03347","volume":"434","author":"P Walther","year":"2005","unstructured":"Walther, P., Resch, K.J., Rudolph, T., Schenck, E., Weinfurter, H., Vedral, V., Aspelmeyer, M., Zeilinger, A.: Experimental one-way quantum computing. Nature 434, 169 (2005)","journal-title":"Nature"},{"key":"14_CR22","first-page":"423","volume":"70","author":"MVD Nest","year":"2004","unstructured":"Nest, M.V.D., Dehaene, J., Moor, B.D.: An efficient algorithm to recognize local Clifford equivalence of graph states. Phys. Rev. A 70, 423\u2013433 (2004)","journal-title":"Phys. Rev. A"},{"key":"14_CR23","first-page":"666","volume":"69","author":"M Hein","year":"2003","unstructured":"Hein, M., Eisert, J., Briegel, H.J.: Multi-party entanglement in graph states. Phys. Rev. A 69, 666\u2013670 (2003)","journal-title":"Phys. Rev. A"},{"key":"14_CR24","doi-asserted-by":"publisher","first-page":"4229","DOI":"10.1103\/PhysRevA.82.062315","volume":"82","author":"A Keet","year":"2010","unstructured":"Keet, A., Fortescue, B., Markham, D., Sanders, B.C.: Quantum secret sharing with qudit graph states. Phys. Rev. A 82, 4229\u20134231 (2010)","journal-title":"Phys. Rev. A"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Mobile Networks and Management"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-90775-8_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,5,8]],"date-time":"2018-05-08T04:51:10Z","timestamp":1525755070000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-90775-8_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319907741","9783319907758"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-90775-8_14","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2018]]}}}