{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T13:29:29Z","timestamp":1725542969645},"publisher-location":"Berlin, Heidelberg","reference-count":38,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642117305"},{"type":"electronic","value":"9783642117312"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-11731-2_30","type":"book-chapter","created":{"date-parts":[[2010,1,7]],"date-time":"2010-01-07T04:54:38Z","timestamp":1262840078000},"page":"249-257","source":"Crossref","is-referenced-by-count":0,"title":["Using Multi-particle Entanglement in Secure Communication Scenarios"],"prefix":"10.1007","author":[{"given":"Mosayeb","family":"Naseri","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"30_CR1","doi-asserted-by":"publisher","first-page":"1052","DOI":"10.1103\/PhysRevLett.82.1052","volume":"82","author":"D.A. Meyer","year":"1999","unstructured":"Meyer, D.A.: Quantum Strategies. Phys. Rev. Lett.\u00a082, 1052 (1999)","journal-title":"Phys. Rev. Lett."},{"key":"30_CR2","doi-asserted-by":"publisher","first-page":"3077","DOI":"10.1103\/PhysRevLett.83.3077","volume":"83","author":"J. Eisert","year":"1999","unstructured":"Eisert, J., Wilkens, M., Lewenstein, M.: Quantum Games and Quantum Strategies. Phys. Rev. Lett.\u00a083, 3077 (1999)","journal-title":"Phys. Rev. Lett."},{"key":"30_CR3","volume-title":"Mathematical Physics Frontiers","author":"E.W. Piotrowski","year":"2004","unstructured":"Piotrowski, E.W., Sladkowski, J.: Quantum Game Theory. In: Mathematical Physics Frontiers. Nova Science Publishers, Inc., Berlin (2004)"},{"key":"30_CR4","doi-asserted-by":"publisher","first-page":"1089","DOI":"10.1023\/A:1025443111388","volume":"42","author":"E.W. Piotrowski","year":"2003","unstructured":"Piotrowski, E.W., Sladkowski, J.: An invitation to quantum game theory. Int. J. Theor. Phys.\u00a042, 1089 (2003)","journal-title":"Int. J. Theor. Phys."},{"key":"30_CR5","doi-asserted-by":"publisher","first-page":"505","DOI":"10.1016\/S0378-4371(02)01533-9","volume":"318","author":"E.W. Piotrowskia","year":"2003","unstructured":"Piotrowskia, E.W., Sladkowski, J.: Quantum English Auctions. Physica A\u00a0318, 505 (2003)","journal-title":"Physica A"},{"key":"30_CR6","doi-asserted-by":"publisher","first-page":"3949","DOI":"10.1016\/j.physa.2008.02.071","volume":"387","author":"E.W. Piotrowskia","year":"2008","unstructured":"Piotrowskia, E.W., Sladkowski, J.: Quantum Auctions: Facts and Myths. Physica A\u00a0387, 3949 (2008)","journal-title":"Physica A"},{"key":"30_CR7","doi-asserted-by":"publisher","first-page":"1939","DOI":"10.1016\/j.optcom.2009.01.026","volume":"282","author":"M. Naseri","year":"2009","unstructured":"Naseri, M.: Secure quantum sealed-bid auction. Opt. Commun.\u00a0282, 1939 (2009)","journal-title":"Opt. Commun."},{"key":"30_CR8","doi-asserted-by":"publisher","first-page":"278","DOI":"10.1016\/j.optcom.2007.03.031","volume":"275","author":"X. Wen","year":"2007","unstructured":"Wen, X., et al.: Secure Quantum Telephone. Optics Communications\u00a0275, 278\u2013282 (2007)","journal-title":"Optics Communications"},{"key":"30_CR9","doi-asserted-by":"crossref","unstructured":"Naseri, M.: Eavesdropping on secure quantum telephone protocol with dishonest server. Opt. Commun. (2009), doi:10.1016\/j.optcom.2009.05.012","DOI":"10.1016\/j.optcom.2009.05.012"},{"key":"30_CR10","first-page":"175","volume-title":"Proceedings of the IEEE International Conference on Computers, Systems and Signal Processings, Bangalore, India","author":"C.H. Bennett","year":"1984","unstructured":"Bennett, C.H., Brassard, G.: Proceedings of the IEEE International Conference on Computers, Systems and Signal Processings, Bangalore, India, p. 175. IEEE, New York (1984)"},{"key":"30_CR11","doi-asserted-by":"publisher","first-page":"357","DOI":"10.12693\/APhysPolA.101.357","volume":"101","author":"A. Beige","year":"2002","unstructured":"Beige, A., Engler, B.G., Kurtsiefer, C., Weinfurter, H.: Secure communication with a publicly known key. Acta Phys. Pol. A\u00a0101, 357 (2002)","journal-title":"Acta Phys. Pol. A"},{"key":"30_CR12","doi-asserted-by":"publisher","first-page":"32302","DOI":"10.1103\/PhysRevA.65.032302","volume":"65","author":"G.L. Long","year":"2002","unstructured":"Long, G.L., Liu, X.S.: Theoretically efficient high-capacity quantum-key-distribution scheme. Phys. Rev. A\u00a065, 32302 (2002)","journal-title":"Phys. Rev. A"},{"key":"30_CR13","doi-asserted-by":"publisher","first-page":"187902","DOI":"10.1103\/PhysRevLett.89.187902","volume":"89","author":"K. Bostrom","year":"2002","unstructured":"Bostrom, K., Felbinger, T.: Deterministic secure direct communication using entanglement. Phys. Rev. Lett.\u00a089, 187902 (2002)","journal-title":"Phys. Rev. Lett."},{"key":"30_CR14","doi-asserted-by":"publisher","first-page":"42317","DOI":"10.1103\/PhysRevA.68.042317","volume":"68","author":"F.G. Deng","year":"2003","unstructured":"Deng, F.G., Long, G.L., Liu, X.S.: Two-step quantum direct communication protocol using the Einstein-Podolsky-Rosen pair block. Phys. Rev. A\u00a068, 042317 (2003)","journal-title":"Phys. Rev. A"},{"issue":"3","key":"30_CR15","first-page":"251","volume":"2","author":"F.G. Deng","year":"2007","unstructured":"Deng, F.G., Long, G.L., Li, X.H., Wen, K., Wang, W.Y.: Improving the security of secure direct communication based on the secret transmitting order of particles. Front. Phys. China\u00a02(3), 251 (2007)","journal-title":"Front. Phys. China"},{"key":"30_CR16","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1016\/j.physleta.2004.10.025","volume":"333","author":"Z.J. Zhang","year":"2004","unstructured":"Zhang, Z.J., Man, Z.X., Li, Y.: Improving W\u00f3jcik\u2019s eavesdropping attack on the ping\u2013pong protocol. Phys. Lett. A\u00a0333, 46 (2004)","journal-title":"Phys. Lett. A"},{"key":"30_CR17","doi-asserted-by":"publisher","first-page":"52319","DOI":"10.1103\/PhysRevA.69.052319","volume":"69","author":"F.G. Deng","year":"2004","unstructured":"Deng, F.G., Long, G.L.: Secure direct communication with a quantum one-time pad. Phys. Rev. A\u00a069, 052319 (2004)","journal-title":"Phys. Rev. A"},{"key":"30_CR18","doi-asserted-by":"publisher","first-page":"385","DOI":"10.1016\/j.physleta.2005.05.023","volume":"341","author":"Z.J. Zhang","year":"2005","unstructured":"Zhang, Z.J., Li, Y., Man, Z.X.: Improved W\u00f3jcik\u2019s eavesdropping attack on ping-pong protocol without eavesdropping-induced channel loss. Phys. Lett. A\u00a0341, 385 (2005)","journal-title":"Phys. Lett. A"},{"key":"30_CR19","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1016\/j.optcom.2005.04.048","volume":"253","author":"C. Wang","year":"2005","unstructured":"Wang, C., Deng, F.G., Long, G.L.: Multi-step quantum secure direct communication using multi-particle Green\u2013Horne\u2013Zeilinger state. Opt. Commun.\u00a0253, 15 (2005)","journal-title":"Opt. Commun."},{"key":"30_CR20","doi-asserted-by":"publisher","first-page":"521","DOI":"10.1142\/S0219749904000912","volume":"2","author":"Z.J. Zhang","year":"2005","unstructured":"Zhang, Z.J., Man, Z.X., Li, Y.: The Improved Bostrom\u2013Felbinger Protocol Against Attacks Without Eavesdropping. Int. J. Quantum Inform.\u00a02, 521 (2005)","journal-title":"Int. J. Quantum Inform."},{"key":"30_CR21","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1088\/0256-307X\/22\/1\/006","volume":"22","author":"Z.X. Man","year":"2005","unstructured":"Man, Z.X., Zhang, Z.J., Li, Y.: Quantum Dialogue Revisited. Chin. Phys. Lett.\u00a022, 18 (2005)","journal-title":"Chin. Phys. Lett."},{"key":"30_CR22","doi-asserted-by":"crossref","first-page":"052319","DOI":"10.1103\/PhysRevA.69.052319","volume":"69","author":"F.G. Deng","year":"2004","unstructured":"Deng, F.G., Long, G.L.: Secure direct communication with a quantum one-time pad. Phys. Rev. A\u00a069, 052319 (2004)","journal-title":"Phys. Rev. A"},{"key":"30_CR23","doi-asserted-by":"publisher","first-page":"157901","DOI":"10.1103\/PhysRevLett.90.157901","volume":"90","author":"A. Wojcik","year":"2003","unstructured":"Wojcik, A.: Eavesdropping on the \u201cPing-Pong\u201d Quantum Communication Protocol. Phys. Rev. Lett.\u00a090, 157901 (2003)","journal-title":"Phys. Rev. Lett."},{"key":"30_CR24","doi-asserted-by":"publisher","first-page":"42312","DOI":"10.1103\/PhysRevA.65.042312","volume":"65","author":"G.H. Zeng","year":"2002","unstructured":"Zeng, G.H., Keitel, C.H.: Arbitrated quantum-signature scheme. Phys. Rev. A\u00a065, 042312 (2002)","journal-title":"Phys. Rev. A"},{"key":"30_CR25","doi-asserted-by":"publisher","first-page":"42317","DOI":"10.1103\/PhysRevA.67.042317","volume":"67","author":"P.O. Boykin","year":"2003","unstructured":"Boykin, P.O., Roychowdhury, V.: Optimal encryption of quantum bits. Phys. Rev. A\u00a067, 042317 (2003)","journal-title":"Phys. Rev. A"},{"key":"30_CR26","doi-asserted-by":"publisher","first-page":"1829","DOI":"10.1103\/PhysRevA.59.1829","volume":"59","author":"M. Hillery","year":"1999","unstructured":"Hillery, M., Buzek, V., Berthiaume, A.: Quantum secret sharing. Phys. Rev. A\u00a059, 1829 (1999)","journal-title":"Phys. Rev. A"},{"key":"30_CR27","doi-asserted-by":"publisher","first-page":"162","DOI":"10.1103\/PhysRevA.59.162","volume":"59","author":"A. Karlsson","year":"1999","unstructured":"Karlsson, A., Koashi, M., Imoto, N.: Quantum entanglement for secret sharing and secret splitting. Phys. Rev. A\u00a059, 162 (1999)","journal-title":"Phys. Rev. A"},{"key":"30_CR28","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1016\/j.physleta.2004.06.009","volume":"328","author":"B.A. Nguyen","year":"2004","unstructured":"Nguyen, B.A.: Quantum Dialogue. Phys. Lett. A\u00a0328, 6 (2004)","journal-title":"Phys. Lett. A"},{"key":"30_CR29","doi-asserted-by":"publisher","first-page":"2278","DOI":"10.1016\/j.optcom.2009.02.033","volume":"282","author":"Y. Sun","year":"2009","unstructured":"Sun, Y., et al.: Improving the security of secure quantum telephone against an attack with fake particles and local operations. Opt. Commun.\u00a0282, 2278 (2009)","journal-title":"Opt. Commun."},{"key":"30_CR30","doi-asserted-by":"publisher","first-page":"3375","DOI":"10.1016\/j.optcom.2009.05.012","volume":"282","author":"M. Naseri","year":"2009","unstructured":"Naseri, M.: Eavesdropping on secure quantum telephone protocol with dishonest server. Optics Commun.\u00a0282, 3375\u20133378 (2009)","journal-title":"Optics Commun."},{"key":"30_CR31","volume-title":"Quantum Computation and Quantum Information","author":"M.A. Nielsen","year":"2000","unstructured":"Nielsen, M.A., Chuang, I.L.: Quantum Computation and Quantum Information. Cambridge University Press, Cambridge (2000)"},{"key":"30_CR32","doi-asserted-by":"publisher","first-page":"22304","DOI":"10.1103\/PhysRevA.65.022304","volume":"65","author":"X.S. Liu","year":"2002","unstructured":"Liu, X.S., et al.: General scheme for superdense coding between multiparties. Phys. Rev. A\u00a065, 022304 (2002)","journal-title":"Phys. Rev. A"},{"key":"30_CR33","doi-asserted-by":"crossref","unstructured":"Subramanian, S.: Design and verification of a secure electronic auction protocol. In: Proc. IEEE 17th Symposium on Reliable Distributed Systems, Washington DC, USA, pp. 204\u2013210 (1998)","DOI":"10.1109\/RELDIS.1998.740497"},{"key":"30_CR34","doi-asserted-by":"publisher","first-page":"4167","DOI":"10.1016\/j.optcom.2009.07.010","volume":"282","author":"Y.G. Yang","year":"2009","unstructured":"Yang, Y.G., et al.: Improved Secure Quantum Sealed-Bid Auction. Optics Communications\u00a0282, 4167\u20134170 (2009)","journal-title":"Optics Communications"},{"key":"30_CR35","doi-asserted-by":"publisher","first-page":"4014","DOI":"10.1016\/j.optcom.2009.06.070","volume":"282","author":"S.-J. Qin","year":"2009","unstructured":"Qin, S.-J., et al.: Cryptanalysis and improvement of a secure quantum sealed-bid auction. Optics Communications\u00a0282, 4014\u20134016 (2009)","journal-title":"Optics Communications"},{"key":"30_CR36","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1016\/j.physleta.2005.09.010","volume":"349","author":"M. Hillery","year":"2006","unstructured":"Hillery, M., et al.: Towards quantum-based privacy and voting. Physics Letters A\u00a0349, 75\u201381 (2006)","journal-title":"Physics Letters A"},{"key":"30_CR37","doi-asserted-by":"publisher","first-page":"12333","DOI":"10.1103\/PhysRevA.75.012333","volume":"75","author":"J.A. Vaccaro","year":"2007","unstructured":"Vaccaro, J.A., et al.: Quantum protocols for anonymous voting and surveying. Physical Review A\u00a075, 012333 (2007)","journal-title":"Physical Review A"},{"key":"30_CR38","first-page":"125","volume-title":"Applied Cryptography","author":"B. Schneier","year":"1996","unstructured":"Schneier, B.: Applied Cryptography, p. 125. Wiley, New York (1996)"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Quantum Communication and Quantum Networking"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-11731-2_30","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,11]],"date-time":"2019-03-11T10:27:53Z","timestamp":1552300073000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-11731-2_30"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642117305","9783642117312"],"references-count":38,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-11731-2_30","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2010]]}}}