{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T00:44:34Z","timestamp":1725583474837},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642211102"},{"type":"electronic","value":"9783642211119"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-21111-9_23","type":"book-chapter","created":{"date-parts":[[2011,5,20]],"date-time":"2011-05-20T13:58:55Z","timestamp":1305899935000},"page":"209-218","source":"Crossref","is-referenced-by-count":0,"title":["Multiparty Simultaneous Quantum Secure Direct Communication Based on GHZ States and Mutual Authentication"],"prefix":"10.1007","author":[{"given":"Wenjie","family":"Liu","sequence":"first","affiliation":[]},{"given":"Jingfa","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Hao","family":"Xiao","sequence":"additional","affiliation":[]},{"given":"Tinghuai","family":"Ma","sequence":"additional","affiliation":[]},{"given":"Yu","family":"Zheng","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"23_CR1","first-page":"175","volume-title":"Proc. of IEEE International Conference on Computers, Systems and Signal Processing","author":"C.H. Bennett","year":"1984","unstructured":"Bennett, C.H., Brassard, G.: Quantum cryptography: Public-key distribution and tossing. In: Proc. of IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, India, pp. 175\u2013179. IEEE Press, Los Alamitos (1984)"},{"key":"23_CR2","doi-asserted-by":"publisher","first-page":"661","DOI":"10.1103\/PhysRevLett.67.661","volume":"67","author":"K. Ekert","year":"1991","unstructured":"Ekert, K.: Quantum cryptography based on Bell\u2019s theorem. Phys. Rev. Lett.\u00a067, 661\u2013663 (1991)","journal-title":"Phys. Rev. Lett."},{"key":"23_CR3","doi-asserted-by":"publisher","first-page":"3121","DOI":"10.1103\/PhysRevLett.68.3121","volume":"68","author":"H. Bennett","year":"1992","unstructured":"Bennett, H.: Quantum cryptography using any two nonorthogonal states. Phys. Rev. Lett.\u00a068, 3121\u20133124 (1992)","journal-title":"Phys. Rev. Lett."},{"key":"23_CR4","doi-asserted-by":"publisher","first-page":"1829","DOI":"10.1103\/PhysRevA.59.1829","volume":"59","author":"M. Hillery","year":"1999","unstructured":"Hillery, M., Bu\u017eek, V., Berthiaume, A.: Quantum secret sharing. Phys. Rev. A\u00a059, 1829 (1999)","journal-title":"Phys. Rev. A"},{"key":"23_CR5","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1016\/j.physleta.2005.04.007","volume":"340","author":"F.G. Deng","year":"2005","unstructured":"Deng, F.G., Long, G.L., Zhou, H.Y.: An efficient quantum secret sharing scheme with Einstein\u2013Podolsky\u2013Rosen pairs. Phys. Lett. A\u00a0340, 43\u201350 (2005)","journal-title":"Phys. Lett. A"},{"key":"23_CR6","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1103\/PhysRevLett.83.648","volume":"83","author":"R. Cleve","year":"1999","unstructured":"Cleve, R., Gottesman, D., Lo, H.K.: How to Share a Quantum Secret. Phys. Rev. Lett.\u00a083, 3 (1999)","journal-title":"Phys. Rev. Lett."},{"key":"23_CR7","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1103\/PhysRevLett.92.177903","volume":"92","author":"M. Lance","year":"2004","unstructured":"Lance, M., Symul, T., Bowen, W.P., Sanders, B.C., Lam, P.K.: Tripartite Quantum State Sharing. Phys. Rev. Lett.\u00a092, 17 (2004)","journal-title":"Phys. Rev. Lett."},{"key":"23_CR8","doi-asserted-by":"publisher","first-page":"187902","DOI":"10.1103\/PhysRevLett.89.187902","volume":"89","author":"K. Bostr\u00f6m","year":"2002","unstructured":"Bostr\u00f6m, K., Felbinger, T.: Deterministic Secure Direct Communication Using Entanglement. Phys. Rev. Lett.\u00a089, 187902 (2002)","journal-title":"Phys. Rev. Lett."},{"key":"23_CR9","doi-asserted-by":"publisher","first-page":"157901","DOI":"10.1103\/PhysRevLett.90.157901","volume":"90","author":"A. W\u00f3jcik","year":"2003","unstructured":"W\u00f3jcik, A.: Eavesdropping on the \u2018ping-pong\u2019 quantum communication protocol. Phys. Rev. Lett.\u00a090, 157901 (2003)","journal-title":"Phys. Rev. Lett."},{"key":"23_CR10","doi-asserted-by":"publisher","first-page":"42317","DOI":"10.1103\/PhysRevA.68.042317","volume":"68","author":"F.G. Deng","year":"2003","unstructured":"Deng, F.G., Long, G.L., Liu, X.S.: Two-step quantum direct communication protocol using the Einstein-Podolsky-Rosen pair block. Phys. Rev. A\u00a068, 042317 (2003)","journal-title":"Phys. Rev. A"},{"key":"23_CR11","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1016\/j.optcom.2005.04.048","volume":"253","author":"C. Wang","year":"2005","unstructured":"Wang, C., Deng, F.G., Long, G.L.: Multi-step quantum secure direct communication using multi-particle Green-Horne-Zeilinger state. Opt. Commun.\u00a0253, 15\u201320 (2005)","journal-title":"Opt. Commun."},{"key":"23_CR12","doi-asserted-by":"publisher","first-page":"357","DOI":"10.12693\/APhysPolA.101.357","volume":"101","author":"A. Beige","year":"2002","unstructured":"Beige, A., Englert, B.G., Kurtsiefer, C., Weinfurter, H.: Secure communication with single-photon two-qubit states. Acta Phys. Pol. A\u00a0101, 357\u2013361 (2002)","journal-title":"Acta Phys. Pol. A"},{"key":"23_CR13","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1140\/epjb\/e2004-00296-4","volume":"41","author":"F.L. Yan","year":"2004","unstructured":"Yan, F.L., Zhang, X.: A scheme for secure direct communication using EPR pairs and teleportation. Euro. Phys. J. B\u00a041, 75\u201378 (2004)","journal-title":"Euro. Phys. J. B"},{"key":"23_CR14","doi-asserted-by":"publisher","first-page":"5761","DOI":"10.1088\/0305-4470\/38\/25\/011","volume":"38","author":"T. Gao","year":"2005","unstructured":"Gao, T., Yan, F.L., Wang, Z.X.: Deterministic secure direct communication using GHZ states and swapping quantum entanglement. J. Phys. A: Math. Gen.\u00a038, 5761\u20135770 (2005)","journal-title":"J. Phys. A: Math. Gen."},{"key":"23_CR15","first-page":"1354","volume":"49","author":"X.H. Li","year":"2006","unstructured":"Li, X.H., Deng, F.G., Li, C.Y., Liang, Y.J., Zhou, P., Zhou, H.Y.: Deterministic Secure Quantum Communication Without Maximally Entangled States. J. Kerean Phys. Soc.\u00a049, 1354\u20131360 (2006)","journal-title":"J. Kerean Phys. Soc."},{"key":"23_CR16","doi-asserted-by":"publisher","first-page":"42305","DOI":"10.1103\/PhysRevA.73.042305","volume":"73","author":"H. Lee","year":"2006","unstructured":"Lee, H., Lim, J., Yang, H.: Quantum direct communication with authentication. Phys. Rev. A\u00a073, 042305 (2006)","journal-title":"Phys. Rev. A"},{"key":"23_CR17","doi-asserted-by":"publisher","first-page":"26301","DOI":"10.1103\/PhysRevA.75.026301","volume":"75","author":"Z.J. Zhang","year":"2007","unstructured":"Zhang, Z.J., Liu, J., Wang, D., Shi, S.H.: Comment on Quantum direct communication with authentication. Phys. Rev. A\u00a075, 026301 (2007)","journal-title":"Phys. Rev. A"},{"key":"23_CR18","doi-asserted-by":"publisher","first-page":"2354","DOI":"10.1088\/0256-307X\/25\/7\/007","volume":"25","author":"W.J. Liu","year":"2008","unstructured":"Liu, W.J., Chen, H.W., Li, Z.Q., Liu, Z.H.: Efficient quantum secure direct communication with authentication. Chin. Phys. Lett.\u00a025, 2354\u20132357 (2008)","journal-title":"Chin. Phys. Lett."},{"key":"23_CR19","doi-asserted-by":"publisher","first-page":"20312","DOI":"10.1088\/0256-307X\/26\/2\/020312","volume":"26","author":"S.J. Qin","year":"2009","unstructured":"Qin, S.J., Wen, Q.Y., Meng, L.M., Zhu, F.C.: High Efficiency of Two Efficient QSDC with Authentication Is at the Cost of Their Security. Chin. Phys. Lett.\u00a026, 020312 (2009)","journal-title":"Chin. Phys. Lett."},{"key":"23_CR20","doi-asserted-by":"crossref","first-page":"376","DOI":"10.26421\/QIC9.5-6-2","volume":"9","author":"A. Yen","year":"2009","unstructured":"Yen, A., Horng, S.J., Goan, H.S., Kao, T.W., Chou, Y.H.: Quantum direct communication with mutual authentication. Quantum Information and Computation\u00a09, 376\u2013394 (2009)","journal-title":"Quantum Information and Computation"}],"container-title":["Lecture Notes in Computer Science","Advances in Neural Networks \u2013 ISNN 2011"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-21111-9_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,23]],"date-time":"2021-11-23T20:36:14Z","timestamp":1637699774000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-21111-9_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642211102","9783642211119"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-21111-9_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}