{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T18:44:39Z","timestamp":1725648279033},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642245527"},{"type":"electronic","value":"9783642245534"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-24553-4_33","type":"book-chapter","created":{"date-parts":[[2012,1,3]],"date-time":"2012-01-03T09:49:00Z","timestamp":1325584140000},"page":"239-246","source":"Crossref","is-referenced-by-count":2,"title":["Attacks and Improvements of QSDC Schemes Based on CSS Codes"],"prefix":"10.1007","author":[{"given":"Xiangfu","family":"Zou","sequence":"first","affiliation":[]},{"given":"Daowen","family":"Qiu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"33_CR1","unstructured":"Bennett, C.H., Brassard, G.: Quantum Cryptography: Public Key Distribution and Coin Tossing. In: IEEE International Conference on Computers, Systems and Signal Processing, pp. 175\u2013179 (1984)"},{"key":"33_CR2","doi-asserted-by":"publisher","first-page":"661","DOI":"10.1103\/PhysRevLett.67.661","volume":"67","author":"A.K. Ekert","year":"1991","unstructured":"Ekert, A.K.: Quantum Cryptography Based on Bell\u2019s Theorem. Physical Review Letters\u00a067, 661\u2013663 (1991)","journal-title":"Physical Review Letters"},{"key":"33_CR3","doi-asserted-by":"publisher","first-page":"2050","DOI":"10.1126\/science.283.5410.2050","volume":"283","author":"H.K. Lo","year":"1999","unstructured":"Lo, H.K., Chau, H.F.: Unconditional Security of Quantumkey Distribution over Arbitrarily Long Distances. Science\u00a0283, 2050\u20132056 (1999)","journal-title":"Science"},{"key":"33_CR4","doi-asserted-by":"publisher","first-page":"441","DOI":"10.1103\/PhysRevLett.85.441","volume":"85","author":"P.W. Shor","year":"2000","unstructured":"Shor, P.W., Preskill, J.: Simple Proof of Security of The BB84 Quantum Key Distribution Protocol. Physical Review Letters\u00a085, 441\u2013444 (2000)","journal-title":"Physical Review Letters"},{"key":"33_CR5","volume-title":"Quantum Conputation and Quantum Information","author":"M.A. Nielsen","year":"2000","unstructured":"Nielsen, M.A., Chuang, I.L.: Quantum Conputation and Quantum Information. Cambridge University Press, Cambridge (2000)"},{"key":"33_CR6","doi-asserted-by":"publisher","first-page":"357","DOI":"10.12693\/APhysPolA.101.357","volume":"101","author":"A. Beige","year":"2002","unstructured":"Beige, A., Englert, B.G., Kurtsiefer, C., Weinfurter, H.: Secure Communication With a Publicly Known Key. Acta Physica Polonica A\u00a0101, 357\u2013368 (2002)","journal-title":"Acta Physica Polonica A"},{"key":"33_CR7","doi-asserted-by":"publisher","first-page":"187902","DOI":"10.1103\/PhysRevLett.89.187902","volume":"89","author":"K. Bost\u00f6m","year":"2002","unstructured":"Bost\u00f6m, K., Felbinger, T.: Deterministic Secure Direct Communication Using Entanglement. Physical Review Letters\u00a089, 187902 (2002)","journal-title":"Physical Review Letters"},{"key":"33_CR8","doi-asserted-by":"publisher","first-page":"157901","DOI":"10.1103\/PhysRevLett.90.157901","volume":"90","author":"A. W\u00f3jcik","year":"2003","unstructured":"W\u00f3jcik, A.: Eavesdropping on the \u201dPing-Pong\u201d Quantum Communication Protocol. Physical Review Letters\u00a090, 157901 (2003)","journal-title":"Physical Review Letters"},{"key":"33_CR9","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1016\/j.physleta.2004.10.025","volume":"333","author":"Z. Zhang","year":"2004","unstructured":"Zhang, Z., Man, Z., Li, Y.: Improving W\u00f3jcik\u2019s Eavesdropping Attack on the Ping-pong Protocol. Physics Letters A\u00a0333, 46\u201350 (2004)","journal-title":"Physics Letters A"},{"key":"33_CR10","doi-asserted-by":"publisher","first-page":"42317","DOI":"10.1103\/PhysRevA.68.042317","volume":"68","author":"F.G. Deng","year":"2003","unstructured":"Deng, F.G., Long, G.L., Liu, X.S.: Two-step Quantum Direct Communication Protocol Using the Einstein-Podolsky-Rosen Pair Block. Physical Review A\u00a068, 042317 (2003)","journal-title":"Physical Review A"},{"key":"33_CR11","first-page":"313","volume":"119","author":"T. Gao","year":"2004","unstructured":"Gao, T., Yan, F.L., Wang, Z.X.: Quantum Secure Direct Communication by EPR Pairs and Entanglement Swapping. Nuovo Cimento Della Societa Italiana di Fisica B\u00a0119, 313\u2013318 (2004)","journal-title":"Nuovo Cimento Della Societa Italiana di Fisica B"},{"key":"33_CR12","doi-asserted-by":"publisher","first-page":"5761","DOI":"10.1088\/0305-4470\/38\/25\/011","volume":"38","author":"T. Gao","year":"2005","unstructured":"Gao, T., Yan, F.L., Wang, Z.X.: Deterministic Secure Direct Communication Using GHZ States and Swapping Quantum Entanglement. Journal of Physics A\u00a038, 5761\u20135770 (2005)","journal-title":"Journal of Physics A"},{"key":"33_CR13","doi-asserted-by":"publisher","first-page":"52319","DOI":"10.1103\/PhysRevA.69.052319","volume":"69","author":"F.G. Deng","year":"2004","unstructured":"Deng, F.G., Long, G.L.: Secure Direct Communication with a Quantum One-time Pad. Physical Review A\u00a069, 052319 (2004)","journal-title":"Physical Review A"},{"key":"33_CR14","doi-asserted-by":"publisher","first-page":"16301","DOI":"10.1103\/PhysRevA.72.016301","volume":"72","author":"H. Hoffmann","year":"2005","unstructured":"Hoffmann, H., Bostroem, K., Felbinger, T.: Comment on Secure Direct Communication with a Quantum One-time Pad. Physical Review A\u00a072, 016301 (2005)","journal-title":"Physical Review A"},{"key":"33_CR15","doi-asserted-by":"publisher","first-page":"16302","DOI":"10.1103\/PhysRevA.72.016302","volume":"72","author":"F.G. Deng","year":"2005","unstructured":"Deng, F.G., Long, G.L.: Reply to Comment on Secure Direct Communication with a Quantum Onetime-pad. Physical Review A\u00a072, 016302 (2005)","journal-title":"Physical Review A"},{"key":"33_CR16","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1088\/0256-307X\/22\/1\/006","volume":"22","author":"Z.X. Man","year":"2005","unstructured":"Man, Z.X., Zhang, Z.J., Li, Y.: Deterministic Secure Direct Communication by Using Swapping Quantum Entanglement and Local Unitary Operations. Chinese Physics Letters\u00a022, 18\u201321 (2005)","journal-title":"Chinese Physics Letters"},{"key":"33_CR17","doi-asserted-by":"publisher","first-page":"140501","DOI":"10.1103\/PhysRevLett.94.140501","volume":"94","author":"M. Lucamarini","year":"2005","unstructured":"Lucamarini, M., Mancini, S.: Secure Deterministic Communication without Entanglement. Physical Review Letters\u00a094, 140501 (2005)","journal-title":"Physical Review Letters"},{"key":"33_CR18","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1016\/j.physleta.2004.06.009","volume":"328","author":"B.A. Nguyen","year":"2004","unstructured":"Nguyen, B.A.: Quantum Dialogue. Physics Letters A\u00a0328, 6\u201310 (2004)","journal-title":"Physics Letters A"},{"key":"33_CR19","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1016\/j.physleta.2006.01.035","volume":"35","author":"X.R. Jin","year":"2006","unstructured":"Jin, X.R., Ji, X., Zhang, Y.Q., Zhang, S., Hong, S.K., Yeon, K.H., Um, C.I.: Three-party Quantum Secure Direct Communication Based on GHZ States. Physics Letters A\u00a035, 67\u201370 (2006)","journal-title":"Physics Letters A"},{"key":"33_CR20","doi-asserted-by":"publisher","first-page":"359","DOI":"10.1016\/j.physleta.2006.06.054","volume":"359","author":"F.G. Deng","year":"2006","unstructured":"Deng, F.G., Li, X.H., Li, C.Y., Zhou, P., Zhou, H.Y.: Quantum Secure Direct Communication Network with Einstein-Podolsky-Rosen Pairs. Physics Letters A\u00a0359, 359\u2013365 (2006)","journal-title":"Physics Letters A"},{"key":"33_CR21","doi-asserted-by":"publisher","first-page":"509","DOI":"10.1360\/jos170509","volume":"17","author":"X. L\u00fc","year":"2006","unstructured":"L\u00fc, X., Ma, Z., Feng, D.G.: Quantum Secure Direct Communication Using Quantum Calderbank-Shor-Steane Error Correcting Codes. Journal of Software\u00a017, 509\u2013515 (2006)","journal-title":"Journal of Software"},{"key":"33_CR22","doi-asserted-by":"crossref","unstructured":"Wang, Y., Wang, H., Li, Z., Huang, J.: Man-in-the-Middle Attack on BB84 Protocol and its Defence. In: 2nd IEEE International Conference on Computer Science and Information Technology, pp. 438\u2013439 (2009)","DOI":"10.1109\/ICCSIT.2009.5234678"},{"key":"33_CR23","doi-asserted-by":"publisher","first-page":"109801","DOI":"10.1103\/PhysRevLett.91.109801","volume":"91","author":"Q.Y. Cai","year":"2003","unstructured":"Cai, Q.Y.: The \u201cPing-Pong\u201d Protocol can be Attacked Without Eavesdropping. Physical Review Letters\u00a091, 109801 (2003)","journal-title":"Physical Review Letters"}],"container-title":["Lecture Notes in Computer Science","Bio-Inspired Computing and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-24553-4_33","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,23]],"date-time":"2019-04-23T21:38:16Z","timestamp":1556055496000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-24553-4_33"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642245527","9783642245534"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-24553-4_33","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}