{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T16:42:50Z","timestamp":1725727370506},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642388644"},{"type":"electronic","value":"9783642388651"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-38865-1_36","type":"book-chapter","created":{"date-parts":[[2013,5,26]],"date-time":"2013-05-26T21:42:02Z","timestamp":1369604522000},"page":"354-362","source":"Crossref","is-referenced-by-count":1,"title":["An Analysis of the Ping-Pong Protocol Operation in a Noisy Quantum Channel"],"prefix":"10.1007","author":[{"given":"Piotr","family":"Zawadzki","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"36_CR1","unstructured":"Nielsen, M.A., Chuang, I.L.: Quantum Computation and Quantum Information. Cambridge University Press (2000)"},{"issue":"5","key":"36_CR2","doi-asserted-by":"publisher","first-page":"1484","DOI":"10.1137\/S0097539795293172","volume":"26","author":"P.W. Shor","year":"1997","unstructured":"Shor, P.W.: Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM J. Comput.\u00a026(5), 1484\u20131509 (1997)","journal-title":"SIAM J. Comput."},{"key":"36_CR3","series-title":"AISC","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1007\/978-3-642-05019-0_24","volume-title":"Internet\u00a0\u2013 Technical Developments and Applications","author":"P. Zawadzki","year":"2009","unstructured":"Zawadzki, P.: A numerical simulation of quantum factorization success probability. In: Tkacz, E., Kapczy\u0144ski, A. (eds.) Internet\u00a0\u2013 Technical Developments and Applications. AISC, vol.\u00a064, pp. 223\u2013231. Springer, Heidelberg (2009)"},{"issue":"8","key":"36_CR4","doi-asserted-by":"publisher","first-page":"1233","DOI":"10.1142\/S0219749910006940","volume":"8","author":"P. Zawadzki","year":"2010","unstructured":"Zawadzki, P.: A fine estimate of quantum factorization success probability. Int. J. Quant. Inf.\u00a08(8), 1233\u20131238 (2010)","journal-title":"Int. J. Quant. Inf."},{"key":"36_CR5","unstructured":"Bennett, C.H., Brassard, G.: Quantum cryptography: Public key distribution and coin tossing. In: Proceedings of International Conference on Computers, Systems and Signal Processing, New York, pp. 175\u2013179 (1984)"},{"issue":"8","key":"36_CR6","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1109\/MC.2009.375","volume":"43","author":"J. Izydorczyk","year":"2010","unstructured":"Izydorczyk, J., Izydorczyk, M.: Microprocessor scaling: What limits will hold? IEEE Computer\u00a043(8), 20\u201326 (2010)","journal-title":"IEEE Computer"},{"key":"36_CR7","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1103\/RevModPhys.74.145","volume":"74","author":"N. Gisin","year":"2002","unstructured":"Gisin, N., Ribordy, G., Tittel, W., Zbinden, H.: Quantum cryptography. Rev. Mod. Phys.\u00a074, 145\u2013195 (2002)","journal-title":"Rev. Mod. Phys."},{"key":"36_CR8","doi-asserted-by":"publisher","first-page":"2881","DOI":"10.1103\/PhysRevLett.69.2881","volume":"69","author":"C.H. Bennett","year":"1992","unstructured":"Bennett, C.H., Wiesner, S.J.: Communication via one- and two-particle operators on Einstein-Podolsky-Rosen states. Phys. Rev. Lett.\u00a069, 2881\u20132884 (1992)","journal-title":"Phys. Rev. Lett."},{"issue":"4","key":"36_CR9","doi-asserted-by":"crossref","first-page":"044305","DOI":"10.1103\/PhysRevA.71.044305","volume":"71","author":"C. Wang","year":"2005","unstructured":"Wang, C., Deng, F.G., Li, Y.S., Liu, X.S., Long, G.L.: Quantum secure direct communication with high-dimension quantum superdense coding. Phys. Rev. A\u00a071(4), 044305 (2005)","journal-title":"Phys. Rev. A"},{"key":"36_CR10","doi-asserted-by":"publisher","first-page":"1895","DOI":"10.1103\/PhysRevLett.70.1895","volume":"70","author":"C.H. Bennett","year":"1993","unstructured":"Bennett, C.H., Brassard, G., Cr\u00e9peau, C., Jozsa, R., Peres, A., Wootters, W.K.: Teleporting an unknown quantum state via dual classical and Einstein-Podolsky-Rosen channels. Phys. Rev. Lett.\u00a070, 1895\u20131899 (1993)","journal-title":"Phys. Rev. Lett."},{"key":"36_CR11","unstructured":"Stinson, D.R.: Cryptography: Theory and Practice, 2nd edn. Chapman & Hall\/CRC (2002)"},{"issue":"3","key":"36_CR12","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1007\/s11467-007-0050-3","volume":"2","author":"G.L. Long","year":"2007","unstructured":"Long, G.L., Deng, F.G., Wang, C., Li, X.H., Wen, K., Wang, W.Y.: Quantum secure direct communication and deterministic secure quantum communication. Front. Phys. China\u00a02(3), 251\u2013272 (2007)","journal-title":"Front. Phys. China"},{"issue":"18","key":"36_CR13","doi-asserted-by":"publisher","first-page":"187902","DOI":"10.1103\/PhysRevLett.89.187902","volume":"89","author":"K. Bostr\u00f6m","year":"2002","unstructured":"Bostr\u00f6m, K., Felbinger, T.: Deterministic secure direct communication using entanglement. Phys. Rev. Lett.\u00a089(18), 187902 (2002)","journal-title":"Phys. Rev. Lett."},{"issue":"17","key":"36_CR14","doi-asserted-by":"publisher","first-page":"4540","DOI":"10.1016\/j.optcom.2008.04.068","volume":"281","author":"M. Ostermeyer","year":"2008","unstructured":"Ostermeyer, M., Walenta, N.: On the implementation of a deterministic secure coding protocol using polarization entangled photons. Opt. Commun.\u00a0281(17), 4540\u20134544 (2008)","journal-title":"Opt. Commun."},{"key":"36_CR15","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1007\/s11128-010-0188-8","volume":"10","author":"E.V. Vasiliu","year":"2011","unstructured":"Vasiliu, E.V.: Non-coherent attack on the ping-pong protocol with completely entangled pairs of qutrits. Quantum Inf. Process.\u00a010, 189\u2013202 (2011)","journal-title":"Quantum Inf. Process."},{"issue":"6","key":"36_CR16","doi-asserted-by":"publisher","first-page":"1419","DOI":"10.1007\/s11128-011-0307-1","volume":"11","author":"P. Zawadzki","year":"2012","unstructured":"Zawadzki, P.: Security of ping-pong protocol based on pairs of completely entangled qudits. Quantum Inf. Process.\u00a011(6), 1419\u20131430 (2012)","journal-title":"Quantum Inf. Process."},{"issue":"15","key":"36_CR17","doi-asserted-by":"publisher","first-page":"157901","DOI":"10.1103\/PhysRevLett.90.157901","volume":"90","author":"A. W\u00f3jcik","year":"2003","unstructured":"W\u00f3jcik, A.: Eavesdropping on the ping-pong quantum communication protocol. Phys. Rev. Lett.\u00a090(15), 157901 (2003)","journal-title":"Phys. Rev. Lett."},{"key":"36_CR18","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1016\/j.physleta.2004.10.025","volume":"333","author":"Z. Zhang","year":"2004","unstructured":"Zhang, Z., Man, Z., Li, Y.: Improving W\u00f3jcik\u2019s eavesdropping attack on the ping-pong protocol. Phys. Lett. A\u00a0333, 46\u201350 (2004)","journal-title":"Phys. Lett. A"},{"issue":"3","key":"36_CR19","doi-asserted-by":"publisher","first-page":"1250032","DOI":"10.1142\/S0219749912500323","volume":"10","author":"P. Zawadzki","year":"2012","unstructured":"Zawadzki, P.: The Ping-Pong protocol with a prior privacy amplification. Int. J. Quant. Inf.\u00a010(3), 1250032 (2012)","journal-title":"Int. J. Quant. Inf."},{"issue":"1-2","key":"36_CR20","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1016\/0375-9601(88)91034-1","volume":"128","author":"A. Peres","year":"1988","unstructured":"Peres, A.: How to differentiate between non-orthogonal states. Phys. Lett. A\u00a0128(1-2), 19 (1988)","journal-title":"Phys. Lett. A"},{"key":"36_CR21","doi-asserted-by":"crossref","first-page":"032314","DOI":"10.1103\/PhysRevA.86.032314","volume":"86","author":"U. Herzog","year":"2012","unstructured":"Herzog, U.: Optimal state discrimination with a fixed rate of inconclusive results: analytical solutions and relation to state discrimination with a\u00a0fixed error rate. Phys. Rev. A\u00a086, 032314 (2012)","journal-title":"Phys. Rev. A"},{"key":"36_CR22","doi-asserted-by":"crossref","first-page":"022302","DOI":"10.1103\/PhysRevA.70.022302","volume":"70","author":"U. Herzog","year":"2004","unstructured":"Herzog, U., Bergou, J.A.: Distinguishing mixed quantum states: Minimum-error discrimination versus optimum unambiguous discrimination. Phys. Rev. A\u00a070, 022302 (2004)","journal-title":"Phys. Rev. A"},{"issue":"9","key":"36_CR23","doi-asserted-by":"publisher","first-page":"897","DOI":"10.1142\/S0129183111016683","volume":"22","author":"J.A. Miszczak","year":"2011","unstructured":"Miszczak, J.A.: Singular value decomposition and matrix reorderings in quantum information theory. Int. J. Mod. Phys. C\u00a022(9), 897\u2013918 (2011)","journal-title":"Int. J. Mod. Phys. C"},{"key":"36_CR24","doi-asserted-by":"crossref","unstructured":"Fuchs, C.A., van de Graaf, J.: Cryptographic distinguishability measures for quantum-mechanical states. IEEE Trans. Inform. Theor.\u00a0(4), 1216\u20131227 (1999)","DOI":"10.1109\/18.761271"}],"container-title":["Communications in Computer and Information Science","Computer Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-38865-1_36","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,13]],"date-time":"2019-05-13T03:22:30Z","timestamp":1557717750000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-38865-1_36"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642388644","9783642388651"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-38865-1_36","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2013]]}}}