{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T02:40:16Z","timestamp":1767321616819,"version":"3.48.0"},"publisher-location":"Singapore","reference-count":22,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819562053","type":"print"},{"value":"9789819562060","type":"electronic"}],"license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-981-95-6206-0_19","type":"book-chapter","created":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T02:37:50Z","timestamp":1767321470000},"page":"373-387","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Quantum Bisimulation-Based Acceleration Method for\u00a0Quantum Cryptographic Protocol Verification"],"prefix":"10.1007","author":[{"given":"Min","family":"Guan","sequence":"first","affiliation":[]},{"given":"Juan","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Jian","family":"Lei","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,1,2]]},"reference":[{"key":"19_CR1","unstructured":"Baier, C., Katoen, J.P.: Principles of model checking. MIT Press (2008)"},{"key":"19_CR2","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1016\/j.tcs.2014.05.025","volume":"560","author":"CH Bennett","year":"2014","unstructured":"Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. Theoret. Comput. Sci. 560, 7\u201311 (2014). https:\/\/doi.org\/10.1016\/j.tcs.2014.05.025","journal-title":"Theoret. Comput. Sci."},{"key":"19_CR3","doi-asserted-by":"crossref","unstructured":"Birkhoff, G., Von\u00a0Neumann, J.: The logic of quantum mechanics, pp. 1\u201326. Springer Netherlands, Dordrecht (1975)","DOI":"10.1007\/978-94-010-1795-4_1"},{"issue":"2","key":"19_CR4","doi-asserted-by":"publisher","first-page":"142","DOI":"10.1016\/0890-5401(92)90017-A","volume":"98","author":"J Burch","year":"1992","unstructured":"Burch, J., Clarke, E., McMillan, K., Dill, D., Hwang, L.: Symbolic model checking: 1020 states and beyond. Inf. Comput. 98(2), 142\u2013170 (1992). https:\/\/doi.org\/10.1016\/0890-5401(92)90017-A","journal-title":"Inf. Comput."},{"key":"19_CR5","doi-asserted-by":"publisher","unstructured":"Ceragioli, L., Gadducci, F., Lomurno, G., Tedeschi, G.: Effect semantics for quantum process calculi. In: Majumdar, R., Silva, A. (eds.) 35th International Conference on Concurrency Theory (CONCUR 2024). LIPIcs, vol.\u00a0311, pp. 16:1\u201316:22. Schloss Dagstuhl \u2013 Leibniz-Zentrum f\u00fcr Informatik, Dagstuhl, Germany (2024). https:\/\/doi.org\/10.4230\/LIPIcs.CONCUR.2024.16","DOI":"10.4230\/LIPIcs.CONCUR.2024.16"},{"key":"19_CR6","doi-asserted-by":"publisher","first-page":"520","DOI":"10.1007\/978-3-031-65633-0_23","volume-title":"Computer Aided Verification","author":"A Dai","year":"2024","unstructured":"Dai, A., Ying, M.: Qreach: a reachability analysis tool for quantum markov chains. In: Gurfinkel, A., Ganesh, V. (eds.) Computer Aided Verification, pp. 520\u2013532. Springer, Cham (2024)"},{"key":"19_CR7","doi-asserted-by":"publisher","unstructured":"Deng, Y.: Bisimulations for probabilistic and quantum processes. In: Schewe, S., Zhang, L. (eds.) 29th International Conference on Concurrency Theory (CONCUR 2018). LIPIcs, vol.\u00a0118, pp. 2:1\u20132:14. Schloss Dagstuhl \u2013 Leibniz-Zentrum f\u00fcr Informatik, Dagstuhl, Germany (2018). https:\/\/doi.org\/10.4230\/LIPIcs.CONCUR.2018.2","DOI":"10.4230\/LIPIcs.CONCUR.2018.2"},{"key":"19_CR8","doi-asserted-by":"publisher","unstructured":"Imran, M., Altamimi, A.B., Khan, W., et al.: Quantum cryptography for future networks security: a systematic review. IEEE Access 12, 180048\u2013180078 (2024). https:\/\/doi.org\/10.1109\/ACCESS.2024.3504815","DOI":"10.1109\/ACCESS.2024.3504815"},{"key":"19_CR9","doi-asserted-by":"publisher","unstructured":"Feng, Y., Deng, Y., Ying, M.: Symbolic bisimulation for quantum processes. ACM Trans. Comput. Logic 15(2) (2014). https:\/\/doi.org\/10.1145\/2579818","DOI":"10.1145\/2579818"},{"key":"19_CR10","doi-asserted-by":"publisher","unstructured":"Feng, Y., Duan, R., Ying, M.: Bisimulation for quantum processes. ACM Trans. Program. Lang. Syst. 34(4) (2012). https:\/\/doi.org\/10.1145\/2400676.2400680","DOI":"10.1145\/2400676.2400680"},{"key":"19_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1007\/978-3-319-19249-9_17","volume-title":"FM 2015: Formal Methods","author":"Y Feng","year":"2015","unstructured":"Feng, Y., Hahn, E.M., Turrini, A., Zhang, L.: QPMC: a model checker for quantum programs and protocols. In: Bj\u00f8rner, N., de Boer, F. (eds.) FM 2015. LNCS, vol. 9109, pp. 265\u2013272. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-19249-9_17"},{"key":"19_CR12","doi-asserted-by":"publisher","unstructured":"Feng, Y., Ying, M.: Toward automatic verification of quantum cryptographic protocols. In: Aceto, L., de\u00a0Frutos\u00a0Escrig, D. (eds.) 26th International Conference on Concurrency Theory (CONCUR 2015). LIPIcs, vol.\u00a042, pp. 441\u2013455. Schloss Dagstuhl \u2013 Leibniz-Zentrum f\u00fcr Informatik, Dagstuhl, Germany (2015). https:\/\/doi.org\/10.4230\/LIPIcs.CONCUR.2015.441","DOI":"10.4230\/LIPIcs.CONCUR.2015.441"},{"issue":"7","key":"19_CR13","doi-asserted-by":"publisher","first-page":"1181","DOI":"10.1016\/j.jcss.2013.04.002","volume":"79","author":"Y Feng","year":"2013","unstructured":"Feng, Y., Yu, N., Ying, M.: Model checking quantum markov chains. J. Comput. Syst. Sci. 79(7), 1181\u20131198 (2013). https:\/\/doi.org\/10.1016\/j.jcss.2013.04.002","journal-title":"J. Comput. Syst. Sci."},{"key":"19_CR14","doi-asserted-by":"publisher","first-page":"543","DOI":"10.1007\/978-3-540-70545-1_51","volume-title":"Computer Aided Verification","author":"SJ Gay","year":"2008","unstructured":"Gay, S.J., Nagarajan, R., Papanikolaou, N.: QMC: a model checker for quantum systems. In: Gupta, A., Malik, S. (eds.) Computer Aided Verification, pp. 543\u2013547. Springer, Berlin, Heidelberg (2008)"},{"key":"19_CR15","doi-asserted-by":"crossref","unstructured":"Gay, S.J., Nagarajan, R., Papanikolaou, N.: Specification and verification of quantum protocols. In: Gay, S., Mackie, I. (eds.) Semantic Techniques in Quantum Computation, pp. 414\u2013472. Cambridge University Press (2010)","DOI":"10.1017\/CBO9781139193313.012"},{"issue":"5","key":"19_CR16","doi-asserted-by":"publisher","first-page":"3831","DOI":"10.1007\/s11831-021-09561-2","volume":"28","author":"A Kumar","year":"2021","unstructured":"Kumar, A., Garhwal, S.: State-of-the-art survey of quantum cryptography. Arch. Comput. Meth. Eng. 28(5), 3831\u20133868 (2021). https:\/\/doi.org\/10.1007\/s11831-021-09561-2","journal-title":"Arch. Comput. Meth. Eng."},{"key":"19_CR17","doi-asserted-by":"publisher","unstructured":"Ling, A., Peloso, M., Marcikic, I., Lamas-Linares, A., Kurtsiefer, C.: Experimental e91 quantum key distribution. In: Hasan, Z., Craig, A., Hemmer, P. (eds.) Advanced Optical Concepts in Quantum Computing, Memory, and Communication. Proceedings of SPIE, vol.\u00a06903, pp. 129\u2013133. SPIE (2008). https:\/\/doi.org\/10.1117\/12.778556","DOI":"10.1117\/12.778556"},{"key":"19_CR18","unstructured":"Papanikolaou, N.K.: Model checking quantum protocols. Ph.D. thesis, University of Warwick (2009)"},{"key":"19_CR19","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipl.2024.106492","volume":"186","author":"H Wu","year":"2024","unstructured":"Wu, H., Yang, Q., Long, H.: Branching bisimulation semantics for quantum processes. Inf. Process. Lett. 186, 106492 (2024). https:\/\/doi.org\/10.1016\/j.ipl.2024.106492","journal-title":"Inf. Process. Lett."},{"key":"19_CR20","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1016\/j.tcs.2022.01.044","volume":"913","author":"M Xu","year":"2022","unstructured":"Xu, M., Fu, J., Mei, J., Deng, Y.: Model checking qctl plus on quantum markov chains. Theoret. Comput. Sci. 913, 43\u201372 (2022). https:\/\/doi.org\/10.1016\/j.tcs.2022.01.044","journal-title":"Theoret. Comput. Sci."},{"key":"19_CR21","doi-asserted-by":"crossref","unstructured":"Ying, M., Feng, Y.: Model checking quantum systems: Principles and Algorithms. Cambridge University Press (2021)","DOI":"10.1017\/9781108613323"},{"issue":"1","key":"19_CR22","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1088\/0256-307X\/22\/1\/007","volume":"22","author":"M Zhong-Xiao","year":"2005","unstructured":"Zhong-Xiao, M., Zhan-Jun, Z., Yong, L.: Quantum dialogue revisited. Chin. Phys. Lett. 22(1), 22\u201324 (2005). https:\/\/doi.org\/10.1088\/0256-307X\/22\/1\/007","journal-title":"Chin. Phys. Lett."}],"container-title":["Lecture Notes in Computer Science","Information Security and Cryptology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-95-6206-0_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T02:37:52Z","timestamp":1767321472000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-95-6206-0_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"ISBN":["9789819562053","9789819562060"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-981-95-6206-0_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]},"assertion":[{"value":"2 January 2026","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"Inscrypt","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Security and Cryptology","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Xi'an","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 October 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 October 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"cisc22025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/inscrypt2025.xidian.edu.cn\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}