{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T11:27:01Z","timestamp":1740137221581,"version":"3.37.3"},"reference-count":25,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2012,4,6]],"date-time":"2012-04-06T00:00:00Z","timestamp":1333670400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"published-print":{"date-parts":[[2013,1]]},"DOI":"10.1007\/s11128-012-0403-x","type":"journal-article","created":{"date-parts":[[2012,4,5]],"date-time":"2012-04-05T08:27:07Z","timestamp":1333614427000},"page":"569-576","source":"Crossref","is-referenced-by-count":19,"title":["Increasing the security of the ping\u2013pong protocol by using many mutually unbiased bases"],"prefix":"10.1007","volume":"12","author":[{"given":"Piotr","family":"Zawadzki","sequence":"first","affiliation":[]},{"given":"Zbigniew","family":"Pucha\u0142a","sequence":"additional","affiliation":[]},{"given":"Jaros\u0142aw Adam","family":"Miszczak","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,4,6]]},"reference":[{"issue":"3","key":"403_CR1","doi-asserted-by":"crossref","first-page":"357","DOI":"10.12693\/APhysPolA.101.357","volume":"101","author":"A. Beige","year":"2002","unstructured":"Beige A., Englert B.G., Kurtsiefer C., Weinfurter H.: Secure communication with a publicly known key. Act. Phys. Pol. A 101(3), 357\u2013368 (2002)","journal-title":"Act. Phys. Pol. A"},{"issue":"18","key":"403_CR2","doi-asserted-by":"crossref","first-page":"187,902","DOI":"10.1103\/PhysRevLett.89.187902","volume":"89","author":"K. Bostr\u00f6m","year":"2002","unstructured":"Bostr\u00f6m K., Felbinger T.: Deterministic secure direct communication using entanglement. Phys. Rev. Lett. 89(18), 187,902 (2002). doi: 10.1103\/PhysRevLett.89.187902","journal-title":"Phys. Rev. Lett."},{"key":"403_CR3","first-page":"0803","volume":"10","author":"S. Brierley","year":"2010","unstructured":"Brierley S., Weigert S., Bengtsson I.: All mutually unbiased bases in dimensions two to five. Quant. Inf. Comput. 10, 0803\u20130820 (2010)","journal-title":"Quant. Inf. Comput."},{"issue":"4","key":"403_CR4","doi-asserted-by":"crossref","first-page":"601","DOI":"10.1088\/0256-307X\/21\/4\/003","volume":"21","author":"Q.Y. Cai","year":"2004","unstructured":"Cai Q.Y., Li B.W.: Deterministic secure communication without using entanglement. Chin. Phys. Lett. 21(4), 601\u2013603 (2004). doi: 10.1088\/0256-307X\/21\/4\/003","journal-title":"Chin. Phys. Lett."},{"issue":"5","key":"403_CR5","first-page":"054,301","volume":"69","author":"Q.Y. Cai","year":"2004","unstructured":"Cai Q.Y., Li B.W.: Improving the capacity of the Bostr\u00f6m-Felbinger protocol. Phys. Rev. Lett. 69(5), 054,301 (2004). doi: 10.1103\/PhysRevA.69.054301","journal-title":"Phys. Rev. Lett."},{"issue":"5","key":"403_CR6","doi-asserted-by":"crossref","first-page":"359","DOI":"10.1016\/j.physleta.2006.06.054","volume":"359","author":"F.G. Deng","year":"2006","unstructured":"Deng F.G., Li X.H., Li C.Y., Zhou P., Zhou H.Y.: Quantum secure direct communication network with Einstein\u2013Podolsky\u2013Rosen pairs. Phys. Lett. A 359(5), 359\u2013365 (2006). doi: 10.1016\/j.physleta.2006.06.054","journal-title":"Phys. Lett. A"},{"key":"403_CR7","doi-asserted-by":"crossref","first-page":"5267","DOI":"10.1088\/0305-4470\/38\/23\/013","volume":"38","author":"T. Durt","year":"2005","unstructured":"Durt T.: About mutually unbiased bases in even and odd prime power dimensions. J. Phys. A Math. Gen. 38, 5267 (2005)","journal-title":"J. Phys. A Math. Gen."},{"issue":"4","key":"403_CR8","doi-asserted-by":"crossref","first-page":"535","DOI":"10.1142\/S0219749910006502","volume":"8","author":"T. Durt","year":"2010","unstructured":"Durt T., Englert B.G., Bengtsson I., \u017byczkowski K.: On mutually unbiased bases. Int. J. Quantum Inf. 8(4), 535\u2013640 (2010)","journal-title":"Int. J. Quantum Inf."},{"issue":"3","key":"403_CR9","doi-asserted-by":"crossref","first-page":"032313","DOI":"10.1103\/PhysRevA.69.032313","volume":"69","author":"T. Durt","year":"2004","unstructured":"Durt T., Kaszlikowski D., Chen J.L., Kwek L.C.: Security of quantum key distributions with entangled qudits. Phys. Rev. A. 69(3), 032313 (2004). doi: 10.1103\/PhysRevA.69.032313","journal-title":"Phys. Rev. A."},{"issue":"11 & 12","key":"403_CR10","first-page":"950","volume":"9","author":"A. Eusebi","year":"2009","unstructured":"Eusebi A., Mancini S.: Deterministic quantum distribution of a d-ary key. Quantum Inform. Comput. 9(11 & 12), 950\u2013962 (2009)","journal-title":"Quantum Inform. Comput."},{"key":"403_CR11","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511840371","volume-title":"Topics in Matrix Analysis","author":"R.A. Horn","year":"1991","unstructured":"Horn R.A., Johnson C.R.: Topics in Matrix Analysis. Cambridge University Press, Cambridge (1991)"},{"issue":"2","key":"403_CR12","doi-asserted-by":"crossref","first-page":"58","DOI":"10.3846\/aviation.2010.10","volume":"14","author":"O. Korchenko","year":"2010","unstructured":"Korchenko O., Vasiliu Y., Gnatyuk S.: Modern quantum technologies of information security against cyberterrorist attacks. Aviation 14(2), 58\u201369 (2010). doi: 10.3846\/aviation.2010.10","journal-title":"Aviation"},{"issue":"2","key":"403_CR13","doi-asserted-by":"crossref","first-page":"022,304","DOI":"10.1103\/PhysRevA.65.022304","volume":"65","author":"X.S. Liu","year":"2002","unstructured":"Liu X.S., Long G.L., Tong D.M., Li F.: General scheme for superdense coding between multiparties. Phys. Rev. A 65(2), 022,304 (2002). doi: 10.1103\/PhysRevA.65.022304","journal-title":"Phys. Rev. A"},{"key":"403_CR14","doi-asserted-by":"crossref","first-page":"140,501","DOI":"10.1103\/PhysRevLett.94.140501","volume":"94","author":"M. Lucamarini","year":"2005","unstructured":"Lucamarini M., Mancini S.: Secure deterministic communication without entanglement. Phys. Rev. Lett. 94, 140,501 (2005). doi: 10.1103\/PhysRevLett.94.140501","journal-title":"Phys. Rev. Lett."},{"key":"403_CR15","unstructured":"McNulty, D., Weigert, S.: All mutually unbiased product bases in dimension six (2011). http:\/\/arxiv.org\/abs\/1111.3632v1"},{"issue":"140","key":"403_CR16","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1515\/crll.1911.140.1","volume":"1911","author":"J. Schur","year":"1911","unstructured":"Schur J.: Bemerkungen zur theorie der beschr\u00e4nkten bilinearformen mit unendlich vielen ver\u00e4nderlichen. J. Reine Angew. Math. 1911(140), 1\u201328 (1911). doi: 10.1515\/crll.1911.140.1","journal-title":"J. Reine Angew. Math."},{"issue":"9","key":"403_CR17","doi-asserted-by":"crossref","first-page":"1984","DOI":"10.1016\/j.optcom.2010.01.007","volume":"283","author":"G.F. Shi","year":"2010","unstructured":"Shi G.F., Xi X.Q., Hu M.L., Yue R.H.: Quantum secure dialogue by using single photons. Opt. Commun. 283(9), 1984\u20131986 (2010). doi: 10.1016\/j.optcom.2010.01.007","journal-title":"Opt. Commun."},{"issue":"2","key":"403_CR18","doi-asserted-by":"crossref","first-page":"022,323","DOI":"10.1103\/PhysRevA.80.022323","volume":"80","author":"K. Shimizu","year":"2009","unstructured":"Shimizu K., Tamaki K., Fukasaka H.: Two-way protocols for quantum cryptography with a nonmaximally entangled qubit pair. Phys. Rev. A 80(2), 022,323 (2009). doi: 10.1103\/PhysRevA.80.022323","journal-title":"Phys. Rev. A"},{"key":"403_CR19","unstructured":"Vasiliu, E., Nikolaenko, S.: Synthesis if the secure system of direct message transfer based on the ping\u2013pong protocol of quantum communication. Scientific works of the Odessa national academy of telecommunications named after O.S. Popov (1), 83\u201391 (2009) (in Russian)"},{"key":"403_CR20","doi-asserted-by":"crossref","first-page":"189","DOI":"10.1007\/s11128-010-0188-8","volume":"10","author":"E.V. Vasiliu","year":"2011","unstructured":"Vasiliu E.V.: Non-coherent attack on the ping\u2013pong protocol with completely entangled pairs of qutrits. Quantum Inf. Process. 10, 189\u2013202 (2011). doi: 10.1007\/s11128-010-0188-8","journal-title":"Quantum Inf. Process."},{"key":"403_CR21","doi-asserted-by":"crossref","first-page":"044,305","DOI":"10.1103\/PhysRevA.71.044305","volume":"71","author":"C. Wang","year":"2005","unstructured":"Wang C., Deng F.G., Li Y.S., Liu X.S., Long G.L.: Quantum secure direct communication with high-dimension quantum superdense coding. Phys. Rev. A 71, 044,305 (2005). doi: 10.1103\/PhysRevA.71.044305","journal-title":"Phys. Rev. A"},{"issue":"4","key":"403_CR22","doi-asserted-by":"crossref","first-page":"256","DOI":"10.1016\/j.physleta.2006.05.035","volume":"358","author":"J. Wang","year":"2006","unstructured":"Wang J., Zhang Q., Tang C.J.: Quantum secure direct communication based on order rearrangement of single photons. Phys. Lett. A 358(4), 256\u2013258 (2006). doi: 10.1016\/j.physleta.2006.05.035","journal-title":"Phys. Lett. A"},{"key":"403_CR23","doi-asserted-by":"crossref","unstructured":"Zawadzki, P.: Security of ping\u2013pong protocol based on pairs of completely entangled qudits. Quantum Inf. Process. (2011). doi: 10.1007\/s11128-011-0307-1 . http:\/\/dx.doi.org\/10.1007\/s11128-011-0307-1 (published online)","DOI":"10.1007\/s11128-011-0307-1"},{"key":"403_CR24","doi-asserted-by":"crossref","unstructured":"Zawadzki, P.: Improving security of the ping\u2013pong protocol. Quantum Inf. Process. (2012). doi: 10.1007\/s11128-012-0363-1 . http:\/\/dx.doi.org\/10.1007\/s11128-012-0363-1 (published online)","DOI":"10.1007\/s11128-012-0363-1"},{"issue":"23","key":"403_CR25","doi-asserted-by":"crossref","first-page":"4633","DOI":"10.1016\/j.optcom.2009.08.024","volume":"282","author":"Y.B. Zhan","year":"2009","unstructured":"Zhan Y.B., Zhang L.L., Zhang Q.Y.: Quantum secure direct communication by entangled qutrits and entanglement swapping. Opt. Commun. 282(23), 4633\u20134636 (2009). doi: 10.1016\/j.optcom.2009.08.024","journal-title":"Opt. Commun."}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-012-0403-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11128-012-0403-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-012-0403-x","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T03:39:09Z","timestamp":1559360349000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11128-012-0403-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,4,6]]},"references-count":25,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2013,1]]}},"alternative-id":["403"],"URL":"https:\/\/doi.org\/10.1007\/s11128-012-0403-x","relation":{},"ISSN":["1570-0755","1573-1332"],"issn-type":[{"type":"print","value":"1570-0755"},{"type":"electronic","value":"1573-1332"}],"subject":[],"published":{"date-parts":[[2012,4,6]]}}}