{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T17:43:50Z","timestamp":1760204630604},"reference-count":21,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2012,9,23]],"date-time":"2012-09-23T00:00:00Z","timestamp":1348358400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"published-print":{"date-parts":[[2014,1]]},"DOI":"10.1007\/s11128-012-0487-3","type":"journal-article","created":{"date-parts":[[2012,9,22]],"date-time":"2012-09-22T10:49:24Z","timestamp":1348310964000},"page":"59-70","source":"Crossref","is-referenced-by-count":36,"title":["The quantum cryptographic switch"],"prefix":"10.1007","volume":"13","author":[{"given":"N.","family":"Srinatha","sequence":"first","affiliation":[]},{"given":"S.","family":"Omkar","sequence":"additional","affiliation":[]},{"given":"R.","family":"Srikanth","sequence":"additional","affiliation":[]},{"given":"Subhashish","family":"Banerjee","sequence":"additional","affiliation":[]},{"given":"Anirban","family":"Pathak","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,9,23]]},"reference":[{"key":"487_CR1","unstructured":"Bennett, C.H., Brassard, G.: \u201cQuantum cryptography: public key distribution and coin tossing. In: Proceedings of the IEEE International Conference on Computers, Systems, and Signal Processing, pp. 175\u2013179. Bangalore (1984)"},{"key":"487_CR2","doi-asserted-by":"crossref","first-page":"661","DOI":"10.1103\/PhysRevLett.67.661","volume":"67","author":"A.K. Ekert","year":"1991","unstructured":"Ekert A.K.: Quantum cryptography based on Bells theorem. Phys. Rev. Lett. 67, 661\u2013663 (1991)","journal-title":"Phys. Rev. Lett."},{"key":"487_CR3","doi-asserted-by":"crossref","first-page":"3121","DOI":"10.1103\/PhysRevLett.68.3121","volume":"68","author":"C.H. Bennett","year":"1992","unstructured":"Bennett C.H.: Quantum cryptography using any two nonorthogonal states. Phys. Rev. Lett. 68, 3121\u20133124 (1992)","journal-title":"Phys. Rev. Lett."},{"key":"487_CR4","doi-asserted-by":"crossref","first-page":"1829","DOI":"10.1103\/PhysRevA.59.1829","volume":"59","author":"M. Hillery","year":"1999","unstructured":"Hillery M., Buzek V., Bertaiume A.: Quantum secret sharing. Phys. Rev. A 59, 1829\u20131834 (1999)","journal-title":"Phys. Rev. A"},{"key":"487_CR5","doi-asserted-by":"crossref","first-page":"157","DOI":"10.1103\/PhysRevA.60.157","volume":"60","author":"K. Shimizu","year":"1999","unstructured":"Shimizu K., Imoto N.: Communication channels secured from eavesdropping via transmission of photonic Bell states. Phys. Rev. A 60, 157\u2013166 (1999)","journal-title":"Phys. Rev. A"},{"key":"487_CR6","doi-asserted-by":"crossref","first-page":"187902","DOI":"10.1103\/PhysRevLett.89.187902","volume":"89","author":"K. Bostrom","year":"2002","unstructured":"Bostrom K., Felbinger T.: Deterministic secure direct communication using entanglement. Phys. Rev. Lett. 89, 187902 (2002)","journal-title":"Phys. Rev. Lett."},{"key":"487_CR7","doi-asserted-by":"crossref","first-page":"1239","DOI":"10.1103\/PhysRevLett.75.1239","volume":"75","author":"L. Goldenberg","year":"1995","unstructured":"Goldenberg L., Vaidman L.: Quantum cryptography based on orthogonal states. Phys. Rev. Lett. 75, 1239\u20131243 (1995)","journal-title":"Phys. Rev. Lett."},{"key":"487_CR8","doi-asserted-by":"crossref","first-page":"140501","DOI":"10.1103\/PhysRevLett.94.140501","volume":"94","author":"M. Lucamarini","year":"2005","unstructured":"Lucamarini M., Mancini S.: Secure deterministic communication without entanglement. Phys. Rev. Lett. 94, 140501 (2005)","journal-title":"Phys. Rev. Lett."},{"key":"487_CR9","doi-asserted-by":"crossref","first-page":"251","DOI":"10.1007\/s11467-007-0050-3","volume":"2","author":"G. Long","year":"2007","unstructured":"Long G. et\u00a0al.: Quantum secure direct communication and deterministic secure quantum communication. Front. Phys. China 2, 251\u2013272 (2007)","journal-title":"Front. Phys. China"},{"key":"487_CR10","first-page":"1354","volume":"49","author":"X.H. Li","year":"2006","unstructured":"Li X.H. et\u00a0al.: Deterministic secure quantum communication without maximally entangled states. J. Korean Phys. Soc. 49, 1354\u20131359 (2006)","journal-title":"J. Korean Phys. Soc."},{"key":"487_CR11","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1140\/epjb\/e2004-00296-4","volume":"41","author":"F.L. Yan","year":"2004","unstructured":"Yan F.L., Zhang X.: A scheme for secure direct communication using EPR pairs and teleportation. Eur. Phys. J. B 41, 75\u201378 (2004)","journal-title":"Eur. Phys. J. B"},{"key":"487_CR12","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1088\/0256-307X\/22\/1\/006","volume":"22","author":"Z.X. Man","year":"2005","unstructured":"Man Z.X., Zhang Z.J., Li Y.: Deterministic secure direct communication by using swapping quantum entanglement and local unitary operations. Chin. Phys. Lett. 22, 18\u201321 (2005)","journal-title":"Chin. Phys. Lett."},{"key":"487_CR13","doi-asserted-by":"crossref","first-page":"022338","DOI":"10.1103\/PhysRevA.73.022338","volume":"73","author":"A.D. Zhu","year":"2006","unstructured":"Zhu A.D., Xia Y., Fan Q.B., Zhang S.: Secure direct communication based on secret transmitting order of particles. Phys. Rev. A 73, 022338 (2006)","journal-title":"Phys. Rev. A"},{"key":"487_CR14","doi-asserted-by":"crossref","first-page":"779","DOI":"10.1140\/epjd\/e2010-10189-8","volume":"61","author":"C.W. Tsai","year":"2011","unstructured":"Tsai C.W., Hsieh C.R., Hwang T.: Dense coding using cluster states and its application on deterministic secure quantum communication. Eur. Phys. J. D 61, 779\u2013783 (2011)","journal-title":"Eur. Phys. J. D"},{"key":"487_CR15","doi-asserted-by":"crossref","first-page":"2881","DOI":"10.1103\/PhysRevLett.69.2881","volume":"69","author":"C.H. Bennett","year":"1992","unstructured":"Bennett C.H., Wiesner S.J.: Communication via one- and two-particle operators on Einstein-Podolsky-Rosen states. Phys. Rev. Lett. 69, 2881\u20132884 (1992)","journal-title":"Phys. Rev. Lett."},{"key":"487_CR16","unstructured":"Adhikari, S., Chakrabarty, I., Agrawal, P.: Probabilistic secret sharing through noisy quantum channels, arXiv:1012.5570v2"},{"key":"487_CR17","doi-asserted-by":"crossref","first-page":"545","DOI":"10.1016\/j.optcom.2010.09.005","volume":"284","author":"H.Y. Jia","year":"2011","unstructured":"Jia H.Y., Wen Q.Y., Song T.T., Gao F.: Quantum protocol for millionaire problem. Opt. Commun. 284, 545 (2011)","journal-title":"Opt. Commun."},{"key":"487_CR18","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-540-75177-9","volume-title":"Mobility, Data Mining and Privacy: Geographic Knowledge Discovery","author":"F. Giannotti","year":"2008","unstructured":"Giannotti F., Pedreschi D.: Mobility, Data Mining and Privacy: Geographic Knowledge Discovery. Springer, New York (2008)"},{"key":"487_CR19","doi-asserted-by":"crossref","first-page":"460","DOI":"10.1007\/978-3-540-76900-2_28","volume":"4833","author":"G. Brassard","year":"2007","unstructured":"Brassard G., Broadent A., Fitzsimons J., Gambs S.: Anonymous quantum communication. Lect. Notes Comput. Sci. 4833, 460\u2013473 (2007)","journal-title":"Lect. Notes Comput. Sci."},{"key":"487_CR20","volume-title":"Quantum Computation and Quantum Information","author":"M. Nielsen","year":"2000","unstructured":"Nielsen M., Chuang I.: Quantum Computation and Quantum Information. Cambridge University Press, Cambridge (2000)"},{"key":"487_CR21","doi-asserted-by":"crossref","first-page":"012318","DOI":"10.1103\/PhysRevA.77.012318","volume":"77","author":"R. Srikanth","year":"2008","unstructured":"Srikanth R., Banerjee S.: Squeezed generalized amplitude damping channel. Phys. Rev. A 77, 012318 (2008)","journal-title":"Phys. Rev. A"}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-012-0487-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11128-012-0487-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-012-0487-3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T07:39:11Z","timestamp":1559374751000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11128-012-0487-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,9,23]]},"references-count":21,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2014,1]]}},"alternative-id":["487"],"URL":"https:\/\/doi.org\/10.1007\/s11128-012-0487-3","relation":{},"ISSN":["1570-0755","1573-1332"],"issn-type":[{"value":"1570-0755","type":"print"},{"value":"1573-1332","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,9,23]]}}}