{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T16:09:25Z","timestamp":1774368565583,"version":"3.50.1"},"reference-count":37,"publisher":"Springer Science and Business Media LLC","issue":"8","license":[{"start":{"date-parts":[[2013,3,17]],"date-time":"2013-03-17T00:00:00Z","timestamp":1363478400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"published-print":{"date-parts":[[2013,8]]},"DOI":"10.1007\/s11128-013-0536-6","type":"journal-article","created":{"date-parts":[[2013,3,16]],"date-time":"2013-03-16T11:38:58Z","timestamp":1363433938000},"page":"2793-2802","source":"Crossref","is-referenced-by-count":55,"title":["Quantum private comparison protocol based on entanglement swapping of $$d$$ -level Bell states"],"prefix":"10.1007","volume":"12","author":[{"given":"Fen Zhuo","family":"Guo","sequence":"first","affiliation":[]},{"given":"Fei","family":"Gao","sequence":"additional","affiliation":[]},{"given":"Su Juan","family":"Qin","sequence":"additional","affiliation":[]},{"given":"Jie","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Qiao Yan","family":"Wen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,3,17]]},"reference":[{"key":"536_CR1","unstructured":"Bennett, C.H., Brassard, G.: in IEEE International Conference on Computers, Systems and Signal Processing. IEEE, New York: Bangalore, pp. 175\u2013179 (1984)"},{"issue":"21","key":"536_CR2","doi-asserted-by":"crossref","first-page":"3121","DOI":"10.1103\/PhysRevLett.68.3121","volume":"68","author":"CH Bennett","year":"1992","unstructured":"Bennett, C.H.: Quantum cryptography using any two nonorthogonal states. Phys. Rev. Lett. 68(21), 3121\u20133124 (1992)","journal-title":"Phys. Rev. Lett."},{"key":"536_CR3","doi-asserted-by":"crossref","first-page":"822","DOI":"10.1103\/PhysRevA.57.822","volume":"57","author":"S Bose","year":"1998","unstructured":"Bose, S., Vedral, V., Knight, P.L.: Multiparticle generalization of entanglement swapping. Phys. Rev. A. 57, 822 (1998)","journal-title":"Phys. Rev. A."},{"key":"536_CR4","doi-asserted-by":"crossref","first-page":"187902","DOI":"10.1103\/PhysRevLett.89.187902","volume":"89","author":"K Bostr\u00f6m","year":"2002","unstructured":"Bostr\u00f6m, K., Felbinger, T.: Deterministic secure direct communication using entanglement. Phys. Rev. Lett. 89, 187902 (2002)","journal-title":"Phys. Rev. Lett."},{"key":"536_CR5","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1016\/S0166-218X(00)00342-5","volume":"111","author":"F Boudot","year":"2001","unstructured":"Boudot, F., Schoenmakers, B., Traore, J.: A fair and efficient solution to the socialist millionaires problem. Discr. Appl. Math. (Special Issue on Coding and Cryptology) 111, 23\u201325 (2001)","journal-title":"Discr. Appl. Math. (Special Issue on Coding and Cryptology)"},{"key":"536_CR6","doi-asserted-by":"crossref","first-page":"127902","DOI":"10.1103\/PhysRevLett.88.127902","volume":"88","author":"NJ Cerf","year":"2002","unstructured":"Cerf, N.J., Bourennane, M., et al.: Security of quantum key distribution using d-level systems. Phys. Rev. Lett. 88, 127902 (2002)","journal-title":"Phys. Rev. Lett."},{"key":"536_CR7","doi-asserted-by":"crossref","first-page":"1561","DOI":"10.1016\/j.optcom.2009.11.085","volume":"283","author":"XB Chen","year":"2010","unstructured":"Chen, X.B., Xu, G., Niu, X.X., Wen, Q.Y., Yang, Y.X.: An efficient protocol for the private comparison of equal information based on the triplet entangled state and single-particle measurement. Opt. Commun. 283, 1561\u20131565 (2010)","journal-title":"Opt. Commun."},{"key":"536_CR8","doi-asserted-by":"crossref","first-page":"042317","DOI":"10.1103\/PhysRevA.68.042317","volume":"68","author":"FG Deng","year":"2003","unstructured":"Deng, F.G., Long, G.L., Liu, X.S.: Two-step quantum direct communication protocol using the Einstein-Podolsky-Rosen pair block. Phys. Rev. A. 68, 042317 (2003)","journal-title":"Phys. Rev. A."},{"issue":"6","key":"536_CR9","doi-asserted-by":"crossref","first-page":"661","DOI":"10.1103\/PhysRevLett.67.661","volume":"67","author":"AK Ekert","year":"1991","unstructured":"Ekert, A.K.: Quantum cryptography based on Bell theorem. Phys. Rev. Lett. 67(6), 661\u2013663 (1991)","journal-title":"Phys. Rev. Lett."},{"key":"536_CR10","first-page":"329","volume":"7","author":"F Gao","year":"2007","unstructured":"Gao, F., Qin, S.J., Wen, Q.Y., Zhu, F.C.: A simple participant attack on the BradlerCDusek protocol. Quantum Inf. Comput. 7, 329 (2007)","journal-title":"Quantum Inf. Comput."},{"issue":"9","key":"536_CR11","doi-asserted-by":"crossref","first-page":"090307","DOI":"10.1088\/0256-307X\/27\/9\/090307","volume":"27","author":"FZ Guo","year":"2010","unstructured":"Guo, F.Z., Qin, S.J., Wen, Q.Y., Zhu, F.C.: Cryptanalysis and improvement of two GHZ-state-based QSDC protocols. Chin. Phys. Lett. 27(9), 090307 (2010)","journal-title":"Chin. Phys. Lett."},{"issue":"6","key":"536_CR12","doi-asserted-by":"crossref","first-page":"1013","DOI":"10.1142\/S0219749910006241","volume":"8","author":"FZ Guo","year":"2010","unstructured":"Guo, F.Z., Gao, F., Wen, Q.Y., Zhu, F.C.: A two-step channel-encrypting quantum key distribution protocol. Int. J. Quantum Inf. 8(6), 1013\u20131022 (2010)","journal-title":"Int. J. Quantum Inf."},{"key":"536_CR13","doi-asserted-by":"crossref","first-page":"1829","DOI":"10.1103\/PhysRevA.59.1829","volume":"59","author":"M Hillery","year":"1999","unstructured":"Hillery, M., Buz\u011bk, V., Berthiaume, A.: Quantum secret sharing. Phys. Rev. A. 59, 1829\u20131834 (1999)","journal-title":"Phys. Rev. A."},{"key":"536_CR14","doi-asserted-by":"crossref","first-page":"545","DOI":"10.1016\/j.optcom.2010.09.005","volume":"284","author":"HY Jia","year":"2011","unstructured":"Jia, H.Y., Wen, Q.Y., Song, T.T., Gao, F.: Quantum protocol for millionaire problem. Opt. Commun. 284, 545\u2013549 (2011)","journal-title":"Opt. Commun."},{"key":"536_CR15","doi-asserted-by":"crossref","first-page":"1187","DOI":"10.1007\/s10773-011-0994-5","volume":"51","author":"HY Jia","year":"2012","unstructured":"Jia, H.Y., Wen, Q.Y., Li, Y.B., Gao, F.: Quantum private comparison using genuine four-particle entangled states. Int. J. Theor. Phys. 51, 1187\u20131194 (2012)","journal-title":"Int. J. Theor. Phys."},{"key":"536_CR16","doi-asserted-by":"crossref","first-page":"052331","DOI":"10.1103\/PhysRevA.65.052331","volume":"65","author":"V Karimipour","year":"2002","unstructured":"Karimipour, V., Bahraminasab, A.: Quantum key distribution for d-level systems with generalized Bell states. Phys. Rev. A. 65, 052331 (2002)","journal-title":"Phys. Rev. A."},{"key":"536_CR17","doi-asserted-by":"crossref","unstructured":"Lin, S., Sun, Y.,. Liu, X.F, Yao, Z.Q.: Quantum private comparison protocol with d-dimensional Bell states. Quantum. Inf. Process., doi: 10.1007\/s11128-012-0395-6 (2012)","DOI":"10.1007\/s11128-012-0395-6"},{"key":"536_CR18","doi-asserted-by":"crossref","first-page":"064304","DOI":"10.1103\/PhysRevA.78.064304","volume":"78","author":"S Lin","year":"2008","unstructured":"Lin, S., Wen, Q.Y., Gao, F., Zhu, F.C.: Quantum secure direct communication with chi-type entangled states. Phys. Rev. A. 78, 064304 (2008)","journal-title":"Phys. Rev. A."},{"key":"536_CR19","doi-asserted-by":"crossref","unstructured":"Liu, B., Gao, F., Jia, H.Y., Huang, W., Zhang, W.W., Wen, Q.Y.: Efficient quantum private comparison employing single photons and collective detection. Quantum. Inf. Process., doi: 10.1007\/s11128-012-0439-y , (2012)","DOI":"10.1007\/s11128-012-0439-y"},{"key":"536_CR20","doi-asserted-by":"crossref","unstructured":"Liu, W., Wang, Y.B.: Quantum private comparison based on GHZ entangled states. Int. J. Theor. Phys., doi: 10.1007\/s10773-012-1246-z","DOI":"10.1007\/s10773-012-1246-z"},{"key":"536_CR21","doi-asserted-by":"crossref","first-page":"3160","DOI":"10.1016\/j.optcom.2011.02.017","volume":"284","author":"W Liu","year":"2011","unstructured":"Liu, W., Wang, Y.B., Jiang, Z.T.: An efficient protocol for the quantum private comparison of equality with W state. Opt. Commun. 284, 3160\u20133163 (2011)","journal-title":"Opt. Commun."},{"key":"536_CR22","first-page":"1389","volume":"47","author":"B Liu","year":"2011","unstructured":"Liu, B., Gao, F., Wen, Q.Y.: Single-photon multiparty quantum cryptographic protocols with collective detection. IEEE J. Quantum Electron. 47, 1389\u20131390 (2011)","journal-title":"IEEE J. Quantum Electron."},{"key":"536_CR23","doi-asserted-by":"crossref","first-page":"583","DOI":"10.1088\/0253-6102\/57\/4\/11","volume":"57","author":"W Liu","year":"2012","unstructured":"Liu, W., Wang, Y.B., Cui, W.: Quantum private comparison protocol based on bell entangled states. Commun. Theor. Phys. 57, 583\u2013588 (2012)","journal-title":"Commun. Theor. Phys."},{"key":"536_CR24","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1007\/s10773-011-0878-8","volume":"51","author":"W Liu","year":"2012","unstructured":"Liu, W., Wang, Y.B., Jiang, Z.T., Cao, Y.Z.: A protocol for the quantum private comparison of equality with $$\\chi $$ -type state. Int. J. Theor. Phys. 51, 69\u201377 (2012)","journal-title":"Int. J. Theor. Phys."},{"key":"536_CR25","doi-asserted-by":"crossref","first-page":"1953","DOI":"10.1007\/s10773-011-1073-7","volume":"51","author":"W Liu","year":"2012","unstructured":"Liu, W., Wang, Y.B., Jiang, Z.T., Cao, Y.Z., Cui, W.: New quantum private comparison protocol using $$\\chi $$ -type state. Int. J. Theor. Phys. 51, 1953\u20131960 (2012)","journal-title":"Int. J. Theor. Phys."},{"issue":"2","key":"536_CR26","doi-asserted-by":"crossref","first-page":"1154","DOI":"10.1103\/PhysRevA.56.1154","volume":"56","author":"HK Lo","year":"1997","unstructured":"Lo, H.K.: Insecurity of quantum secure computations. Phys. Rev. A. 56(2), 1154\u20131162 (1997)","journal-title":"Phys. Rev. A."},{"key":"536_CR27","first-page":"0490","volume":"12","author":"JJ Ma","year":"2012","unstructured":"Ma, J.J., Guo, F.Z., Yang, Q., et al.: Semi-loss-tolerant strong coin flipping protocol using EPR pairs. Quantum Inf. Comput. 12, 0490\u20130501 (2012)","journal-title":"Quantum Inf. Comput."},{"key":"536_CR28","doi-asserted-by":"crossref","first-page":"3891","DOI":"10.1103\/PhysRevLett.80.3891","volume":"80","author":"JW Pan","year":"1998","unstructured":"Pan, J.W., Bouwmeester, D., et al.: Experimental entanglement swapping: entangling photons that never interacted. Phys. Rev. Lett. 80, 3891 (1998)","journal-title":"Phys. Rev. Lett."},{"key":"536_CR29","doi-asserted-by":"crossref","first-page":"117","DOI":"10.1088\/0034-4885\/61\/2\/002","volume":"61","author":"A Steane","year":"1998","unstructured":"Steane, A.: Quantum computing. Rep. Prog. Phys. 61, 117\u2013173 (1998)","journal-title":"Rep. Prog. Phys."},{"key":"536_CR30","doi-asserted-by":"crossref","first-page":"373","DOI":"10.1007\/s11128-011-0251-0","volume":"11","author":"HY Tseng","year":"2012","unstructured":"Tseng, H.Y., Lin, J., Hwang, T.: New quantum private comparison protocol using EPR pairs. Quantum. Inf. Process. 11, 373\u2013384 (2012)","journal-title":"Quantum. Inf. Process."},{"key":"536_CR31","doi-asserted-by":"crossref","unstructured":"Yang, Y.G., Xia, J., Jia, X., Zhang, H.: Comment on \u201cquantum private comparison protocols with a semi-honest third party\u201d. Quantum. Inf. Process., doi: 10.1007\/s11128-012-0433-4 (2012)","DOI":"10.1007\/s11128-012-0433-4"},{"key":"536_CR32","doi-asserted-by":"crossref","first-page":"055305","DOI":"10.1088\/1751-8113\/42\/5\/055305","volume":"42","author":"YG Yang","year":"2009","unstructured":"Yang, Y.G., Wen, Q.Y.: An efficient two-party quantum private comparison protocol with decoy photons and two-photon entanglement. J. Phys. A-Math. Theor. 42, 055305 (2009)","journal-title":"J. Phys. A-Math. Theor."},{"issue":"6","key":"536_CR33","doi-asserted-by":"crossref","first-page":"065002","DOI":"10.1088\/0031-8949\/80\/06\/065002","volume":"80","author":"YG Yang","year":"2009","unstructured":"Yang, Y.G., Cao, W.F., Wen, Q.Y.: Secure quantum private comparison. Phys. Scr. 80(6), 065002 (2009)","journal-title":"Phys. Scr."},{"key":"536_CR34","doi-asserted-by":"crossref","unstructured":"Yao, A.C.: Protocols for secure computations. In: Proceedings of 23rd IEEE Symposium on Foundations of Computer Science (FOCS\u2019 82). Washington, DC, USA, pp. 160 (1982)","DOI":"10.1109\/SFCS.1982.38"},{"key":"536_CR35","doi-asserted-by":"crossref","unstructured":"Zhang, W.W., Gao, F., Liu, B., et al.: A quantum watermark protocol. Int. J. Theor. Phys. doi: 10.1007\/s10773-012-1354-9 (2012)","DOI":"10.1007\/s10773-012-1354-9"},{"key":"536_CR36","doi-asserted-by":"crossref","unstructured":"Zhang, W.W., Gao, F., Liu, B. et al.: A watermark strategy for quantum images based on quantum fourier transform. Quantum. Inf. Process. doi: 10.1007\/s11128-012-0423-6 (2012)","DOI":"10.1007\/s11128-012-0423-6"},{"key":"536_CR37","doi-asserted-by":"crossref","first-page":"4287","DOI":"10.1103\/PhysRevLett.71.4287","volume":"71","author":"M Zukowski","year":"1993","unstructured":"Zukowski, M., Zeilinger, A., Horne, M.A., Ekert, A.K.: \u201cEvent-ready-detectors\u201d Bell experiment via entanglement swapping. Phys. Rev. Lett. 71, 4287 (1993)","journal-title":"Phys. Rev. Lett."}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-013-0536-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11128-013-0536-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-013-0536-6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,11]],"date-time":"2019-07-11T02:08:37Z","timestamp":1562810917000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11128-013-0536-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,3,17]]},"references-count":37,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2013,8]]}},"alternative-id":["536"],"URL":"https:\/\/doi.org\/10.1007\/s11128-013-0536-6","relation":{},"ISSN":["1570-0755","1573-1332"],"issn-type":[{"value":"1570-0755","type":"print"},{"value":"1573-1332","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,3,17]]}}}