{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T04:19:58Z","timestamp":1773807598504,"version":"3.50.1"},"reference-count":12,"publisher":"Springer Science and Business Media LLC","issue":"8","license":[{"start":{"date-parts":[[2013,3,29]],"date-time":"2013-03-29T00:00:00Z","timestamp":1364515200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"published-print":{"date-parts":[[2013,8]]},"DOI":"10.1007\/s11128-013-0569-x","type":"journal-article","created":{"date-parts":[[2013,3,28]],"date-time":"2013-03-28T11:00:34Z","timestamp":1364468434000},"page":"2871-2875","source":"Crossref","is-referenced-by-count":5,"title":["Comment on \u201cEfficient and feasible quantum private comparison of equality against the collective amplitude damping noise\u201d"],"prefix":"10.1007","volume":"12","author":[{"given":"Chun-Wei","family":"Yang","sequence":"first","affiliation":[]},{"given":"Shih-Hung","family":"Kao","sequence":"additional","affiliation":[]},{"given":"Tzonelih","family":"Hwang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,3,29]]},"reference":[{"key":"569_CR1","unstructured":"Andrew, C.Y.: Protocols for secure computations. In: 23rd Annual Symposium on Foundations of Computer Science, pp. 160\u2013164 (1982)"},{"issue":"6","key":"569_CR2","doi-asserted-by":"crossref","first-page":"065002","DOI":"10.1088\/0031-8949\/80\/06\/065002","volume":"80","author":"Y-G Yang","year":"2009","unstructured":"Yang, Y.-G., Cao, W.-F., Wen, Q.-Y.: Secure quantum private comparison. Physica Scripta 80(6), 065002 (2009)","journal-title":"Physica Scripta"},{"issue":"5","key":"569_CR3","doi-asserted-by":"crossref","first-page":"055305","DOI":"10.1088\/1751-8113\/42\/5\/055305","volume":"42","author":"Y-G Yang","year":"2009","unstructured":"Yang, Y.-G., Wen, Q.-Y.: An efficient two-party quantum private comparison protocol with decoy photons and two-photon entanglement. J. Phys. A Math. Theor. 42(5), 055305 (2009)","journal-title":"J. Phys. A Math. Theor."},{"issue":"7","key":"569_CR4","doi-asserted-by":"crossref","first-page":"1561","DOI":"10.1016\/j.optcom.2009.11.085","volume":"283","author":"X-B Chen","year":"2010","unstructured":"Chen, X.-B., Xu, G., Niu, X.-X., Wen, Q.-Y., Yang, Y.-X.: An efficient protocol for the private comparison of equal information based on the triplet entangled state and single-particle measurement. Opt. Commun. 283(7), 1561\u20131565 (2010)","journal-title":"Opt. Commun."},{"issue":"1","key":"569_CR5","doi-asserted-by":"crossref","first-page":"545","DOI":"10.1016\/j.optcom.2010.09.005","volume":"284","author":"H-Y Jia","year":"2011","unstructured":"Jia, H.-Y., Wen, Q.-Y., Song, T.-T., Gao, F.: Quantum protocol for millionaire problem. Opt. Commun. 284(1), 545\u2013549 (2011)","journal-title":"Opt. Commun."},{"issue":"2","key":"569_CR6","doi-asserted-by":"crossref","first-page":"373","DOI":"10.1007\/s11128-011-0251-0","volume":"11","author":"H-Y Tseng","year":"2012","unstructured":"Tseng, H.-Y., Lin, J., Hwang, T.: New quantum private comparison protocol using EPR pairs. Quantum Inf. Process. 11(2), 373\u2013384 (2012)","journal-title":"Quantum Inf. Process."},{"key":"569_CR7","doi-asserted-by":"crossref","unstructured":"Zhang, W.-W., Zhang, K.-J.: Cryptanalysis and improvement of the quantum private comparison protocol with semi-honest third party. Quantum Inf. Process. (2012). doi: 10.1007\/s11128-012-0507-3","DOI":"10.1007\/s11128-012-0507-3"},{"key":"569_CR8","doi-asserted-by":"crossref","unstructured":"Chang, Y.-J., Tsai, C.-W., Hwang, T.: Multi-user private comparison protocol using GHZ class states. Quantum Inf. Process. 12(2), 1077\u20131088 (2013)","DOI":"10.1007\/s11128-012-0454-z"},{"key":"569_CR9","doi-asserted-by":"crossref","unstructured":"Chen, X.-B., Su, Y., Niu, X.-X., Yang, Y.-X.: Efficient and feasible quantum private comparison of equality against the collective amplitude damping noise. Quantum Inf. Process. (2012). doi: 10.1007\/s11128-012-0505-5","DOI":"10.1007\/s11128-012-0505-5"},{"issue":"8","key":"569_CR10","doi-asserted-by":"crossref","first-page":"1208","DOI":"10.1007\/s11433-009-0140-z","volume":"52","author":"S-J Qin","year":"2009","unstructured":"Qin, S.-J., Wen, Q.-Y., Meng, L.-M., Zhu, F.-C.: Quantum secure direct communication over the collective amplitude damping channel. Sci. China Ser. G Phys. Mech. Astron. 52(8), 1208\u20131212 (2009)","journal-title":"Sci. China Ser. G Phys. Mech. Astron."},{"issue":"16","key":"569_CR11","doi-asserted-by":"crossref","first-page":"3198","DOI":"10.1016\/j.optcom.2010.04.020","volume":"283","author":"Y-G Yang","year":"2010","unstructured":"Yang, Y.-G., Wen, Q.-Y.: Arbitrated quantum signature of classical messages against collective amplitude damping noise. Opt. Commun. 283(16), 3198\u20133201 (2010)","journal-title":"Opt. Commun."},{"issue":"8","key":"569_CR12","doi-asserted-by":"crossref","first-page":"2766","DOI":"10.1088\/0256-307X\/25\/8\/009","volume":"25","author":"G Fei","year":"2008","unstructured":"Fei, G., Fen-Zhuo, G., Qiao-Yan, W., Fu-Chen, Z.: Forcible-measurement attack on quantum secure direct communication protocol with cluster state. Chin. Phys. Lett. 25(8), 2766 (2008)","journal-title":"Chin. Phys. Lett."}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-013-0569-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11128-013-0569-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-013-0569-x","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T03:39:13Z","timestamp":1559360353000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11128-013-0569-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,3,29]]},"references-count":12,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2013,8]]}},"alternative-id":["569"],"URL":"https:\/\/doi.org\/10.1007\/s11128-013-0569-x","relation":{},"ISSN":["1570-0755","1573-1332"],"issn-type":[{"value":"1570-0755","type":"print"},{"value":"1573-1332","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,3,29]]}}}