{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,19]],"date-time":"2024-08-19T17:50:20Z","timestamp":1724089820547},"reference-count":35,"publisher":"Springer Science and Business Media LLC","issue":"12","license":[{"start":{"date-parts":[[2013,9,12]],"date-time":"2013-09-12T00:00:00Z","timestamp":1378944000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"published-print":{"date-parts":[[2013,12]]},"DOI":"10.1007\/s11128-013-0636-3","type":"journal-article","created":{"date-parts":[[2013,9,11]],"date-time":"2013-09-11T15:00:07Z","timestamp":1378911607000},"page":"3791-3805","source":"Crossref","is-referenced-by-count":17,"title":["Multiparty controlled quantum secure direct communication based on quantum search algorithm"],"prefix":"10.1007","volume":"12","author":[{"given":"Shih-Hung","family":"Kao","sequence":"first","affiliation":[]},{"given":"Tzonelih","family":"Hwang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,9,12]]},"reference":[{"issue":"2","key":"636_CR1","doi-asserted-by":"crossref","first-page":"303","DOI":"10.1137\/S0036144598347011","volume":"41","author":"PW Shor","year":"1999","unstructured":"Shor, P.W.: Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM Rev. 41(2), 303\u2013332 (1999)","journal-title":"SIAM Rev."},{"issue":"2","key":"636_CR2","doi-asserted-by":"crossref","first-page":"325","DOI":"10.1103\/PhysRevLett.79.325","volume":"79","author":"LK Grover","year":"1997","unstructured":"Grover, L.K.: Quantum mechanics helps in searching for a needle in a haystack. Phys. Rev. Lett. 79(2), 325 (1997)","journal-title":"Phys. Rev. Lett."},{"issue":"1","key":"636_CR3","doi-asserted-by":"crossref","first-page":"481","DOI":"10.1007\/s11128-012-0385-8","volume":"12","author":"C-Y Pang","year":"2013","unstructured":"Pang, C.-Y., Zhou, R.-G., Ding, C.-B., Hu, B.-Q.: Quantum search algorithm for set operation. Quantum Inf. Process. 12(1), 481\u2013492 (2013)","journal-title":"Quantum Inf. Process."},{"issue":"6","key":"636_CR4","doi-asserted-by":"crossref","first-page":"461","DOI":"10.1007\/s11128-007-0066-1","volume":"6","author":"J Lomonaco","year":"2007","unstructured":"Lomonaco, J., Samuel, J., Kauffman, L.: Is grover\u2019s algorithm a quantum hidden subgroup algorithm? Quantum Inf. Process. 6(6), 461\u2013476 (2007)","journal-title":"Quantum Inf. Process."},{"key":"636_CR5","doi-asserted-by":"crossref","unstructured":"Sun, J., Lu, S., Liu, F.: Partial adiabatic quantum search algorithm and its extensions. Quantum Inf. Process. 12(8), 2689\u20132699 (2013)","DOI":"10.1007\/s11128-013-0557-1"},{"issue":"1","key":"636_CR6","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1007\/s11128-005-0004-z","volume":"5","author":"V Korepin","year":"2006","unstructured":"Korepin, V., Grover, L.: Simple algorithm for partial quantum search. Quantum Inf. Process. 5(1), 5\u201310 (2006)","journal-title":"Quantum Inf. Process."},{"issue":"4","key":"636_CR7","doi-asserted-by":"crossref","first-page":"042317","DOI":"10.1103\/PhysRevA.68.042317","volume":"68","author":"F-G Deng","year":"2003","unstructured":"Deng, F.-G., Long, G.L., Liu, X.-S.: Two-step quantum direct communication protocol using the einstein-podolsky-rosen pair block. Phys. Rev. A 68(4), 042317 (2003)","journal-title":"Phys. Rev. A"},{"issue":"2","key":"636_CR8","doi-asserted-by":"crossref","first-page":"732","DOI":"10.1016\/j.optcom.2006.05.035","volume":"266","author":"J Wang","year":"2006","unstructured":"Wang, J., Zhang, Q., Tang, C-j: Multiparty controlled quantum secure direct communication using greenberger\u2013horne\u2013zeilinger state. Opt. Commun. 266(2), 732\u2013737 (2006)","journal-title":"Opt. Commun."},{"issue":"03","key":"636_CR9","doi-asserted-by":"crossref","first-page":"443","DOI":"10.1142\/S0219749910006071","volume":"08","author":"C Wang","year":"2010","unstructured":"Wang, C., Hao, L., Song, S.Y., Long, G.L.: Quantum direct communication based on quantum search algorithm. Int. J. Quantum Inf. 08(03), 443\u2013450 (2010)","journal-title":"Int. J. Quantum Inf."},{"issue":"8","key":"636_CR10","doi-asserted-by":"crossref","first-page":"2447","DOI":"10.1007\/s10773-012-1125-7","volume":"51","author":"H-Y Tseng","year":"2012","unstructured":"Tseng, H.-Y., Tsai, C.-W., Hwang, T.: Controlled deterministic secure quantum communication based on quantum search algorithm. Int. J. Theor. Phys. 51(8), 2447\u20132454 (2012)","journal-title":"Int. J. Theor. Phys."},{"issue":"5","key":"636_CR11","doi-asserted-by":"crossref","first-page":"052319","DOI":"10.1103\/PhysRevA.69.052319","volume":"69","author":"F-G Deng","year":"2004","unstructured":"Deng, F.-G., Long, G.L.: Secure direct communication with a quantum one-time pad. Phys. Rev. A 69(5), 052319 (2004)","journal-title":"Phys. Rev. A"},{"issue":"4","key":"636_CR12","doi-asserted-by":"crossref","first-page":"044305","DOI":"10.1103\/PhysRevA.71.044305","volume":"71","author":"C Wang","year":"2005","unstructured":"Wang, C., Deng, F.-G., Li, Y.-S., Liu, X.-S., Long, G.L.: Quantum secure direct communication with high-dimension quantum superdense coding. Phys. Rev. A 71(4), 044305 (2005)","journal-title":"Phys. Rev. A"},{"issue":"1\u20133","key":"636_CR13","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1016\/j.optcom.2005.04.048","volume":"253","author":"C Wang","year":"2005","unstructured":"Wang, C., Deng, F.G., Long, G.L.: Multi-step quantum secure direct communication using multi-particle green\u2013horne\u2013zeilinger state. Opt. Commun. 253(1\u20133), 15\u201320 (2005)","journal-title":"Opt. Commun."},{"issue":"8","key":"636_CR14","doi-asserted-by":"crossref","first-page":"2149","DOI":"10.1088\/1009-1963\/16\/8\/001","volume":"16","author":"X-H Li","year":"2007","unstructured":"Li, X.-H., Li, C.-Y., Deng, F.G., Zhou, P., Liang, Y.-J., Zhou, H.-Y.: Quantum secure direct communication with quantum encryption based on pure entangled states. Chin. Phys. 16(8), 2149 (2007)","journal-title":"Chin. Phys."},{"issue":"5","key":"636_CR15","doi-asserted-by":"crossref","first-page":"359","DOI":"10.1016\/j.physleta.2006.06.054","volume":"359","author":"F-G Deng","year":"2006","unstructured":"Deng, F.-G., Li, X.-H., Li, C.-Y., Zhou, P., Zhou, H.-Y.: Quantum secure direct communication network with einstein-podolsky-rosen pairs. Phys. Lett. A 359(5), 359\u2013365 (2006)","journal-title":"Phys. Lett. A"},{"issue":"3","key":"636_CR16","doi-asserted-by":"crossref","first-page":"032302","DOI":"10.1103\/PhysRevA.65.032302","volume":"65","author":"GL Long","year":"2002","unstructured":"Long, G.L., Liu, X.S.: Theoretically efficient high-capacity quantum-key-distribution scheme. Phys. Rev. A 65(3), 032302 (2002)","journal-title":"Phys. Rev. A"},{"issue":"3","key":"636_CR17","doi-asserted-by":"crossref","first-page":"251","DOI":"10.1007\/s11467-007-0050-3","volume":"2","author":"G-L Long","year":"2007","unstructured":"Long, G.-L., Deng, F.-G., Wang, C., Li, X.-H., Wen, K., Wang, W.-Y.: Quantum secure direct communication and deterministic secure quantum communication. Front. Phys. China 2(3), 251\u2013272 (2007)","journal-title":"Front. Phys. China"},{"issue":"3","key":"636_CR18","doi-asserted-by":"crossref","first-page":"032302","DOI":"10.1103\/PhysRevA.65.032302","volume":"65","author":"GL Long","year":"2002","unstructured":"Long, G.L., Liu, X.S.: Theoretically efficient high-capacity quantum-key-distribution scheme. Phys. Rev. A 65(3), 032302 (2002)","journal-title":"Phys. Rev. A"},{"issue":"4","key":"636_CR19","doi-asserted-by":"crossref","first-page":"625","DOI":"10.1142\/S0129183108012364","volume":"19","author":"T Hwang","year":"2008","unstructured":"Hwang, T., Li, C.-M., Lee, N.-Y.: Secure direct communication using deterministic bb84 protocol. Int. J. Mod. Phys. C 19(4), 625\u2013635 (2008)","journal-title":"Int. J. Mod. Phys. C"},{"issue":"3","key":"636_CR20","doi-asserted-by":"crossref","first-page":"496","DOI":"10.1007\/s11433-011-4245-9","volume":"54","author":"C-W Yang","year":"2011","unstructured":"Yang, C.-W., Tsai, C.-W., Hwang, T.: Fault tolerant two-step quantum secure direct communication protocol against collective noises. Sci. China Phys. Mech. Astron. 54(3), 496\u2013501 (2011)","journal-title":"Sci. China Phys. Mech. Astron."},{"issue":"12","key":"636_CR21","doi-asserted-by":"crossref","first-page":"3941","DOI":"10.1007\/s10773-012-1286-4","volume":"51","author":"C-W Yang","year":"2012","unstructured":"Yang, C.-W., Hwang, T.: Improved qsdc protocol over a collective-dephasing noise channel. Int. J. Theor. Phys. 51(12), 3941\u20133950 (2012)","journal-title":"Int. J. Theor. Phys."},{"issue":"1","key":"636_CR22","doi-asserted-by":"crossref","first-page":"79","DOI":"10.1088\/0253-6102\/48\/1\/017","volume":"48","author":"Y-J Xia","year":"2007","unstructured":"Xia, Y.-J., Man, Z.-X.: Controlled quantum n -party simultaneous direct communication. Commun. Theor. Phys. 48(1), 79 (2007)","journal-title":"Commun. Theor. Phys."},{"issue":"3","key":"636_CR23","doi-asserted-by":"crossref","first-page":"543","DOI":"10.1142\/S0219749908003566","volume":"6","author":"X-B Chen","year":"2008","unstructured":"Chen, X.-B., Wang, T.-Y., Du, J.-Z., Wen, Q.-Y., Zhu, F.-C.: Controlled quantum secure direct communication with quantum encryption. Int. J. Quantum Inf. 6(3), 543\u2013551 (2008)","journal-title":"Int. J. Quantum Inf."},{"issue":"2","key":"636_CR24","doi-asserted-by":"crossref","first-page":"333","DOI":"10.1016\/j.optcom.2008.09.070","volume":"282","author":"X-M Xiu","year":"2009","unstructured":"Xiu, X.-M., Dong, L., Gao, Y.-J., Chi, F.: Controlled deterministic secure quantum communication using five-qubit entangled states and two-step security test. Opt. Commun. 282(2), 333\u2013337 (2009)","journal-title":"Opt. Commun."},{"issue":"4","key":"636_CR25","doi-asserted-by":"crossref","first-page":"044302","DOI":"10.1103\/PhysRevA.72.044302","volume":"72","author":"F-G Deng","year":"2005","unstructured":"Deng, F.-G., Li, X.-H., Zhou, H.-Y., Zhang, Z-j: Improving the security of multiparty quantum secret sharing against Trojan Horse attack. Phys. Rev. A 72(4), 044302 (2005)","journal-title":"Phys. Rev. A"},{"issue":"1\u20132","key":"636_CR26","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1016\/j.physleta.2005.10.050","volume":"351","author":"Q-Y Cai","year":"2006","unstructured":"Cai, Q.-Y.: Eavesdropping on the two-way quantum communication protocols with invisible photons. Phys. Lett. A 351(1\u20132), 23\u201325 (2006)","journal-title":"Phys. Lett. A"},{"issue":"3","key":"636_CR27","doi-asserted-by":"crossref","first-page":"893","DOI":"10.1016\/j.optcom.2010.09.080","volume":"284","author":"S-K Chong","year":"2011","unstructured":"Chong, S.-K., Luo, Y.-P., Hwang, T.: On arbitrated quantum signature of classical messages against collective amplitude damping noise. Opt. Commun. 284(3), 893\u2013895 (2011)","journal-title":"Opt. Commun."},{"issue":"5","key":"636_CR28","doi-asserted-by":"crossref","first-page":"054302","DOI":"10.1103\/PhysRevA.74.054302","volume":"74","author":"X-H Li","year":"2006","unstructured":"Li, X.-H., Deng, F.-G., Zhou, H.-Y.: Improving the security of secure direct communication based on the secret transmitting order of particles. Phys. Rev. A 74(5), 054302 (2006)","journal-title":"Phys. Rev. A"},{"issue":"11","key":"636_CR29","doi-asserted-by":"crossref","first-page":"2896","DOI":"10.1088\/0256-307X\/23\/11\/004","volume":"23","author":"C-Y Li","year":"2006","unstructured":"Li, C.-Y., Li, X.-H., Deng, F.-G., Zhou, P., Liang, Y.-J., Zhou, H.-Y.: Efficient quantum cryptography network without entanglement and quantum memory. Chin. Phys. Lett. 23(11), 2896 (2006)","journal-title":"Chin. Phys. Lett."},{"issue":"5","key":"636_CR30","doi-asserted-by":"crossref","first-page":"1049","DOI":"10.1088\/0256-307X\/22\/5\/006","volume":"22","author":"C-Y Li","year":"2005","unstructured":"Li, C.-Y., Zhou, H.-Y., Wang, Y., Deng, F.-G.: Secure quantum key distribution network with bell states and local unitary operations. Chin. Phys. Lett. 22(5), 1049 (2005)","journal-title":"Chin. Phys. Lett."},{"issue":"5886","key":"636_CR31","doi-asserted-by":"crossref","first-page":"802","DOI":"10.1038\/299802a0","volume":"299","author":"WK Wootters","year":"1982","unstructured":"Wootters, W.K., Zurek, W.H.: A single quantum cannot be cloned. Nature 299(5886), 802\u2013803 (1982)","journal-title":"Nature"},{"issue":"12","key":"636_CR32","doi-asserted-by":"crossref","first-page":"1853","DOI":"10.1007\/s11433-008-0185-4","volume":"51","author":"F Gao","year":"2008","unstructured":"Gao, F., Guo, F., Wen, Q., Zhu, F.: Comparing the efficiencies of different detect strategies in the ping-pong protocol. Sci. China Ser. G Phys. Mech. Astron. 51(12), 1853\u20131860 (2008)","journal-title":"Sci. China Ser. G Phys. Mech. Astron."},{"issue":"8","key":"636_CR33","doi-asserted-by":"crossref","first-page":"3189","DOI":"10.1088\/1674-1056\/18\/8\/016","volume":"18","author":"T-Y Wang","year":"2009","unstructured":"Wang, T.-Y., Wen, Q.-Y., Zhu, F.-C.: Secure authentication of classical messages with single photons. Chin. Phys. B 18(8), 3189 (2009)","journal-title":"Chin. Phys. B"},{"issue":"1","key":"636_CR34","doi-asserted-by":"crossref","first-page":"685","DOI":"10.1007\/s11128-012-0413-8","volume":"12","author":"J Lin","year":"2013","unstructured":"Lin, J., Hwang, T.: New circular quantum secret sharing for remote agents. Quantum Inf. Process. 12(1), 685\u2013697 (2013)","journal-title":"Quantum Inf. Process."},{"issue":"1","key":"636_CR35","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1007\/s11128-012-0362-2","volume":"12","author":"C-W Yang","year":"2013","unstructured":"Yang, C.-W., Hwang, T., Luo, Y.-P.: Enhancement on quantum blind signature based on two-state vector formalism. Quantum Inf. Process. 12(1), 109\u2013117 (2013)","journal-title":"Quantum Inf. Process."}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-013-0636-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11128-013-0636-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-013-0636-3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,23]],"date-time":"2019-07-23T23:53:26Z","timestamp":1563926006000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11128-013-0636-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,9,12]]},"references-count":35,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2013,12]]}},"alternative-id":["636"],"URL":"https:\/\/doi.org\/10.1007\/s11128-013-0636-3","relation":{},"ISSN":["1570-0755","1573-1332"],"issn-type":[{"value":"1570-0755","type":"print"},{"value":"1573-1332","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,9,12]]}}}