{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,28]],"date-time":"2022-03-28T22:41:10Z","timestamp":1648507270975},"reference-count":27,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2013,12,1]],"date-time":"2013-12-01T00:00:00Z","timestamp":1385856000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"published-print":{"date-parts":[[2014,4]]},"DOI":"10.1007\/s11128-013-0701-y","type":"journal-article","created":{"date-parts":[[2013,11,30]],"date-time":"2013-11-30T09:00:39Z","timestamp":1385802039000},"page":"917-923","source":"Crossref","is-referenced-by-count":6,"title":["Man-in-the-middle attack on quantum secure communications with authentication"],"prefix":"10.1007","volume":"13","author":[{"given":"Tzu Han","family":"Lin","sequence":"first","affiliation":[]},{"given":"Tzonelish","family":"Hwang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,12,1]]},"reference":[{"issue":"8","key":"701_CR1","doi-asserted-by":"crossref","first-page":"3189","DOI":"10.1088\/1674-1056\/18\/8\/016","volume":"18","author":"TY Wang","year":"2009","unstructured":"Wang, T.Y., Wen, Q.Y., Zhu, F.C.: Secure authentication of classical messages with single photons. Chin. Phys. B 18(8), 3189\u20133192 (2009)","journal-title":"Chin. Phys. B"},{"issue":"16","key":"701_CR2","doi-asserted-by":"crossref","first-page":"3382","DOI":"10.1016\/j.optcom.2009.05.036","volume":"282","author":"T-Y Wang","year":"2009","unstructured":"Wang, T.-Y., Wen, Q.-Y., Zhu, F.-C.: Secure authentication of classical messages with decoherence-free states. Opt. Commun. 282(16), 3382\u20133385 (2009)","journal-title":"Opt. Commun."},{"issue":"10","key":"701_CR3","doi-asserted-by":"crossref","first-page":"4105","DOI":"10.1088\/1674-1056\/18\/10\/007","volume":"18","author":"WJ Liu","year":"2009","unstructured":"Liu, W.J., Chen, H.W., Ma, T.H., Li, Z.Q., Liu, Z.H., Hu, W.B.: An efficient deterministic secure quantum communication scheme based on cluster states and identity authentication. Chin. Phys. B 18(10), 4105\u20134109 (2009)","journal-title":"Chin. Phys. B"},{"issue":"2","key":"701_CR4","first-page":"101","volume":"9","author":"Y Kanamori","year":"2009","unstructured":"Kanamori, Y., Yoo, S.-M., Gregory, D.A., Sheldon, F.T.: Authentication protocol using quantum superposition states. Int. J. Netw. Secur. 9(2), 101\u2013108 (2009)","journal-title":"Int. J. Netw. Secur."},{"issue":"7","key":"701_CR5","doi-asserted-by":"crossref","first-page":"1027","DOI":"10.3923\/itj.2009.1027.1032","volume":"8","author":"Z-N Chen","year":"2009","unstructured":"Chen, Z.-N., Zheng, Q., Lu, L.: A quantum secure direct communication with authentication. Inf. Technol. J. 8(7), 1027\u20131032 (2009)","journal-title":"Inf. Technol. J."},{"issue":"5","key":"701_CR6","doi-asserted-by":"crossref","first-page":"050306","DOI":"10.1088\/0256-307X\/27\/5\/050306","volume":"27","author":"D Liu","year":"2010","unstructured":"Liu, D., Pei, C.X., Quan, D.X., Zhao, N.: A new quantum secure direct communication scheme with authentication. Chin. Phys. Lett. 27(5), 050306 (2010)","journal-title":"Chin. Phys. Lett."},{"issue":"2","key":"701_CR7","doi-asserted-by":"crossref","first-page":"020303","DOI":"10.1088\/0256-307X\/28\/2\/020303","volume":"28","author":"F Gao","year":"2011","unstructured":"Gao, F., Qin, S.-J., Guo, F.-Z., Wen, Q.-Y.: Cryptanalysis of quantum secure direct communication and authentication scheme via Bell states. Chin. Phys. Lett. 28(2), 020303 (2011)","journal-title":"Chin. Phys. Lett."},{"issue":"02","key":"701_CR8","doi-asserted-by":"crossref","first-page":"701","DOI":"10.1142\/S0219749911007745","volume":"09","author":"P Huang","year":"2011","unstructured":"Huang, P., Zhu, J.U.N., Lu, Y., Zeng, G.-H.: Quantum identity authentication using Gaussian-modulated squeezed states. Int. J. Quantum Inf. 09(02), 701\u2013721 (2011)","journal-title":"Int. J. Quantum Inf."},{"issue":"07n08","key":"701_CR9","doi-asserted-by":"crossref","first-page":"1677","DOI":"10.1142\/S0219749911008271","volume":"9","author":"M Naseri","year":"2011","unstructured":"Naseri, M.: An efficient protocol for quantum secure dialogue with authentication by using single photons. Int. J. Quantum Inf. 9(07n08), 1677\u20131684 (2011)","journal-title":"Int. J. Quantum Inf."},{"issue":"6","key":"701_CR10","doi-asserted-by":"crossref","first-page":"1023","DOI":"10.1088\/0253-6102\/56\/6\/08","volume":"56","author":"C-W Tsai","year":"2011","unstructured":"Tsai, C.-W., Wei, T.-S., Hwang, T.: One-way quantum authenticated secure communication using rotation operation. Commun. Theor. Phys. 56(6), 1023\u20131026 (2011)","journal-title":"Commun. Theor. Phys."},{"key":"701_CR11","doi-asserted-by":"crossref","unstructured":"Shen, D., Ma, W., Yin, X., Li, X.: Quantum dialogue with authentication based on Bell states. Int. J. Theor. Phys. 52(6), 1825\u20131835 (2012)","DOI":"10.1007\/s10773-012-1276-6"},{"issue":"12","key":"701_CR12","doi-asserted-by":"crossref","first-page":"3681","DOI":"10.1007\/s10773-012-1265-9","volume":"51","author":"Y-G Yang","year":"2012","unstructured":"Yang, Y.-G., Jia, X., Xia, J., Shi, L., Zhang, H.: Comment on \u201cQuantum secure direct communication with authentication expansion using single photons\u201d. Int. J. Theor. Phys. 51(12), 3681\u20133687 (2012)","journal-title":"Int. J. Theor. Phys."},{"key":"701_CR13","doi-asserted-by":"crossref","unstructured":"Yu, C.-H., Guo, G.-D., Lin, S.: Quantum secure direct communication with authentication using two nonorthogonal states. Int. J. Theor. Phys. 52(6), 1937\u20131945 (2012)","DOI":"10.1007\/s10773-012-1336-y"},{"issue":"9","key":"701_CR14","doi-asserted-by":"crossref","first-page":"2360","DOI":"10.1088\/0256-307X\/23\/9\/004","volume":"23","author":"J Wang","year":"2006","unstructured":"Wang, J., Zhang, Q., Tang, C.J.: Multiparty simultaneous quantum identity authentication based on entanglement swapping. Chin. Phys. Lett. 23(9), 2360\u20132363 (2006)","journal-title":"Chin. Phys. Lett."},{"key":"701_CR15","doi-asserted-by":"crossref","unstructured":"Lee, H., Lim, J., Yang, H.: Quantum direct communication with authentication. Phys. Rev. A 73(4), 042305 (2006)","DOI":"10.1103\/PhysRevA.73.042305"},{"key":"701_CR16","doi-asserted-by":"crossref","unstructured":"Zhang, Z.-J., Liu, J., Wang, D., Shi, S.-H.: Comment on \u201cQuantum direct communication with authentication\u201d. Phys. Rev. A 75(2), 026301 (2007)","DOI":"10.1103\/PhysRevA.75.026301"},{"issue":"11","key":"701_CR17","doi-asserted-by":"crossref","first-page":"3860","DOI":"10.1088\/0256-307X\/25\/11\/007","volume":"25","author":"M-J Wang","year":"2008","unstructured":"Wang, M.-J., Pan, W.: Quantum secure direct communication based on authentication. Chin. Phys. Lett. 25(11), 3860\u20133863 (2008)","journal-title":"Chin. Phys. Lett."},{"issue":"7","key":"701_CR18","doi-asserted-by":"crossref","first-page":"2354","DOI":"10.1088\/0256-307X\/25\/7\/007","volume":"25","author":"W-J Liu","year":"2008","unstructured":"Liu, W.-J., Chen, H.-W., Li, Z.-Q., Liu, Z.-H.: Efficient quantum secure direct communication with authentication. Chin. Phys. Lett. 25(7), 2354\u20132357 (2008)","journal-title":"Chin. Phys. Lett."},{"issue":"5\u20136","key":"701_CR19","first-page":"376","volume":"9","author":"CA Yen","year":"2009","unstructured":"Yen, C.A., Horng, S.J., Goan, H.S., Kao, T.W., Chou, Y.H.: Quantum direct communication with mutual authentication. Quantum Inf. Comput. 9(5\u20136), 376\u2013394 (2009)","journal-title":"Quantum Inf. Comput."},{"issue":"2","key":"701_CR20","doi-asserted-by":"crossref","first-page":"020312","DOI":"10.1088\/0256-307X\/26\/2\/020312","volume":"26","author":"SJ Qin","year":"2009","unstructured":"Qin, S.J., Wen, Q.Y., Meng, L.M., Zhu, F.C.: High efficiency of two efficient QSDC with authentication is at the cost of their security. Chin. Phys. Lett. 26(2), 020312 (2009)","journal-title":"Chin. Phys. Lett."},{"issue":"8","key":"701_CR21","doi-asserted-by":"crossref","first-page":"3233","DOI":"10.1088\/1674-1056\/18\/8\/023","volume":"18","author":"Y-G Yang","year":"2009","unstructured":"Yang, Y.-G., Wen, Q.-Y.: Economical multiparty simultaneous quantum identity authentication based on Greenberger\u2013Horne\u2013Zeilinger states. Chin. Phys. B 18(8), 3233\u20133237 (2009)","journal-title":"Chin. Phys. B"},{"issue":"5","key":"701_CR22","doi-asserted-by":"crossref","first-page":"829","DOI":"10.1088\/0253-6102\/54\/5\/10","volume":"54","author":"J Yang","year":"2010","unstructured":"Yang, J., Wang, C., Zhang, R.: Quantum secure direct communication with authentication expansion using single photons. Commun. Theor. Phys. 54(5), 829\u2013834 (2010)","journal-title":"Commun. Theor. Phys."},{"issue":"7","key":"701_CR23","doi-asserted-by":"crossref","first-page":"070304","DOI":"10.1088\/1674-1056\/19\/7\/070304","volume":"19","author":"YG Yang","year":"2010","unstructured":"Yang, Y.G., Wang, Y.H., Wen, Q.Y.: Quantum broadcast communication with authentication. Chin. Phys. B 19(7), 070304 (2010)","journal-title":"Chin. Phys. B"},{"issue":"2","key":"701_CR24","doi-asserted-by":"crossref","first-page":"336","DOI":"10.1007\/s10773-012-1347-8","volume":"52","author":"Y-G Yang","year":"2012","unstructured":"Yang, Y.-G., Tian, J., Xia, J., Zhang, H.: Quantum authenticated direct communication using Bell states. Int. J. Theor. Phys. 52(2), 336\u2013344 (2012)","journal-title":"Int. J. Theor. Phys."},{"issue":"2","key":"701_CR25","doi-asserted-by":"crossref","first-page":"524","DOI":"10.1007\/s10773-012-1356-7","volume":"52","author":"Y-G Yang","year":"2012","unstructured":"Yang, Y.-G., Wang, H.-Y., Jia, X., Zhang, H.: A quantum protocol for (t, n)-threshold identity authentication based on Greenberger\u2013Horne\u2013Zeilinger states. Int. J. Theor. Phys. 52(2), 524\u2013530 (2012)","journal-title":"Int. J. Theor. Phys."},{"key":"701_CR26","doi-asserted-by":"crossref","unstructured":"Yang, C.-W., Hwang, T., Lin, T.-H.: Modification attack on QSDC with authentication and the improvement. Int. J. Theor. Phys. (2013). doi: 10.1007\/s10773-013-1498-2","DOI":"10.1007\/s10773-013-1498-2"},{"key":"701_CR27","unstructured":"Bennett, C.H., Brassard, G: Quantum cryptography: public key distribution and coin tossing. In: Proceedings of the IEEE International Conference on Computers, Systems and, Signal Processing, pp. 175\u2013179 (1984)"}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-013-0701-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11128-013-0701-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-013-0701-y","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T07:39:15Z","timestamp":1559374755000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11128-013-0701-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,12,1]]},"references-count":27,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2014,4]]}},"alternative-id":["701"],"URL":"https:\/\/doi.org\/10.1007\/s11128-013-0701-y","relation":{},"ISSN":["1570-0755","1573-1332"],"issn-type":[{"value":"1570-0755","type":"print"},{"value":"1573-1332","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,12,1]]}}}