{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T08:17:21Z","timestamp":1759133841492},"reference-count":74,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2013,12,1]],"date-time":"2013-12-01T00:00:00Z","timestamp":1385856000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"published-print":{"date-parts":[[2014,4]]},"DOI":"10.1007\/s11128-013-0702-x","type":"journal-article","created":{"date-parts":[[2013,11,30]],"date-time":"2013-11-30T11:19:31Z","timestamp":1385810371000},"page":"925-933","source":"Crossref","is-referenced-by-count":23,"title":["Quantum authencryption: one-step authenticated quantum secure direct communications for off-line communicants"],"prefix":"10.1007","volume":"13","author":[{"given":"Tzonelih","family":"Hwang","sequence":"first","affiliation":[]},{"given":"Yi-Ping","family":"Luo","sequence":"additional","affiliation":[]},{"given":"Chun-Wei","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Tzu-Han","family":"Lin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,12,1]]},"reference":[{"key":"702_CR1","unstructured":"Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. In: IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, India (1984)"},{"key":"702_CR2","doi-asserted-by":"crossref","first-page":"661","DOI":"10.1103\/PhysRevLett.67.661","volume":"67","author":"AK Ekert","year":"1991","unstructured":"Ekert, A.K.: Quantum cryptography based on Bell\u2019s theorem. Phys. Rev. Lett. 67, 661\u2013663 (1991)","journal-title":"Phys. Rev. Lett."},{"key":"702_CR3","doi-asserted-by":"crossref","first-page":"3121","DOI":"10.1103\/PhysRevLett.68.3121","volume":"68","author":"CH Bennett","year":"1992","unstructured":"Bennett, C.H.: Quantum cryptography using any two nonorthogonal states. Phys. Rev. Lett. 68, 3121\u20133124 (1992)","journal-title":"Phys. Rev. Lett."},{"key":"702_CR4","doi-asserted-by":"crossref","first-page":"032302","DOI":"10.1103\/PhysRevA.65.032302","volume":"65","author":"G Long","year":"2002","unstructured":"Long, G., Liu, X.: Theoretically efficient high-capacity quantum-key-distribution scheme. Phys. Rev. A 65, 032302 (2002)","journal-title":"Phys. Rev. A"},{"key":"702_CR5","doi-asserted-by":"crossref","first-page":"2097","DOI":"10.1088\/0256-307X\/21\/11\/007","volume":"21","author":"FG Deng","year":"2004","unstructured":"Deng, F.G., Long, G.L., Wang, Y., Xiao, L.: Increasing the efficiencies of random-choice-based quantum communication protocols with delayed measurement. Chin. Phys. Lett. 21, 2097\u20132100 (2004)","journal-title":"Chin. Phys. Lett."},{"key":"702_CR6","first-page":"615","volume":"11","author":"T Hwang","year":"2011","unstructured":"Hwang, T., Tsai, C.W., Chong, S.K.: Probabilistic quantum key distribution. Quantum Inf. Comput. 11, 615\u2013637 (2011)","journal-title":"Quantum Inf. Comput."},{"key":"702_CR7","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1109\/TDSC.2007.13","volume":"4","author":"T Hwang","year":"2007","unstructured":"Hwang, T., Lee, K.C., Li, C.M.: Provably secure three-party authenticated quantum key distribution protocols. IEEE Trans. Dependable Secure Comput. 4, 71\u201380 (2007)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"702_CR8","first-page":"785","volume":"61","author":"T Hwang","year":"2011","unstructured":"Hwang, T., Hwang, C.C., Tsai, C.W.: Quantum key distribution protocol using dense coding of three-qubit W state. Eur. Phys. J. D At. Mol. Opt. Plasma Phys. 61, 785\u2013790 (2011)","journal-title":"Eur. Phys. J. D At. Mol. Opt. Plasma Phys."},{"key":"702_CR9","doi-asserted-by":"crossref","unstructured":"Braunstein, S.L., Pirandola, S.: Side-channel-free quantum key distribution. Phys. Rev. Lett. 108, 130502 (2012)","DOI":"10.1103\/PhysRevLett.108.130502"},{"key":"702_CR10","doi-asserted-by":"crossref","unstructured":"Pirandola, S., Garcia-Patron, R., Braunstein, S.L., Lloyd, S.: Direct and reverse secret-key capacities of a quantum channel. Phys. Rev. Lett. 102, 050503 (2009)","DOI":"10.1103\/PhysRevLett.102.050503"},{"key":"702_CR11","doi-asserted-by":"crossref","first-page":"3043","DOI":"10.1007\/s11128-013-0582-0","volume":"12","author":"C-W Yang","year":"2013","unstructured":"Yang, C.-W., Tsai, C.-W., Hwang, T.: Fault tolerant deterministic quantum communications using GHZ states over collective-noise channels. Quantum Inf. Process. 12, 3043\u20133055 (2013)","journal-title":"Quantum Inf. Process."},{"key":"702_CR12","doi-asserted-by":"crossref","first-page":"625","DOI":"10.1142\/S0129183108012364","volume":"19","author":"T Hwang","year":"2008","unstructured":"Hwang, T., Li, C.M., Lee, N.Y.: Secure direct communication using deterministic BB84 protocol. Int. J. Mod. Phys. C 19, 625\u2013635 (2008)","journal-title":"Int. J. Mod. Phys. C"},{"key":"702_CR13","doi-asserted-by":"crossref","first-page":"4397","DOI":"10.1016\/j.optcom.2010.06.039","volume":"283","author":"CW Tsai","year":"2010","unstructured":"Tsai, C.W., Hwang, T.: New deterministic quantum communication via symmetric W state. Opt. Commun. 283, 4397\u20134400 (2010)","journal-title":"Opt. Commun."},{"key":"702_CR14","first-page":"779","volume":"61","author":"CW Tsai","year":"2011","unstructured":"Tsai, C.W., Hsieh, C.R., Hwang, T.: Dense coding using cluster states and its application on deterministic secure quantum communication. Eur. Phys. J. D At. Mol. Opt. Plasma Phys. 61, 779\u2013783 (2011)","journal-title":"Eur. Phys. J. D At. Mol. Opt. Plasma Phys."},{"key":"702_CR15","doi-asserted-by":"crossref","first-page":"187902","DOI":"10.1103\/PhysRevLett.89.187902","volume":"89","author":"K Bostr\u00f6m","year":"2002","unstructured":"Bostr\u00f6m, K., Felbinger, T.: Deterministic secure direct communication using entanglement. Phys. Rev. Lett. 89, 187902 (2002)","journal-title":"Phys. Rev. Lett."},{"key":"702_CR16","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1088\/0256-307X\/22\/1\/006","volume":"22","author":"ZX Man","year":"2005","unstructured":"Man, Z.X., Zhang, Z.J., Li, Y.: Deterministic secure direct communication by using swapping quantum entanglement and local unitary operations. Chin. Phys. Lett. 22, 18\u201321 (2005)","journal-title":"Chin. Phys. Lett."},{"key":"702_CR17","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1016\/j.physleta.2004.10.025","volume":"333","author":"ZJ Zhang","year":"2004","unstructured":"Zhang, Z.J., Man, Z.X., Li, Y.: Improving Wojcik\u2019s eavesdropping attack on the ping-pong protocol. Phys. Lett. A 333, 46\u201350 (2004)","journal-title":"Phys. Lett. A"},{"key":"702_CR18","doi-asserted-by":"crossref","first-page":"385","DOI":"10.1016\/j.physleta.2005.05.023","volume":"341","author":"ZJ Zhang","year":"2005","unstructured":"Zhang, Z.J., Li, Y., Man, Z.X.: Improved Wojcik\u2019s eavesdropping attack on ping-pong protocol without eavesdropping-induced channel loss. Phys. Lett. A 341, 385\u2013389 (2005)","journal-title":"Phys. Lett. A"},{"key":"702_CR19","doi-asserted-by":"crossref","first-page":"2652","DOI":"10.1088\/0256-307X\/23\/10\/008","volume":"23","author":"ZJ Zhang","year":"2006","unstructured":"Zhang, Z.J., Jun, L., Liu, Y.M., Cao, H.J., Shi, S.H.: Revisiting quantum secure direct communication with W state. Chin. Phys. Lett. 23, 2652\u20132655 (2006)","journal-title":"Chin. Phys. Lett."},{"key":"702_CR20","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1088\/0253-6102\/49\/1\/22","volume":"49","author":"ZJ Zhang","year":"2008","unstructured":"Zhang, Z.J., Yuan, H., Liu, Y.M., Zhang, W.: Eavesdropping on quantum secure direct communication with W state in noisy channel. Commun. Theor. Phys. 49, 103\u2013106 (2008)","journal-title":"Commun. Theor. Phys."},{"key":"702_CR21","doi-asserted-by":"crossref","first-page":"2149","DOI":"10.1088\/1009-1963\/16\/8\/001","volume":"16","author":"X-H Li","year":"2007","unstructured":"Li, X.-H., Li, C.-Y., Deng, F.-G., Zhou, P., Liang, Y.-J., Zhou, H.-Y.: Quantum secure direct communication with quantum encryption based on pure entangled states. Chin. Phys. 16, 2149 (2007)","journal-title":"Chin. Phys."},{"key":"702_CR22","doi-asserted-by":"crossref","first-page":"042317","DOI":"10.1103\/PhysRevA.68.042317","volume":"68","author":"F-G Deng","year":"2003","unstructured":"Deng, F.-G., Long, G., Liu, X.-S.: Two-step quantum direct communication protocol using the Einstein\u2013Podolsky\u2013Rosen pair block. Phys. Rev. A 68, 042317 (2003)","journal-title":"Phys. Rev. A"},{"key":"702_CR23","doi-asserted-by":"crossref","first-page":"496","DOI":"10.1007\/s11433-011-4245-9","volume":"54","author":"C-W Yang","year":"2011","unstructured":"Yang, C.-W., Tsai, C.-W., Hwang, T.: Fault tolerant two-step quantum secure direct communication protocol against collective noises. Sci. China Phys. Mech. Astron. 54, 496\u2013501 (2011)","journal-title":"Sci. China Phys. Mech. Astron."},{"key":"702_CR24","doi-asserted-by":"crossref","first-page":"3941","DOI":"10.1007\/s10773-012-1286-4","volume":"51","author":"C-W Yang","year":"2012","unstructured":"Yang, C.-W., Hwang, T.: Improved QSDC protocol over a collective-dephasing noise channel. Int. J. Theor. Phys. 51, 3941\u20133950 (2012)","journal-title":"Int. J. Theor. Phys."},{"key":"702_CR25","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1088\/0256-307X\/22\/1\/007","volume":"22","author":"ZX Man","year":"2005","unstructured":"Man, Z.X., Zhang, Z.J., Li, Y.: Quantum dialogue revisited. Chin. Phys. Lett. 22, 22\u201324 (2005)","journal-title":"Chin. Phys. Lett."},{"key":"702_CR26","doi-asserted-by":"crossref","first-page":"739","DOI":"10.1142\/S0219749906002146","volume":"4","author":"ZX Man","year":"2006","unstructured":"Man, Z.X., Xia, Y.J., Zhang, Z.J.: Secure deterministic bidirectional communication without entanglement. Int. J. Quantum Inf. 4, 739\u2013746 (2006)","journal-title":"Int. J. Quantum Inf."},{"key":"702_CR27","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1016\/j.physleta.2004.06.009","volume":"328","author":"B Nguyen","year":"2004","unstructured":"Nguyen, B.: Quantum dialogue. Phys. Lett. A 328, 6\u201310 (2004)","journal-title":"Phys. Lett. A"},{"key":"702_CR28","doi-asserted-by":"crossref","first-page":"2460","DOI":"10.1016\/j.optcom.2009.02.062","volume":"282","author":"G-F Shi","year":"2009","unstructured":"Shi, G.-F., Xi, X.-Q., Tian, X.-L., Yue, R.-H.: Bidirectional quantum secure communication based on a shared private Bell state. Opt. Commun. 282, 2460\u20132463 (2009)","journal-title":"Opt. Commun."},{"key":"702_CR29","doi-asserted-by":"crossref","first-page":"1984","DOI":"10.1016\/j.optcom.2010.01.007","volume":"283","author":"G-F Shi","year":"2010","unstructured":"Shi, G.-F., Xi, X.-Q., Hu, M.-L., Yue, R.-H.: Quantum secure dialogue by using single photons. Opt. Commun. 283, 1984\u20131986 (2010)","journal-title":"Opt. Commun."},{"key":"702_CR30","doi-asserted-by":"crossref","first-page":"2288","DOI":"10.1016\/j.optcom.2010.01.022","volume":"283","author":"G Gao","year":"2010","unstructured":"Gao, G.: Two quantum dialogue protocols without information leakage. Opt. Commun. 283, 2288\u20132293 (2010)","journal-title":"Opt. Commun."},{"key":"702_CR31","doi-asserted-by":"crossref","unstructured":"Yang, C.-W., Hwang, T.: Quantum dialogue protocols immune to collective noise. Quantum Inf. Process. 12, 2131\u20132142 (2013)","DOI":"10.1007\/s11128-012-0514-4"},{"key":"702_CR32","doi-asserted-by":"crossref","unstructured":"Yang, Y.G., Wen, Q.Y.: An efficient two-party quantum private comparison protocol with decoy photons and two-photon entanglement. J. Phys. A: Math. Theor. 42, 055305 (2009)","DOI":"10.1088\/1751-8113\/42\/5\/055305"},{"key":"702_CR33","doi-asserted-by":"crossref","first-page":"2412","DOI":"10.1016\/j.optcom.2010.12.070","volume":"284","author":"J Lin","year":"2011","unstructured":"Lin, J., Tseng, H.-Y., Hwang, T.: Intercept-resend attacks on Chen et al\u2019.s quantum private comparison protocol and the improvements. Opt. Commun. 284, 2412\u20132414 (2011)","journal-title":"Opt. Commun."},{"key":"702_CR34","doi-asserted-by":"crossref","first-page":"1077","DOI":"10.1007\/s11128-012-0454-z","volume":"12","author":"Y-J Chang","year":"2013","unstructured":"Chang, Y.-J., Tsai, C.-W., Hwang, T.: Multi-user private comparison protocol using GHZ class states. Quantum Inf. Process. 12, 1077\u20131088 (2013)","journal-title":"Quantum Inf. Process."},{"key":"702_CR35","doi-asserted-by":"crossref","first-page":"1561","DOI":"10.1016\/j.optcom.2009.11.085","volume":"283","author":"XB Chen","year":"2010","unstructured":"Chen, X.B., Xu, G., Niu, X.X., Wen, Q.Y., Yang, Y.X.: An efficient protocol for the private comparison of equal information based on the triplet entangled state and single-particle measurement. Opt. Commun. 283, 1561\u20131565 (2010)","journal-title":"Opt. Commun."},{"key":"702_CR36","unstructured":"Zhang, W.-W., Zhang, K.-J.: Cryptanalysis and improvement of the quantum private comparison protocol with semi-honest third party. Quantum Inf. Process. (2012). doi: 10.1007\/s11128-012-0507-3\/11\/01"},{"key":"702_CR37","doi-asserted-by":"crossref","first-page":"583","DOI":"10.1088\/0253-6102\/57\/4\/11","volume":"57","author":"W Liu","year":"2012","unstructured":"Liu, W., Wang, Y.B., Cui, W.: Quantum private comparison protocol based on Bell entangled states. Commun. Theor. Phys. 57, 583\u2013588 (2012)","journal-title":"Commun. Theor. Phys."},{"key":"702_CR38","doi-asserted-by":"crossref","unstructured":"Tseng, H.-Y., Lin, J., Hwang, T.: New quantum private comparison protocol using EPR pairs. Quantum Inf. Process. (2012). doi: 10.1007\/s11128-011-0251-0","DOI":"10.1007\/s11128-011-0251-0"},{"key":"702_CR39","doi-asserted-by":"crossref","first-page":"887","DOI":"10.1007\/s11128-012-0439-y","volume":"12","author":"B Liu","year":"2013","unstructured":"Liu, B., Gao, F., Jia, H.-Y., Huang, W., Zhang, W.-W., Wen, Q.-Y.: Efficient quantum private comparison employing single photons and collective detection. Quantum Inf. Process. 12, 887\u2013897 (2013)","journal-title":"Quantum Inf. Process."},{"key":"702_CR40","doi-asserted-by":"crossref","first-page":"1957","DOI":"10.1016\/j.physleta.2007.10.066","volume":"372","author":"F-G Deng","year":"2008","unstructured":"Deng, F.-G., Li, X.-H., Zhou, H.-Y.: Efficient high-capacity quantum secret sharing with two-photon entanglement. Phys. Lett. A 372, 1957\u20131962 (2008)","journal-title":"Phys. Lett. A"},{"key":"702_CR41","doi-asserted-by":"crossref","first-page":"399","DOI":"10.1016\/j.physleta.2008.10.056","volume":"373","author":"F-G Deng","year":"2009","unstructured":"Deng, F.-G., Li, X.-H., Zhou, H.-Y.: Reply to: \u201cComment on: \u2019Efficient high-capacity quantum secret sharing with two-photon entanglement\u2019 Phys. Lett. A 372 (2008) 1957 \u201d Phys. Lett. A 373 (2009) 396. Phys. Lett. A 373, 399\u2013400 (2009)","journal-title":"Phys. Lett. A"},{"key":"702_CR42","doi-asserted-by":"crossref","unstructured":"Deng, F.-G., Zhou, H.-Y., Long, G.L.: Circular quantum secret sharing. J. Phys. A: Math. Gen. 39, 14089\u201314099 (2006)","DOI":"10.1088\/0305-4470\/39\/45\/018"},{"key":"702_CR43","doi-asserted-by":"crossref","first-page":"044301","DOI":"10.1103\/PhysRevA.71.044301","volume":"71","author":"ZJ Zhang","year":"2005","unstructured":"Zhang, Z.J., Li, Y., Man, Z.X.: Multiparty quantum secret sharing. Phys. Rev. A 71, 044301 (2005)","journal-title":"Phys. Rev. A"},{"key":"702_CR44","doi-asserted-by":"crossref","first-page":"022303","DOI":"10.1103\/PhysRevA.72.022303","volume":"72","author":"ZJ Zhang","year":"2005","unstructured":"Zhang, Z.J., Man, Z.X.: Multiparty quantum secret sharing of classical messages based on entanglement swapping. Phys. Rev. A 72, 022303 (2005)","journal-title":"Phys. Rev. A"},{"key":"702_CR45","doi-asserted-by":"crossref","unstructured":"Zhang, Z.J., Man, Z.X.: Reply to \u201cComment on \u2019Multiparty quantum secret sharing of classical messages based on entanglement swapping\u2019 \u201d. Phys. Rev. A 76 (2007)","DOI":"10.1103\/PhysRevA.76.036302"},{"key":"702_CR46","doi-asserted-by":"crossref","first-page":"60","DOI":"10.1016\/j.physleta.2005.05.049","volume":"342","author":"ZJ Zhang","year":"2005","unstructured":"Zhang, Z.J.: Multiparty quantum secret sharing of secure direct communication. Phys. Lett. A 342, 60\u201366 (2005)","journal-title":"Phys. Lett. A"},{"key":"702_CR47","doi-asserted-by":"crossref","first-page":"199","DOI":"10.1016\/j.optcom.2005.11.060","volume":"261","author":"ZJ Zhang","year":"2006","unstructured":"Zhang, Z.J.: Multiparty secret sharing of quantum information via cavity QED. Opt. Commun. 261, 199\u2013202 (2006)","journal-title":"Opt. Commun."},{"key":"702_CR48","doi-asserted-by":"crossref","first-page":"233","DOI":"10.1016\/j.physa.2005.07.005","volume":"361","author":"ZJ Zhang","year":"2006","unstructured":"Zhang, Z.J.: Robust multiparty quantum secret key sharing over two collective-noise channels. Phys. A Stat. Mech. Appl. 361, 233\u2013238 (2006)","journal-title":"Phys. A Stat. Mech. Appl."},{"key":"702_CR49","doi-asserted-by":"crossref","first-page":"2790","DOI":"10.1007\/s10773-011-0777-z","volume":"50","author":"T Hwang","year":"2011","unstructured":"Hwang, T., Hwang, C.-C., Yang, C.-W., Li, C.-M.: Revisiting Deng et al\u2019.s multiparty quantum secret sharing protocol. Int. J. Theor. Phys. 50, 2790\u20132798 (2011)","journal-title":"Int. J. Theor. Phys."},{"key":"702_CR50","doi-asserted-by":"crossref","first-page":"113","DOI":"10.1007\/s11128-011-0236-z","volume":"11","author":"C-W Yang","year":"2012","unstructured":"Yang, C.-W., Tsai, C.-W., Hwang, T.: Thwarting intercept-and-resend attack on Zhang\u2019s quantum secret sharing using collective rotation noises. Quantum Inf. Process. 11, 113\u2013122 (2012)","journal-title":"Quantum Inf. Process."},{"key":"702_CR51","doi-asserted-by":"crossref","first-page":"042305","DOI":"10.1103\/PhysRevA.73.042305","volume":"73","author":"H Lee","year":"2006","unstructured":"Lee, H., Lim, J., Yang, H.: Quantum direct communication with authentication. Phys. Rev. A 73, 042305 (2006)","journal-title":"Phys. Rev. A"},{"key":"702_CR52","doi-asserted-by":"crossref","first-page":"026301","DOI":"10.1103\/PhysRevA.75.026301","volume":"75","author":"ZJ Zhang","year":"2007","unstructured":"Zhang, Z.J., Liu, J., Wang, D., Shi, S.H.: Comment on \u201cQuantum direct communication with authentication. Phys. Rev. A 75, 026301 (2007)","journal-title":"Phys. Rev. A"},{"key":"702_CR53","first-page":"376","volume":"9","author":"CA Yen","year":"2009","unstructured":"Yen, C.A., Horng, S.J., Goan, H.S., Kao, T.W., Chou, Y.H.: Quantum direct communication with mutual authentication. Quantum Inf. Comput. 9, 376\u2013394 (2009)","journal-title":"Quantum Inf. Comput."},{"key":"702_CR54","doi-asserted-by":"crossref","first-page":"2354","DOI":"10.1088\/0256-307X\/25\/7\/007","volume":"25","author":"WJ Liu","year":"2008","unstructured":"Liu, W.J., Chen, H.W., Li, Z.Q., Liu, Z.H.: Efficient quantum secure direct communication with authentication. Chin. Phys. Lett. 25, 2354\u20132357 (2008)","journal-title":"Chin. Phys. Lett."},{"key":"702_CR55","doi-asserted-by":"crossref","first-page":"3860","DOI":"10.1088\/0256-307X\/25\/11\/007","volume":"25","author":"MJ Wang","year":"2008","unstructured":"Wang, M.J., Pan, W.: Quantum secure direct communication based on authentication. Chin. Phys. Lett. 25, 3860\u20133863 (2008)","journal-title":"Chin. Phys. Lett."},{"key":"702_CR56","doi-asserted-by":"crossref","first-page":"829","DOI":"10.1088\/0253-6102\/54\/5\/10","volume":"54","author":"J Yang","year":"2010","unstructured":"Yang, J., Wang, C.A., Zhang, R.: Quantum secure direct communication with authentication expansion using single photons. Commun. Theor. Phys. 54, 829\u2013834 (2010)","journal-title":"Commun. Theor. Phys."},{"key":"702_CR57","doi-asserted-by":"crossref","first-page":"3681","DOI":"10.1007\/s10773-012-1265-9","volume":"51","author":"Y-G Yang","year":"2012","unstructured":"Yang, Y.-G., Jia, X., Xia, J., Shi, L., Zhang, H.: Comment on \u201cQuantum secure direct communication with authentication expansion using single photons\u201d. Int. J. Theor. Phys. 51, 3681\u20133687 (2012)","journal-title":"Int. J. Theor. Phys."},{"key":"702_CR58","unstructured":"Yu, C.-H., Guo, G.-D., Lin, S.: Quantum secure direct communication with authentication using two nonorthogonal states. Int. J. Theor. Phys. (2012). doi: 10.1007\/s10773-012-1336-y\/09\/01"},{"key":"702_CR59","doi-asserted-by":"crossref","first-page":"4105","DOI":"10.1088\/1674-1056\/18\/10\/007","volume":"18","author":"WJ Liu","year":"2009","unstructured":"Liu, W.J., Chen, H.W., Ma, T.H., Li, Z.Q., Liu, Z.H., Hu, W.B.: An efficient deterministic secure quantum communication scheme based on cluster states and identity authentication. Chin. Phys. B 18, 4105\u20134109 (2009)","journal-title":"Chin. Phys. B"},{"key":"702_CR60","doi-asserted-by":"crossref","first-page":"050306","DOI":"10.1088\/0256-307X\/27\/5\/050306","volume":"27","author":"D Liu","year":"2010","unstructured":"Liu, D., Pei, C.X., Quan, D.X., Zhao, N.: A new quantum secure direct communication scheme with authentication. Chin. Phys. Lett. 27, 050306 (2010)","journal-title":"Chin. Phys. Lett."},{"key":"702_CR61","doi-asserted-by":"crossref","unstructured":"Gao, F., Qin, S.J., Guo, F.Z., Wen, Q.Y.: Cryptanalysis of quantum secure direct communication and authentication scheme via Bell states. Chin. Phys. Lett. 28, 020303 (2011)","DOI":"10.1088\/0256-307X\/28\/2\/020303"},{"key":"702_CR62","doi-asserted-by":"crossref","first-page":"1023","DOI":"10.1088\/0253-6102\/56\/6\/08","volume":"56","author":"CW Tsai","year":"2011","unstructured":"Tsai, C.W., Wei, T.S., Hwang, T.: One-way quantum authenticated secure communication using rotation operation. Commun. Theor. Phys. 56, 1023\u20131026 (2011)","journal-title":"Commun. Theor. Phys."},{"key":"702_CR63","doi-asserted-by":"crossref","first-page":"2050","DOI":"10.1126\/science.283.5410.2050","volume":"283","author":"HK Lo","year":"1999","unstructured":"Lo, H.K., Chau, H.F.: Unconditional security of quantum key distribution over arbitrarily long distances. Science 283, 2050\u20132056 (1999)","journal-title":"Science"},{"key":"702_CR64","doi-asserted-by":"crossref","first-page":"441","DOI":"10.1103\/PhysRevLett.85.441","volume":"85","author":"PW Shor","year":"2000","unstructured":"Shor, P.W., Preskill, J.: Simple proof of security of the BB84 quantum key distribution protocol. Phys. Rev. Lett. 85, 441\u2013444 (2000)","journal-title":"Phys. Rev. Lett."},{"key":"702_CR65","doi-asserted-by":"crossref","unstructured":"Damgard, I.B.: A design principle for hash functions. In: Advances in Cryptology\u2014Crypto 89, vol. 435, pp. 416\u2013427 (1990)","DOI":"10.1007\/0-387-34805-0_39"},{"key":"702_CR66","doi-asserted-by":"crossref","first-page":"405","DOI":"10.1103\/PhysRevLett.78.405","volume":"78","author":"AR Calderbank","year":"1997","unstructured":"Calderbank, A.R., Rains, E.M., Shor, P.W., Sloane, N.J.A.: Quantum error correction and orthogonal geometry. Phys. Rev. Lett. 78, 405\u2013408 (1997)","journal-title":"Phys. Rev. Lett."},{"key":"702_CR67","doi-asserted-by":"crossref","first-page":"1098","DOI":"10.1103\/PhysRevA.54.1098","volume":"54","author":"AR Calderbank","year":"1996","unstructured":"Calderbank, A.R., Shor, P.W.: Good quantum error-correcting codes exist. Phys. Rev. A 54, 1098\u20131105 (1996)","journal-title":"Phys. Rev. A"},{"key":"702_CR68","doi-asserted-by":"crossref","first-page":"2585","DOI":"10.1103\/PhysRevLett.77.2585","volume":"77","author":"A Ekert","year":"1996","unstructured":"Ekert, A., Macchiavello, C.: Quantum error correction for communication. Phys. Rev. Lett. 77, 2585\u20132588 (1996)","journal-title":"Phys. Rev. Lett."},{"key":"702_CR69","doi-asserted-by":"crossref","first-page":"1862","DOI":"10.1103\/PhysRevA.54.1862","volume":"54","author":"D Gottesman","year":"1996","unstructured":"Gottesman, D.: Class of quantum error-correcting codes saturating the quantum Hamming bound. Phys. Rev. A 54, 1862\u20131868 (1996)","journal-title":"Phys. Rev. A"},{"key":"702_CR70","doi-asserted-by":"crossref","first-page":"2525","DOI":"10.1103\/PhysRevLett.84.2525","volume":"84","author":"E Knill","year":"2000","unstructured":"Knill, E., Laflamme, R., Viola, L.: Theory of quantum error correction for general noise. Phys. Rev. Lett. 84, 2525\u20132528 (2000)","journal-title":"Phys. Rev. Lett."},{"key":"702_CR71","doi-asserted-by":"crossref","first-page":"198","DOI":"10.1103\/PhysRevLett.77.198","volume":"77","author":"R Laflamme","year":"1996","unstructured":"Laflamme, R., Miquel, C., Paz, J.P., Zurek, W.H.: Perfect quantum error correcting code. Phys. Rev. Lett. 77, 198\u2013201 (1996)","journal-title":"Phys. Rev. Lett."},{"key":"702_CR72","doi-asserted-by":"crossref","first-page":"R2493","DOI":"10.1103\/PhysRevA.52.R2493","volume":"52","author":"PW Shor","year":"1995","unstructured":"Shor, P.W.: Scheme for reducing decoherence in quantum computer memory. Phys. Rev. A 52, R2493\u2013R2496 (1995)","journal-title":"Phys. Rev. A"},{"key":"702_CR73","doi-asserted-by":"crossref","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","volume":"28","author":"CE Shannon","year":"1949","unstructured":"Shannon, C.E.: Communication theory of secrecy system. Bell Syst. Tech. J. 28, 656\u2013715 (1949)","journal-title":"Bell Syst. Tech. J."},{"key":"702_CR74","doi-asserted-by":"crossref","first-page":"2230","DOI":"10.1007\/s10773-013-1498-2","volume":"52","author":"C-W Yang","year":"2013","unstructured":"Yang, C.-W., Hwang, T., Lin, T.-H.: Modification attack on QSDC with authentication and the improvement. Int. J. Theor. Phys. 52, 2230\u20132234 (2013)","journal-title":"Int. J. Theor. Phys."}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-013-0702-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11128-013-0702-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-013-0702-x","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T07:39:15Z","timestamp":1559374755000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11128-013-0702-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,12,1]]},"references-count":74,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2014,4]]}},"alternative-id":["702"],"URL":"https:\/\/doi.org\/10.1007\/s11128-013-0702-x","relation":{},"ISSN":["1570-0755","1573-1332"],"issn-type":[{"value":"1570-0755","type":"print"},{"value":"1573-1332","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,12,1]]}}}