{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,18]],"date-time":"2026-01-18T10:38:26Z","timestamp":1768732706992,"version":"3.49.0"},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2014,3,18]],"date-time":"2014-03-18T00:00:00Z","timestamp":1395100800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"published-print":{"date-parts":[[2014,6]]},"DOI":"10.1007\/s11128-014-0740-z","type":"journal-article","created":{"date-parts":[[2014,3,18]],"date-time":"2014-03-18T04:52:51Z","timestamp":1395118371000},"page":"1457-1465","source":"Crossref","is-referenced-by-count":120,"title":["Authenticated semi-quantum key distribution protocol using Bell states"],"prefix":"10.1007","volume":"13","author":[{"given":"Kun-Fei","family":"Yu","sequence":"first","affiliation":[]},{"given":"Chun-Wei","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Ci-Hong","family":"Liao","sequence":"additional","affiliation":[]},{"given":"Tzonelih","family":"Hwang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,3,18]]},"reference":[{"issue":"21","key":"740_CR1","doi-asserted-by":"crossref","first-page":"3121","DOI":"10.1103\/PhysRevLett.68.3121","volume":"68","author":"CH Bennett","year":"1992","unstructured":"Bennett, C.H.: Quantum cryptography using any two nonorthogonal states. Phys. Rev. Lett. 68(21), 3121\u20133124 (1992)","journal-title":"Phys. Rev. Lett."},{"issue":"6","key":"740_CR2","doi-asserted-by":"crossref","first-page":"661","DOI":"10.1103\/PhysRevLett.67.661","volume":"67","author":"AK Ekert","year":"1991","unstructured":"Ekert, A.K.: Quantum cryptography based on Bell\u2019s theorem. Phys. Rev. Lett. 67(6), 661\u2013663 (1991)","journal-title":"Phys. Rev. Lett."},{"issue":"11","key":"740_CR3","doi-asserted-by":"crossref","first-page":"2097","DOI":"10.1088\/0256-307X\/21\/11\/007","volume":"21","author":"FG Deng","year":"2004","unstructured":"Deng, F.G., Long, G.L., Wang, Y., Xiao, L.: Increasing the efficiencies of random-choice-based quantum communication protocols with delayed measurement. Chinese Phys. Lett. 21(11), 2097\u20132100 (2004)","journal-title":"Chinese Phys. Lett."},{"issue":"3","key":"740_CR4","doi-asserted-by":"crossref","first-page":"032302","DOI":"10.1103\/PhysRevA.65.032302","volume":"65","author":"G Long","year":"2002","unstructured":"Long, G., Liu, X.: Theoretically efficient high-capacity quantum-key-distribution scheme. Phys. Rev. A 65(3), 032302 (2002)","journal-title":"Phys. Rev. A"},{"issue":"5410","key":"740_CR5","doi-asserted-by":"crossref","first-page":"2050","DOI":"10.1126\/science.283.5410.2050","volume":"283","author":"HK Lo","year":"1999","unstructured":"Lo, H.K., Chau, H.F.: Unconditional security of quantum key distribution over arbitrarily long distances. Science 283(5410), 2050\u20132056 (1999)","journal-title":"Science"},{"issue":"2","key":"740_CR6","doi-asserted-by":"crossref","first-page":"441","DOI":"10.1103\/PhysRevLett.85.441","volume":"85","author":"PW Shor","year":"2000","unstructured":"Shor, P.W., Preskill, J.: Simple proof of security of the BB84 quantum key distribution protocol. Phys. Rev. Lett. 85(2), 441\u2013444 (2000)","journal-title":"Phys. Rev. Lett."},{"key":"740_CR7","unstructured":"Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. In: Proceedings of the IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, India (1984)"},{"issue":"3","key":"740_CR8","doi-asserted-by":"crossref","first-page":"555","DOI":"10.1142\/S021974990500116X","volume":"3","author":"ZJ Zhang","year":"2005","unstructured":"Zhang, Z.J., Man, Z.X., Shi, S.H.: An efficient multiparty quantum key distribution scheme. Int. J. Quantum Inf. 3(3), 555\u2013560 (2005)","journal-title":"Int. J. Quantum Inf."},{"issue":"1","key":"740_CR9","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1088\/0253-6102\/47\/1\/011","volume":"47","author":"P Chen","year":"2007","unstructured":"Chen, P., Li, Y.-S., Deng, F.-G., Long, G.-L.: Measuring-basis encrypted quantum key distribution with four-state systems. Commun. Theor. Phys. 47(1), 49\u201352 (2007)","journal-title":"Commun. Theor. Phys."},{"key":"740_CR10","doi-asserted-by":"crossref","unstructured":"Li, X.-H., Deng, F.-G., Zhou, H.-Y.: Efficient quantum key distribution over a collective noise channel. Phys. Rev. A 78(2), 022321 (2008)","DOI":"10.1103\/PhysRevA.78.022321"},{"issue":"7","key":"740_CR11","doi-asserted-by":"crossref","first-page":"1141","DOI":"10.1142\/S021974991000623X","volume":"8","author":"X-H Li","year":"2010","unstructured":"Li, X.-H., Duan, X.-J., Deng, F.-G., Zhou, H.-Y.: Error-rejecting Bennett\u2013Brassard\u2013Mermin quantum key distribution protocol based on linear optics over a collective-noise channel. Int. J. Quantum Inf. 8(7), 1141\u20131151 (2010)","journal-title":"Int. J. Quantum Inf."},{"issue":"8","key":"740_CR12","doi-asserted-by":"crossref","first-page":"1479","DOI":"10.1142\/S021974990900595X","volume":"7","author":"X-H Li","year":"2009","unstructured":"Li, X.-H., Zhao, B.-K., Sheng, Y.-B., Deng, F.-G., Zhou, H.-Y.: FAULT tolerant quantum key distribution based on quantum dense coding with collective noise. Int. J. Quantum. Inf. 7(8), 1479\u20131489 (2009)","journal-title":"Int. J. Quantum. Inf."},{"issue":"4","key":"740_CR13","doi-asserted-by":"crossref","first-page":"739","DOI":"10.1142\/S0219749909005493","volume":"7","author":"B-K Zhao","year":"2009","unstructured":"Zhao, B.-K., Sheng, Y.-B., Deng, F.-G., Zhang, F.-S., Zhou, H.-Y.: Stable and deterministic quantum key distribution based on differential phase shift. Int. J. Quantum Inf. 7(4), 739\u2013745 (2009)","journal-title":"Int. J. Quantum Inf."},{"issue":"3","key":"740_CR14","doi-asserted-by":"crossref","first-page":"785","DOI":"10.1140\/epjd\/e2010-10320-y","volume":"61","author":"T Hwang","year":"2011","unstructured":"Hwang, T., Hwang, C.C., Tsai, C.W.: Quantum key distribution protocol using dense coding of three-qubit W state. Eur. Phys. J. D 61(3), 785\u2013790 (2011)","journal-title":"Eur. Phys. J. D"},{"issue":"1","key":"740_CR15","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1109\/TDSC.2007.13","volume":"4","author":"T Hwang","year":"2007","unstructured":"Hwang, T., Lee, K.C., Li, C.M.: Provably secure three-party authenticated quantum key distribution protocols. IEEE Trans Depend Secur 4(1), 71\u201380 (2007)","journal-title":"IEEE Trans Depend Secur"},{"issue":"7\u20138","key":"740_CR16","first-page":"615","volume":"11","author":"T Hwang","year":"2011","unstructured":"Hwang, T., Tsai, C.W., Chong, S.K.: Probabilistic quantum key distribution. Quantum Inf. Comput. 11(7\u20138), 615\u2013637 (2011)","journal-title":"Quantum Inf. Comput."},{"issue":"14","key":"740_CR17","doi-asserted-by":"crossref","first-page":"140501","DOI":"10.1103\/PhysRevLett.99.140501","volume":"99","author":"M Boyer","year":"2007","unstructured":"Boyer, M., Kenigsberg, D., Mor, T.: Quantum key distribution with classical Bob. Phys. Rev. Lett. 99(14), 140501 (2007)","journal-title":"Phys. Rev. Lett."},{"issue":"3","key":"740_CR18","doi-asserted-by":"crossref","first-page":"032341","DOI":"10.1103\/PhysRevA.79.032341","volume":"79","author":"M Boyer","year":"2009","unstructured":"Boyer, M., Gelles, R., Kenigsberg, D., Mor, T.: Semiquantum key distribution. Phys. Rev. A 79(3), 032341 (2009)","journal-title":"Phys. Rev. A"},{"issue":"5","key":"740_CR19","doi-asserted-by":"crossref","first-page":"052312","DOI":"10.1103\/PhysRevA.79.052312","volume":"79","author":"X Zou","year":"2009","unstructured":"Zou, X., Qiu, D., Li, L., Wu, L., Li, L.: Semiquantum-key distribution using less than four quantum states. Phys. Rev. A 79(5), 052312 (2009)","journal-title":"Phys. Rev. A"},{"key":"740_CR20","doi-asserted-by":"crossref","unstructured":"Wang, J., Zhang, S., Zhang, Q., Tang, C. J.: Semiquantum key distribution using entangled states. Chinese Phys. Lett. 28(10), 100301 (2011)","DOI":"10.1088\/0256-307X\/28\/10\/100301"},{"issue":"12","key":"740_CR21","doi-asserted-by":"crossref","first-page":"3941","DOI":"10.1007\/s10773-012-1286-4","volume":"51","author":"C-W Yang","year":"2012","unstructured":"Yang, C.-W., Hwang, T.: Improved QSDC protocol over a collective-dephasing noise channel. Int. J. Theor. Phys. 51(12), 3941\u20133950 (2012)","journal-title":"Int. J. Theor. Phys."},{"issue":"1","key":"740_CR22","doi-asserted-by":"crossref","first-page":"156","DOI":"10.1007\/s10773-012-1314-4","volume":"52","author":"J Lin","year":"2013","unstructured":"Lin, J., Yang, C.-W., Tsai, C.-W., Hwang, T.: Intercept-resend attacks on semiquantum secret sharing and the improvements. Int. J. Theor. Phys. 52(1), 156\u2013162 (2013)","journal-title":"Int. J. Theor. Phys."},{"issue":"7","key":"740_CR23","doi-asserted-by":"crossref","first-page":"2230","DOI":"10.1007\/s10773-013-1498-2","volume":"52","author":"C-W Yang","year":"2013","unstructured":"Yang, C.-W., Hwang, T., Lin, T.-H.: Modification Attack on QSDC with Authentication and the Improvement. Int. J. Theor. Phys. 52(7), 2230\u20132234 (2013)","journal-title":"Int. J. Theor. Phys."},{"issue":"2","key":"740_CR24","doi-asserted-by":"crossref","first-page":"210","DOI":"10.1137\/0217014","volume":"17","author":"CH Bennett","year":"1988","unstructured":"Bennett, C.H., Brassard, G., Robert, J.M.: Privacy amplification by public discussion. SIAM J. Comput. 17(2), 210\u2013229 (1988)","journal-title":"SIAM J. Comput."},{"issue":"6","key":"740_CR25","doi-asserted-by":"crossref","first-page":"1915","DOI":"10.1109\/18.476316","volume":"41","author":"CH Bennett","year":"1995","unstructured":"Bennett, C.H., Brassard, G., Crepeau, C., Maurer, U.M.: Generalized privacy amplification. IEEE Trans. Inf. Theory 41(6), 1915\u20131923 (1995)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"1","key":"740_CR26","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1007\/s11128-012-0362-2","volume":"12","author":"C-W Yang","year":"2013","unstructured":"Yang, C.-W., Hwang, T., Luo, Y.-P.: Enhancement on \u201cquantum blind signature based on two-state vector formalism\u201d. Quantum Inf. Process. 12(1), 109\u2013117 (2013)","journal-title":"Quantum Inf. Process."},{"key":"740_CR27","unstructured":"Deng, F.G., Zhou, P., Li, X.H., Li, C.Y., Zhou, H.Y.: Robustness of two-way quantum communication protocols against trojan horse attack. Quantum Phys. (2005) arXiv:quant-ph\/0508168v1z"},{"issue":"1\u20132","key":"740_CR28","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1016\/j.physleta.2005.10.050","volume":"351","author":"QY Cai","year":"2006","unstructured":"Cai, Q.Y.: Eavesdropping on the two-way quantum communication protocols with invisible photons. Phys. Lett. A 351(1\u20132), 23\u201325 (2006)","journal-title":"Phys. Lett. A"},{"issue":"4","key":"740_CR29","doi-asserted-by":"crossref","first-page":"044302","DOI":"10.1103\/PhysRevA.72.044302","volume":"72","author":"FG Deng","year":"2005","unstructured":"Deng, F.G., Li, X.H., Zhou, H.Y., Zhang, Z.J.: Improving the security of multiparty quantum secret sharing against Trojan horse attack. Phys. Rev. A 72(4), 044302 (2005)","journal-title":"Phys. Rev. A"},{"issue":"5","key":"740_CR30","doi-asserted-by":"crossref","first-page":"054302","DOI":"10.1103\/PhysRevA.74.054302","volume":"74","author":"XH Li","year":"2006","unstructured":"Li, X.H., Deng, F.G., Zhou, H.Y.: Improving the security of secure direct communication based on the secret transmitting order of particles. Phys. Rev. A 74(5), 054302 (2006)","journal-title":"Phys. Rev. A"},{"issue":"4","key":"740_CR31","doi-asserted-by":"crossref","first-page":"049901","DOI":"10.1103\/PhysRevA.73.049901","volume":"73","author":"FG Deng","year":"2006","unstructured":"Deng, F.G., Li, X.H., Zhou, H.Y., Zhang, Z.J.: Improving the security of multiparty quantum secret sharing against Trojan horse attack (vol 72, art no 044302, 2005). Phys. Rev. A 73(4), 049901 (2006)","journal-title":"Phys. Rev. A"}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-014-0740-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11128-014-0740-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-014-0740-z","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T07:39:16Z","timestamp":1559374756000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11128-014-0740-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,3,18]]},"references-count":31,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2014,6]]}},"alternative-id":["740"],"URL":"https:\/\/doi.org\/10.1007\/s11128-014-0740-z","relation":{},"ISSN":["1570-0755","1573-1332"],"issn-type":[{"value":"1570-0755","type":"print"},{"value":"1573-1332","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,3,18]]}}}