{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,20]],"date-time":"2025-12-20T22:09:21Z","timestamp":1766268561171},"reference-count":50,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2014,3,16]],"date-time":"2014-03-16T00:00:00Z","timestamp":1394928000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"published-print":{"date-parts":[[2014,7]]},"DOI":"10.1007\/s11128-014-0743-9","type":"journal-article","created":{"date-parts":[[2014,3,18]],"date-time":"2014-03-18T02:39:58Z","timestamp":1395110398000},"page":"1501-1510","source":"Crossref","is-referenced-by-count":18,"title":["Quantum deniable authentication protocol"],"prefix":"10.1007","volume":"13","author":[{"given":"Wei-Min","family":"Shi","sequence":"first","affiliation":[]},{"given":"Yi-Hua","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Yu-Guang","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,3,16]]},"reference":[{"key":"743_CR1","unstructured":"Bennett, C.H., Brassard G.: Quantum cryptography: public-key distribution and coin tossing. In: Proceedings of the IEEE International Conference on Computers, Systems and Signal Processing. pp. 175\u2013179. IEEE, New York (1984)"},{"key":"743_CR2","doi-asserted-by":"crossref","first-page":"661","DOI":"10.1103\/PhysRevLett.67.661","volume":"67","author":"A Ekert","year":"1991","unstructured":"Ekert, A.: Quantum cryptography based on Bell\u2019s theorem. Phys. Rev. Lett. 67, 661\u2013664 (1991)","journal-title":"Phys. Rev. Lett."},{"key":"743_CR3","doi-asserted-by":"crossref","first-page":"3121","DOI":"10.1103\/PhysRevLett.68.3121","volume":"68","author":"CH Bennett","year":"1992","unstructured":"Bennett, C.H.: Quantum cryptography using any two non-orthogonal states. Phys. Rev. Lett. 68, 3121\u20133124 (1992)","journal-title":"Phys. Rev. Lett."},{"key":"743_CR4","doi-asserted-by":"crossref","first-page":"012311","DOI":"10.1103\/PhysRevA.70.012311","volume":"70","author":"FG Deng","year":"2004","unstructured":"Deng, F.G., Long, G.L.: Bidirectional quantum key distribution protocol with practical faint laser pulses. Phys. Rev. A 70, 012311 (2004)","journal-title":"Phys. Rev. A"},{"key":"743_CR5","doi-asserted-by":"crossref","first-page":"042315","DOI":"10.1103\/PhysRevA.68.042315","volume":"68","author":"FG Deng","year":"2003","unstructured":"Deng, F.G., Long, G.L.: Controlled order rearrangement encryption for quantum key distribution. Phys. Rev. A 68, 042315 (2003)","journal-title":"Phys. Rev. A"},{"issue":"5","key":"743_CR6","doi-asserted-by":"crossref","first-page":"820","DOI":"10.1088\/0253-6102\/51\/5\/12","volume":"51","author":"G Gan","year":"2009","unstructured":"Gan, G.: Quantum key distribution scheme with high efficiency. Commun. Theor. Phys. 51(5), 820\u2013822 (2009)","journal-title":"Commun. Theor. Phys."},{"key":"743_CR7","doi-asserted-by":"crossref","first-page":"2703","DOI":"10.1007\/s10773-011-0768-0","volume":"50","author":"T-S Wei","year":"2011","unstructured":"Wei, T.-S., Tsai, C.-W., Hwang, T.: Quantum key distribution and quantum authentication based on entangled state. Int. J. Theor. Phys. 50, 2703\u20132707 (2011)","journal-title":"Int. J. Theor. Phys."},{"key":"743_CR8","doi-asserted-by":"crossref","first-page":"052319","DOI":"10.1103\/PhysRevA.69.052319","volume":"69","author":"FG Deng","year":"2004","unstructured":"Deng, F.G., Long, G.L.: Secure direct communication with a quantum one-time pad. Phys. Rev. A 69, 052319 (2004)","journal-title":"Phys. Rev. A"},{"issue":"4","key":"743_CR9","doi-asserted-by":"crossref","first-page":"256","DOI":"10.1016\/j.physleta.2006.05.035","volume":"358","author":"J Wang","year":"2006","unstructured":"Wang, J., Zhang, Q., Tang, C.J.: Quantum secure direct communication based on order rearrangement of single photons. Phys. Lett. A 358(4), 256\u2013258.7 (2006)","journal-title":"Phys. Lett. A"},{"key":"743_CR10","first-page":"1354","volume":"49","author":"XH Li","year":"2006","unstructured":"Li, X.H., Deng, F.G., Li, C.Y., et al.: Deterministic secure quantum communication without maximally entangled states. J. Korean. Phys. Soc. 49, 1354\u20131359 (2006)","journal-title":"J. Korean. Phys. Soc."},{"key":"743_CR11","doi-asserted-by":"crossref","first-page":"2149","DOI":"10.1088\/1009-1963\/16\/8\/001","volume":"16","author":"XH Li","year":"2007","unstructured":"Li, X.H., Li, C.Y., Deng, F.G., et al.: Quantum secure direct communication with quantum encryption based on pure entangled states. Chin. Phys. 16, 2149\u20132153 (2007)","journal-title":"Chin. Phys."},{"key":"743_CR12","first-page":"39","volume":"4","author":"F Sheikhehi","year":"2011","unstructured":"Sheikhehi, F., Hantehzadeh, M., Naseri, M.: Secure quantum report with authentication based on GHZ states and entanglement swapping. J. Theor. Appl. Phys. 4, 39\u201344 (2011)","journal-title":"J. Theor. Appl. Phys."},{"key":"743_CR13","doi-asserted-by":"crossref","unstructured":"Zhang, Q., Li, C., Li, Y., Nie. Y.: Quantum secure direct communication based on four-qubit cluster states. Int. J. Theor. Phys. (2012). doi: 10.1007\/s10773-012-1294-4","DOI":"10.1007\/s10773-012-1294-4"},{"key":"743_CR14","doi-asserted-by":"crossref","unstructured":"Yu, C.H., Guo, G.D., Lin, S.: Quantum secure direct communication with authentication using two nonorthogonal states. Int. J. Theor. Phys. (2012). doi: 10.1007\/s10773-012-1336-y","DOI":"10.1007\/s10773-012-1336-y"},{"key":"743_CR15","doi-asserted-by":"crossref","first-page":"1829","DOI":"10.1103\/PhysRevA.59.1829","volume":"59","author":"M Hillery","year":"1999","unstructured":"Hillery, M., Bu\u017eek, V., Berthiaume, A.: Quantum secret sharing. Phys. Rev. A 59, 1829\u20131834 (1999)","journal-title":"Phys. Rev. A"},{"key":"743_CR16","doi-asserted-by":"crossref","first-page":"162","DOI":"10.1103\/PhysRevA.59.162","volume":"59","author":"A Karlsson","year":"1999","unstructured":"Karlsson, A., Koashi, M., Imoto, N.: Quantum entanglement for secret sharing and secret splitting. Phys. Rev. A 59, 162\u2013168 (1999)","journal-title":"Phys. Rev. A"},{"key":"743_CR17","doi-asserted-by":"crossref","first-page":"648","DOI":"10.1103\/PhysRevLett.83.648","volume":"83","author":"R Cleve","year":"1999","unstructured":"Cleve, R., Gottesman, D., Lo, H.K.: How to share a quantum secret. Phys. Rev. Lett. 83, 648\u2013651 (1999)","journal-title":"Phys. Rev. Lett."},{"key":"743_CR18","doi-asserted-by":"crossref","first-page":"247","DOI":"10.1016\/S0375-9601(03)00074-4","volume":"310","author":"GP Guo","year":"2003","unstructured":"Guo, G.P., Guo, G.C.: Quantum secret sharing without entanglement. Phys. Lett. A 310, 247\u2013251 (2003)","journal-title":"Phys. Lett. A"},{"key":"743_CR19","doi-asserted-by":"crossref","first-page":"14089","DOI":"10.1088\/0305-4470\/39\/45\/018","volume":"39","author":"FG Deng","year":"2006","unstructured":"Deng, F.G., et al.: Circular quantum secret sharing. J. Phys. A Math. Gen. 39, 14089 (2006)","journal-title":"J. Phys. A Math. Gen."},{"key":"743_CR20","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1088\/0256-307X\/24\/1\/007","volume":"24","author":"XH Li","year":"2007","unstructured":"Li, X.H., et al.: Multiparty quantum remote secret conference. Chin. Phys. Lett. 24, 23 (2007)","journal-title":"Chin. Phys. Lett."},{"key":"743_CR21","doi-asserted-by":"crossref","first-page":"3101","DOI":"10.1007\/s10773-012-1191-x","volume":"51","author":"H-Y Tseng","year":"2012","unstructured":"Tseng, H.-Y., Tsai, C.-W., Hwang, T., Li, C.-M.: Quantum secret sharing based on suantum search algorithm. Int. J. Theor. Phys. 51, 3101\u20133108 (2012)","journal-title":"Int. J. Theor. Phys."},{"key":"743_CR22","doi-asserted-by":"crossref","first-page":"2727","DOI":"10.1007\/s10773-012-1147-1","volume":"51","author":"R Du","year":"2012","unstructured":"Du, R., Sun, Z., Wang, B., Long, D.: Quantum secret sharing of secure direct communication using one-time pad. Int. J. Theor. Phys. 51, 2727\u20132736 (2012)","journal-title":"Int. J. Theor. Phys."},{"key":"743_CR23","doi-asserted-by":"crossref","first-page":"2852","DOI":"10.1007\/s10773-010-0478-z","volume":"49","author":"G Gao","year":"2010","unstructured":"Gao, G., et al.: An efficient multiparty quantum secret sharing protocol based on Bell states in the high dimension Hilbert space. Int. J. Theor. Phys. 49, 2852 (2010)","journal-title":"Int. J. Theor. Phys."},{"key":"743_CR24","doi-asserted-by":"crossref","first-page":"2291","DOI":"10.1007\/s10773-012-1109-7","volume":"51","author":"L-L Liu","year":"2012","unstructured":"Liu, L.-L., Tsai, C.-W., Hwang, T.: Quantum secret sharing using symmetric $$W$$ W state. Int. J. Theor. Phys. 51, 2291\u20132306 (2012)","journal-title":"Int. J. Theor. Phys."},{"key":"743_CR25","doi-asserted-by":"crossref","first-page":"149","DOI":"10.1103\/PhysRevA.60.149","volume":"60","author":"M Du\u0160ek","year":"1999","unstructured":"Du\u0160ek, M., Haderka, O., Hendrych, M., et al.: Quantum identification system. Phys. Rev. A 60, 149\u2013156 (1999)","journal-title":"Phys. Rev. A"},{"key":"743_CR26","doi-asserted-by":"crossref","first-page":"062309","DOI":"10.1103\/PhysRevA.64.062309","volume":"64","author":"M Curty","year":"2001","unstructured":"Curty, M., Santos, D.J.: Quantum authentication of classical messages. Phys. Rev. A 64, 062309 (2001)","journal-title":"Phys. Rev. A"},{"key":"743_CR27","doi-asserted-by":"crossref","first-page":"05236","DOI":"10.1103\/PhysRevA.65.052326","volume":"65","author":"T Mihara","year":"2002","unstructured":"Mihara, T.: Quantum identification schemes with entanglements. Phys. Rev. A 65, 05236 (2002)","journal-title":"Phys. Rev. A"},{"key":"743_CR28","doi-asserted-by":"crossref","first-page":"022303","DOI":"10.1103\/PhysRevA.61.022303","volume":"61","author":"GH Zeng","year":"2001","unstructured":"Zeng, G.H., Zhang, W.P.: Identity verification in quantum key distribution. Phys. Rev. A 61, 022303 (2001)","journal-title":"Phys. Rev. A"},{"key":"743_CR29","doi-asserted-by":"crossref","first-page":"022305","DOI":"10.1103\/PhysRevA.62.022305","volume":"62","author":"D Ljunggren","year":"2000","unstructured":"Ljunggren, D., Bourennane, M., Karlsson, A.: Authority-based user authentication in quantum key distribution. Phys. Rev. A 62, 022305 (2000)","journal-title":"Phys. Rev. A"},{"key":"743_CR30","doi-asserted-by":"crossref","first-page":"380","DOI":"10.1016\/j.optcom.2005.06.002","volume":"254","author":"NR Zhou","year":"2005","unstructured":"Zhou, N.R., Zeng, G.H., Zeng, W.J., et al.: Cross-center quantum identification scheme based on teleportation and entanglement swapping. Opt. Commun. 254, 380\u2013388 (2005)","journal-title":"Opt. Commun."},{"key":"743_CR31","doi-asserted-by":"crossref","first-page":"3382","DOI":"10.1016\/j.optcom.2009.05.036","volume":"282","author":"T-Y Wang","year":"2009","unstructured":"Wang, T.-Y., Wen, Q.-Y., Zhu, F.-C.: Secure authentication of classical messages with decoherence-free states. Opt. Commun. 282, 3382\u20133385 (2009)","journal-title":"Opt. Commun."},{"key":"743_CR32","doi-asserted-by":"crossref","unstructured":"Li, N., Zha, X.W., Lan, Q.: Secure quantum report with authentication based on six-particle cluster state and entanglement swapping. Sci. Ch. Inf. Sci. (2012). doi: 10.1007\/s11432-012-4704-6","DOI":"10.1007\/s11432-012-4704-6"},{"key":"743_CR33","doi-asserted-by":"crossref","unstructured":"Aumann, Y., Rabin M.: Authentication, enhanced security and error correcting codes. Crypto\u2019 98, Santa Barbara, CA, USA, LNCS 1462, pp. 299\u2013303. Springer, Berlin (1998)","DOI":"10.1007\/BFb0055736"},{"key":"743_CR34","unstructured":"Aumann, Y., Rabin, M.: Efficient deniable authentication of long messages. In: International Conference on Theoretical Computer Science in Honor of Professor Manuel Blum\u2019s 60th Birthday (1998)"},{"key":"743_CR35","doi-asserted-by":"crossref","unstructured":"Dwork, C., Naor, M., Sahai A.: Concurrent zero-knowledge. In: Proceedings of the 30th ACM STOC\u201998, pp. 409\u2013418, Dallas, TX (1998)","DOI":"10.1145\/276698.276853"},{"issue":"2","key":"743_CR36","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1049\/ip-cdt:20010207","volume":"148","author":"X Deng","year":"2001","unstructured":"Deng, X., Lee, C.H., Zhu, H.: Deniable authentication protocols. IEE Proc. Comput. Digit. Tech. Engl. 148(2), 101\u2013104 (2001)","journal-title":"IEE Proc. Comput. Digit. Tech. Engl."},{"issue":"5","key":"743_CR37","doi-asserted-by":"crossref","first-page":"449","DOI":"10.1016\/j.csi.2003.11.001","volume":"26","author":"ZH Shao","year":"2004","unstructured":"Shao, Z.H.: Efficient deniable authentication protocol based on generalized ElGamal signature scheme. Comput. Stand. Interfaces 26(5), 449\u2013454 (2004)","journal-title":"Comput. Stand. Interfaces"},{"key":"743_CR38","doi-asserted-by":"crossref","first-page":"1376","DOI":"10.1016\/j.ins.2006.09.020","volume":"177","author":"WB Lee","year":"2007","unstructured":"Lee, W.B., Wu, C.C., Tsaur, W.J.: A novel deniable authentication protocol using generalized ElGamal signature scheme. Inf. Sci. 177, 1376\u20131381 (2007)","journal-title":"Inf. Sci."},{"key":"743_CR39","unstructured":"Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. In: Proceedings of IEEE International Conference on Computers Systems and Signal Processing, Bangalore, India. pp. 175\u2013179. IEEE, New York (1984)"},{"key":"743_CR40","doi-asserted-by":"crossref","first-page":"032302","DOI":"10.1103\/PhysRevA.65.032302","volume":"65","author":"GL Long","year":"2002","unstructured":"Long, G.L., Liu, X.S.: Theoretically efficient high-capacity quantum-key distribution scheme. Phys. Rev. A 65, 032302 (2002)","journal-title":"Phys. Rev. A"},{"key":"743_CR41","first-page":"3","volume":"30","author":"Z Yu-Jing","year":"2013","unstructured":"Yu-Jing, Z., Xi-Ming, F., Fang, Z.: Preparation of N-qubit GHZ state with a hybrid quantum system based on nitrogen-vacancy centers. Chin. Phys. Lett. 30, 3\u20135 (2013)","journal-title":"Chin. Phys. Lett."},{"issue":"8","key":"743_CR42","doi-asserted-by":"crossref","first-page":"2438","DOI":"10.1007\/s10773-012-1124-8","volume":"51","author":"LR Long","year":"2012","unstructured":"Long, L.R., Zhou, P., Li, Z., Yin, C.L.: Multiparty joint remote preparation of an arbitrary GHZ-class state via positive operator-valued measurement. Int. J. Theor. Phys. 51(8), 2438\u20132446 (2012)","journal-title":"Int. J. Theor. Phys."},{"issue":"56","key":"743_CR43","first-page":"655","volume":"4","author":"Y Rong-Can","year":"2011","unstructured":"Rong-Can, Y., Huang, Z.-P., Guo, Y.-Q.: Atomic GHZ states prepared in two directly coupled cavities with virtual excitations in one step. Commun. Theor. Phys. 4(56), 655\u2013658 (2011)","journal-title":"Commun. Theor. Phys."},{"issue":"55","key":"743_CR44","doi-asserted-by":"crossref","first-page":"771","DOI":"10.1088\/0253-6102\/55\/5\/07","volume":"5","author":"S-Y Ma","year":"2011","unstructured":"Ma, S.-Y., Chen, X.-B., Tang, P.: Scheme for cloning a three-particle GHZ class state with assistance. Commun. Theor. Phys. 5(55), 771\u2013774 (2011)","journal-title":"Commun. Theor. Phys."},{"key":"743_CR45","doi-asserted-by":"crossref","first-page":"042317","DOI":"10.1103\/PhysRevA.68.042317","volume":"68","author":"FG Deng","year":"2003","unstructured":"Deng, F.G., Long, G.L., Liu, X.S.: Two-step quantum direct communication protocol using the Einstein-Podolsky-Rosen pair block. Phys. Rev. A 68, 042317 (2003)","journal-title":"Phys. Rev. A"},{"key":"743_CR46","doi-asserted-by":"crossref","first-page":"661","DOI":"10.1103\/PhysRevLett.67.661","volume":"67","author":"AK Ekert","year":"1991","unstructured":"Ekert, A.K.: Quantum cryptography based on Bell theorem. Phys. Rev. Lett. 67, 661\u2013664 (1991)","journal-title":"Phys. Rev. Lett."},{"key":"743_CR47","unstructured":"Gottesman, D., Chuang, I.: Quantum digital signature. arXiv:quant-ph\/0105032 (2001)"},{"issue":"1","key":"743_CR48","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1049\/iet-ifs:20060124","volume":"1","author":"T Hwang","year":"2007","unstructured":"Hwang, T., Lee, K.C.: EPR quantum key distribution protocols with 100% qubit efficiency. IET Inf. Secur. 1(1), 43\u201345 (2007)","journal-title":"IET Inf. Secur."},{"issue":"10","key":"743_CR49","doi-asserted-by":"crossref","first-page":"1531","DOI":"10.1142\/S0129183109014576","volume":"20","author":"JH Chen","year":"2009","unstructured":"Chen, J.H., Lee, K.C., Hwang, T.: The enhancement of Zhou et al.\u2019s quantum secret sharing protocol. Int. J. Mod. Phys. C 20(10), 1531\u20131535 (2009)","journal-title":"Int. J. Mod. Phys. C"},{"issue":"6","key":"743_CR50","doi-asserted-by":"crossref","first-page":"1602","DOI":"10.1109\/JSTQE.2009.2019617","volume":"15","author":"HC Shih","year":"2009","unstructured":"Shih, H.C., Lee, K.C., Hwang, T.: New efficient three-party quantum key distribution protocols. IEEE J. Sel. Top. Quantum Electron. 15(6), 1602\u20131606 (2009)","journal-title":"IEEE J. Sel. Top. Quantum Electron."}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-014-0743-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11128-014-0743-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-014-0743-9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,8]],"date-time":"2019-08-08T14:48:53Z","timestamp":1565275733000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11128-014-0743-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,3,16]]},"references-count":50,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2014,7]]}},"alternative-id":["743"],"URL":"https:\/\/doi.org\/10.1007\/s11128-014-0743-9","relation":{},"ISSN":["1570-0755","1573-1332"],"issn-type":[{"value":"1570-0755","type":"print"},{"value":"1573-1332","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,3,16]]}}}