{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,2]],"date-time":"2026-03-02T21:23:45Z","timestamp":1772486625293,"version":"3.50.1"},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"11","license":[{"start":{"date-parts":[[2014,8,22]],"date-time":"2014-08-22T00:00:00Z","timestamp":1408665600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"published-print":{"date-parts":[[2014,11]]},"DOI":"10.1007\/s11128-014-0808-9","type":"journal-article","created":{"date-parts":[[2014,8,21]],"date-time":"2014-08-21T08:39:44Z","timestamp":1408610384000},"page":"2535-2549","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":56,"title":["Quantum identity authentication based on ping-pong technique without entanglements"],"prefix":"10.1007","volume":"13","author":[{"given":"Hao","family":"Yuan","sequence":"first","affiliation":[]},{"given":"Yi-min","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Guo-zhu","family":"Pan","sequence":"additional","affiliation":[]},{"given":"Gang","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Jun","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Zhan-jun","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,8,22]]},"reference":[{"key":"808_CR1","doi-asserted-by":"crossref","unstructured":"Cr\u00e9au, C., Salvail, L.: Advances in Cryptology. In: Proceedings of Eurocrypt \u2019 95, p. 133. Springer, Berlin (1995)","DOI":"10.1007\/3-540-49264-X_11"},{"key":"808_CR2","unstructured":"Bennett, C.H., Brassard, G., Cr\u00e9au, C., Skubiszewska, M.H.: Advances in Cryptology. In: Proceedings of Crypto \u2019 91. Lecture Notes in Computer Science, vol. 576, p. 133. Springer, Berlin (1992)"},{"key":"808_CR3","unstructured":"Mayers, D.: The trouble with quantum bit commitment. e-print quant\/9603015 (1996)"},{"key":"808_CR4","doi-asserted-by":"crossref","first-page":"149","DOI":"10.1103\/PhysRevA.60.149","volume":"60","author":"M Du\u0161ek","year":"1999","unstructured":"Du\u0161ek, M., Hade\u0159ka, O., Hendrych, M., My\u0161ka, R.: Quantum identification system. Phys. Rev. A 60, 149 (1999)","journal-title":"Phys. Rev. A"},{"key":"808_CR5","doi-asserted-by":"crossref","first-page":"022303","DOI":"10.1103\/PhysRevA.61.022303","volume":"61","author":"G Zeng","year":"2000","unstructured":"Zeng, G., Zhang, W.: Identity verification in quantum key distribution. Phys. Rev. A 61, 022303 (2000)","journal-title":"Phys. Rev. A"},{"key":"808_CR6","doi-asserted-by":"crossref","first-page":"022305","DOI":"10.1103\/PhysRevA.62.022305","volume":"62","author":"D Ljunggren","year":"2000","unstructured":"Ljunggren, D., Bourennane, M., Karlsson, A.: Authority-based user authentication in quantum key distribution. Phys. Rev. A 62, 022305 (2000)","journal-title":"Phys. Rev. A"},{"key":"808_CR7","doi-asserted-by":"crossref","first-page":"052326","DOI":"10.1103\/PhysRevA.65.052326","volume":"65","author":"T Mihara","year":"2002","unstructured":"Mihara, T.: Quantum identification schemes with entanglements. Phys. Rev. A 65, 052326 (2002)","journal-title":"Phys. Rev. A"},{"key":"808_CR8","doi-asserted-by":"crossref","first-page":"380","DOI":"10.1016\/j.optcom.2005.06.002","volume":"254","author":"N Zhou","year":"2005","unstructured":"Zhou, N., Zeng, G.H., Zeng, W.J., Zhu, F.C.: Cross-center quantum identification scheme based on teleportation and entanglement swapping. Opt. Commun. 254, 380 (2005)","journal-title":"Opt. Commun."},{"key":"808_CR9","doi-asserted-by":"crossref","first-page":"042305","DOI":"10.1103\/PhysRevA.73.042305","volume":"73","author":"H Lee","year":"2006","unstructured":"Lee, H., Lim, J., Yang, H.J.: Quantum direct communication with authentication. Phys. Rev. A 73, 042305 (2006)","journal-title":"Phys. Rev. A"},{"key":"808_CR10","doi-asserted-by":"crossref","first-page":"026301","DOI":"10.1103\/PhysRevA.75.026301","volume":"75","author":"ZJ Zhang","year":"2007","unstructured":"Zhang, Z.J., Liu, J., Wang, D., Shi, S.H.: Comment on quantum direct communication with authentication. Phys. Rev. A 75, 026301 (2007)","journal-title":"Phys. Rev. A"},{"key":"808_CR11","doi-asserted-by":"crossref","first-page":"199","DOI":"10.1016\/j.physleta.2006.03.048","volume":"356","author":"Z Zhang","year":"2006","unstructured":"Zhang, Z., Zeng, G., Zhou, N., Xiong, J.: Quantum identity authentication based on ping-pong technique for photons. Phys. Lett. A 356, 199 (2006)","journal-title":"Phys. Lett. A"},{"key":"808_CR12","first-page":"376","volume":"9","author":"CA Yen","year":"2009","unstructured":"Yen, C.A., Horng, S.J., Goan, H.S., Kao, T.W., Chou, Y.H.: Quantum direct communication with mutual authentication. Quantum Inf. Comput. 9, 376 (2009)","journal-title":"Quantum Inf. Comput."},{"key":"808_CR13","doi-asserted-by":"crossref","first-page":"050306","DOI":"10.1088\/0256-307X\/27\/5\/050306","volume":"27","author":"D Liu","year":"2010","unstructured":"Liu, D., Pei, C.X., Quan, D.X., Zhao, N.: A new quantum secure direct communication scheme with authentication. Chin. Phys. Lett. 27, 050306 (2010)","journal-title":"Chin. Phys. Lett."},{"key":"808_CR14","doi-asserted-by":"crossref","first-page":"829","DOI":"10.1088\/0253-6102\/54\/5\/10","volume":"54","author":"J Yang","year":"2010","unstructured":"Yang, J., Wang, C., Zhang, R.: Quantum secure direct communication with authentication expansion using single photons. Commun. Theor. Phys. 54, 829 (2010)","journal-title":"Commun. Theor. Phys."},{"key":"808_CR15","doi-asserted-by":"crossref","first-page":"1023","DOI":"10.1088\/0253-6102\/56\/6\/08","volume":"56","author":"CW Tsai","year":"2011","unstructured":"Tsai, C.W., Wei, T.S., Hwang, T.: One- way quantum authenticated secure communication using rotation operation. Commun. Theor. Phys. 56, 1023 (2011)","journal-title":"Commun. Theor. Phys."},{"key":"808_CR16","first-page":"125008","volume":"10","author":"ZW Sun","year":"2012","unstructured":"Sun, Z.W., Du, R.G., Long, D.Y.: Quantum secure direct communication with quantum identification. Int. J. Quantum Inf. 10, 125008 (2012)","journal-title":"Int. J. Quantum Inf."},{"key":"808_CR17","doi-asserted-by":"crossref","first-page":"060301","DOI":"10.1088\/0256-307X\/30\/6\/060301","volume":"30","author":"Y Chang","year":"2013","unstructured":"Chang, Y., Zhang, S.B., Yan, L.L., Sheng, Z.: A multiparty controlled bidirectional quantum secure direct communication and authentication protocol based on EPR pairs. Chin. Phys. Lett. 30, 060301 (2013)","journal-title":"Chin. Phys. Lett."},{"key":"808_CR18","doi-asserted-by":"crossref","first-page":"336","DOI":"10.1007\/s10773-012-1347-8","volume":"52","author":"YG Yang","year":"2013","unstructured":"Yang, Y.G., Tian, J., Xia, J., Zhang, H.: Quantum authenticated direct communication using Bell states. Int. J. Theor. Phys. 52, 336 (2013)","journal-title":"Int. J. Theor. Phys."},{"key":"808_CR19","doi-asserted-by":"crossref","first-page":"1937","DOI":"10.1007\/s10773-012-1336-y","volume":"52","author":"CH Yu","year":"2013","unstructured":"Yu, C.H., Guo, G.D., Lin, S.: Quantum secure direct communication with authentication using two nonorthogonal states. Int. J. Theor. Phys. 52, 1937 (2013)","journal-title":"Int. J. Theor. Phys."},{"key":"808_CR20","doi-asserted-by":"crossref","first-page":"524","DOI":"10.1007\/s10773-012-1356-7","volume":"52","author":"YG Yang","year":"2013","unstructured":"Yang, Y.G., Wang, H.Y., Jia, X., Zhang, H.: A quantum protocol for (t, n)-threshold identity authentication based on Greenberger\u2013Horne\u2013Zeilinger states. Int. J. Theor. Phys. 52, 524 (2013)","journal-title":"Int. J. Theor. Phys."},{"key":"808_CR21","doi-asserted-by":"crossref","first-page":"035008","DOI":"10.1088\/0031-8949\/87\/03\/035008","volume":"87","author":"S Lin","year":"2013","unstructured":"Lin, S., Huang, C., Liu, X.F.: Multi-user quantum key distribution based on Bell states with mutual authentication. Phys. Scr. 87, 035008 (2013)","journal-title":"Phys. Scr."},{"key":"808_CR22","doi-asserted-by":"crossref","first-page":"187902","DOI":"10.1103\/PhysRevLett.89.187902","volume":"89","author":"K Bostr\u00f6m","year":"2002","unstructured":"Bostr\u00f6m, K., Felbinger, T.: Deterministic secure direct communication using entanglement. Phys. Rev. Lett. 89, 187902 (2002)","journal-title":"Phys. Rev. Lett."},{"key":"808_CR23","doi-asserted-by":"crossref","first-page":"109801","DOI":"10.1103\/PhysRevLett.91.109801","volume":"91","author":"QY Cai","year":"2003","unstructured":"Cai, Q.Y.: The \u201cPing-Pong\u201d protocol can be attacked without eavesdropping. Phys. Rev. Lett. 91, 109801 (2003)","journal-title":"Phys. Rev. Lett."},{"key":"808_CR24","doi-asserted-by":"crossref","first-page":"054301","DOI":"10.1103\/PhysRevA.69.054301","volume":"69","author":"QY Cai","year":"2004","unstructured":"Cai, Q.Y., Li, B.W.: Improving the capacity of the Bostr\u00f6m\u2013Felbinger protocol. Phys. Rev. A 69, 054301 (2004)","journal-title":"Phys. Rev. A"},{"key":"808_CR25","doi-asserted-by":"crossref","first-page":"157901","DOI":"10.1103\/PhysRevLett.90.157901","volume":"90","author":"A Wojcik","year":"2003","unstructured":"Wojcik, A.: Eavesdropping on the \u201cping-pong\u201d quantum communication protocol. Phys. Rev. Lett. 90, 157901 (2003)","journal-title":"Phys. Rev. Lett."},{"key":"808_CR26","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1016\/j.physleta.2005.10.050","volume":"351","author":"QY Cai","year":"2006","unstructured":"Cai, Q.Y.: Eavesdropping on the two-way quantum communication protocols with invisible photons. Phys. Lett. A 351, 23 (2006)","journal-title":"Phys. Lett. A"},{"key":"808_CR27","doi-asserted-by":"crossref","unstructured":"Lucamarini, M., Mancini, S.: Secure deterministic communication without entanglement. Phys. Rev. Lett. 94, 140501 (2005)","DOI":"10.1103\/PhysRevLett.94.140501"},{"key":"808_CR28","doi-asserted-by":"crossref","first-page":"145","DOI":"10.1103\/RevModPhys.74.145","volume":"74","author":"N Gisin","year":"2002","unstructured":"Gisin, N., Ribordy, G., Tittel, W., Zbinden, H.: Quantum cryptography. Rev. Mod. Phys. 74, 145 (2002)","journal-title":"Rev. Mod. Phys."},{"key":"808_CR29","unstructured":"Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. In: International Conference of Computers in Systems and Signal Processing, Dec 1984, Bangalore, India (IEEE, New York 1984), p. 175 (1984)"},{"key":"808_CR30","first-page":"1354","volume":"49","author":"XH Li","year":"2006","unstructured":"Li, X.H., Deng, F.G., Li, C.Y., Liang, Y.J., Zhou, P., Zhou, H.Y.: Deterministic secure quantum communication without maximally entangled states. J. Kerean Phys. Soc. 49, 1354 (2006)","journal-title":"J. Kerean Phys. Soc."}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-014-0808-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11128-014-0808-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-014-0808-9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,14]],"date-time":"2019-08-14T01:08:26Z","timestamp":1565744906000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11128-014-0808-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,8,22]]},"references-count":30,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2014,11]]}},"alternative-id":["808"],"URL":"https:\/\/doi.org\/10.1007\/s11128-014-0808-9","relation":{},"ISSN":["1570-0755","1573-1332"],"issn-type":[{"value":"1570-0755","type":"print"},{"value":"1573-1332","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,8,22]]}}}