{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,3]],"date-time":"2022-04-03T13:53:15Z","timestamp":1648993995110},"reference-count":37,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2014,12,24]],"date-time":"2014-12-24T00:00:00Z","timestamp":1419379200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"published-print":{"date-parts":[[2015,3]]},"DOI":"10.1007\/s11128-014-0901-0","type":"journal-article","created":{"date-parts":[[2014,12,23]],"date-time":"2014-12-23T11:00:25Z","timestamp":1419332425000},"page":"989-1003","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Controlled probabilistic quantum key distribution using a ground state"],"prefix":"10.1007","volume":"14","author":[{"given":"Lin-Lin","family":"Liu","sequence":"first","affiliation":[]},{"given":"Tzonelih","family":"Hwang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,12,24]]},"reference":[{"key":"901_CR1","unstructured":"Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing (invited paper). In: Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, India, pp. 175\u2013179 (1984)"},{"key":"901_CR2","doi-asserted-by":"crossref","first-page":"3121","DOI":"10.1103\/PhysRevLett.68.3121","volume":"68","author":"CH Bennett","year":"1992","unstructured":"Bennett, C.H.: Quantum cryptography using any two non-orthogonal states. Phys. Rev. Lett. 68, 3121\u20133124 (1992)","journal-title":"Phys. Rev. Lett."},{"issue":"14","key":"901_CR3","doi-asserted-by":"crossref","first-page":"3018","DOI":"10.1103\/PhysRevLett.81.3018","volume":"81","author":"D Bruss","year":"1998","unstructured":"Bruss, D.: Optimal eavesdropping in quantum cryptography with six states. Phys. Rev. Lett. 81(14), 3018\u20133021 (1998)","journal-title":"Phys. Rev. Lett."},{"key":"901_CR4","doi-asserted-by":"crossref","first-page":"032302","DOI":"10.1103\/PhysRevA.65.032302","volume":"65","author":"GL Long","year":"2002","unstructured":"Long, G.L., Liu, X.S.: Theoretically efficient high-capacity quantum key distribution scheme. Phys. Rev. A 65, 032302 (2002)","journal-title":"Phys. Rev. A"},{"key":"901_CR5","doi-asserted-by":"crossref","first-page":"661","DOI":"10.1103\/PhysRevLett.67.661","volume":"67","author":"AK Ekert","year":"1991","unstructured":"Ekert, A.K.: Quantum cryptography based on Bell\u2019s theorem. Phys. Rev. Lett. 67, 661\u2013663 (1991)","journal-title":"Phys. Rev. Lett."},{"issue":"5","key":"901_CR6","doi-asserted-by":"crossref","first-page":"820","DOI":"10.1088\/0253-6102\/51\/5\/12","volume":"51","author":"G Gan","year":"2009","unstructured":"Gan, G.: Quantum key distribution scheme with high efficiency. Commun. Theor. Phys. 51(5), 820\u2013822 (2009)","journal-title":"Commun. Theor. Phys."},{"issue":"2","key":"901_CR7","doi-asserted-by":"crossref","first-page":"155","DOI":"10.1088\/1464-4266\/5\/2\/306","volume":"5","author":"C Li","year":"2003","unstructured":"Li, C., Song, H.S., Zhou, L., Wu, C.F.: A random quantum key distribution achieved by using Bell states. J. Opt. B Quantum Semiclass. Opt. 5(2), 155\u2013157 (2003)","journal-title":"J. Opt. B Quantum Semiclass. Opt."},{"issue":"3","key":"901_CR8","doi-asserted-by":"crossref","first-page":"034301","DOI":"10.1103\/PhysRevA.69.034301","volume":"69","author":"D Song","year":"2004","unstructured":"Song, D.: Secure key distribution by swapping quantum entanglement. Phys. Rev. A 69(3), 034301 (2004)","journal-title":"Phys. Rev. A"},{"key":"901_CR9","doi-asserted-by":"crossref","unstructured":"Ma, X.F., Qi, B., Zhao, Y., Lo, H.K.: Practical decoy state for quantum key distribution (2005). arXiv:quant-ph\/0503005v5","DOI":"10.1103\/PhysRevA.72.012326"},{"key":"901_CR10","doi-asserted-by":"crossref","first-page":"042317","DOI":"10.1103\/PhysRevA.68.042317","volume":"68","author":"FG Deng","year":"2003","unstructured":"Deng, F.G., Long, G.L., Liu, X.S.: Two-step quantum direct communication protocol using the Einstein\u2013Podolsky\u2013Rosen pair block. Phys. Rev. A 68, 042317 (2003)","journal-title":"Phys. Rev. A"},{"key":"901_CR11","doi-asserted-by":"crossref","first-page":"042315","DOI":"10.1103\/PhysRevA.68.042315","volume":"68","author":"FG Deng","year":"2003","unstructured":"Deng, F.G., Long, G.L.: Controlled order rearrangement encryption for quantum key distribution. Phys. Rev. A 68, 042315 (2003)","journal-title":"Phys. Rev. A"},{"key":"901_CR12","doi-asserted-by":"crossref","unstructured":"Biham, E., Boyer, M., Boykin, P.O., Mor, T., Roychowdhury, V.: A proof of the security of quantum key distribution. In: Proceedings of the Thirty-second Annual ACM Symposium on Theory of Computing, Portland, Oregon, USA, pp. 715\u2013724 (2000)","DOI":"10.1145\/335305.335406"},{"issue":"2","key":"901_CR13","doi-asserted-by":"crossref","first-page":"457","DOI":"10.1109\/TIT.2002.807289","volume":"49","author":"D Gottesman","year":"2003","unstructured":"Gottesman, D., Lo, H.K.: Proof of security of quantum key distribution with two-way classical communications. IEEE Trans. Inf. Theory 49(2), 457\u2013475 (2003)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"901_CR14","doi-asserted-by":"crossref","first-page":"2050","DOI":"10.1126\/science.283.5410.2050","volume":"283","author":"HK Lo","year":"1999","unstructured":"Lo, H.K., Chau, H.F.: Unconditional security of quantum key distribution over arbitrarily long distances. Science 283, 2050\u20132056 (1999)","journal-title":"Science"},{"key":"901_CR15","doi-asserted-by":"crossref","first-page":"351","DOI":"10.1145\/382780.382781","volume":"48","author":"D Mayers","year":"2001","unstructured":"Mayers, D.: Unconditional security in quantum cryptography. J. ACM 48, 351\u2013406 (2001)","journal-title":"J. ACM"},{"key":"901_CR16","doi-asserted-by":"crossref","first-page":"230504","DOI":"10.1103\/PhysRevLett.94.230504","volume":"94","author":"HK Lo","year":"2005","unstructured":"Lo, H.K., Ma, X., Chen, K.: Decoy state quantum key distribution. Phys. Rev. Lett. 94, 230504 (2005)","journal-title":"Phys. Rev. Lett."},{"key":"901_CR17","doi-asserted-by":"crossref","unstructured":"Ben-Or, M., Horodecki, M., Leung, D.W., Mayers, D., Oppenheim, J.: The universal composable security of quantum key distribution. In: Proceedings of the 2nd Theory of Cryptography Conference, Lecture Notes in Computer Science\/Security and Cryptology, vol. 3378, Cambridge, MA, USA, pp. 386\u2013406 (2005)","DOI":"10.1007\/978-3-540-30576-7_21"},{"issue":"7\u20138","key":"901_CR18","first-page":"615","volume":"11","author":"T Hwang","year":"2011","unstructured":"Hwang, T., Tsai, C.-W., Chong, S.-K.: Probabilistic quantum key distribution. Quantum Inf. Comput. 11(7\u20138), 615\u2013637 (2011)","journal-title":"Quantum Inf. Comput."},{"issue":"6","key":"901_CR19","doi-asserted-by":"crossref","first-page":"1192","DOI":"10.1016\/j.optcom.2009.11.007","volume":"283","author":"SK Chong","year":"2010","unstructured":"Chong, S.K., Hwang, T.: Quantum key agreement protocol based on BB84. Opt. Commun. 283(6), 1192\u20131195 (2010)","journal-title":"Opt. Commun."},{"issue":"6","key":"901_CR20","doi-asserted-by":"crossref","first-page":"1793","DOI":"10.1007\/s10773-011-0691-4","volume":"50","author":"SK Chong","year":"2011","unstructured":"Chong, S.K., Tsai, C.W., Hwang, T.: Improvement on \u201cquantum key agreement protocol with maximally entangled states\u201d. Int. J. Theor. Phys. 50(6), 1793\u20131802 (2011)","journal-title":"Int. J. Theor. Phys."},{"key":"901_CR21","unstructured":"Hsueh, C.C., Chen, C.Y.: Quantum key agreement protocol with maximally entangled states. In: Proceedings of the 14th Information Security Conference (ISC 2004), National Taiwan University of Science and Technology, Taipei, Taiwan, pp. 236\u2013242 (2004)"},{"key":"901_CR22","unstructured":"Tsai, C.W., Chong, S.K., Hwang, T.: Comment on quantum key agreement protocol with maximally entangled states. In: Proceedings of the 20th Cryptology and Information Security Conference (CISC 2010), National Chiao Tung University, Hsinchu, Taiwan, pp. 210\u2013213 (2010)"},{"key":"901_CR23","unstructured":"Tsai, C.W., Hwang, T.: On \u201cquantum key agreement protocol\u201d. Technical Report, C-S-I-E, NCKU. R.O.C, Taiwan (2009)"},{"issue":"18","key":"901_CR24","doi-asserted-by":"crossref","first-page":"1149","DOI":"10.1049\/el:20045183","volume":"40","author":"N Zhou","year":"2004","unstructured":"Zhou, N., Zeng, G., Xiong, J.: Quantum key agreement protocol. Electron. Lett. 40(18), 1149\u20131150 (2004)","journal-title":"Electron. Lett."},{"key":"901_CR25","doi-asserted-by":"crossref","first-page":"477","DOI":"10.1007\/BF01218021","volume":"115","author":"I Affleck","year":"1988","unstructured":"Affleck, I., Kennedy, T., Lieb, E.H., Tasaki, H.: Valence bond ground states in isotropic quantum antiferromagnets. Commun. Math. Phys. 115, 477\u2013528 (1988)","journal-title":"Commun. Math. Phys."},{"key":"901_CR26","author":"LL Liu","year":"2014","unstructured":"Liu, L.L., Hwang, T.: Controlled remote state preparation protocols via AKLT states. Quantum Inf. Process (2014). doi: 10.1007\/s11128-014-0757-3","journal-title":"Quantum Inf. Process"},{"key":"901_CR27","doi-asserted-by":"crossref","first-page":"220501","DOI":"10.1103\/PhysRevLett.102.220501","volume":"102","author":"X Chen","year":"2009","unstructured":"Chen, X., Zeng, B., Gu, Z.C., Yoshida, B., Chuang, I.L.: Gapped two-body Hamiltonian whose unique ground state is universal for one-way quantum computation. Phys. Rev. Lett. 102, 220501 (2009)","journal-title":"Phys. Rev. Lett."},{"key":"901_CR28","doi-asserted-by":"crossref","first-page":"042307","DOI":"10.1103\/PhysRevA.63.042307","volume":"63","author":"J Kempe","year":"2001","unstructured":"Kempe, J., Bacon, D., Lidar, D.A., Whaley, K.B.: Theory of decoherence-free fault-tolerant universal quantum computation. Phys. Rev. A 63, 042307 (2001)","journal-title":"Phys. Rev. A"},{"key":"901_CR29","doi-asserted-by":"crossref","first-page":"4113","DOI":"10.1016\/j.optcom.2010.06.016","volume":"283","author":"BA Nguyen","year":"2010","unstructured":"Nguyen, B.A.: Joint remote state preparation via W and W-type states. Opt. Commun. 283, 4113\u20134117 (2010)","journal-title":"Opt. Commun."},{"key":"901_CR30","doi-asserted-by":"crossref","first-page":"012328","DOI":"10.1103\/PhysRevA.82.012328","volume":"82","author":"AS Darmawan","year":"2010","unstructured":"Darmawan, A.S., Bartlett, S.D.: Optical spin-1 chain and its use as a quantum-computational wire. Phys. Rev. A 82, 012328 (2010)","journal-title":"Phys. Rev. A"},{"key":"901_CR31","doi-asserted-by":"crossref","first-page":"850","DOI":"10.1038\/nphys1777","volume":"6","author":"R Kaltenbaek","year":"2010","unstructured":"Kaltenbaek, R., Lavoie, J., Zeng, B., Bartlett, S.D., Resch, K.J.: Optical one-way quantum computing with a simulated valence-bond solid. Nat. Phys. let. 6, 850\u2013854 (2010)","journal-title":"Nat. Phys. let."},{"key":"901_CR32","doi-asserted-by":"crossref","first-page":"080502","DOI":"10.1103\/PhysRevLett.105.080502","volume":"105","author":"JG Coello","year":"2010","unstructured":"Coello, J.G., Bayat, A., Bose, S., Jefferson, J.H., Creffield, C.E.: Spin filtering and entanglement swapping through coherent evolution of a single quantum dot. Phys. Rev. Lett. 105, 080502 (2010)","journal-title":"Phys. Rev. Lett."},{"key":"901_CR33","doi-asserted-by":"crossref","first-page":"227203","DOI":"10.1103\/PhysRevLett.93.227203","volume":"93","author":"H Fan","year":"2004","unstructured":"Fan, H., Korepin, V., Roychowdhury, V.: Entanglement in a valence-bond solid state. Phys. Rev. Lett. 93, 227203 (2004)","journal-title":"Phys. Rev. Lett."},{"issue":"5","key":"901_CR34","doi-asserted-by":"crossref","first-page":"1561","DOI":"10.1088\/0256-307X\/25\/5\/011","volume":"25","author":"F Gao","year":"2008","unstructured":"Gao, F., Lin, S., Wen, Q.Y., Zhu, F.C.: A special eavesdropping on one-sender versus n-receiver QSDC protocol. Chin. Phys. Lett. 25(5), 1561\u20131563 (2008)","journal-title":"Chin. Phys. Lett."},{"issue":"13","key":"901_CR35","doi-asserted-by":"crossref","first-page":"2656","DOI":"10.1016\/j.optcom.2009.03.050","volume":"282","author":"SJ Qin","year":"2009","unstructured":"Qin, S.J., Wen, Q.Y., Meng, L.M., Zhu, F.C.: Comment on \u201cControlled DSQC using five-qubit entangled states and two-step security test\u201d. Opt. Commun. 282(13), 2656\u20132658 (2009)","journal-title":"Opt. Commun."},{"issue":"1","key":"901_CR36","doi-asserted-by":"crossref","first-page":"192","DOI":"10.1016\/j.optcom.2009.09.047","volume":"283","author":"G Gao","year":"2010","unstructured":"Gao, G., Qin, S.J., Wen, Q.Y., Zhu, F.C.: Cryptanalysis of multiparty controlled quantum secure direct communication using Greenberger\u2013Horne\u2013Zeilinger state. Opt. Commun. 283(1), 192\u2013195 (2010)","journal-title":"Opt. Commun."},{"key":"901_CR37","volume-title":"Quantum Computation and Quantum Information","author":"MA Nielsen","year":"2000","unstructured":"Nielsen, M.A., Chuang, I.L.: Quantum Computation and Quantum Information. Cambridge University Press, Cambridge (2000)"}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-014-0901-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11128-014-0901-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-014-0901-0","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,18]],"date-time":"2019-08-18T19:10:10Z","timestamp":1566155410000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11128-014-0901-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,12,24]]},"references-count":37,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2015,3]]}},"alternative-id":["901"],"URL":"https:\/\/doi.org\/10.1007\/s11128-014-0901-0","relation":{},"ISSN":["1570-0755","1573-1332"],"issn-type":[{"value":"1570-0755","type":"print"},{"value":"1573-1332","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,12,24]]}}}