{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,3]],"date-time":"2025-08-03T22:52:18Z","timestamp":1754261538982},"reference-count":24,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2015,4,18]],"date-time":"2015-04-18T00:00:00Z","timestamp":1429315200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"published-print":{"date-parts":[[2015,6]]},"DOI":"10.1007\/s11128-015-0994-0","type":"journal-article","created":{"date-parts":[[2015,4,17]],"date-time":"2015-04-17T11:41:26Z","timestamp":1429270886000},"page":"2183-2193","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":20,"title":["A novel quantum deniable authentication protocol without entanglement"],"prefix":"10.1007","volume":"14","author":[{"given":"Wei-Min","family":"Shi","sequence":"first","affiliation":[]},{"given":"Jian-Biao","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Yi-Hua","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Yu-Guang","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,4,18]]},"reference":[{"key":"994_CR1","doi-asserted-by":"crossref","first-page":"149","DOI":"10.1103\/PhysRevA.60.149","volume":"60","author":"M Du\u0160ek","year":"1999","unstructured":"Du\u0160ek, M., Haderka, O., Hendrych, M., et al.: Quantum identification system. Phys. Rev. A 60, 149\u2013156 (1999)","journal-title":"Phys. Rev. A"},{"key":"994_CR2","doi-asserted-by":"crossref","first-page":"062309","DOI":"10.1103\/PhysRevA.64.062309","volume":"64","author":"M Curty","year":"2001","unstructured":"Curty, M., Santos, D.J.: Quantum authentication of classical messages. Phys. Rev. A 64, 062309 (2001)","journal-title":"Phys. Rev. A"},{"key":"994_CR3","doi-asserted-by":"crossref","first-page":"05236","DOI":"10.1103\/PhysRevA.65.052326","volume":"65","author":"T Mihara","year":"2002","unstructured":"Mihara, T.: Quantum identification schemes with entanglements. Phys. Rev. A 65, 05236 (2002)","journal-title":"Phys. Rev. A"},{"key":"994_CR4","doi-asserted-by":"crossref","first-page":"022303","DOI":"10.1103\/PhysRevA.61.022303","volume":"61","author":"GH Zeng","year":"2001","unstructured":"Zeng, G.H., Zhang, W.P.: Identity verification in quantum key distribution. Phys. Rev. A 61, 022303 (2001)","journal-title":"Phys. Rev. A"},{"key":"994_CR5","doi-asserted-by":"crossref","first-page":"022305","DOI":"10.1103\/PhysRevA.62.022305","volume":"62","author":"D Ljunggren","year":"2000","unstructured":"Ljunggren, D., Bourennane, M., Karlsson, A.: Authority-based user authentication in quantum key distribution. Phys. Rev. A 62, 022305 (2000)","journal-title":"Phys. Rev. A"},{"key":"994_CR6","doi-asserted-by":"crossref","first-page":"380","DOI":"10.1016\/j.optcom.2005.06.002","volume":"254","author":"NR Zhou","year":"2005","unstructured":"Zhou, N.R., Zeng, G.H., Zeng, W.J., et al.: Cross-center quantum identification scheme based on teleportation and entanglement swapping. Opt. Commun. 254, 380\u2013388 (2005)","journal-title":"Opt. Commun."},{"key":"994_CR7","doi-asserted-by":"crossref","first-page":"3382","DOI":"10.1016\/j.optcom.2009.05.036","volume":"282","author":"Tian-Yin Wang","year":"2009","unstructured":"Wang, Tian-Yin, Wen, Qiao-Yan, Zhu, Fu-Chen: Secure authentication of classical messages with decoherence-free states. Opt. Commun. 282, 3382\u20133385 (2009)","journal-title":"Opt. Commun."},{"key":"994_CR8","doi-asserted-by":"crossref","unstructured":"Ning, L.I., XinWei, Z.H.A., Qian, L.A.N.: Secure quantum report with authentication based on six-particle cluster state and entanglement swapping. SCIENCE CHINA Information Sciences (2012).doi: 10.1007\/s11432-012-4704-6","DOI":"10.1007\/s11432-012-4704-6"},{"key":"994_CR9","doi-asserted-by":"crossref","first-page":"592","DOI":"10.1007\/978-3-642-38348-9_35","volume":"7881","author":"Dan Boneh","year":"2013","unstructured":"Boneh, Dan, Zhandry, Mark: Quantum-secure message authentication codes. Lect. Notes Comput. Sci. 7881, 592\u2013608 (2013)","journal-title":"Lect. Notes Comput. Sci."},{"key":"994_CR10","doi-asserted-by":"crossref","first-page":"925","DOI":"10.1007\/s11128-013-0702-x","volume":"13","author":"Tzonelih Hwang","year":"2014","unstructured":"Hwang, Tzonelih, Luo, Yi-Ping, Yang, Chun-Wei, Lin, Tzu-Han: Quantum authencryption: one-step authenticated quantum secure direct communications for off-line communicants. Quantum Inf. Process 13, 925\u2013933 (2014)","journal-title":"Quantum Inf. Process"},{"key":"994_CR11","doi-asserted-by":"crossref","unstructured":"Aumann, Y., Rabin, M.: Authentication, enhanced security and error correcting codes. Crypto\u2019 98, Santa Barbara, CA, USA, LNCS 1462, pp. 299\u2013303. Springer, Berlin (1998)","DOI":"10.1007\/BFb0055736"},{"issue":"2","key":"994_CR12","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1049\/ip-cdt:20010207","volume":"148","author":"X Deng","year":"2001","unstructured":"Deng, X., Lee, C.H., Zhu, H.: Deniable authentication protocols. IEE Proc. Comput. Digit. Tech. Engl. 148(2), 101\u2013104 (2001)","journal-title":"IEE Proc. Comput. Digit. Tech. Engl."},{"key":"994_CR13","doi-asserted-by":"crossref","first-page":"1501","DOI":"10.1007\/s11128-014-0743-9","volume":"13","author":"Wei-Min Shi","year":"2014","unstructured":"Shi, Wei-Min, Zhou, Yi-Hua, Yang, Yu-Guang: Quantum deniable authentication protocol. Quantum Inf. Process 13, 1501\u20131510 (2014)","journal-title":"Quantum Inf. Process"},{"issue":"5","key":"994_CR14","doi-asserted-by":"crossref","first-page":"449","DOI":"10.1016\/j.csi.2003.11.001","volume":"26","author":"ZH Shao","year":"2004","unstructured":"Shao, Z.H.: Efficient deniable authentication protocol based on generalized ElGamal signature scheme. Comput. Stand. Interfaces 26(5), 449\u2013454 (2004)","journal-title":"Comput. Stand. Interfaces"},{"key":"994_CR15","doi-asserted-by":"crossref","first-page":"1376","DOI":"10.1016\/j.ins.2006.09.020","volume":"177","author":"WB Lee","year":"2007","unstructured":"Lee, W.B., Wu, C.C., Tsaur, W.J.: A novel deniable authentication protocol using generalized ElGamal signature scheme. Inf. Sci. 177, 1376\u20131381 (2007)","journal-title":"Inf. Sci."},{"key":"994_CR16","unstructured":"Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. In: Proceedings of IEEE international conference on computers systems and signal processing, Bangalore, India. New York: IEEE, pp. 175\u2013179 (1984)"},{"key":"994_CR17","doi-asserted-by":"crossref","first-page":"032302","DOI":"10.1103\/PhysRevA.65.032302","volume":"65","author":"GL Long","year":"2002","unstructured":"Long, G.L., Liu, X.S.: Theoretically efficient high-capacity quantum-key distribution scheme. Phys. Rev. A 65, 032302 (2002)","journal-title":"Phys. Rev. A"},{"key":"994_CR18","doi-asserted-by":"crossref","first-page":"042317","DOI":"10.1103\/PhysRevA.67.042317","volume":"67","author":"PO Boykin","year":"2003","unstructured":"Boykin, P.O., Roychowdhury, V.: Optimal encryption of quantum bits. Phys. Rev. A 67, 042317 (2003)","journal-title":"Phys. Rev. A"},{"key":"994_CR19","doi-asserted-by":"crossref","first-page":"3295","DOI":"10.1007\/s10773-013-1626-z","volume":"52","author":"X Zou","year":"2013","unstructured":"Zou, X., Qiu, D., Mateus, P.: Security analyses and improvement of arbitrated quantum signature with an untrusted arbitrator. Int. J. Theor. Phys. 52, 3295\u20133305 (2013)","journal-title":"Int. J. Theor. Phys."},{"issue":"3","key":"994_CR20","doi-asserted-by":"crossref","first-page":"773","DOI":"10.1140\/epjd\/e2010-10157-4","volume":"61","author":"Yu-Guang Yang","year":"2011","unstructured":"Yang, Yu-Guang, Zhou, Zheng, Teng, Yi-Wei, Wen, Qiao-Yan: Arbitrated quantum signature with an untrusted arbitrator. Eur. Phys. J. D 61(3), 773\u2013778 (2011)","journal-title":"Eur. Phys. J. D"},{"key":"994_CR21","unstructured":"Gottesman, D., Chuang, I.: Quantum digital signature. arXiv: quant-ph\/0105032 (2001)"},{"issue":"1","key":"994_CR22","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1049\/iet-ifs:20060124","volume":"1","author":"T Hwang","year":"2007","unstructured":"Hwang, T., Lee, K.C.: EPR quantum key distribution protocols with 100% qubit efficiency. IET Inf. Secur. 1(1), 43\u201345 (2007)","journal-title":"IET Inf. Secur."},{"issue":"10","key":"994_CR23","doi-asserted-by":"crossref","first-page":"1531","DOI":"10.1142\/S0129183109014576","volume":"20","author":"JH Chen","year":"2009","unstructured":"Chen, J.H., Lee, K.C., Hwang, T.: The enhancement of Zhou et al\u2019.s quantum secret sharing protocol. Int. J. Mod. Phys. C 20(10), 1531\u20131535 (2009)","journal-title":"Int. J. Mod. Phys. C"},{"issue":"6","key":"994_CR24","doi-asserted-by":"crossref","first-page":"1602","DOI":"10.1109\/JSTQE.2009.2019617","volume":"15","author":"HC Shih","year":"2009","unstructured":"Shih, H.C., Lee, K.C., Hwang, T.: New efficient three-party quantum key distribution protocols. IEEE J. Sel. Top. Quantum Electron. 15(6), 1602\u20131606 (2009)","journal-title":"IEEE J. Sel. Top. Quantum Electron."}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-015-0994-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11128-015-0994-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-015-0994-0","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,23]],"date-time":"2019-08-23T17:07:58Z","timestamp":1566580078000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11128-015-0994-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,4,18]]},"references-count":24,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2015,6]]}},"alternative-id":["994"],"URL":"https:\/\/doi.org\/10.1007\/s11128-015-0994-0","relation":{},"ISSN":["1570-0755","1573-1332"],"issn-type":[{"value":"1570-0755","type":"print"},{"value":"1573-1332","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,4,18]]}}}