{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,16]],"date-time":"2026-01-16T07:38:49Z","timestamp":1768549129398,"version":"3.49.0"},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"8","license":[{"start":{"date-parts":[[2015,5,23]],"date-time":"2015-05-23T00:00:00Z","timestamp":1432339200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"published-print":{"date-parts":[[2015,8]]},"DOI":"10.1007\/s11128-015-1013-1","type":"journal-article","created":{"date-parts":[[2015,5,22]],"date-time":"2015-05-22T07:04:13Z","timestamp":1432278253000},"page":"3031-3040","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["Quantum oblivious transfer with relaxed constraints on the receiver"],"prefix":"10.1007","volume":"14","author":[{"given":"Yu-Guang","family":"Yang","sequence":"first","affiliation":[]},{"given":"Rui","family":"Yang","sequence":"additional","affiliation":[]},{"given":"He","family":"Lei","sequence":"additional","affiliation":[]},{"given":"Wei-Min","family":"Shi","sequence":"additional","affiliation":[]},{"given":"Yi-Hua","family":"Zhou","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,5,23]]},"reference":[{"key":"1013_CR1","unstructured":"Bennett, C.H., Brassard, G.: Quantum cryptography: public-key distribution and coin tossing. In: Proceedings of the IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, India, pp. 175\u2013179. IEEE Press, New York (1984)"},{"key":"1013_CR2","doi-asserted-by":"crossref","first-page":"3414","DOI":"10.1103\/PhysRevLett.78.3414","volume":"78","author":"D Mayers","year":"1997","unstructured":"Mayers, D.: Unconditional secure quantum bit commitment is impossible. Phys. Rev. Lett. 78, 3414\u20133417 (1997)","journal-title":"Phys. Rev. Lett."},{"key":"1013_CR3","doi-asserted-by":"crossref","first-page":"3410","DOI":"10.1103\/PhysRevLett.78.3410","volume":"78","author":"HK Lo","year":"1997","unstructured":"Lo, H.K., Chau, H.F.: Is quantum bit commitment really possible? Phys. Rev. Lett. 78, 3410\u20133413 (1997)","journal-title":"Phys. Rev. Lett."},{"key":"1013_CR4","doi-asserted-by":"crossref","unstructured":"Mayers, D., Salvail, L.: Quantum oblivious transfer is secure against all individual measurements. In: Proceedings of the Third Workshop on Physics and Computation\u2013PhysComp \u201994, p. 69. IEEE Computer Society Press, Dallas (1994)","DOI":"10.1109\/PHYCMP.1994.363696"},{"key":"1013_CR5","doi-asserted-by":"crossref","unstructured":"He, G.P.: Secure quantum weak oblivious transfer against individual measurements. Quantum Inf. Process. doi: 10.1007\/s11128-015-0970-8","DOI":"10.1007\/s11128-015-0970-8"},{"key":"1013_CR6","first-page":"1541","volume":"56","author":"HK Lo","year":"1997","unstructured":"Lo, H.K.: Insecurity of quantum secure computations. Phys. Rev. A 56, 1541\u20131162 (1997)","journal-title":"Phys. Rev. A"},{"key":"1013_CR7","unstructured":"Rabin, M.O.: How to exchange secrets by oblivious transfer. Technical Report TR-81, Harvard Aiken Computational Laboratory (1981)"},{"issue":"6","key":"1013_CR8","doi-asserted-by":"crossref","first-page":"637","DOI":"10.1145\/3812.3818","volume":"28","author":"S Even","year":"1985","unstructured":"Even, S., Goldreich, O., Lempel, A.: A randomized protocol for signing contracts. Commun. ACM 28(6), 637\u2013647 (1985)","journal-title":"Commun. ACM"},{"key":"1013_CR9","doi-asserted-by":"crossref","first-page":"012331","DOI":"10.1103\/PhysRevA.73.012331","volume":"73","author":"GP He","year":"2006","unstructured":"He, G.P., Wang, Z.D.: Oblivious transfer using quantum entanglement. Phys. Rev. A 73, 012331 (2006)","journal-title":"Phys. Rev. A"},{"issue":"3","key":"1013_CR10","doi-asserted-by":"crossref","first-page":"035005","DOI":"10.1088\/0031-8949\/78\/03\/035005","volume":"78","author":"IC Chen","year":"2008","unstructured":"Chen, I.C., Hwang, T., Li, C.M.: Efficient one-out-of-two quantum oblivious transfer based on four-coherent-state postselection protocol. Phys. Scr. 78(3), 035005 (2008)","journal-title":"Phys. Scr."},{"issue":"18","key":"1013_CR11","doi-asserted-by":"crossref","first-page":"5409","DOI":"10.1016\/j.ijleo.2014.06.023","volume":"125","author":"YG Yang","year":"2014","unstructured":"Yang, Y.G., Xu, P., Sun, S.J., et al.: Quantum oblivious transfer with an untrusted third party. Optik-Int. J. Light Electron Optics 125(18), 5409\u20135413 (2014)","journal-title":"Optik-Int. J. Light Electron Optics"},{"issue":"3","key":"1013_CR12","doi-asserted-by":"crossref","first-page":"910","DOI":"10.1007\/s10773-014-2286-3","volume":"54","author":"Y-G Yang","year":"2015","unstructured":"Yang, Y.-G., Sun, S.-J., Wang, Y.: Quantum oblivious transfer based on a quantum symmetrically private information retrieval protocol. Int. J. Theor. Phys. 54(3), 910\u2013916 (2015)","journal-title":"Int. J. Theor. Phys."},{"key":"1013_CR13","doi-asserted-by":"crossref","first-page":"131","DOI":"10.1007\/s11128-013-0550-8","volume":"13","author":"YB Li","year":"2014","unstructured":"Li, Y.B., Wen, Q.Y., Qin, S., Guo, F.-Z., Sun, Y.: Practical quantum all-or-nothing oblivious transfer protocol. Quantum Inf. Process. 13, 131\u2013139 (2014)","journal-title":"Quantum Inf. Process."},{"key":"1013_CR14","doi-asserted-by":"crossref","unstructured":"Bennett, C.H., Brassard, G., Cr\u00e9peau, C., Skubiszewska, M.H.: Practical quantum oblivious transfer. In: Proceedings of the Advances in Cryptology-Crypto\u201990, pp. 351\u2013366. Springer, Berlin (1991)","DOI":"10.1007\/3-540-46766-1_29"},{"key":"1013_CR15","doi-asserted-by":"crossref","unstructured":"Damgard, I., Fehr, S., Salvail, L., Schaffner, C.: Cryptography in the bounded quantum-storage model. In: Proceedings of 46th Annual IEEE Symposium on Foundations of Computer Science, FOCS 2005, pp. 449\u2013458. IEEE (2005)","DOI":"10.1109\/SFCS.2005.30"},{"key":"1013_CR16","doi-asserted-by":"crossref","first-page":"098902","DOI":"10.1103\/PhysRevLett.102.098902","volume":"102","author":"M Boyer","year":"2009","unstructured":"Boyer, M., Kenigsberg, D., Mor, T.: Comment on \u201cQuantum key distribution with classical Bob\u201d reply. Phys. Rev. Lett. 102, 098902 (2009)","journal-title":"Phys. Rev. Lett."},{"key":"1013_CR17","doi-asserted-by":"crossref","first-page":"140501","DOI":"10.1103\/PhysRevLett.99.140501","volume":"99","author":"M Boyer","year":"2007","unstructured":"Boyer, M., Kenigsberg, D., Mor, T.: Quantum key distribution with classical Bob. Phys. Rev. Lett. 99, 140501 (2007)","journal-title":"Phys. Rev. Lett."},{"key":"1013_CR18","doi-asserted-by":"crossref","first-page":"032341","DOI":"10.1103\/PhysRevA.79.032341","volume":"79","author":"M Boyer","year":"2009","unstructured":"Boyer, M., Gelles, R., Kenigsberg, D., Mor, T.: Semiquantum key distribution. Phys. Rev. A 79, 032341 (2009)","journal-title":"Phys. Rev. A"},{"key":"1013_CR19","first-page":"329","volume":"7","author":"F Gao","year":"2007","unstructured":"Gao, F., Qin, S.J., Wen, Q.Y., Zhu, F.C.: A simple participant attack on the Bradler-Dusek protocol. Quantum Inf. Comput. 7, 329 (2007)","journal-title":"Quantum Inf. Comput."},{"key":"1013_CR20","doi-asserted-by":"crossref","first-page":"062324","DOI":"10.1103\/PhysRevA.76.062324","volume":"76","author":"SJ Qin","year":"2007","unstructured":"Qin, S.J., Gao, F., Wen, Q.Y., Zhu, F.C.: Cryptanalysis of the Hillery-Buzek-Berthiaume quantum secret-sharing protocol. Phys. Rev. A 76, 062324 (2007)","journal-title":"Phys. Rev. A"},{"key":"1013_CR21","doi-asserted-by":"crossref","first-page":"036301","DOI":"10.1103\/PhysRevA.76.036301","volume":"76","author":"S Lin","year":"2007","unstructured":"Lin, S., Gao, F., Guo, F.Z., Wen, Q.Y., Zhu, F.C.: Comment on \u201cMultiparty quantum secret sharing of classical messages based on entanglement swapping\u201d. Phys. Rev. A 76, 036301 (2007)","journal-title":"Phys. Rev. A"},{"key":"1013_CR22","doi-asserted-by":"crossref","first-page":"748","DOI":"10.1016\/j.physleta.2006.08.016","volume":"360","author":"F Gao","year":"2007","unstructured":"Gao, F., Wen, Q.Y., Zhu, F.C.: Comment on: \u201cQuantum exam\u201d [Phys. Lett. A 350 (2006) 174]. Phys. Lett. A 360, 748\u2013750 (2007)","journal-title":"Phys. Lett. A"},{"key":"1013_CR23","doi-asserted-by":"crossref","first-page":"208901","DOI":"10.1103\/PhysRevLett.101.208901","volume":"101","author":"F Gao","year":"2008","unstructured":"Gao, F., Guo, F.Z., Wen, Q.Y., Zhu, F.C.: Comment on \u201cExperimental demonstration of a quantum protocol for Byzantine agreement and liar detection\u201d. Phys. Rev. Lett. 101, 208901 (2008)","journal-title":"Phys. Rev. Lett."},{"issue":"4","key":"1013_CR24","doi-asserted-by":"crossref","first-page":"1333","DOI":"10.1088\/1674-1056\/18\/4\/007","volume":"18","author":"TT Song","year":"2009","unstructured":"Song, T.T., Zhang, J., Gao, F., Wen, Q.Y., Zhu, F.C.: Participant attack on quantum secret sharing based on entanglement swapping. Chin. Phys. B 18(4), 1333\u20131337 (2009)","journal-title":"Chin. Phys. B"},{"key":"1013_CR25","doi-asserted-by":"crossref","first-page":"192","DOI":"10.1016\/j.optcom.2009.09.047","volume":"283","author":"F Gao","year":"2010","unstructured":"Gao, F., Qin, S.J., Wen, Q.Y., Zhu, F.C.: Cryptanalysis of multiparty controlled quantum secure direct communication using Greenberger-Horne-Zeilinger state. Opt. Commun. 283, 192\u2013195 (2010)","journal-title":"Opt. Commun."},{"key":"1013_CR26","doi-asserted-by":"crossref","first-page":"445","DOI":"10.1140\/epjd\/e2009-00306-3","volume":"56","author":"FZ Guo","year":"2010","unstructured":"Guo, F.Z., Qin, S.J., Gao, F., Lin, S., Wen, Q.Y., Zhu, F.C.: Participant attack on a kind of MQSS schemes based on entanglement swapping. Eur. Phys. J. D 56, 445\u2013448 (2010)","journal-title":"Eur. Phys. J. D"},{"key":"1013_CR27","doi-asserted-by":"crossref","first-page":"395","DOI":"10.1007\/s10773-010-0543-7","volume":"50","author":"Y-G Yang","year":"2011","unstructured":"Yang, Y.-G., Chai, H.-P., Teng, Y.-W., Wen, Q.-Y.: Improving the security of controlled quantum secure direct communication by using four particle cluster states against an attack with fake entangled particles. Int. J. Theor. Phys. 50, 395\u2013400 (2011)","journal-title":"Int. J. Theor. Phys."},{"key":"1013_CR28","volume-title":"Quantum Detection and Estimation Theory","author":"CW Helstrom","year":"1976","unstructured":"Helstrom, C.W.: Quantum Detection and Estimation Theory. Academic, New York (1976)"},{"key":"1013_CR29","doi-asserted-by":"crossref","unstructured":"Di Crescenzo, G., Malkin, T., Ostrovsky, R.: Single database private information retrieval implies oblivious transfer. In: Advances in Cryptology: Proceedings of Eurocrypt\u201900, pp. 122\u2013138 (2000)","DOI":"10.1007\/3-540-45539-6_10"},{"key":"1013_CR30","doi-asserted-by":"crossref","unstructured":"Kilian, J.: Founding cryptography on oblivious transfer. In: Proceedings of 20th Annual ACM Symposium on the Theory of Computing (Chicago, IL, 1988), pp. 20\u201331. ACM Press, New York (1988)","DOI":"10.1145\/62212.62215"},{"key":"1013_CR31","doi-asserted-by":"crossref","first-page":"805","DOI":"10.1007\/s11128-013-0692-8","volume":"13","author":"Y-G Yang","year":"2014","unstructured":"Yang, Y.-G., Sun, S.-J., Xu, P., Tian, J.: Flexible protocol for quantum private query based on B92 protocol. Quantum Inf. Process. 13, 805\u2013813 (2014)","journal-title":"Quantum Inf. Process."},{"key":"1013_CR32","doi-asserted-by":"crossref","first-page":"5538","DOI":"10.1016\/j.ijleo.2014.06.084","volume":"125","author":"Y-G Yang","year":"2014","unstructured":"Yang, Y.-G., Sun, S.-J., Tian, J., Xu, P.: Secure quantum private query with real-time security check. Optik-Int. J. Light Electron Optics 125, 5538\u20135541 (2014)","journal-title":"Optik-Int. J. Light Electron Optics"},{"key":"1013_CR33","doi-asserted-by":"crossref","first-page":"1017","DOI":"10.1007\/s11128-014-0902-z","volume":"14","author":"Y-G Yang","year":"2015","unstructured":"Yang, Y.-G., Zhang, M.O., Yang, R.: Private database queries using one quantum state. Quantum Inf. Process. 14, 1017\u20131024 (2015)","journal-title":"Quantum Inf. Process."},{"key":"1013_CR34","doi-asserted-by":"crossref","first-page":"1443","DOI":"10.1007\/s11128-015-0937-9","volume":"14","author":"S-J Sun","year":"2015","unstructured":"Sun, S.-J., Yang, Y.-G., Zhang, M.O.: Relativistic quantum private database queries. Quantum Inf. Process. 14, 1443\u20131450 (2015)","journal-title":"Quantum Inf. Process."}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-015-1013-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11128-015-1013-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-015-1013-1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,28]],"date-time":"2025-05-28T02:15:24Z","timestamp":1748398524000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11128-015-1013-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,5,23]]},"references-count":34,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2015,8]]}},"alternative-id":["1013"],"URL":"https:\/\/doi.org\/10.1007\/s11128-015-1013-1","relation":{},"ISSN":["1570-0755","1573-1332"],"issn-type":[{"value":"1570-0755","type":"print"},{"value":"1573-1332","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,5,23]]}}}