{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,24]],"date-time":"2025-12-24T12:40:23Z","timestamp":1766580023940},"reference-count":72,"publisher":"Springer Science and Business Media LLC","issue":"12","license":[{"start":{"date-parts":[[2015,10,8]],"date-time":"2015-10-08T00:00:00Z","timestamp":1444262400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"published-print":{"date-parts":[[2015,12]]},"DOI":"10.1007\/s11128-015-1140-8","type":"journal-article","created":{"date-parts":[[2015,10,8]],"date-time":"2015-10-08T16:02:20Z","timestamp":1444320140000},"page":"4631-4650","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":16,"title":["Probabilistic authenticated quantum dialogue"],"prefix":"10.1007","volume":"14","author":[{"given":"Tzonelih","family":"Hwang","sequence":"first","affiliation":[]},{"given":"Yi-Ping","family":"Luo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,10,8]]},"reference":[{"issue":"1","key":"1140_CR1","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1016\/j.physleta.2004.06.009","volume":"328","author":"BA Nguyen","year":"2004","unstructured":"Nguyen, B.A.: Quantum dialogue. Phys. Lett. A 328(1), 6\u201310 (2004)","journal-title":"Phys. Lett. A"},{"issue":"10","key":"1140_CR2","doi-asserted-by":"crossref","first-page":"777","DOI":"10.1103\/PhysRev.47.777","volume":"47","author":"A Einstein","year":"1935","unstructured":"Einstein, A., Podolsky, P., Rosen, S.: Can quantum-mechanical description of physical reality be considered complete? Phys. Rev. 47(10), 777\u2013780 (1935)","journal-title":"Phys. Rev."},{"issue":"1","key":"1140_CR3","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1088\/0256-307X\/22\/1\/007","volume":"22","author":"ZX Man","year":"2005","unstructured":"Man, Z.X., Zhang, Z.J., Li, Y.: Quantum dialogue revisited. Chin. Phys. Lett. 22(1), 22\u201324 (2005)","journal-title":"Chin. Phys. Lett."},{"issue":"7","key":"1140_CR4","doi-asserted-by":"crossref","first-page":"1418","DOI":"10.1088\/1009-1963\/15\/7\/005","volume":"15","author":"X Ji","year":"2006","unstructured":"Ji, X., Zhang, S.: Secure quantum dialogue based on single-photon. Chin. Phys. 15(7), 1418\u20131420 (2006)","journal-title":"Chin. Phys."},{"issue":"1\u20132","key":"1140_CR5","doi-asserted-by":"crossref","first-page":"67","DOI":"10.1016\/j.physleta.2006.01.035","volume":"354","author":"XR Jin","year":"2006","unstructured":"Jin, X.R., Ji, X., Zhang, Y.Q., Zhang, S., Hong, S.K., Yeon, K.H., Um, C.I.: Three-party quantum secure direct communication based on GHZ states. Phys. Lett. A 354(1\u20132), 67\u201370 (2006)","journal-title":"Phys. Lett. A"},{"issue":"18","key":"1140_CR6","doi-asserted-by":"crossref","first-page":"3855","DOI":"10.1088\/0953-4075\/39\/18\/015","volume":"39","author":"ZX Man","year":"2006","unstructured":"Man, Z.X., Xia, Y.J., An, N.B.: Quantum secure direct communication by using GHZ states and entanglement swapping. J. Phys. B: At. Mol. Opt. Phys. 39(18), 3855\u20133863 (2006)","journal-title":"J. Phys. B: At. Mol. Opt. Phys."},{"issue":"4","key":"1140_CR7","doi-asserted-by":"crossref","first-page":"739","DOI":"10.1142\/S0219749906002146","volume":"4","author":"ZX Man","year":"2006","unstructured":"Man, Z.X., Xia, Y.J., Zhang, Z.J.: Secure deterministic bidirectional communication without entanglement. Int. J. Quantum Inf. 4(4), 739\u2013746 (2006)","journal-title":"Int. J. Quantum Inf."},{"issue":"1","key":"1140_CR8","first-page":"24","volume":"48","author":"Y Xia","year":"2006","unstructured":"Xia, Y., Fu, C.B., Zhang, S., Hong, S.K., Yeon, K.H., Um, C.L.: Quantum dialogue by using GHZ state. J. Korean Phys. Soc. 48(1), 24\u201327 (2006)","journal-title":"J. Korean Phys. Soc."},{"issue":"7","key":"1140_CR9","doi-asserted-by":"crossref","first-page":"1680","DOI":"10.1088\/0256-307X\/23\/7\/007","volume":"23","author":"ZX Man","year":"2006","unstructured":"Man, Z.X., Xia, Y.J.: Controlled bidirectional quantum direct communication by using a GHZ state. Chin. Phys. Lett. 23(7), 1680\u20131682 (2006)","journal-title":"Chin. Phys. Lett."},{"issue":"5","key":"1140_CR10","doi-asserted-by":"crossref","first-page":"558","DOI":"10.1007\/s11433-007-0057-3","volume":"50","author":"YG Yang","year":"2007","unstructured":"Yang, Y.G., Wen, Q.Y.: Quasi-secure quantum dialogue using single photons. Sci. China Ser. G Phys. Mech. Astron. 50(5), 558\u2013562 (2007)","journal-title":"Sci. China Ser. G Phys. Mech. Astron."},{"issue":"5","key":"1140_CR11","doi-asserted-by":"crossref","first-page":"841","DOI":"10.1088\/0253-6102\/48\/5\/017","volume":"48","author":"Y Xia","year":"2007","unstructured":"Xia, Y., Song, J., Nie, J., Song, H.S.: Controlled secure quantum dialogue using a pure entangled GHZ states. Commun. Theor. Phys. 48(5), 841\u2013846 (2007)","journal-title":"Commun. Theor. Phys."},{"issue":"1","key":"1140_CR12","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1088\/0256-307X\/24\/1\/006","volume":"24","author":"Y Chen","year":"2007","unstructured":"Chen, Y., Man, Z.X., Xia, Y.J.: Quantum bidirectional secure direct communication via entanglement swapping. Chin. Phys. Lett. 24(1), 19\u201322 (2007)","journal-title":"Chin. Phys. Lett."},{"issue":"1","key":"1140_CR13","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1088\/0256-307X\/24\/1\/005","volume":"24","author":"ZX Man","year":"2007","unstructured":"Man, Z.X., Xia, Y.J.: Improvement of security of three-party quantum secure direct communication based on GHZ states. Chin. Phys. Lett. 24(1), 15\u201318 (2007)","journal-title":"Chin. Phys. Lett."},{"issue":"2","key":"1140_CR14","doi-asserted-by":"crossref","first-page":"325","DOI":"10.1142\/S021974990800344X","volume":"6","author":"YG Tan","year":"2008","unstructured":"Tan, Y.G., Cai, Q.Y.: Classical correlation in quantum dialogue. Int. J. Quantum Inf. 6(2), 325\u2013329 (2008)","journal-title":"Int. J. Quantum Inf."},{"issue":"5","key":"1140_CR15","doi-asserted-by":"crossref","first-page":"559","DOI":"10.1007\/s11433-008-0065-y","volume":"51","author":"F Gao","year":"2008","unstructured":"Gao, F., Guo, F.Z., Wen, Q.Y., Zhu, F.C.: Revisiting the security of quantum dialogue and bidirectional quantum secrue direct communnication. Sci. China Ser. G Phys. Mech. Astron. 51(5), 559\u2013566 (2008)","journal-title":"Sci. China Ser. G Phys. Mech. Astron."},{"issue":"5","key":"1140_CR16","doi-asserted-by":"crossref","first-page":"853","DOI":"10.1088\/0253-6102\/52\/5\/19","volume":"52","author":"L Dong","year":"2009","unstructured":"Dong, L., Xiu, X.M., Gao, Y.J., Chi, F.: Quantum dialogue protocol using a class of three-photon W states. Commun. Theor. Phys. 52(5), 853\u2013856 (2009)","journal-title":"Commun. Theor. Phys."},{"key":"1140_CR17","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1007\/978-3-642-10240-0_4","volume":"29","author":"DZ Huang","year":"2009","unstructured":"Huang, D.Z., Chen, Z.G., Xie, J.Q., Guo, Y.: Bidirectional quantum secure direct communication based on entanglement. Commun. Comput. Inf. Sci. 29, 40\u201349 (2009)","journal-title":"Commun. Comput. Inf. Sci."},{"issue":"12","key":"1140_CR18","doi-asserted-by":"crossref","first-page":"2460","DOI":"10.1016\/j.optcom.2009.02.062","volume":"282","author":"GF Shi","year":"2009","unstructured":"Shi, G.F., Xi, X.Q., Tian, X.L., Yue, R.H.: Bidirectional quantum secure communication based on a shared private Bell state. Opt. Commun. 282(12), 2460\u20132463 (2009)","journal-title":"Opt. Commun."},{"issue":"27","key":"1140_CR19","doi-asserted-by":"crossref","first-page":"3225","DOI":"10.1142\/S0217984909021259","volume":"23","author":"CJ Shan","year":"2009","unstructured":"Shan, C.J., Liu, J.B., Cheng, W.W., Liu, T.K.: Bidirectional quantum secure direct communication in driven cavity QED. Mod. Phys. Lett. B 23(27), 3225\u20133234 (2009)","journal-title":"Mod. Phys. Lett. B"},{"issue":"9","key":"1140_CR20","doi-asserted-by":"crossref","first-page":"1984","DOI":"10.1016\/j.optcom.2010.01.007","volume":"283","author":"GF Shi","year":"2010","unstructured":"Shi, G.F., Xi, X.Q., Hu, M.L., Yue, R.H.: Quantum secure dialogue by using single photons. Opt. Commun. 283(9), 1984\u20131986 (2010)","journal-title":"Opt. Commun."},{"issue":"20","key":"1140_CR21","doi-asserted-by":"crossref","first-page":"2027","DOI":"10.1080\/09500340.2010.514072","volume":"57","author":"GF Shi","year":"2010","unstructured":"Shi, G.F., Tian, X.L.: Quantum secure dialogue based on single photons and controlled-not operations. J. Mod. Opt. 57(20), 2027\u20132030 (2010)","journal-title":"J. Mod. Opt."},{"issue":"4","key":"1140_CR22","doi-asserted-by":"crossref","first-page":"648","DOI":"10.1088\/0253-6102\/53\/4\/13","volume":"53","author":"YB Zhan","year":"2010","unstructured":"Zhan, Y.B., Zhang, L.L., Wang, Y.W., Zhang, Q.Y.: Quantum dialogue by using non-symmetric quantum channel. Commun. Theor. Phys. 53(4), 648\u2013652 (2010)","journal-title":"Commun. Theor. Phys."},{"issue":"7","key":"1140_CR23","first-page":"070\u00a0305\u20131","volume":"20","author":"H Liu","year":"2011","unstructured":"Liu, H., Zhang, X\u00a0.L., Lu, H.: Eavesdropping on the quantum dialogue protocol in lossy channel. Chin. Phys. B 20(7), 070\u00a0305\u20131\u2013070\u00a0305\u20135 (2011)","journal-title":"Chin. Phys. B"},{"key":"1140_CR24","doi-asserted-by":"crossref","first-page":"357","DOI":"10.1142\/S0219749911007332","volume":"9","author":"F Sheikhehi","year":"2011","unstructured":"Sheikhehi, F., Naseri, M.: Probabilistic bidirectional quantum secure communication based on a shared partially entangled states. Int. J. Quantum Inf. 9, 357\u2013365 (2011)","journal-title":"Int. J. Quantum Inf."},{"issue":"6","key":"1140_CR25","doi-asserted-by":"crossref","first-page":"1745","DOI":"10.1007\/s10773-012-1220-9","volume":"52","author":"H Wang","year":"2013","unstructured":"Wang, H., Zhang, Y.Q., Hu, Y.P.: Efficient quantum dialogue by using the two-qutrit entangled states without information leakage. Int. J. Theor. Phys. 52(6), 1745\u20131750 (2013)","journal-title":"Int. J. Theor. Phys."},{"issue":"6","key":"1140_CR26","doi-asserted-by":"crossref","first-page":"2131","DOI":"10.1007\/s11128-012-0514-4","volume":"12","author":"CW Yang","year":"2013","unstructured":"Yang, C.W., Hwang, T.: Quantum dialogue protocols immune to collective noise. Quantum Inf. Process. 12(6), 2131\u20132142 (2013)","journal-title":"Quantum Inf. Process."},{"issue":"1","key":"1140_CR27","first-page":"015 103-1","volume":"89","author":"TY Ye","year":"2014","unstructured":"Ye, T.Y., Jiang, L.Z.: Quantum dialogue without information leakage based on the entanglement swapping between any two Bell states and the shared secret Bell state. Phys. Scr. 89(1), 015 103-1\u2013015 103-7 (2014)","journal-title":"Phys. Scr."},{"issue":"8","key":"1140_CR28","doi-asserted-by":"crossref","first-page":"2760","DOI":"10.1007\/s10773-014-2072-2","volume":"53","author":"A-H Yin","year":"2014","unstructured":"Yin, A.-H., Tang, Z.-H.: Two-step efficient quantum dialogue with three-particle entangled W state. Int. J. Theor. Phys. 53(8), 2760\u20132768 (2014)","journal-title":"Int. J. Theor. Phys."},{"issue":"05","key":"1140_CR29","doi-asserted-by":"crossref","first-page":"1550018","DOI":"10.1142\/S0217984915500189","volume":"29","author":"A-H Yin","year":"2015","unstructured":"Yin, A.-H., Tang, Z.-H., Chen, D.: Efficient quantum dialogue without information leakage. Mod. Phys. Lett. B 29(05), 1550018 (2015)","journal-title":"Mod. Phys. Lett. B"},{"issue":"11","key":"1140_CR30","doi-asserted-by":"crossref","first-page":"2451","DOI":"10.1007\/s11128-014-0803-1","volume":"13","author":"Y-P Luo","year":"2014","unstructured":"Luo, Y.-P., Lin, C.-Y., Hwang, T.: Efficient quantum dialogue using single photons. Quantum Inf. Process. 13(11), 2451\u20132461 (2014)","journal-title":"Quantum Inf. Process."},{"issue":"6","key":"1140_CR31","first-page":"1775","volume":"54","author":"TY Ye","year":"2014","unstructured":"Ye, T.Y.: Analysis on security loophole of two-step efficient quantum dialogue with three-particle entangled W state. Int. J. Theor. Phys. 54(6), 1775\u20131778 (2014)","journal-title":"Int. J. Theor. Phys."},{"issue":"11","key":"1140_CR32","doi-asserted-by":"crossref","first-page":"3829","DOI":"10.1007\/s10773-014-2135-4","volume":"53","author":"N-R Zhou","year":"2014","unstructured":"Zhou, N.-R., Hua, T.-X., Wu, G.-T., He, C.-S., Zhang, Y.: Single-photon secure quantum dialogue protocol without information leakage. Int. J. Theor. Phys. 53(11), 3829\u20133837 (2014)","journal-title":"Int. J. Theor. Phys."},{"issue":"11","key":"1140_CR33","doi-asserted-by":"crossref","first-page":"3719","DOI":"10.1007\/s10773-014-2124-7","volume":"53","author":"TY Ye","year":"2014","unstructured":"Ye, T.Y.: Quantum dialogue without information leakage using a single quantum entangled state. Int. J. Theor. Phys. 53(11), 3719\u20133727 (2014)","journal-title":"Int. J. Theor. Phys."},{"issue":"4","key":"1140_CR34","doi-asserted-by":"crossref","first-page":"1388","DOI":"10.1007\/s10773-014-2337-9","volume":"54","author":"M Wang","year":"2015","unstructured":"Wang, M., Ma, W., Shen, D., Wang, L.: A quantum dialogue protocol based on four-qubit entangled state. Int. J. Theor. Phys. 54(4), 1388\u20131395 (2015)","journal-title":"Int. J. Theor. Phys."},{"issue":"7","key":"1140_CR35","doi-asserted-by":"crossref","first-page":"1238","DOI":"10.1007\/s11433-014-5461-x","volume":"57","author":"C Zheng","year":"2014","unstructured":"Zheng, C., Long, G.: Quantum secure direct dialogue using Einstein\u2013Podolsky\u2013Rosen pairs. Sci. China Phys. Mech. Astron. 57(7), 1238\u20131243 (2014)","journal-title":"Sci. China Phys. Mech. Astron."},{"issue":"3","key":"1140_CR36","doi-asserted-by":"crossref","first-page":"338","DOI":"10.1088\/0253-6102\/62\/3\/08","volume":"62","author":"TY Ye","year":"2014","unstructured":"Ye, T.Y.: Quantum secure dialogue with quantum encryption. Commun. Theor. Phys. 62(3), 338\u2013342 (2014)","journal-title":"Commun. Theor. Phys."},{"issue":"12","key":"1140_CR37","doi-asserted-by":"crossref","first-page":"1450094","DOI":"10.1142\/S0217984914500948","volume":"28","author":"G Gao","year":"2014","unstructured":"Gao, G.: Information leakage in quantum dialogue by using the two-qutrit entangled states. Mod. Phys. Lett. B 28(12), 1450094 (2014)","journal-title":"Mod. Phys. Lett. B"},{"issue":"7\u20138","key":"1140_CR38","doi-asserted-by":"crossref","first-page":"1677","DOI":"10.1142\/S0219749911008271","volume":"9","author":"M Naseri","year":"2011","unstructured":"Naseri, M.: An efficient protocol for quantum secure dialogue with authentication by using sinlge photons. Int. J. Quantum Inf. 9(7\u20138), 1677\u20131684 (2011)","journal-title":"Int. J. Quantum Inf."},{"issue":"6","key":"1140_CR39","doi-asserted-by":"crossref","first-page":"1825","DOI":"10.1007\/s10773-012-1276-6","volume":"52","author":"D Shen","year":"2013","unstructured":"Shen, D., Ma, W., Yin, X., Li, X.: Quantum dialogue with authentication based on Bell states. Int. J. Theor. Phys. 52(6), 1825\u20131835 (2013)","journal-title":"Int. J. Theor. Phys."},{"issue":"9","key":"1140_CR40","doi-asserted-by":"crossref","first-page":"3199","DOI":"10.1007\/s10773-013-1614-3","volume":"52","author":"TH Lin","year":"2013","unstructured":"Lin, T.H., Lin, C.Y., Hwang, T.: Man-in-the-middle attack on \u201cquantum dialogue with authentication based on Bell states\u201d. Int. J. Theor. Phys. 52(9), 3199\u20133203 (2013)","journal-title":"Int. J. Theor. Phys."},{"issue":"3","key":"1140_CR41","doi-asserted-by":"crossref","first-page":"780","DOI":"10.1007\/s10773-014-2269-4","volume":"54","author":"C-Y Lin","year":"2015","unstructured":"Lin, C.-Y., Yang, C.-W., Hwang, T.: Authenticated quantum dialogue based on Bell states. Int. J. Theor. Phys. 54(3), 780\u2013786 (2015)","journal-title":"Int. J. Theor. Phys."},{"key":"1140_CR42","unstructured":"FIPS180-1: Secure Hash Standard. NIST, US Department of Commerce, Washington, DC (April 1995)"},{"issue":"2","key":"1140_CR43","first-page":"9","volume":"3","author":"B Preneel","year":"1997","unstructured":"Preneel, B., Dobbertin, H., Bosselaers, A.: The cryptographic hash function RIPEMD-160. Crypto Bytes 3(2), 9\u201314 (1997)","journal-title":"Crypto Bytes"},{"key":"1140_CR44","unstructured":"Deng, F.G., Zhou, P., Li, X.H., Li, C.Y., Zhou, H.Y.: Robustness of two-way quantum communication protocols against Trojan horse attack. arXiv:quant-ph\/0508168v1 (2005)"},{"key":"1140_CR45","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1016\/j.physleta.2005.10.050","volume":"351","author":"QY Cai","year":"2006","unstructured":"Cai, Q.Y.: Eavesdropping on the two-way quantum communication protocols with invisible photons. Phys. Lett. A 351, 23\u201325 (2006)","journal-title":"Phys. Lett. A"},{"issue":"1\u20132","key":"1140_CR46","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1016\/j.physleta.2004.10.025","volume":"333","author":"ZJ Zhang","year":"2004","unstructured":"Zhang, Z.J., Man, Z.X., Li, Y.: Improving W\u00f3jcik eavesdropping attack on the ping-pong protocol. Phys. Lett. A 333(1\u20132), 46\u201350 (2004)","journal-title":"Phys. Lett. A"},{"issue":"1","key":"1140_CR47","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1088\/0256-307X\/22\/1\/006","volume":"22","author":"ZX Man","year":"2005","unstructured":"Man, Z.X., Zhang, Z.J., Li, Y.: Deterministic secure direct communication by using swapping quantum entanglement and local unitary operations. Chin. Phys. Lett. 22(1), 18\u201321 (2005)","journal-title":"Chin. Phys. Lett."},{"issue":"4","key":"1140_CR48","doi-asserted-by":"crossref","first-page":"521","DOI":"10.1142\/S0219749904000912","volume":"2","author":"ZJ Zhang","year":"2004","unstructured":"Zhang, Z.J., Man, Z.X., Li, Y.: The improved Bostrom\u2013Felbinger protocol against attacks without eavesdropping. Int. J. Quantum Inf. 2(4), 521\u2013527 (2004)","journal-title":"Int. J. Quantum Inf."},{"issue":"10","key":"1140_CR49","doi-asserted-by":"crossref","first-page":"2652","DOI":"10.1088\/0256-307X\/23\/10\/008","volume":"23","author":"J Liu","year":"2006","unstructured":"Liu, J., Liu, Y.M., Cao, H.J., Shi, S.H., Zhang, Z.J.: Revisiting quantum secure direct communication with W state. Chin. Phys. Lett. 23(10), 2652\u20132655 (2006)","journal-title":"Chin. Phys. Lett."},{"issue":"2","key":"1140_CR50","first-page":"026 301\u20131","volume":"75","author":"ZJ Zhang","year":"2007","unstructured":"Zhang, Z.J., Liu, J., Wang, D., Shi, S.H.: Comment on \u201cQuantum direct communication with authentication\u201d. Phys. Rev. A 75(2), 026 301\u20131\u2013026 301\u20134 (2007)","journal-title":"Phys. Rev. A"},{"issue":"1","key":"1140_CR51","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1088\/0253-6102\/49\/1\/22","volume":"49","author":"H Yuan","year":"2008","unstructured":"Yuan, H., Liu, Y.M., Zhang, W., Zhang, Z.J.: Eavesdropping on quantum secure direct communication with W state in noisy channel. Commun. Theor. Phys. 49(1), 103\u2013106 (2008)","journal-title":"Commun. Theor. Phys."},{"issue":"4","key":"1140_CR52","doi-asserted-by":"crossref","first-page":"887","DOI":"10.1088\/0253-6102\/49\/4\/17","volume":"49","author":"J Liu","year":"2008","unstructured":"Liu, J., Liu, Y.M., Xia, Y., Zhang, Z.J.: Revisiting controlled quantum secure direct communication using a non-symmetric quantum channel with quantum superdense coding. Commun. Theor. Phys. 49(4), 887\u2013890 (2008)","journal-title":"Commun. Theor. Phys."},{"key":"1140_CR53","unstructured":"MacWilliams, F.J., Sloane, N.J.A.: The Theory of Error Correcting Codes. Elsevier, Amsterdam (1977)"},{"issue":"12","key":"1140_CR54","doi-asserted-by":"crossref","first-page":"2266","DOI":"10.1007\/s11433-014-5566-2","volume":"57","author":"TY Ye","year":"2014","unstructured":"Ye, T.Y.: Information leakage resistant quantum dialogue against collective noise. Sci. China Phys. Mech. Astron. 57(12), 2266\u20132275 (2014)","journal-title":"Sci. China Phys. Mech. Astron."},{"issue":"4","key":"1140_CR55","first-page":"1","volume":"58","author":"TY Ye","year":"2015","unstructured":"Ye, T.Y.: Fault tolerant channel-encrypting quantum dialogue against collective noise. Sci. China Phys. Mech. Astron. 58(4), 1\u201310 (2015)","journal-title":"Sci. China Phys. Mech. Astron."},{"issue":"3","key":"1140_CR56","doi-asserted-by":"crossref","first-page":"496","DOI":"10.1007\/s11433-011-4245-9","volume":"54","author":"C-W Yang","year":"2011","unstructured":"Yang, C.-W., Tsai, C.-W., Hwang, T.: Fault tolerant two-step quantum secure direct communication protocol against collective noises. Sci. China Phys. Mech. Astron. 54(3), 496\u2013501 (2011)","journal-title":"Sci. China Phys. Mech. Astron."},{"issue":"08","key":"1140_CR57","doi-asserted-by":"crossref","first-page":"1479","DOI":"10.1142\/S021974990900595X","volume":"07","author":"X-H Li","year":"2009","unstructured":"Li, X.-H., Zhao, B.-K., Sheng, Y.-B., Deng, F.-G., Zhou, H.-Y.: Fault tolerant quantum key distribution based on quantum dense coding with collective noise. Int. J. Quantum Inf. 07(08), 1479\u20131489 (2009)","journal-title":"Int. J. Quantum Inf."},{"issue":"15","key":"1140_CR58","doi-asserted-by":"crossref","first-page":"3099","DOI":"10.1016\/j.optcom.2010.04.015","volume":"283","author":"B Gu","year":"2010","unstructured":"Gu, B., Mu, L., Ding, L., Zhang, C., Li, C.: Fault tolerant three-party quantum secret sharing against collective noise. Opt. Commun. 283(15), 3099\u20133103 (2010)","journal-title":"Opt. Commun."},{"issue":"4","key":"1140_CR59","doi-asserted-by":"crossref","first-page":"925","DOI":"10.1007\/s11128-013-0702-x","volume":"13","author":"T Hwang","year":"2014","unstructured":"Hwang, T., Luo, Y.-P., Yang, C.-W., Lin, T.-H.: Quantum authencryption: one-step authenticated quantum secure direct communications for off-line communicants. Quantum Inf. Process. 13(4), 925\u2013933 (2014)","journal-title":"Quantum Inf. Process."},{"issue":"7","key":"1140_CR60","doi-asserted-by":"crossref","first-page":"2230","DOI":"10.1007\/s10773-013-1498-2","volume":"52","author":"C-W Yang","year":"2013","unstructured":"Yang, C.-W., Hwang, T., Lin, T.-H.: Modification attack on qsdc with authentication and the improvement. Int. J. Theor. Phys. 52(7), 2230\u20132234 (2013)","journal-title":"Int. J. Theor. Phys."},{"issue":"12","key":"1140_CR61","doi-asserted-by":"crossref","first-page":"3941","DOI":"10.1007\/s10773-012-1286-4","volume":"51","author":"CW Yang","year":"2012","unstructured":"Yang, C.W., Hwang, T.: Improved QSDC protocol over a collective-dephasing noise channel. Int. J. Theor. Phys. 51(12), 3941\u20133950 (2012)","journal-title":"Int. J. Theor. Phys."},{"issue":"5","key":"1140_CR62","doi-asserted-by":"crossref","first-page":"1561","DOI":"10.1088\/0256-307X\/25\/5\/011","volume":"25","author":"F Gao","year":"2008","unstructured":"Gao, F., Lin, S., Wen, Q.Y., Zhu, F.C.: A special eavesdropping on one-sender versus n-receiver QSDC protocol. Chin. Phys. Lett. 25(5), 1561\u20131563 (2008)","journal-title":"Chin. Phys. Lett."},{"issue":"13","key":"1140_CR63","doi-asserted-by":"crossref","first-page":"2656","DOI":"10.1016\/j.optcom.2009.03.050","volume":"282","author":"SJ Qin","year":"2009","unstructured":"Qin, S.J., Wen, Q.Y., Meng, L.M., Zhu, F.C.: Comment on \u201cControlled DSQC using five-qubit entangled states and two-step security test\u201d. Opt. Commun. 282(13), 2656\u20132658 (2009)","journal-title":"Opt. Commun."},{"issue":"1","key":"1140_CR64","doi-asserted-by":"crossref","first-page":"192","DOI":"10.1016\/j.optcom.2009.09.047","volume":"283","author":"G Gao","year":"2010","unstructured":"Gao, G., Qin, S.J., Wen, Q.Y., Zhu, F.C.: Cryptanalysis of multiparty controlled quantum secure direct communication using Greenberger\u2013Horne\u2013Zeilinger state. Opt. Commun. 283(1), 192\u2013195 (2010)","journal-title":"Opt. Commun."},{"issue":"9","key":"1140_CR65","doi-asserted-by":"crossref","first-page":"3189","DOI":"10.1088\/1674-1056\/17\/9\/006","volume":"17","author":"F Gao","year":"2008","unstructured":"Gao, F., Wen, Q.Y., Zhu, F.C.: Teleportation attack on the QSDC protocol with a random basis and order. Chin. Phys. B 17(9), 3189\u20133193 (2008)","journal-title":"Chin. Phys. B"},{"issue":"8","key":"1140_CR66","doi-asserted-by":"crossref","first-page":"2766","DOI":"10.1088\/0256-307X\/25\/8\/009","volume":"25","author":"F Gao","year":"2008","unstructured":"Gao, F., Guo, F.Z., Wen, Q.Y., Zhu, F.C.: Forcible-measurement attack on quantum secure direct communication protocol with cluster state. Chin. Phys. Lett. 25(8), 2766\u20132769 (2008)","journal-title":"Chin. Phys. Lett."},{"issue":"9","key":"1140_CR67","doi-asserted-by":"crossref","first-page":"2790","DOI":"10.1007\/s10773-011-0777-z","volume":"50","author":"T Hwang","year":"2011","unstructured":"Hwang, T., Hwnag, C.C., Yang, C.W., Li, C.M.: Revisiting Deng et al.\u2019s multiparty quantum secret sharing protocol. Int. J. Theor. Phys. 50(9), 2790\u20132798 (2011)","journal-title":"Int. J. Theor. Phys."},{"issue":"9","key":"1140_CR68","doi-asserted-by":"crossref","first-page":"2412","DOI":"10.1016\/j.optcom.2010.12.070","volume":"284","author":"J Lin","year":"2011","unstructured":"Lin, J., Tseng, H.Y., Hwang, T.: Intercept-resend attacks on Chen et al.\u2019s quantum private comparison protocol and the improvements. Opt. Commun. 284(9), 2412\u20132414 (2011)","journal-title":"Opt. Commun."},{"issue":"5","key":"1140_CR69","doi-asserted-by":"crossref","first-page":"1468","DOI":"10.1016\/j.optcom.2010.10.095","volume":"284","author":"J Lin","year":"2011","unstructured":"Lin, J., Hwang, T.: An enhancement on Shi et al.\u2019s multiparty quantum secret sharing protocol. Opt. Commun. 284(5), 1468\u20131471 (2011)","journal-title":"Opt. Commun."},{"issue":"6","key":"1140_CR70","doi-asserted-by":"crossref","first-page":"1793","DOI":"10.1007\/s10773-011-0691-4","volume":"50","author":"SK Chong","year":"2011","unstructured":"Chong, S.K., Tsai, C.W., Hwang, T.: Improvement on \u201cQuantum key agreement protocol with maximally entangled states\u201d. Int. J. Theor. Phys. 50(6), 1793\u20131802 (2011)","journal-title":"Int. J. Theor. Phys."},{"issue":"3","key":"1140_CR71","first-page":"471","volume":"28","author":"HY Tseng","year":"2012","unstructured":"Tseng, H.Y., Hwang, T., Lin, C.Y.: On the \u201cDeterministic secure quantum communication using four-particle entangled state and entanglement swapping\u201d. J. Inf. Sci. Eng. 28(3), 471\u2013478 (2012)","journal-title":"J. Inf. Sci. Eng."},{"issue":"1","key":"1140_CR72","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1007\/s11128-012-0362-2","volume":"12","author":"CW Yang","year":"2013","unstructured":"Yang, C.W., Hwang, T., Luo, Y.P.: Enhancement on \u201cQuantum blind signature based on two-state vector formalism\u201d. Quantum Inf. Process. 12(1), 109\u2013117 (2013)","journal-title":"Quantum Inf. Process."}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-015-1140-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11128-015-1140-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-015-1140-8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T07:39:24Z","timestamp":1559374764000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11128-015-1140-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,10,8]]},"references-count":72,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2015,12]]}},"alternative-id":["1140"],"URL":"https:\/\/doi.org\/10.1007\/s11128-015-1140-8","relation":{},"ISSN":["1570-0755","1573-1332"],"issn-type":[{"value":"1570-0755","type":"print"},{"value":"1573-1332","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,10,8]]}}}