{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,18]],"date-time":"2026-01-18T12:47:47Z","timestamp":1768740467168,"version":"3.49.0"},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2016,4,18]],"date-time":"2016-04-18T00:00:00Z","timestamp":1460937600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"name":"Ministry of Science and Technology of the Republic of China","award":["MOST 103-2221-E-471 -001 -"],"award-info":[{"award-number":["MOST 103-2221-E-471 -001 -"]}]},{"name":"Ministry of Science and Technology of the Republic of China","award":["MOST 103-2221-E-006 -177"],"award-info":[{"award-number":["MOST 103-2221-E-006 -177"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"published-print":{"date-parts":[[2016,7]]},"DOI":"10.1007\/s11128-016-1307-y","type":"journal-article","created":{"date-parts":[[2016,4,18]],"date-time":"2016-04-18T07:25:34Z","timestamp":1460964334000},"page":"2881-2893","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":33,"title":["Authenticated semi-quantum key distributions without classical channel"],"prefix":"10.1007","volume":"15","author":[{"given":"Chuan-Ming","family":"Li","sequence":"first","affiliation":[]},{"given":"Kun-Fei","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Shih-Hung","family":"Kao","sequence":"additional","affiliation":[]},{"given":"Tzonelih","family":"Hwang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,4,18]]},"reference":[{"issue":"1","key":"1307_CR1","doi-asserted-by":"crossref","first-page":"78","DOI":"10.1145\/1008908.1008920","volume":"15","author":"S Wiesner","year":"1983","unstructured":"Wiesner, S.: Conjugate coding. SIGACT News 15(1), 78\u201388 (1983)","journal-title":"SIGACT News"},{"key":"1307_CR2","unstructured":"Bennett, C. H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. In: Proceedings of the IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, India, pp. 175\u2013179 (1984)"},{"issue":"6","key":"1307_CR3","doi-asserted-by":"crossref","first-page":"661","DOI":"10.1103\/PhysRevLett.67.661","volume":"67","author":"AK Ekert","year":"1991","unstructured":"Ekert, A.K.: Quantum cryptography based on Bell\u2019s theorem. Phys. Rev. Lett. 67(6), 661\u2013663 (1991)","journal-title":"Phys. Rev. Lett."},{"issue":"5","key":"1307_CR4","doi-asserted-by":"crossref","first-page":"557","DOI":"10.1103\/PhysRevLett.68.557","volume":"68","author":"CH Bennett","year":"1992","unstructured":"Bennett, C.H., Brassard, G., Mermin, N.D.: Quantum cryptography without Bell\u2019s theorem. Phys. Rev. Lett. 68(5), 557\u2013559 (1992)","journal-title":"Phys. Rev. Lett."},{"issue":"5","key":"1307_CR5","doi-asserted-by":"crossref","first-page":"052312,","DOI":"10.1103\/PhysRevA.61.052312","volume":"61","author":"A Cabello","year":"2000","unstructured":"Cabello, A.: Quantum key distribution without alternative measurements. Phys. Rev. A 61(5), 052312, (2000)","journal-title":"Phys. Rev. A"},{"issue":"3","key":"1307_CR6","doi-asserted-by":"crossref","first-page":"032302","DOI":"10.1103\/PhysRevA.65.032302","volume":"65","author":"GL Long","year":"2002","unstructured":"Long, G.L., Liu, X.S.: Theoretically efficient high-capacity quantum-key-distribution scheme. Phys. Rev. A 65(3), 032302 (2002)","journal-title":"Phys. Rev. A"},{"issue":"2","key":"1307_CR7","doi-asserted-by":"crossref","first-page":"155","DOI":"10.1088\/1464-4266\/5\/2\/306","volume":"5","author":"C Li","year":"2003","unstructured":"Li, C., Song, H.S., Zhou, L., Wu, C.F.: A random quantum key distribution achieved by using Bell states. J. Opt. B Quantum Semiclassical Opt. 5(2), 155\u2013157 (2003)","journal-title":"J. Opt. B Quantum Semiclassical Opt."},{"issue":"1","key":"1307_CR8","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1049\/iet-ifs:20060124","volume":"1","author":"T Hwang","year":"2007","unstructured":"Hwang, T., Lee, K.C.: EPR quantum key distribution protocols with potential 100\u00a0% qubit efficiency. IET Inf. Secur. 1(1), 43\u201345 (2007)","journal-title":"IET Inf. Secur."},{"key":"1307_CR9","doi-asserted-by":"crossref","unstructured":"Li, X.H., Deng, F.G., Zhou, H.Y.: Efficient quantum key distribution over a collective noise channel. Phys. Rev. A 78, 022321 (2008)","DOI":"10.1103\/PhysRevA.78.022321"},{"issue":"6","key":"1307_CR10","doi-asserted-by":"crossref","first-page":"1602","DOI":"10.1109\/JSTQE.2009.2019617","volume":"15","author":"HC Shih","year":"2009","unstructured":"Shih, H.C., Lee, K.C., Hwang, T.: New efficient three-party quantum key distribution protocols. IEEE J. Sel. Topics Quantum Electron. 15(6), 1602\u20131606 (2009)","journal-title":"IEEE J. Sel. Topics Quantum Electron."},{"issue":"12","key":"1307_CR11","doi-asserted-by":"crossref","first-page":"2644","DOI":"10.1016\/j.optcom.2010.02.037","volume":"283","author":"CH Hong","year":"2010","unstructured":"Hong, C.H., Heo, J.O., Khym, G.L., Lim, J., Hong, S.-K., Yang, H.J.: Quantum channels are sufficient for multi-user quantum key distribution protocol between users. Opt. Commun. 283(12), 2644\u20132646 (2010)","journal-title":"Opt. Commun."},{"issue":"19","key":"1307_CR12","doi-asserted-by":"crossref","first-page":"4836","DOI":"10.1016\/j.optcom.2011.05.002","volume":"284","author":"N Zhou","year":"2011","unstructured":"Zhou, N., Wang, L., Gong, L., Zuo, X., Liu, Y.: Quantum deterministic key distribution protocols based on teleportation and entanglement swapping. Opt. Commun. 284(19), 4836\u20134842 (2011)","journal-title":"Opt. Commun."},{"issue":"14","key":"1307_CR13","doi-asserted-by":"crossref","first-page":"140501","DOI":"10.1103\/PhysRevLett.99.140501","volume":"99","author":"M Boyer","year":"2007","unstructured":"Boyer, M., Kenigsberg, D., Mor, T.: Quantum key distribution with classical Bob. Phys. Rev. Lett. 99(14), 140501 (2007)","journal-title":"Phys. Rev. Lett."},{"issue":"3","key":"1307_CR14","doi-asserted-by":"crossref","first-page":"032341","DOI":"10.1103\/PhysRevA.79.032341","volume":"79","author":"M Boyer","year":"2009","unstructured":"Boyer, M., Gelles, R., Kenigsberg, D., Mor, T.: Semiquantum key distribution. Phys. Rev. A 79(3), 032341 (2009)","journal-title":"Phys. Rev. A"},{"issue":"5","key":"1307_CR15","doi-asserted-by":"crossref","first-page":"052312","DOI":"10.1103\/PhysRevA.79.052312","volume":"79","author":"X Zou","year":"2009","unstructured":"Zou, X., Qiu, D., Li, L., Wu, L., Li, L.: Semiquantum-key distribution using less than four quantum states. Phys. Rev. A 79(5), 052312 (2009)","journal-title":"Phys. Rev. A"},{"key":"1307_CR16","doi-asserted-by":"crossref","unstructured":"Zhang, X.Z., Gong, W.G., Tan, Y.G., Ren, Z.Z., Guo, X.T.: Quantum key distribution series network protocol with M-classical Bobs. Chin. Phys. B 18(6), 2143 (2009)","DOI":"10.1088\/1674-1056\/18\/6\/006"},{"key":"1307_CR17","doi-asserted-by":"crossref","unstructured":"Wang, J., Zhang, S., Zhang, Q., Tang, C.J.: Semiquantum key distribution using entangled states. Chin. Phys. Lett. 28(10), 100301 (2011)","DOI":"10.1088\/0256-307X\/28\/10\/100301"},{"issue":"6","key":"1307_CR18","doi-asserted-by":"crossref","first-page":"1457","DOI":"10.1007\/s11128-014-0740-z","volume":"13","author":"KF Yu","year":"2014","unstructured":"Yu, K.F., Yang, C.W., Liao, C.H., Hwang, T.: Authenticated semi-quantum key distribution protocol using Bell states. Quantum Inf. Process. 13(6), 1457\u20131465 (2014)","journal-title":"Quantum Inf. Process."},{"issue":"2","key":"1307_CR19","doi-asserted-by":"crossref","first-page":"022303","DOI":"10.1103\/PhysRevA.82.022303","volume":"82","author":"Q Li","year":"2010","unstructured":"Li, Q., Chan, W.H., Long, D.-Y.: Semiquantum secret sharing using entangled states. Phys. Rev. A 82(2), 022303 (2010)","journal-title":"Phys. Rev. A"},{"issue":"05","key":"1307_CR20","doi-asserted-by":"crossref","first-page":"1250050","DOI":"10.1142\/S0219749912500505","volume":"10","author":"J Wang","year":"2012","unstructured":"Wang, J., Zhang, S., Zhang, Q., Tang, C.-J.: Semiquantum secret sharing using two-particle entangled state. Int. J. Quantum Inf. 10(05), 1250050 (2012)","journal-title":"Int. J. Quantum Inf."},{"issue":"4","key":"1307_CR21","doi-asserted-by":"crossref","first-page":"045304","DOI":"10.1088\/1751-8113\/46\/4\/045304","volume":"46","author":"L Li","year":"2013","unstructured":"Li, L., Qiu, D., Mateus, P.: Quantum secret sharing with classical Bobs. J. Phys. A Math. Theor. 46(4), 045304 (2013)","journal-title":"J. Phys. A Math. Theor."},{"issue":"05","key":"1307_CR22","doi-asserted-by":"crossref","first-page":"1350052","DOI":"10.1142\/S0219749913500524","volume":"11","author":"C-W Yang","year":"2013","unstructured":"Yang, C.-W., Hwang, T.: Efficient key construction on semi-quantum secret sharing protocols. Int. J. Quantum Inf. 11(05), 1350052 (2013)","journal-title":"Int. J. Quantum Inf."},{"issue":"1","key":"1307_CR23","doi-asserted-by":"crossref","first-page":"156","DOI":"10.1007\/s10773-012-1314-4","volume":"52","author":"J Lin","year":"2013","unstructured":"Lin, J., Yang, C.-W., Tsai, C.-W., Hwang, T.: Intercept-resend attacks on semi-quantum secret sharing and the improvements. Int. J. Theor. Phys. 52(1), 156\u2013162 (2013)","journal-title":"Int. J. Theor. Phys."},{"issue":"7","key":"1307_CR24","doi-asserted-by":"crossref","first-page":"2230","DOI":"10.1007\/s10773-013-1498-2","volume":"52","author":"CW Yang","year":"2013","unstructured":"Yang, C.W., Hwang, T., Lin, T.H.: Modification attack on QSDC with authentication and the improvement. Int. J. Theor. Phys. 52(7), 2230\u20132234 (2013)","journal-title":"Int. J. Theor. Phys."},{"issue":"1","key":"1307_CR25","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1007\/s11128-012-0362-2","volume":"12","author":"CW Yang","year":"2013","unstructured":"Yang, C.W., Hwang, T., Luo, Y.P.: Enhancement on quantum blind signature based on two-state vector formalism. Quantum Inf. Process. 12(1), 109\u2013117 (2013)","journal-title":"Quantum Inf. Process."},{"key":"1307_CR26","unstructured":"Deng, F.G., Zhou, P., Li, X.H., Li, C.Y., Zhou, H.Y.: Robustness of two-way quantum communication protocols against trojan horse attack. Quantum Phys. (2005). arXiv:quant-ph\/0508168v1z"},{"issue":"1\u20132","key":"1307_CR27","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1016\/j.physleta.2005.10.050","volume":"351","author":"QY Cai","year":"2006","unstructured":"Cai, Q.Y.: Eavesdropping on the two-way quantum communication protocols with invisible photons. Phys. Lett. A 351(1\u20132), 23\u201325 (2006)","journal-title":"Phys. Lett. A"},{"issue":"4","key":"1307_CR28","doi-asserted-by":"crossref","first-page":"044302","DOI":"10.1103\/PhysRevA.72.044302","volume":"72","author":"FG Deng","year":"2005","unstructured":"Deng, F.G., Li, X.H., Zhou, H.Y., Zhang, Z.J.: Improving the security of multiparty quantum secret sharing against Trojan horse attack. Phys. Rev. A 72(4), 044302 (2005)","journal-title":"Phys. Rev. A"},{"issue":"5","key":"1307_CR29","doi-asserted-by":"crossref","first-page":"054302","DOI":"10.1103\/PhysRevA.74.054302","volume":"74","author":"XH Li","year":"2006","unstructured":"Li, X.H., Deng, F.G., Zhou, H.Y.: Improving the security of secure direct communication based on the secret transmitting order of particles. Phys. Rev. A 74(5), 054302 (2006)","journal-title":"Phys. Rev. A"},{"issue":"4","key":"1307_CR30","doi-asserted-by":"crossref","first-page":"049901","DOI":"10.1103\/PhysRevA.73.049901","volume":"73","author":"FG Deng","year":"2006","unstructured":"Deng, F.G., Li, X.H., Zhou, H.Y., Zhang, Z.J.: Improving the security of multiparty quantum secret sharing against Trojan horse attack. Phys. Rev. A 73(4), 049901 (2006)","journal-title":"Phys. Rev. A"},{"issue":"5","key":"1307_CR31","doi-asserted-by":"crossref","first-page":"1468","DOI":"10.1016\/j.optcom.2010.10.095","volume":"284","author":"J Lin","year":"2011","unstructured":"Lin, J., Hwang, T.: An enhancement on Shi et al.\u2019s multiparty quantum secret sharing protocol. Opt. Commun. 284(5), 1468\u20131471 (2011)","journal-title":"Opt. Commun."}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-016-1307-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11128-016-1307-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-016-1307-y","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T07:39:26Z","timestamp":1559374766000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11128-016-1307-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,4,18]]},"references-count":31,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2016,7]]}},"alternative-id":["1307"],"URL":"https:\/\/doi.org\/10.1007\/s11128-016-1307-y","relation":{},"ISSN":["1570-0755","1573-1332"],"issn-type":[{"value":"1570-0755","type":"print"},{"value":"1573-1332","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,4,18]]}}}