{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,17]],"date-time":"2026-03-17T08:18:50Z","timestamp":1773735530627,"version":"3.50.1"},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"9","license":[{"start":{"date-parts":[[2016,6,18]],"date-time":"2016-06-18T00:00:00Z","timestamp":1466208000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61572053"],"award-info":[{"award-number":["61572053"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"published-print":{"date-parts":[[2016,9]]},"DOI":"10.1007\/s11128-016-1367-z","type":"journal-article","created":{"date-parts":[[2016,6,18]],"date-time":"2016-06-18T14:50:45Z","timestamp":1466261445000},"page":"3833-3840","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":45,"title":["Novel classical post-processing for quantum key distribution-based quantum private query"],"prefix":"10.1007","volume":"15","author":[{"given":"Yu-Guang","family":"Yang","sequence":"first","affiliation":[]},{"given":"Zhi-Chao","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Xiu-Bo","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Wei-Feng","family":"Cao","sequence":"additional","affiliation":[]},{"given":"Yi-Hua","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Wei-Min","family":"Shi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,6,18]]},"reference":[{"key":"1367_CR1","doi-asserted-by":"crossref","first-page":"592","DOI":"10.1006\/jcss.1999.1689","volume":"60","author":"Y Gertner","year":"2000","unstructured":"Gertner, Y., Ishai, Y., Kushilevitz, E., Malkin, T.: Protecting data privacy in private information retrieval schemes. J. Comput. Syst. Sci. 60, 592\u2013629 (2000)","journal-title":"J. Comput. Syst. Sci."},{"key":"1367_CR2","doi-asserted-by":"crossref","unstructured":"Shor, P.W.: Algorithms for quantum computation: discrete logarithms and factoring. In: Proceedings of 35th Annual Symposium on the Foundations of Computer Science, Santa Fe, New Mexico, pp. 124\u2013134 (1994)","DOI":"10.1109\/SFCS.1994.365700"},{"key":"1367_CR3","doi-asserted-by":"crossref","unstructured":"Grover, L.K.: A fast quantum mechanical algorithm for database search. In: Proceedings on 28th Annual ACM Symposium on Theory of Computing, New York, pp. 212\u2013218 (1996)","DOI":"10.1145\/237814.237866"},{"key":"1367_CR4","unstructured":"Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. In: Proceedings on IEEE International Conference on Computers, Systems and Signal, Bangalore, India, pp. 175\u2013179 (1984)"},{"key":"1367_CR5","doi-asserted-by":"crossref","first-page":"145","DOI":"10.1103\/RevModPhys.74.145","volume":"74","author":"N Gisin","year":"2002","unstructured":"Gisin, N., Ribordy, G., Tittel, W., Zbinden, H.: Quantum cryptography. Rev. Mod. Phys. 74, 145\u2013195 (2002)","journal-title":"Rev. Mod. Phys."},{"key":"1367_CR6","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1016\/j.ipl.2004.02.003","volume":"90","author":"I Kerenidis","year":"2004","unstructured":"Kerenidis, I., de Wolf, R.: Quantum symmetrically-private information retrieval. Inform. Process. Lett. 90, 109\u2013114 (2004)","journal-title":"Inform. Process. Lett."},{"key":"1367_CR7","doi-asserted-by":"crossref","first-page":"230502","DOI":"10.1103\/PhysRevLett.100.230502","volume":"100","author":"V Giovannetti","year":"2008","unstructured":"Giovannetti, V., Lloyd, S., Maccone, L.: Quantum private queries. Phys. Rev. Lett. 100, 230502 (2008)","journal-title":"Phys. Rev. Lett."},{"key":"1367_CR8","doi-asserted-by":"crossref","first-page":"3465","DOI":"10.1109\/TIT.2010.2048446","volume":"56","author":"V Giovannetti","year":"2010","unstructured":"Giovannetti, V., Lloyd, S., Maccone, L.: Quantum private queries: security analysis. IEEE Trans. Inf. Theor. 56, 3465\u20133477 (2010)","journal-title":"IEEE Trans. Inf. Theor."},{"key":"1367_CR9","doi-asserted-by":"crossref","first-page":"010302","DOI":"10.1103\/PhysRevA.80.010302","volume":"80","author":"FD Martini","year":"2009","unstructured":"Martini, F.D., Giovannetti, V., Lloyd, S., Maccone, L., Nagali, E., Sansoni, L., Sciarrino, F.: Experimental quantum private queries with linear optics. Phys. Rev. A 80, 010302 (2009)","journal-title":"Phys. Rev. A"},{"key":"1367_CR10","doi-asserted-by":"crossref","first-page":"022313","DOI":"10.1103\/PhysRevA.84.022313","volume":"84","author":"L Olejnik","year":"2011","unstructured":"Olejnik, L.: Secure quantum private information retrieval using phase-encoded queries. Phys. Rev. A 84, 022313 (2011)","journal-title":"Phys. Rev. A"},{"key":"1367_CR11","doi-asserted-by":"crossref","first-page":"022301","DOI":"10.1103\/PhysRevA.83.022301","volume":"83","author":"M Jakobi","year":"2011","unstructured":"Jakobi, M., Simon, C., Gisin, N., Bancal, J.D., Branciard, C., Walenta, N., Zbinden, H.: Practical private database queries based on a quantum-key-distribution protocol. Phys. Rev. A 83, 022301 (2011)","journal-title":"Phys. Rev. A"},{"key":"1367_CR12","doi-asserted-by":"crossref","first-page":"057901","DOI":"10.1103\/PhysRevLett.92.057901","volume":"92","author":"V Scarani","year":"2004","unstructured":"Scarani, V., Acin, A., Ribordy, G., Gisin, N.: Quantum cryptography protocols robust against photon number splitting attacks for weak Laser pulse implementations. Phys. Rev. Lett. 92, 057901 (2004)","journal-title":"Phys. Rev. Lett."},{"key":"1367_CR13","doi-asserted-by":"crossref","first-page":"17411","DOI":"10.1364\/OE.20.017411","volume":"20","author":"F Gao","year":"2012","unstructured":"Gao, F., Liu, B., Wen, Q.-Y.: Flexible quantum private queries based on quantum key distribution. Opt. Exp. 20, 17411\u201317420 (2012)","journal-title":"Opt. Exp."},{"key":"1367_CR14","doi-asserted-by":"crossref","first-page":"022334","DOI":"10.1103\/PhysRevA.88.022334","volume":"88","author":"J-L Zhang","year":"2013","unstructured":"Zhang, J.-L., Guo, F.-Z., Gao, F., Liu, B., Wen, Q.-Y.: Private database queries based on counterfactual quantum key distribution. Phys. Rev. A 88, 022334 (2013)","journal-title":"Phys. Rev. A"},{"key":"1367_CR15","doi-asserted-by":"crossref","first-page":"805","DOI":"10.1007\/s11128-013-0692-8","volume":"13","author":"Y-G Yang","year":"2014","unstructured":"Yang, Y.-G., Sun, S.-J., Xu, P., Tian, J.: Flexible protocol for quantum private query based on B92 protocol. Quantum Inf. Process. 13, 805\u2013813 (2014)","journal-title":"Quantum Inf. Process."},{"key":"1367_CR16","doi-asserted-by":"crossref","first-page":"5538","DOI":"10.1016\/j.ijleo.2014.06.084","volume":"125","author":"Y-G Yang","year":"2014","unstructured":"Yang, Y.-G., Sun, S.-J., Tian, J., Xu, P.: Secure quantum private query with real-time security check. Optik 125, 5538\u20135541 (2014)","journal-title":"Optik"},{"key":"1367_CR17","doi-asserted-by":"crossref","first-page":"080302","DOI":"10.1088\/0256-307X\/28\/8\/080302","volume":"28","author":"C Wang","year":"2011","unstructured":"Wang, C., Hao, L., Zhao, L.J.: Implementation of quantum private queries using nuclear magnetic resonance. Chin. Phys. Lett. 28, 080302 (2011)","journal-title":"Chin. Phys. Lett."},{"key":"1367_CR18","doi-asserted-by":"crossref","first-page":"05233","DOI":"10.1038\/srep05233","volume":"4","author":"P Chan","year":"2014","unstructured":"Chan, P., Lucio-Martinez, I., Mo, X.F., Simon, C., Tittel, W.: Performing private database queries in a real-world environment using a quantum protocol. Sci. Rep. 4, 05233 (2014)","journal-title":"Sci. Rep."},{"key":"1367_CR19","doi-asserted-by":"crossref","first-page":"1017","DOI":"10.1007\/s11128-014-0902-z","volume":"14","author":"Y-G Yang","year":"2015","unstructured":"Yang, Y.-G., Zhang, M.O., Yang, R.: Private database queries using one quantum state. Quantum Inf. Process. 14, 1017\u20131024 (2015)","journal-title":"Quantum Inf. Process."},{"key":"1367_CR20","doi-asserted-by":"crossref","first-page":"1443","DOI":"10.1007\/s11128-015-0937-9","volume":"14","author":"S-J Sun","year":"2015","unstructured":"Sun, S.-J., Yang, Y.-G., Zhang, M.-O.: Relativistic quantum private database queries. Quantum Inf. Process. 14, 1443\u20131450 (2015)","journal-title":"Quantum Inf. Process."},{"issue":"1\u20132","key":"1367_CR21","first-page":"91","volume":"14","author":"F Yu","year":"2014","unstructured":"Yu, F., Qiu, D.W.: Coding-based quantum private database query using entanglement. Quantum Inf. Comput. 14(1\u20132), 91\u2013106 (2014)","journal-title":"Quantum Inf. Comput."},{"key":"1367_CR22","first-page":"504","volume":"14","author":"DS Shen","year":"2012","unstructured":"Shen, D.S., et al.: Improvement on private database queries based on the quantum key distribution. J. Optoelectron. Adv. Mater. 14, 504\u2013510 (2012)","journal-title":"J. Optoelectron. Adv. Mater."},{"issue":"40\u201341","key":"1367_CR23","doi-asserted-by":"crossref","first-page":"2561","DOI":"10.1016\/j.physleta.2015.05.040","volume":"379","author":"H Lai","year":"2015","unstructured":"Lai, H., Orgun, M.A., Pieprzyk, J., Xiao, J.H., Xue, L.Y., Jia, Z.T.: Controllable quantum private queries using an entangled Fibonacci-sequence spiral source. Phys. Lett. A 379(40\u201341), 2561\u20132568 (2015)","journal-title":"Phys. Lett. A"},{"issue":"10","key":"1367_CR24","doi-asserted-by":"crossref","first-page":"100301","DOI":"10.1007\/s11433-015-5714-3","volume":"58","author":"B Liu","year":"2015","unstructured":"Liu, B., Gao, F., Huang, W., Wen, Q.Y.: QKD-based quantum private query without a failure probability. Sci. Chin. Phys. Mech. Astron. 58(10), 100301 (2015)","journal-title":"Sci. Chin. Phys. Mech. Astron."},{"issue":"2","key":"1367_CR25","doi-asserted-by":"crossref","first-page":"459","DOI":"10.1142\/S0219749909005249","volume":"7","author":"T Hogg","year":"2009","unstructured":"Hogg, T., Zhang, L.: Private database queries using quantum states with limited coherence times. Int. J. Quantum Inf. 7(2), 459\u2013474 (2009)","journal-title":"Int. J. Quantum Inf."},{"key":"1367_CR26","doi-asserted-by":"crossref","first-page":"7537","DOI":"10.1038\/srep07537","volume":"4","author":"CY Wei","year":"2014","unstructured":"Wei, C.Y., Gao, F., Wen, Q.Y., Wang, T.Y.: Practical quantum private query of blocks based on unbalanced-state Bennett\u2013Brassard-1984 quantum key-distribution protocol. Sci. Rep. 4, 7537 (2014)","journal-title":"Sci. Rep."},{"issue":"3","key":"1367_CR27","doi-asserted-by":"crossref","first-page":"299","DOI":"10.1088\/0253-6102\/64\/3\/299","volume":"64","author":"WX Shi","year":"2015","unstructured":"Shi, W.X., Liu, X.T., Wang, J., Tang, C.J.: Multi-bit quantum private query. Commun. Theor. Phys. 64(3), 299\u2013304 (2015)","journal-title":"Commun. Theor. Phys."},{"key":"1367_CR28","doi-asserted-by":"crossref","first-page":"042318","DOI":"10.1103\/PhysRevA.93.042318","volume":"93","author":"C-Y Wei","year":"2016","unstructured":"Wei, C.-Y., Wang, T.-Y., Gao, F.: Practical quantum private query with better performance in resisting joint-measurement attack. Phys. Rev. A 93, 042318 (2016)","journal-title":"Phys. Rev. A"},{"key":"1367_CR29","doi-asserted-by":"crossref","first-page":"012331","DOI":"10.1103\/PhysRevA.87.012331","volume":"87","author":"MVP Rao","year":"2013","unstructured":"Rao, M.V.P., Jakobi, M.: Towards communication-efficient quantum oblivious key distribution. Phys. Rev. A 87, 012331 (2013)","journal-title":"Phys. Rev. A"},{"issue":"3","key":"1367_CR30","first-page":"6600111","volume":"21","author":"F Gao","year":"2015","unstructured":"Gao, F., Liu, B., Huang, W., Wen, Q.-Y.: Postprocessing of the oblivious key in quantum private query. IEEE J. Sel. Top. Quantum Electron 21(3), 6600111 (2015)","journal-title":"IEEE J. Sel. Top. Quantum Electron"},{"key":"1367_CR31","unstructured":"Raynal, P.: Unambiguous state discrimination of two density matrices in quantum information theory. arXiv: quant-ph\/0611133"},{"key":"1367_CR32","doi-asserted-by":"crossref","first-page":"050301","DOI":"10.1103\/PhysRevA.71.050301","volume":"71","author":"U Herzog","year":"2005","unstructured":"Herzog, U., Bergou, J.A.: Optimum unambiguous discrimination of two mixed quantum states. Phys. Rev. A 71, 050301 (2005)","journal-title":"Phys. Rev. A"},{"key":"1367_CR33","volume-title":"Quantum detection and estimation theory","author":"CW Helstrom","year":"1976","unstructured":"Helstrom, C.W.: Quantum detection and estimation theory. Academic Press, New York (1976)"}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-016-1367-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11128-016-1367-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-016-1367-z","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,24]],"date-time":"2017-06-24T12:39:28Z","timestamp":1498307968000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11128-016-1367-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,6,18]]},"references-count":33,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2016,9]]}},"alternative-id":["1367"],"URL":"https:\/\/doi.org\/10.1007\/s11128-016-1367-z","relation":{},"ISSN":["1570-0755","1573-1332"],"issn-type":[{"value":"1570-0755","type":"print"},{"value":"1573-1332","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,6,18]]}}}