{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,14]],"date-time":"2026-02-14T01:57:51Z","timestamp":1771034271625,"version":"3.50.1"},"reference-count":91,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2017,3,18]],"date-time":"2017-03-18T00:00:00Z","timestamp":1489795200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61273250"],"award-info":[{"award-number":["61273250"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Innovation Foundation for Doctor Dissertation of Northwestern Polytechnical University","award":["CX201618"],"award-info":[{"award-number":["CX201618"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"published-print":{"date-parts":[[2017,5]]},"DOI":"10.1007\/s11128-017-1573-3","type":"journal-article","created":{"date-parts":[[2017,3,18]],"date-time":"2017-03-18T14:08:05Z","timestamp":1489846085000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":60,"title":["Semiquantum secure direct communication using EPR pairs"],"prefix":"10.1007","volume":"16","author":[{"given":"Ming-Hui","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Hui-Fang","family":"Li","sequence":"additional","affiliation":[]},{"given":"Zhao-Qiang","family":"Xia","sequence":"additional","affiliation":[]},{"given":"Xiao-Yi","family":"Feng","sequence":"additional","affiliation":[]},{"given":"Jin-Ye","family":"Peng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,3,18]]},"reference":[{"key":"1573_CR1","unstructured":"Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. In: Proceedings of the IEEE International Conference on Computers, Systems and Signal Processing, Bangalore. pp. 175\u2013179 (1984)"},{"issue":"6","key":"1573_CR2","doi-asserted-by":"publisher","first-page":"661","DOI":"10.1103\/PhysRevLett.67.661","volume":"67","author":"AK Ekert","year":"1991","unstructured":"Ekert, A.K.: Quantum cryptography based on bells theorem. Phys. Rev. Lett. 67(6), 661\u2013663 (1991)","journal-title":"Phys. Rev. Lett."},{"issue":"21","key":"1573_CR3","doi-asserted-by":"publisher","first-page":"3121","DOI":"10.1103\/PhysRevLett.68.3121","volume":"68","author":"CH Bennett","year":"1992","unstructured":"Bennett, C.H.: Quantum cryptography using any two nonorthogonal states. Phys. Rev. Lett. 68(21), 3121\u20133124 (1992)","journal-title":"Phys. Rev. Lett."},{"issue":"3","key":"1573_CR4","doi-asserted-by":"publisher","first-page":"1301","DOI":"10.1103\/RevModPhys.81.1301","volume":"81","author":"V Scarani","year":"2009","unstructured":"Scarani, V., Bechmann-Pasquinucci, H., Cerf, N.J., et al.: The security of practical quantum key distribution. Rev. Mod. Phys. 81(3), 1301\u20131350 (2009)","journal-title":"Rev. Mod. Phys."},{"issue":"5","key":"1573_CR5","doi-asserted-by":"publisher","first-page":"057901","DOI":"10.1103\/PhysRevLett.91.057901","volume":"91","author":"WY Hwang","year":"2003","unstructured":"Hwang, W.Y.: Quantum key distribution with high loss: toward global secure communication. Phys. Rev. Lett. 91(5), 057901 (2003)","journal-title":"Phys. Rev. Lett."},{"issue":"4","key":"1573_CR6","doi-asserted-by":"publisher","first-page":"042315","DOI":"10.1103\/PhysRevA.68.042315","volume":"68","author":"FG Deng","year":"2003","unstructured":"Deng, F.G., Long, G.L.: Controlled order rearrangement encryption for quantum key distribution. Phys. Rev. A 68(4), 042315 (2003)","journal-title":"Phys. Rev. A"},{"issue":"2","key":"1573_CR7","doi-asserted-by":"publisher","first-page":"022321","DOI":"10.1103\/PhysRevA.78.022321","volume":"78","author":"XH Li","year":"2008","unstructured":"Li, X.H., Deng, F.G., Zhou, H.Y.: Efficient quantum key distribution over a collective noise channel. Phys. Rev. A 78(2), 022321 (2008)","journal-title":"Phys. Rev. A"},{"issue":"13","key":"1573_CR8","doi-asserted-by":"publisher","first-page":"130503","DOI":"10.1103\/PhysRevLett.108.130503","volume":"108","author":"HK Lo","year":"2012","unstructured":"Lo, H.K., Curty, M., Qi, B.: Measurement-device-independent quantum key distribution. Phys. Rev. Lett. 108(13), 130503 (2012)","journal-title":"Phys. Rev. Lett."},{"issue":"3","key":"1573_CR9","doi-asserted-by":"publisher","first-page":"1829","DOI":"10.1103\/PhysRevA.59.1829","volume":"59","author":"M Hillery","year":"1999","unstructured":"Hillery, M., Buzek, V., Berthiaume, A.: Quantum secret sharing. Phys. Rev. A 59(3), 1829\u20131834 (1999)","journal-title":"Phys. Rev. A"},{"issue":"1","key":"1573_CR10","doi-asserted-by":"publisher","first-page":"162","DOI":"10.1103\/PhysRevA.59.162","volume":"59","author":"A Karlsson","year":"1999","unstructured":"Karlsson, A., Koashi, M., Imoto, N.: Quantum entanglement for secret sharing and secret splitting. Phys. Rev. A 59(1), 162\u2013168 (1999)","journal-title":"Phys. Rev. A"},{"issue":"3","key":"1573_CR11","doi-asserted-by":"publisher","first-page":"648","DOI":"10.1103\/PhysRevLett.83.648","volume":"83","author":"R Cleve","year":"1999","unstructured":"Cleve, R., Gottesman, D., Lo, H.K.: How to share a quantum secret. Phys. Rev. Lett. 83(3), 648\u2013651 (1999)","journal-title":"Phys. Rev. Lett."},{"issue":"5","key":"1573_CR12","doi-asserted-by":"publisher","first-page":"052307","DOI":"10.1103\/PhysRevA.69.052307","volume":"69","author":"L Xiao","year":"2004","unstructured":"Xiao, L., Long, G.L., Deng, F.G., et al.: Efficient multiparty quantum-secret-sharing schemes. Phys. Rev. A 69(5), 052307 (2004)","journal-title":"Phys. Rev. A"},{"key":"1573_CR13","unstructured":"Gottesman, D., Chuang, I.: Quantum digital signatures. arXiv:quant-ph\/0105032 (2001)"},{"issue":"4","key":"1573_CR14","doi-asserted-by":"publisher","first-page":"042304","DOI":"10.1103\/PhysRevA.91.042304","volume":"91","author":"P Wallden","year":"2015","unstructured":"Wallden, P., Dunjko, V., Kent, A., et al.: Quantum digital signatures with quantum-key-distribution components. Phys. Rev. A 91(4), 042304 (2015)","journal-title":"Phys. Rev. A"},{"issue":"10","key":"1573_CR15","doi-asserted-by":"publisher","first-page":"4283","DOI":"10.1007\/s11128-016-1383-z","volume":"15","author":"MH Zhang","year":"2016","unstructured":"Zhang, M.H., Li, H.F.: Fault-tolerant quantum blind signature protocols against collective noise. Quantum Inf. Process. 15(10), 4283\u20134301 (2016)","journal-title":"Quantum Inf. Process."},{"issue":"3","key":"1573_CR16","doi-asserted-by":"publisher","first-page":"032302","DOI":"10.1103\/PhysRevA.65.032302","volume":"65","author":"GL Long","year":"2002","unstructured":"Long, G.L., Liu, X.S.: Theoretically efficient high-capacity quantum-key-distribution scheme. Phys. Rev. A 65(3), 032302 (2002)","journal-title":"Phys. Rev. A"},{"issue":"4","key":"1573_CR17","doi-asserted-by":"publisher","first-page":"042317","DOI":"10.1103\/PhysRevA.68.042317","volume":"68","author":"FG Deng","year":"2003","unstructured":"Deng, F.G., Long, G.L., Liu, X.S.: Two-step quantum direct communication protocol using the Einstein\u2013Podolsky\u2013Rosen pair block. Phys. Rev. A 68(4), 042317 (2003)","journal-title":"Phys. Rev. A"},{"key":"1573_CR18","doi-asserted-by":"crossref","unstructured":"Zhang, W., Ding, D.S., Sheng, Y.B., et al.: Quantum secure direct communication with quantum memory. arXiv:1609.09184 (2016)","DOI":"10.1103\/PhysRevLett.118.220501"},{"issue":"5","key":"1573_CR19","doi-asserted-by":"publisher","first-page":"052319","DOI":"10.1103\/PhysRevA.69.052319","volume":"69","author":"FG Deng","year":"2004","unstructured":"Deng, F.G., Long, G.L.: Secure direct communication with a quantum one-time pad. Phys. Rev. A 69(5), 052319 (2004)","journal-title":"Phys. Rev. A"},{"issue":"9","key":"1573_CR20","doi-asserted-by":"publisher","first-page":"e16144","DOI":"10.1038\/lsa.2016.144","volume":"5","author":"JY Hu","year":"2016","unstructured":"Hu, J.Y., Yu, B., Jing, M.Y., et al.: Experimental quantum secure direct communication with single photons. Light Sci. Appl. 5(9), e16144 (2016)","journal-title":"Light Sci. Appl."},{"issue":"4","key":"1573_CR21","doi-asserted-by":"publisher","first-page":"256","DOI":"10.1016\/j.physleta.2006.05.035","volume":"358","author":"J Wang","year":"2006","unstructured":"Wang, J., Zhang, Q., Tang, C.J.: Quantum secure direct communication based on order rearrangement of single photons. Phys. Lett. A 358(4), 256\u2013258 (2006)","journal-title":"Phys. Lett. A"},{"key":"1573_CR22","unstructured":"Gao, T., Yan, F.L., Wang, Z.X.: Quantum secure direct communication by Einstein\u2013Podolsky\u2013Rosen pairs and entanglement swapping. arXiv:quant-ph\/0406083 (2004)"},{"issue":"4","key":"1573_CR23","doi-asserted-by":"publisher","first-page":"044305","DOI":"10.1103\/PhysRevA.71.044305","volume":"71","author":"C Wang","year":"2005","unstructured":"Wang, C., Deng, F.G., Li, Y.S., et al.: Quantum secure direct communication with high-dimension quantum superdense coding. Phys. Rev. A 71(4), 044305 (2005)","journal-title":"Phys. Rev. A"},{"issue":"1\u20132","key":"1573_CR24","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1016\/j.physleta.2006.01.035","volume":"354","author":"XR Jin","year":"2006","unstructured":"Jin, X.R., Ji, X., Zhang, Y.Q., et al.: Three-party quantum secure direct communication based on GHZ states. Phys. Lett. A 354(1\u20132), 67\u201370 (2006)","journal-title":"Phys. Lett. A"},{"issue":"1","key":"1573_CR25","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1088\/0256-307X\/24\/1\/005","volume":"24","author":"ZX Man","year":"2007","unstructured":"Man, Z.X., Xia, Y.J.: Improvement of security of three-party quantum secure direct communication based on GHZ states. Chin. Phys. Lett. 24(1), 15\u201318 (2007)","journal-title":"Chin. Phys. Lett."},{"issue":"18","key":"1573_CR26","doi-asserted-by":"publisher","first-page":"3855","DOI":"10.1088\/0953-4075\/39\/18\/015","volume":"39","author":"ZX Man","year":"2006","unstructured":"Man, Z.X., Xia, Y.J., Nguyen, B.: Quantum secure direct communication by using GHZ states and entanglement swapping. J. Phys. B At. Mol. Opt. Phys. 39(18), 3855\u20133863 (2006)","journal-title":"J. Phys. B At. Mol. Opt. Phys."},{"issue":"8","key":"1573_CR27","doi-asserted-by":"publisher","first-page":"1973","DOI":"10.1088\/0256-307X\/23\/8\/004","volume":"23","author":"ZX Man","year":"2006","unstructured":"Man, Z.X., Xia, Y.J.: Efficient one-sender versus N-receiver quantum secure direct communication. Chin. Phys. Lett. 23(8), 1973\u20131975 (2006)","journal-title":"Chin. Phys. Lett."},{"issue":"5","key":"1573_CR28","doi-asserted-by":"publisher","first-page":"1197","DOI":"10.1088\/1009-1963\/16\/5\/004","volume":"16","author":"ZX Man","year":"2007","unstructured":"Man, Z.X., Xia, Y.J.: Quantum secure direct communication via partially entangled states. Chin. Phys. 16(5), 1197\u20131200 (2007)","journal-title":"Chin. Phys."},{"issue":"5","key":"1573_CR29","doi-asserted-by":"publisher","first-page":"359","DOI":"10.1016\/j.physleta.2006.06.054","volume":"359","author":"FG Deng","year":"2006","unstructured":"Deng, F.G., Li, X.H., Li, C.Y., et al.: Quantum secure direct communication network with Einstein\u2013Podolsky\u2013Rosen pairs. Phys. Lett. A 359(5), 359\u2013365 (2006)","journal-title":"Phys. Lett. A"},{"issue":"8","key":"1573_CR30","doi-asserted-by":"publisher","first-page":"2149","DOI":"10.1088\/1009-1963\/16\/8\/001","volume":"16","author":"XH Li","year":"2007","unstructured":"Li, X.H., Li, C.Y., Deng, F.G., et al.: Quantum secure direct communication with quantum encryption based on pure entangled states. Chin. Phys. 16(8), 2149\u20132153 (2007)","journal-title":"Chin. Phys."},{"issue":"6","key":"1573_CR31","doi-asserted-by":"publisher","first-page":"064304","DOI":"10.1103\/PhysRevA.78.064304","volume":"78","author":"S Lin","year":"2008","unstructured":"Lin, S., Wen, Q.Y., Gao, F., et al.: Quantum secure direct communication with $$\\chi $$ \u03c7 -type entangled states. Phys. Rev. A 78(6), 064304 (2008)","journal-title":"Phys. Rev. A"},{"issue":"3","key":"1573_CR32","doi-asserted-by":"publisher","first-page":"443","DOI":"10.1142\/S0219749910006071","volume":"8","author":"C Wang","year":"2010","unstructured":"Wang, C., Hao, L., Song, S.Y., et al.: Quantum direct communication based on quantum search algorithm. Int. J. Quantum Inf. 8(3), 443\u2013450 (2010)","journal-title":"Int. J. Quantum Inf."},{"issue":"4","key":"1573_CR33","doi-asserted-by":"publisher","first-page":"040305","DOI":"10.1088\/0256-307X\/28\/4\/040305","volume":"28","author":"TJ Wang","year":"2011","unstructured":"Wang, T.J., Li, T., Du, F.F., et al.: High-capacity quantum secure direct communication based on quantum hyperdense coding with hyperentanglement. Chin. Phys. Lett. 28(4), 040305 (2011)","journal-title":"Chin. Phys. Lett."},{"issue":"1","key":"1573_CR34","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1016\/j.scib.2016.11.007","volume":"62","author":"FG Deng","year":"2017","unstructured":"Deng, F.G., Ren, B.C., Li, X.H.: Quantum hyperentanglement and its applications in quantum information processing. Sci. Bull. 62(1), 46\u201348 (2017)","journal-title":"Sci. Bull."},{"issue":"7","key":"1573_CR35","doi-asserted-by":"publisher","first-page":"1680","DOI":"10.1088\/0256-307X\/23\/7\/007","volume":"23","author":"ZX Man","year":"2006","unstructured":"Man, Z.X., Xia, Y.J.: Controlled bidirectional quantum direct communication by using a GHZ state. Chin. Phys. Lett. 23(7), 1680\u20131682 (2006)","journal-title":"Chin. Phys. Lett."},{"issue":"4","key":"1573_CR36","doi-asserted-by":"publisher","first-page":"040305","DOI":"10.1088\/0256-307X\/30\/4\/040305","volume":"30","author":"TY Ye","year":"2013","unstructured":"Ye, T.Y., Jiang, L.Z.: Improvement of controlled bidirectional quantum direct communication using a GHZ state. Chin. Phys. Lett. 30(4), 040305 (2013)","journal-title":"Chin. Phys. Lett."},{"issue":"9","key":"1573_CR37","doi-asserted-by":"publisher","first-page":"3515","DOI":"10.1007\/s11128-015-1050-9","volume":"14","author":"CH Chang","year":"2015","unstructured":"Chang, C.H., Luo, Y.P., Yang, C.W., et al.: Intercept-and-resend attack on controlled bidirectional quantum direct communication and its improvement. Quantum Inf. Process. 14(9), 3515\u20133522 (2015)","journal-title":"Quantum Inf. Process."},{"issue":"5","key":"1573_CR38","doi-asserted-by":"publisher","first-page":"2137","DOI":"10.1007\/s11128-016-1268-1","volume":"15","author":"XQ Tan","year":"2016","unstructured":"Tan, X.Q., Zhang, X.Q.: Controlled quantum secure direct communication by entanglement distillation or generalized measurement. Quantum Inf. Process. 15(5), 2137\u20132154 (2016)","journal-title":"Quantum Inf. Process."},{"issue":"5","key":"1573_CR39","doi-asserted-by":"publisher","first-page":"942","DOI":"10.1007\/s11433-011-4265-5","volume":"54","author":"B Gu","year":"2011","unstructured":"Gu, B., Zhang, C.Y., Cheng, G.S., et al.: Robust quantum secure direct communication with a quantum one-time pad over a collective-noise channel. Sci. China Phys. Mech. Astron. 54(5), 942\u2013947 (2011)","journal-title":"Sci. China Phys. Mech. Astron."},{"issue":"12","key":"1573_CR40","doi-asserted-by":"publisher","first-page":"4461","DOI":"10.1007\/s10773-013-1765-2","volume":"52","author":"B Gu","year":"2013","unstructured":"Gu, B., Huang, Y.G., Fang, X., et al.: Robust quantum secure communication with spatial quantum states of single photons. Int. J. Theor. Phys. 52(12), 4461\u20134469 (2013)","journal-title":"Int. J. Theor. Phys."},{"issue":"4","key":"1573_CR41","doi-asserted-by":"publisher","first-page":"1487","DOI":"10.1007\/s11128-015-0919-y","volume":"14","author":"TY Ye","year":"2015","unstructured":"Ye, T.Y.: Quantum secure direct dialogue over collective noise channels based on logical Bell states. Quantum Inf. Process. 14(4), 1487\u20131499 (2015)","journal-title":"Quantum Inf. Process."},{"issue":"4","key":"1573_CR42","first-page":"1","volume":"58","author":"TY Ye","year":"2015","unstructured":"Ye, T.Y.: Fault tolerant channel-encrypting quantum dialogue against collective noise. Sci. China Phys. Mech. Astron. 58(4), 1\u201310 (2015)","journal-title":"Sci. China Phys. Mech. Astron."},{"issue":"10","key":"1573_CR43","doi-asserted-by":"publisher","first-page":"100309","DOI":"10.1088\/1674-1056\/20\/10\/100309","volume":"20","author":"B Gu","year":"2011","unstructured":"Gu, B., Huang, Y.G., Fang, X., et al.: A two-step quantum secure direct communication protocol with hyperentanglement. Chin. Phys. B 20(10), 100309 (2011)","journal-title":"Chin. Phys. B"},{"issue":"4","key":"1573_CR44","doi-asserted-by":"publisher","first-page":"659","DOI":"10.1088\/0253-6102\/56\/4\/11","volume":"56","author":"B Gu","year":"2011","unstructured":"Gu, B., Huang, Y.G., Fang, X., et al.: Bidirectional quantum secure direct communication network protocol with hyperentanglement. Commun. Theor. Phys. 56(4), 659\u2013663 (2011)","journal-title":"Commun. Theor. Phys."},{"issue":"9","key":"1573_CR45","doi-asserted-by":"publisher","first-page":"2923","DOI":"10.1007\/s10773-012-1171-1","volume":"51","author":"D Liu","year":"2012","unstructured":"Liu, D., Chen, J.L., Jiang, W.: High-capacity quantum secure direct communication with single photons in both polarization and spatial-mode degrees of freedom. Int. J. Theor. Phys. 51(9), 2923\u20132929 (2012)","journal-title":"Int. J. Theor. Phys."},{"issue":"7","key":"1573_CR46","doi-asserted-by":"publisher","first-page":"2216","DOI":"10.1007\/s10773-014-2021-0","volume":"53","author":"YY Yang","year":"2014","unstructured":"Yang, Y.Y.: A quantum secure direct communication protocol without quantum memories. Int. J. Theor. Phys. 53(7), 2216\u20132221 (2014)","journal-title":"Int. J. Theor. Phys."},{"issue":"2","key":"1573_CR47","doi-asserted-by":"publisher","first-page":"589","DOI":"10.1007\/s10773-014-2251-1","volume":"54","author":"YB Li","year":"2015","unstructured":"Li, Y.B., Song, T.T., Huang, W.: Fault-tolerant quantum secure direct communication protocol based on decoherence-free states. Int. J. Theor. Phys. 54(2), 589\u2013597 (2015)","journal-title":"Int. J. Theor. Phys."},{"issue":"12","key":"1573_CR48","doi-asserted-by":"publisher","first-page":"2731","DOI":"10.1007\/s11128-014-0825-8","volume":"13","author":"P Yadav","year":"2014","unstructured":"Yadav, P., Srikanth, R., Pathak, A.: Two-step orthogonal-state-based protocol of quantum secure direct communication with the help of order-rearrangement technique. Quantum Inf. Process. 13(12), 2731\u20132743 (2014)","journal-title":"Quantum Inf. Process."},{"issue":"11","key":"1573_CR49","doi-asserted-by":"publisher","first-page":"4747","DOI":"10.1007\/s11128-016-1410-0","volume":"15","author":"AGDAH Guerra","year":"2016","unstructured":"Guerra, A.G.D.A.H., Rios, F.F.S., Ramos, R.V.: Quantum secure direct communication of digital and analog signals using continuum coherent states. Quantum Inf. Process. 15(11), 4747\u20134758 (2016)","journal-title":"Quantum Inf. Process."},{"issue":"1","key":"1573_CR50","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1007\/s10773-014-2205-7","volume":"54","author":"WL Li","year":"2015","unstructured":"Li, W.L., Chen, J.B., Wang, X.L., et al.: Quantum secure direct communication achieved by using multi-entanglement. Int. J. Theor. Phys. 54(1), 100\u2013105 (2015)","journal-title":"Int. J. Theor. Phys."},{"issue":"16","key":"1573_CR51","doi-asserted-by":"crossref","first-page":"160307","DOI":"10.7498\/aps.64.160307","volume":"64","author":"XH Li","year":"2015","unstructured":"Li, X.H.: Quantum secure direct communication. Acta Phys. Sin. 64(16), 160307 (2015)","journal-title":"Acta Phys. Sin."},{"issue":"14","key":"1573_CR52","doi-asserted-by":"publisher","first-page":"140501","DOI":"10.1103\/PhysRevLett.99.140501","volume":"99","author":"M Boyer","year":"2007","unstructured":"Boyer, M., Kenigsberg, D., Mor, T.: Quantum key distribution with classical Bob. Phys. Rev. Lett. 99(14), 140501 (2007)","journal-title":"Phys. Rev. Lett."},{"issue":"9","key":"1573_CR53","doi-asserted-by":"publisher","first-page":"098901","DOI":"10.1103\/PhysRevLett.102.098901","volume":"102","author":"YG Tan","year":"2009","unstructured":"Tan, Y.G., Lu, H., Cai, Q.Y.: Comment on \u201cQuantum key distribution with classical Bob\u201d. Phys. Rev. Lett. 102(9), 098901 (2009)","journal-title":"Phys. Rev. Lett."},{"issue":"9","key":"1573_CR54","doi-asserted-by":"publisher","first-page":"098902","DOI":"10.1103\/PhysRevLett.102.098902","volume":"102","author":"M Boyer","year":"2009","unstructured":"Boyer, M., Kenigsberg, D., Mor, T.: Comment on \u201cQuantum Key Distribution with Classical Bob\u201d Reply. Phys. Rev. Lett. 102(9), 098902 (2009)","journal-title":"Phys. Rev. Lett."},{"issue":"3","key":"1573_CR55","doi-asserted-by":"publisher","first-page":"032341","DOI":"10.1103\/PhysRevA.79.032341","volume":"79","author":"M Boyer","year":"2009","unstructured":"Boyer, M., Gelles, R., Kenigsberg, D., et al.: Semiquantum key distribution. Phys. Rev. A 79(3), 032341 (2009)","journal-title":"Phys. Rev. A"},{"issue":"6","key":"1573_CR56","doi-asserted-by":"publisher","first-page":"1195","DOI":"10.1142\/S0219749908004353","volume":"6","author":"H Lu","year":"2008","unstructured":"Lu, H., Cai, Q.Y.: Quantum key distribution with classical Alice. Int. J. Quantum Inf. 6(6), 1195\u20131202 (2008)","journal-title":"Int. J. Quantum Inf."},{"issue":"6","key":"1573_CR57","doi-asserted-by":"publisher","first-page":"2143","DOI":"10.1088\/1674-1056\/18\/6\/006","volume":"18","author":"XZ Zhang","year":"2009","unstructured":"Zhang, X.Z., Gong, W.G., Tan, Y.G., et al.: Quantum key distribution series network protocol with M-classical Bobs. Chin. Phys. B 18(6), 2143\u20132148 (2009)","journal-title":"Chin. Phys. B"},{"issue":"5","key":"1573_CR58","doi-asserted-by":"publisher","first-page":"052312","DOI":"10.1103\/PhysRevA.79.052312","volume":"79","author":"XF Zou","year":"2009","unstructured":"Zou, X.F., Qiu, D.W., Li, L.Z., et al.: Semiquantum-key distribution using less than four quantum states. Phys. Rev. A 79(5), 052312 (2009)","journal-title":"Phys. Rev. A"},{"key":"1573_CR59","unstructured":"Boyer, M., Mor, T.: On the robustness of (photonic) quantum key distribution with classical Alice. arXiv:1012.2418 (2010)"},{"issue":"4","key":"1573_CR60","doi-asserted-by":"publisher","first-page":"046301","DOI":"10.1103\/PhysRevA.83.046301","volume":"83","author":"M Boyer","year":"2011","unstructured":"Boyer, M., Mor, T.: Comment on \u201cSemiquantum-key distribution using less than four quantum states\u201d. Phys. Rev. A 83(4), 046301 (2011)","journal-title":"Phys. Rev. A"},{"issue":"4","key":"1573_CR61","doi-asserted-by":"publisher","first-page":"046302","DOI":"10.1103\/PhysRevA.83.046302","volume":"83","author":"XF Zou","year":"2011","unstructured":"Zou, X.F., Qiu, D.W.: Reply to \u201cComment on \u2018Semiquantum-key distribution using less than four quantum states\u201d\u2019. Phys. Rev. A 83(4), 046302 (2011)","journal-title":"Phys. Rev. A"},{"issue":"6","key":"1573_CR62","doi-asserted-by":"publisher","first-page":"1427","DOI":"10.1142\/S0219749911008118","volume":"9","author":"T Miyadera","year":"2011","unstructured":"Miyadera, T.: Relation between information and disturbance in quantum key distribution protocol with classical Alice. Int. J. Quantum Inf. 9(6), 1427\u20131435 (2011)","journal-title":"Int. J. Quantum Inf."},{"issue":"10","key":"1573_CR63","doi-asserted-by":"publisher","first-page":"100301","DOI":"10.1088\/0256-307X\/28\/10\/100301","volume":"28","author":"J Wang","year":"2011","unstructured":"Wang, J., Zhang, S., Zhang, Q., et al.: Semiquantum key distribution using entangled states. Chin. Phys. Lett. 28(10), 100301 (2011)","journal-title":"Chin. Phys. Lett."},{"issue":"6","key":"1573_CR64","doi-asserted-by":"publisher","first-page":"1457","DOI":"10.1007\/s11128-014-0740-z","volume":"13","author":"KF Yu","year":"2014","unstructured":"Yu, K.F., Yang, C.W., Liao, C.H., et al.: Authenticated semi-quantum key distribution protocol using Bell states. Quantum Inf. Process. 13(6), 1457\u20131465 (2014)","journal-title":"Quantum Inf. Process."},{"issue":"11","key":"1573_CR65","doi-asserted-by":"publisher","first-page":"2417","DOI":"10.1007\/s11128-014-0802-2","volume":"13","author":"WO Krawec","year":"2014","unstructured":"Krawec, W.O.: Restricted attacks on semi-quantum key distribution protocols. Quantum Inf. Process. 13(11), 2417\u20132436 (2014)","journal-title":"Quantum Inf. Process."},{"issue":"2","key":"1573_CR66","doi-asserted-by":"publisher","first-page":"681","DOI":"10.1007\/s11128-014-0872-1","volume":"14","author":"YG Yang","year":"2015","unstructured":"Yang, Y.G., Sun, S.J., Zhao, Q.Q.: Trojan-horse attacks on quantum key distribution with classical Bob. Quantum Inf. Process. 14(2), 681\u2013686 (2015)","journal-title":"Quantum Inf. Process."},{"key":"1573_CR67","doi-asserted-by":"publisher","first-page":"19898","DOI":"10.1038\/srep19898","volume":"6","author":"Q Li","year":"2016","unstructured":"Li, Q., Chan, W.H., Zhang, S.Y.: Semiquantum key distribution with secure delegated quantum computation. Sci. Rep. 6, 19898 (2016)","journal-title":"Sci. Rep."},{"issue":"8","key":"1573_CR68","doi-asserted-by":"publisher","first-page":"2981","DOI":"10.1007\/s11128-015-1015-z","volume":"14","author":"XF Zou","year":"2015","unstructured":"Zou, X.F., Qiu, D.W., Zhang, S.Y.: Semiquantum key distribution without invoking the classical party\u2019s measurement capability. Quantum Inf. Process. 14(8), 2981\u20132996 (2015)","journal-title":"Quantum Inf. Process."},{"issue":"3","key":"1573_CR69","doi-asserted-by":"publisher","first-page":"032323","DOI":"10.1103\/PhysRevA.91.032323","volume":"91","author":"WO Krawec","year":"2015","unstructured":"Krawec, W.O.: Mediated semiquantum key distribution. Phys. Rev. A 91(3), 032323 (2015)","journal-title":"Phys. Rev. A"},{"issue":"2","key":"1573_CR70","doi-asserted-by":"publisher","first-page":"022303","DOI":"10.1103\/PhysRevA.82.022303","volume":"82","author":"Q Li","year":"2010","unstructured":"Li, Q., Chan, W.H., Long, D.Y.: Semiquantum secret sharing using entangled states. Phys. Rev. A 82(2), 022303 (2010)","journal-title":"Phys. Rev. A"},{"issue":"5","key":"1573_CR71","doi-asserted-by":"publisher","first-page":"1250050","DOI":"10.1142\/S0219749912500505","volume":"10","author":"J Wang","year":"2012","unstructured":"Wang, J., Zhang, S., Zhang, Q., et al.: Semiquantum secret sharing using two-particle entangled state. Int. J. Quantum Inf. 10(5), 1250050 (2012)","journal-title":"Int. J. Quantum Inf."},{"issue":"4","key":"1573_CR72","doi-asserted-by":"publisher","first-page":"045304","DOI":"10.1088\/1751-8113\/46\/4\/045304","volume":"46","author":"LZ Li","year":"2013","unstructured":"Li, L.Z., Qiu, D.W., Mateus, P.: Quantum secret sharing with classical Bobs. J. Phys. A Math. Theor. 46(4), 045304 (2013)","journal-title":"J. Phys. A Math. Theor."},{"issue":"10","key":"1573_CR73","doi-asserted-by":"publisher","first-page":"1650130","DOI":"10.1142\/S021798491650130X","volume":"30","author":"G Gao","year":"2016","unstructured":"Gao, G., Wang, Y., Wang, D.: Multiparty semiquantum secret sharing based on rearranging orders of qubits. Mod. Phys. Lett. B 30(10), 1650130 (2016)","journal-title":"Mod. Phys. Lett. B"},{"issue":"9","key":"1573_CR74","doi-asserted-by":"publisher","first-page":"1696","DOI":"10.1007\/s11433-014-5542-x","volume":"57","author":"XF Zou","year":"2014","unstructured":"Zou, X.F., Qiu, D.W.: Three-step semiquantum secure direct communication protocol. Sci. China Phys. Mech. Astron. 57(9), 1696\u20131702 (2014)","journal-title":"Sci. China Phys. Mech. Astron."},{"issue":"2","key":"1573_CR75","doi-asserted-by":"publisher","first-page":"947","DOI":"10.1007\/s11128-015-1182-y","volume":"15","author":"YP Luo","year":"2016","unstructured":"Luo, Y.P., Hwang, T.: Authenticated semi-quantum direct communication protocols using Bell states. Quantum Inf. Process. 15(2), 947\u2013958 (2016)","journal-title":"Quantum Inf. Process."},{"issue":"5","key":"1573_CR76","doi-asserted-by":"publisher","first-page":"1049","DOI":"10.1088\/0256-307X\/22\/5\/006","volume":"22","author":"CY Li","year":"2005","unstructured":"Li, C.Y., Zhou, H.Y., Wang, Y., et al.: Secure quantum key distribution network with Bell states and local unitary operations. Chin. Phys. Lett. 22(5), 1049\u20131052 (2005)","journal-title":"Chin. Phys. Lett."},{"issue":"11","key":"1573_CR77","doi-asserted-by":"publisher","first-page":"2896","DOI":"10.1088\/0256-307X\/23\/11\/004","volume":"23","author":"CY Li","year":"2006","unstructured":"Li, C.Y., Li, X.H., Deng, F.G., et al.: Efficient quantum cryptography network without entanglement and quantum memory. Chin. Phys. Lett. 23(11), 2896\u20132899 (2006)","journal-title":"Chin. Phys. Lett."},{"issue":"1\u20132","key":"1573_CR78","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1016\/j.physleta.2005.10.050","volume":"351","author":"QY Cai","year":"2006","unstructured":"Cai, Q.Y.: Eavesdropping on the two-way quantum communication protocols with invisible photons. Phys. Lett. A 351(1\u20132), 23\u201325 (2006)","journal-title":"Phys. Lett. A"},{"issue":"5","key":"1573_CR79","doi-asserted-by":"publisher","first-page":"054302","DOI":"10.1103\/PhysRevA.74.054302","volume":"74","author":"XH Li","year":"2006","unstructured":"Li, X.H., Deng, F.G., Zhou, H.Y.: Improving the security of secure direct communication based on the secret transmitting order of particles. Phys. Rev. A 74(5), 054302 (2006)","journal-title":"Phys. Rev. A"},{"issue":"4","key":"1573_CR80","doi-asserted-by":"publisher","first-page":"044302","DOI":"10.1103\/PhysRevA.72.044302","volume":"72","author":"FG Deng","year":"2005","unstructured":"Deng, F.G., Li, X.H., Zhou, H.Y., et al.: Improving the security of multiparty quantum secret sharing against Trojan horse attack. Phys. Rev. A 72(4), 044302 (2005)","journal-title":"Phys. Rev. A"},{"key":"1573_CR81","volume-title":"Quantum Computation and Quantum Information","author":"MA Nielsen","year":"2000","unstructured":"Nielsen, M.A., Chuang, I.L.: Quantum Computation and Quantum Information. Cambridge University Press, Cambridge (2000)"},{"issue":"3","key":"1573_CR82","doi-asserted-by":"publisher","first-page":"032310","DOI":"10.1103\/PhysRevA.69.032310","volume":"69","author":"IP Degiovanni","year":"2004","unstructured":"Degiovanni, I.P., Ruo Berchera, I., Castelletto, S., et al.: Quantum dense key distribution. Phys. Rev. A 69(3), 032310 (2004)","journal-title":"Phys. Rev. A"},{"issue":"14","key":"1573_CR83","doi-asserted-by":"publisher","first-page":"140501","DOI":"10.1103\/PhysRevLett.94.140501","volume":"94","author":"M Lucamarini","year":"2005","unstructured":"Lucamarini, M., Mancini, S.: Secure deterministic communication without entanglement. Phys. Rev. Lett. 94(14), 140501 (2005)","journal-title":"Phys. Rev. Lett."},{"issue":"1","key":"1573_CR84","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1103\/RevModPhys.74.145","volume":"74","author":"N Gisin","year":"2002","unstructured":"Gisin, N., Ribordy, G., Tittel, W., et al.: Quantum cryptography. Rev. Mod. Phys. 74(1), 145\u2013195 (2002)","journal-title":"Rev. Mod. Phys."},{"key":"1573_CR85","volume-title":"Quantum Theory: Concepts and Methods","author":"A Peres","year":"1997","unstructured":"Peres, A.: Quantum Theory: Concepts and Methods. Kluwer Academic, Dordrecht (1997)"},{"issue":"1","key":"1573_CR86","doi-asserted-by":"publisher","first-page":"012311","DOI":"10.1103\/PhysRevA.70.012311","volume":"70","author":"FG Deng","year":"2004","unstructured":"Deng, F.G., Long, G.L.: Bidirectional quantum key distribution protocol with practical faint laser pulses. Phys. Rev. A 70(1), 012311 (2004)","journal-title":"Phys. Rev. A"},{"issue":"45","key":"1573_CR87","doi-asserted-by":"publisher","first-page":"14089","DOI":"10.1088\/0305-4470\/39\/45\/018","volume":"39","author":"FG Deng","year":"2006","unstructured":"Deng, F.G., Zhou, H.Y., Long, G.L.: Circular quantum secret sharing. J. Phys. A Math. Gen. 39(45), 14089\u201314099 (2006)","journal-title":"J. Phys. A Math. Gen."},{"issue":"26","key":"1573_CR88","doi-asserted-by":"publisher","first-page":"5635","DOI":"10.1103\/PhysRevLett.85.5635","volume":"85","author":"A Cabello","year":"2000","unstructured":"Cabello, A.: Quantum key distribution in the Holevo limit. Phys. Rev. Lett. 85(26), 5635\u20135638 (2000)","journal-title":"Phys. Rev. Lett."},{"key":"1573_CR89","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511622748","volume-title":"Quantum Measurement","author":"VB Braginsky","year":"1992","unstructured":"Braginsky, V.B., Khalili, F.Y.: Quantum Measurement. Cambridge University Press, Cambridge (1992)"},{"issue":"6819","key":"1573_CR90","doi-asserted-by":"publisher","first-page":"490","DOI":"10.1038\/35054017","volume":"409","author":"C Liu","year":"2001","unstructured":"Liu, C., Dutton, Z., Behroozi, C.H., et al.: Observation of coherent optical information storage in an atomic medium using halted light pulses. Nature 409(6819), 490\u2013493 (2001)","journal-title":"Nature"},{"issue":"5","key":"1573_CR91","doi-asserted-by":"publisher","first-page":"783","DOI":"10.1103\/PhysRevLett.86.783","volume":"86","author":"DF Phillips","year":"2001","unstructured":"Phillips, D.F., Fleischhauer, A., Mair, A., et al.: Storage of light in atomic vapor. Phys. Rev. Lett. 86(5), 783\u2013786 (2001)","journal-title":"Phys. Rev. Lett."}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-017-1573-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11128-017-1573-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-017-1573-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,26]],"date-time":"2022-07-26T16:58:44Z","timestamp":1658854724000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11128-017-1573-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,3,18]]},"references-count":91,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2017,5]]}},"alternative-id":["1573"],"URL":"https:\/\/doi.org\/10.1007\/s11128-017-1573-3","relation":{},"ISSN":["1570-0755","1573-1332"],"issn-type":[{"value":"1570-0755","type":"print"},{"value":"1573-1332","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,3,18]]},"article-number":"117"}}