{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T15:12:04Z","timestamp":1777475524931,"version":"3.51.4"},"reference-count":59,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2017,6,5]],"date-time":"2017-06-05T00:00:00Z","timestamp":1496620800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61402407"],"award-info":[{"award-number":["61402407"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["11375152"],"award-info":[{"award-number":["11375152"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"published-print":{"date-parts":[[2017,7]]},"DOI":"10.1007\/s11128-017-1628-5","type":"journal-article","created":{"date-parts":[[2017,6,5]],"date-time":"2017-06-05T06:36:59Z","timestamp":1496644619000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":55,"title":["Multi-party quantum private comparison based on the entanglement swapping of d-level cat states and d-level Bell states"],"prefix":"10.1007","volume":"16","author":[{"given":"Ji","family":"Zhao-Xu","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5581-9895","authenticated-orcid":false,"given":"Ye","family":"Tian-Yu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,6,5]]},"reference":[{"key":"1628_CR1","first-page":"175","volume":"560","author":"CH Bennett","year":"1984","unstructured":"Bennett, C.H., Brassard, G.: Quantum cryptography: public-key distribution and coin tossing. Proc. IEEE Int. Conf. Comput. Syst. Signal Process. 560, 175\u2013179 (1984)","journal-title":"Proc. IEEE Int. Conf. Comput. Syst. Signal Process."},{"issue":"6","key":"1628_CR2","doi-asserted-by":"crossref","first-page":"661","DOI":"10.1103\/PhysRevLett.67.661","volume":"67","author":"AK Ekert","year":"1991","unstructured":"Ekert, A.K.: Quantum cryptography based on Bell\u2019s theorem. Phys. Rev. Lett. 67(6), 661\u2013663 (1991)","journal-title":"Phys. Rev. Lett."},{"issue":"21","key":"1628_CR3","doi-asserted-by":"crossref","first-page":"3121","DOI":"10.1103\/PhysRevLett.68.3121","volume":"68","author":"CH Bennett","year":"1992","unstructured":"Bennett, C.H.: Quantum cryptography using any two nonorthogonal states. Phys. Rev. Lett. 68(21), 3121 (1992)","journal-title":"Phys. Rev. Lett."},{"key":"1628_CR4","doi-asserted-by":"crossref","first-page":"5635","DOI":"10.1103\/PhysRevLett.85.5635","volume":"85","author":"A Cabello","year":"2000","unstructured":"Cabello, A.: Quantum key distribution in the Holevo limit. Phys. Rev. Lett. 85, 5635 (2000)","journal-title":"Phys. Rev. Lett."},{"issue":"6","key":"1628_CR5","doi-asserted-by":"crossref","first-page":"1602","DOI":"10.1109\/JSTQE.2009.2019617","volume":"15","author":"HC Shih","year":"2009","unstructured":"Shih, H.C., Lee, K.C., Hwang, T.: New efficient three-party quantum key distribution protocols. IEEE J. Sel. Top. Quantum Electron. 15(6), 1602\u20131606 (2009)","journal-title":"IEEE J. Sel. Top. Quantum Electron."},{"key":"1628_CR6","doi-asserted-by":"crossref","first-page":"032302","DOI":"10.1103\/PhysRevA.65.032302","volume":"65","author":"GL Long","year":"2002","unstructured":"Long, G.L., Liu, X.S.: Theoretically efficient high-capacity quantum-key-distribution scheme. Phys. Rev. A 65, 032302 (2002)","journal-title":"Phys. Rev. A"},{"key":"1628_CR7","doi-asserted-by":"crossref","first-page":"187902","DOI":"10.1103\/PhysRevLett.89.187902","volume":"89","author":"K Bostrom","year":"2002","unstructured":"Bostrom, K., Felbinger, T.: Deterministic secure direct communication using entanglement. Phys. Rev. Lett. 89, 187902 (2002)","journal-title":"Phys. Rev. Lett."},{"issue":"1","key":"1628_CR8","doi-asserted-by":"crossref","first-page":"515","DOI":"10.1016\/j.optcom.2010.08.037","volume":"284","author":"SK Chong","year":"2011","unstructured":"Chong, S.K., Hwang, T.: The enhancement of three-party simultaneous quantum secure direct communication scheme with EPR pairs. Opt. Commun. 284(1), 515\u2013518 (2011)","journal-title":"Opt. Commun."},{"issue":"6660","key":"1628_CR9","doi-asserted-by":"crossref","first-page":"575","DOI":"10.1038\/37539","volume":"390","author":"D Bouwmeester","year":"1997","unstructured":"Bouwmeester, D., Pan, J.W., Mattle, K., Eibl, M., Weinfurter, H., Zeilinger, A.: Experimental quantum teleportation. Nature 390(6660), 575\u2013579 (1997)","journal-title":"Nature"},{"issue":"5","key":"1628_CR10","doi-asserted-by":"crossref","first-page":"847","DOI":"10.1088\/6102\/44\/5\/847","volume":"44","author":"ZJ Zhang","year":"2005","unstructured":"Zhang, Z.J., Liu, Y.M., Man, Z.X.: Many-agent controlled teleportation of multi-qubit quantum information via quantum entanglement swapping. Commun. Theor. Phys. 44(5), 847\u2013849 (2005)","journal-title":"Commun. Theor. Phys."},{"issue":"11","key":"1628_CR11","doi-asserted-by":"crossref","first-page":"2059","DOI":"10.1007\/s11433-010-4050-x","volume":"53","author":"XF Yin","year":"2010","unstructured":"Yin, X.F., Liu, Y.M., Zhang, Z.Y., Zhang, W., Zhang, Z.J.: Perfect teleportation of an arbitrary three-qubit state with the highly entangled six-qubit genuine state. Sci. China Phys. Mech. Astron. 53(11), 2059\u20132063 (2010)","journal-title":"Sci. China Phys. Mech. Astron."},{"key":"1628_CR12","doi-asserted-by":"crossref","unstructured":"Yao, A.C.: Protocols for secure computations. In: Proceedings of 23rd IEEE Symposium on Foundations of Computer Science (FOCS\u2019 82), p. 160. Washington, DC (1982)","DOI":"10.1109\/SFCS.1982.38"},{"issue":"1\u20132","key":"1628_CR13","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1016\/S0166-218X(00)00342-5","volume":"111","author":"F Boudot","year":"2001","unstructured":"Boudot, F., Schoenmakers, B., Traor\u2019e, J.: A fair and efficient solution to the socialist millionaires\u2019problem. Discret. Appl. Math. 111(1\u20132), 23\u201336 (2001)","journal-title":"Discret. Appl. Math."},{"issue":"2","key":"1628_CR14","doi-asserted-by":"crossref","first-page":"1154","DOI":"10.1103\/PhysRevA.56.1154","volume":"56","author":"HK Lo","year":"1997","unstructured":"Lo, H.K.: Insecurity of quantum secure computations. Phys. Rev. A 56(2), 1154\u20131162 (1997)","journal-title":"Phys. Rev. A"},{"key":"1628_CR15","doi-asserted-by":"crossref","first-page":"055305","DOI":"10.1088\/1751-8113\/42\/5\/055305","volume":"42","author":"YG Yang","year":"2009","unstructured":"Yang, Y.G., Wen, Q.Y.: An efficient two-party quantum private comparison protocol with decoy photons and two-photon entanglement. J. Phys. A Math. Theor. 42, 055305 (2009)","journal-title":"J. Phys. A Math. Theor."},{"key":"1628_CR16","doi-asserted-by":"crossref","first-page":"1561","DOI":"10.1016\/j.optcom.2009.11.085","volume":"283","author":"XB Chen","year":"2010","unstructured":"Chen, X.B., Xu, G., Niu, X.X., Wen, Q.Y., Yang, Y.X.: An efficient protocol for the private comparison of equal information based on the triplet entangled state and single-particle measurement. Opt. Commun. 283, 1561 (2010)","journal-title":"Opt. Commun."},{"key":"1628_CR17","doi-asserted-by":"crossref","first-page":"2412","DOI":"10.1016\/j.optcom.2010.12.070","volume":"284","author":"J Lin","year":"2011","unstructured":"Lin, J., Tseng, H.Y., Hwang, T.: Intercept\u2013resend attacks on Chen et al\u2019.s quantum private comparison protocol and the improvements. Opt. Commun. 284, 2412\u20132414 (2011)","journal-title":"Opt. Commun."},{"key":"1628_CR18","doi-asserted-by":"crossref","first-page":"065002","DOI":"10.1088\/0031-8949\/80\/06\/065002","volume":"80","author":"YG Yang","year":"2009","unstructured":"Yang, Y.G., Gao, W.F., Wen, Q.Y.: Secure quantum private comparison. Phys. Scr. 80, 065002 (2009)","journal-title":"Phys. Scr."},{"key":"1628_CR19","doi-asserted-by":"crossref","first-page":"583","DOI":"10.1088\/0253-6102\/57\/4\/11","volume":"57","author":"W Liu","year":"2012","unstructured":"Liu, W., Wang, Y.B., Cui, W.: Quantum private comparison protocol based on Bell entangled states. Commun. Theor. Phys. 57, 583\u2013588 (2012)","journal-title":"Commun. Theor. Phys."},{"key":"1628_CR20","doi-asserted-by":"crossref","first-page":"1250065","DOI":"10.1142\/S0219749912500657","volume":"10","author":"YG Yang","year":"2012","unstructured":"Yang, Y.G., Xia, J., Jia, X., Shi, L., Zhang, H.: New quantum private comparison protocol without entanglement. Int. J. Quantum Inf. 10, 1250065 (2012)","journal-title":"Int. J. Quantum Inf."},{"key":"1628_CR21","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1007\/s11128-012-0505-5","volume":"13","author":"XB Chen","year":"2014","unstructured":"Chen, X.B., Su, Y., Niu, X.X., Yang, Y.X.: Efficient and feasible quantum private comparison of equality against the collective amplitude damping noise. Quantum Inf. Process. 13, 101\u2013112 (2014)","journal-title":"Quantum Inf. Process."},{"key":"1628_CR22","doi-asserted-by":"crossref","first-page":"887","DOI":"10.1007\/s11128-012-0439-y","volume":"12","author":"B Liu","year":"2013","unstructured":"Liu, B., Gao, F., Jia, H.Y., Huang, W., Zhang, W.W., Wen, Q.Y.: Efficient quantum private comparison employing single photons and collective detection. Quantum Inf. Process. 12, 887\u2013897 (2013)","journal-title":"Quantum Inf. Process."},{"key":"1628_CR23","doi-asserted-by":"crossref","first-page":"3212","DOI":"10.1007\/s10773-013-1616-1","volume":"52","author":"W Zi","year":"2013","unstructured":"Zi, W., Guo, F.Z., Luo, Y., Cao, S.H., Wen, Q.Y.: Quantum private comparison protocol with the random rotation. Int. J. Theor. Phys. 52, 3212\u20133219 (2013)","journal-title":"Int. J. Theor. Phys."},{"key":"1628_CR24","doi-asserted-by":"crossref","first-page":"373","DOI":"10.1007\/s11128-011-0251-0","volume":"11","author":"HY Tseng","year":"2012","unstructured":"Tseng, H.Y., Lin, J., Hwang, T.: New quantum private comparison protocol using EPR pairs. Quantum Inf. Process. 11, 373\u2013384 (2012)","journal-title":"Quantum Inf. Process."},{"key":"1628_CR25","doi-asserted-by":"crossref","first-page":"1350039","DOI":"10.1142\/S0219749913500391","volume":"11","author":"C Wang","year":"2013","unstructured":"Wang, C., Xu, G., Yang, Y.X.: Cryptanalysis and improvements for the quantum private comparison protocol using EPR pairs. Int. J. Quantum Inf. 11, 1350039 (2013)","journal-title":"Int. J. Quantum Inf."},{"key":"1628_CR26","doi-asserted-by":"crossref","first-page":"877","DOI":"10.1007\/s11128-012-0433-4","volume":"12","author":"YG Yang","year":"2013","unstructured":"Yang, Y.G., Xia, J., Jia, X., Zhang, H.: Comment on quantum private comparison protocols with a semi-honest third party. Quantum Inf. Process. 12, 877\u2013885 (2013)","journal-title":"Quantum Inf. Process."},{"key":"1628_CR27","doi-asserted-by":"crossref","first-page":"1981","DOI":"10.1007\/s11128-012-0507-3","volume":"12","author":"WW Zhang","year":"2013","unstructured":"Zhang, W.W., Zhang, K.J.: Cryptanalysis and improvement of the quantum private comparison protocol with semi-honest third party. Quantum Inf. Process. 12, 1981\u20131990 (2013)","journal-title":"Quantum Inf. Process."},{"key":"1628_CR28","doi-asserted-by":"crossref","first-page":"3191","DOI":"10.1007\/s10773-014-2116-7","volume":"53","author":"YB Li","year":"2014","unstructured":"Li, Y.B., Ma, Y.J., Xu, S.W., Huang, W., Zhang, Y.S.: Quantum private comparison based on phase encoding of single photons. Int. J. Theor. Phys. 53, 3191\u20133200 (2014)","journal-title":"Int. J. Theor. Phys."},{"key":"1628_CR29","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1007\/s11128-013-0708-4","volume":"13","author":"XT Liu","year":"2014","unstructured":"Liu, X.T., Zhang, B., Wang, J., Tang, C.J., Zhao, J.J.: Differential phase shift quantum private comparison. Quantum Inf. Process. 13, 71\u201384 (2014)","journal-title":"Quantum Inf. Process."},{"key":"1628_CR30","doi-asserted-by":"crossref","first-page":"3596","DOI":"10.1007\/s10773-012-1246-z","volume":"51","author":"W Liu","year":"2012","unstructured":"Liu, W., Wang, Y.B.: Quantum private comparison based on GHZ entangled states. Int. J. Theor. Phys. 51, 3596\u20133604 (2012)","journal-title":"Int. J. Theor. Phys."},{"issue":"7","key":"1628_CR31","doi-asserted-by":"crossref","first-page":"2167","DOI":"10.1007\/s10773-013-1983-7","volume":"53","author":"J Li","year":"2014","unstructured":"Li, J., Zhou, H.F., Jia, L., Zhang, T.T.: An efficient protocol for the private comparison of equal information based on four-particle entangled W state and Bell entangled states swapping. Int. J. Theor. Phys. 53(7), 2167\u20132176 (2014)","journal-title":"Int. J. Theor. Phys."},{"key":"1628_CR32","doi-asserted-by":"crossref","first-page":"3160","DOI":"10.1016\/j.optcom.2011.02.017","volume":"284","author":"W Liu","year":"2011","unstructured":"Liu, W., Wang, Y.B., Jiang, Z.T.: An efficient protocol for the quantum private comparison of equality with W state. Opt. Commun. 284, 3160\u20133163 (2011)","journal-title":"Opt. Commun."},{"issue":"5","key":"1628_CR33","doi-asserted-by":"crossref","first-page":"1723","DOI":"10.1007\/s10773-013-1970-z","volume":"53","author":"WW Zhang","year":"2014","unstructured":"Zhang, W.W., Li, D., Li, Y.B.: Quantum private comparison protocol with W States. Int. J. Theor. Phys. 53(5), 1723\u20131729 (2014)","journal-title":"Int. J. Theor. Phys."},{"key":"1628_CR34","doi-asserted-by":"crossref","first-page":"711","DOI":"10.1088\/0253-6102\/65\/6\/711","volume":"65","author":"ZX Ji","year":"2016","unstructured":"Ji, Z.X., Ye, T.Y.: Quantum private comparison of equal information based on highly entangled six-qubit genuine state. Commun. Theor. Phys. 65, 711\u2013715 (2016)","journal-title":"Commun. Theor. Phys."},{"key":"1628_CR35","doi-asserted-by":"crossref","first-page":"212","DOI":"10.1007\/s10773-012-1321-5","volume":"52","author":"ZW Sun","year":"2013","unstructured":"Sun, Z.W., Long, D.Y.: Quantum private comparison protocol based on cluster states. Int. J. Theor. Phys. 52, 212\u2013218 (2013)","journal-title":"Int. J. Theor. Phys."},{"key":"1628_CR36","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1007\/s10773-011-0878-8","volume":"51","author":"W Liu","year":"2012","unstructured":"Liu, W., Wang, Y.B., Jiang, Z.T., Cao, Y.Z.: A protocol for the quantum private comparison of equality with \n                        $$\\chi $$\n                        \n                            \n                                            \n                                \u03c7\n                            \n                        \n                    -type state. Int. J. Theor. Phys. 51, 69\u201377 (2012)","journal-title":"Int. J. Theor. Phys."},{"key":"1628_CR37","doi-asserted-by":"crossref","first-page":"1953","DOI":"10.1007\/s10773-011-1073-7","volume":"51","author":"W Liu","year":"2012","unstructured":"Liu, W., Wang, Y.B., Jiang, Z.T., Cao, Y.Z., Cui, W.: New quantum private comparison protocol using \n                        $$\\chi $$\n                        \n                            \n                                            \n                                \u03c7\n                            \n                        \n                    -type state. Int. J. Theor. Phys. 51, 1953\u20131960 (2012)","journal-title":"Int. J. Theor. Phys."},{"key":"1628_CR38","doi-asserted-by":"crossref","first-page":"4185","DOI":"10.1007\/s10773-013-1731-z","volume":"52","author":"S Lin","year":"2013","unstructured":"Lin, S., Guo, G.D., Liu, X.F.: Quantum private comparison of equality with \n                        $$\\chi $$\n                        \n                            \n                                            \n                                \u03c7\n                            \n                        \n                    -type entangled states. Int. J. Theor. Phys. 52, 4185\u20134194 (2013)","journal-title":"Int. J. Theor. Phys."},{"key":"1628_CR39","doi-asserted-by":"crossref","first-page":"1077","DOI":"10.1007\/s11128-012-0454-z","volume":"12","author":"YJ Chang","year":"2013","unstructured":"Chang, Y.J., Tsai, C.W., Hwang, T.: Multi-user private comparison protocol using GHZ class states. Quantum Inf. Process. 12, 1077\u20131088 (2013)","journal-title":"Quantum Inf. Process."},{"key":"1628_CR40","doi-asserted-by":"crossref","first-page":"1085","DOI":"10.1007\/s10773-013-1903-x","volume":"53","author":"W Liu","year":"2014","unstructured":"Liu, W., Wang, Y.B., Wang, X.M.: Multi-party quantum private comparison protocol using \n                        $$d$$\n                        \n                            \n                                            \n                                d\n                            \n                        \n                    -dimensional basis states without entanglement swapping. Int. J. Theor. Phys. 53, 1085\u20131091 (2014)","journal-title":"Int. J. Theor. Phys."},{"key":"1628_CR41","doi-asserted-by":"crossref","first-page":"2375","DOI":"10.1007\/s11128-014-0774-2","volume":"13","author":"QL Wang","year":"2014","unstructured":"Wang, Q.L., Sun, H.X., Huang, W.: Multi-party quantum private comparison protocol with \n                        $$n$$\n                        \n                            \n                                            \n                                n\n                            \n                        \n                    -level entangled states. Quantum Inf. Process. 13, 2375\u20132389 (2014)","journal-title":"Quantum Inf. Process."},{"key":"1628_CR42","doi-asserted-by":"crossref","first-page":"4497","DOI":"10.1103\/PhysRevLett.84.4497","volume":"84","author":"NJ Cerf","year":"2000","unstructured":"Cerf, N.J.: Pauli cloning of a quantum bit. Phys. Rev. Lett. 84, 4497 (2000)","journal-title":"Phys. Rev. Lett."},{"issue":"2\u20133","key":"1628_CR43","doi-asserted-by":"crossref","first-page":"187","DOI":"10.1080\/09500340008244036","volume":"47","author":"NJ Cerf","year":"2000","unstructured":"Cerf, N.J.: Asymmetric quantum cloning in any dimension. J. Mod. Opt. 47(2\u20133), 187\u2013209 (2000)","journal-title":"J. Mod. Opt."},{"issue":"3","key":"1628_CR44","first-page":"115","volume":"48","author":"NJ Cerf","year":"1998","unstructured":"Cerf, N.J.: Asymmetric quantum cloning machines. Acta Phys. Slov. 48(3), 115 (1998)","journal-title":"Acta Phys. Slov."},{"key":"1628_CR45","doi-asserted-by":"crossref","first-page":"042320","DOI":"10.1103\/PhysRevA.65.042320","volume":"65","author":"V Karimipour","year":"2002","unstructured":"Karimipour, V., Bahraminasab, A., Bagherinezhad, S.: Entanglement swapping of generalized cat states and secret sharing. Phys. Rev. A 65, 042320 (2002)","journal-title":"Phys. Rev. A"},{"issue":"5","key":"1628_CR46","doi-asserted-by":"crossref","first-page":"1049","DOI":"10.1088\/0256-307X\/22\/5\/006","volume":"22","author":"CY Li","year":"2005","unstructured":"Li, C.Y., Zhou, H.Y., Wang, Y., Deng, F.G.: Secure quantum key distribution network with Bell states and local unitary operations. Chin. Phys. Lett. 22(5), 1049 (2005)","journal-title":"Chin. Phys. Lett."},{"issue":"11","key":"1628_CR47","doi-asserted-by":"crossref","first-page":"2896","DOI":"10.1088\/0256-307X\/23\/11\/004","volume":"23","author":"CY Li","year":"2006","unstructured":"Li, C.Y., Li, X.H., Deng, F.G., Zhou, P., Liang, Y.J., Zhou, H.Y.: Efficient quantum cryptography network without entanglement and quantum memory. Chin. Phys. Lett. 23(11), 2896 (2006)","journal-title":"Chin. Phys. Lett."},{"issue":"1","key":"1628_CR48","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1088\/0256-307X\/24\/1\/006","volume":"24","author":"Y Chen","year":"2007","unstructured":"Chen, Y., Man, Z.X., Xia, Y.J.: Quantum bidirectional secure direct communication via entanglement swapping. Chin. Phys. Lett. 24(1), 19 (2007)","journal-title":"Chin. Phys. Lett."},{"issue":"4","key":"1628_CR49","doi-asserted-by":"crossref","first-page":"040305","DOI":"10.1088\/0256-307X\/30\/4\/040305","volume":"30","author":"TY Ye","year":"2013","unstructured":"Ye, T.Y., Jiang, L.Z.: Improvement of controlled bidirectional quantum direct communication using a GHZ state. Chin. Phys. Lett. 30(4), 040305 (2013)","journal-title":"Chin. Phys. Lett."},{"issue":"1\u20132","key":"1628_CR50","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1016\/j.physleta.2005.10.050","volume":"351","author":"QY Cai","year":"2006","unstructured":"Cai, Q.Y.: Eavesdropping on the two-way quantum communication protocols with invisible photons. Phys. Lett. A 351(1\u20132), 23\u201325 (2006)","journal-title":"Phys. Lett. A"},{"issue":"1","key":"1628_CR51","doi-asserted-by":"crossref","first-page":"145","DOI":"10.1103\/RevModPhys.74.145","volume":"74","author":"N Gisin","year":"2002","unstructured":"Gisin, N., Ribordy, G., Tittel, W., Zbinden, H.: Quantum cryptography. Rev. Mod. Phys. 74(1), 145\u2013195 (2002)","journal-title":"Rev. Mod. Phys."},{"key":"1628_CR52","unstructured":"Deng, F.G., Zhou, P., Li, X.H., Li, C.Y., Zhou, H.Y.: Robustness of two-way quantum communication protocols against Trojan horse attack (2005). \n                        arXiv: quant-ph\/0508168"},{"key":"1628_CR53","doi-asserted-by":"crossref","first-page":"054302","DOI":"10.1103\/PhysRevA.74.054302","volume":"74","author":"XH Li","year":"2006","unstructured":"Li, X.H., Deng, F.G., Zhou, H.Y.: Improving the security of secure direct communication based on the secret transmitting order of particles. Phys. Rev. A 74, 054302 (2006)","journal-title":"Phys. Rev. A"},{"key":"1628_CR54","first-page":"329","volume":"7","author":"F Gao","year":"2007","unstructured":"Gao, F., Qin, S.J., Wen, Q.Y., Zhu, F.C.: A simple participant attack on the Bradler\u2013Dusek protocol. Quantum Inf. Comput. 7, 329 (2007)","journal-title":"Quantum Inf. Comput."},{"issue":"6","key":"1628_CR55","doi-asserted-by":"crossref","first-page":"748","DOI":"10.1016\/j.physleta.2006.08.016","volume":"360","author":"F Gao","year":"2007","unstructured":"Gao, F., Wen, Q.Y., Zhu, F.C.: Comment on:\u201cquantum exam\u201d [Phys Lett A 350(2006) 174]. Phys. Lett. A 360(6), 748\u2013750 (2007)","journal-title":"Phys. Lett. A"},{"issue":"3","key":"1628_CR56","doi-asserted-by":"crossref","first-page":"445","DOI":"10.1140\/epjd\/e2009-00306-3","volume":"56","author":"FZ Guo","year":"2010","unstructured":"Guo, F.Z., Qin, S.J., Gao, F., Lin, S., Wen, Q.Y., Zhu, F.C.: Participant attack on a kind of MQSS schemes based on entanglement swapping. Eur. Phys. J. D 56(3), 445\u2013448 (2010)","journal-title":"Eur. Phys. J. D"},{"issue":"6","key":"1628_CR57","doi-asserted-by":"crossref","first-page":"062324","DOI":"10.1103\/PhysRevA.76.062324","volume":"76","author":"SJ Qin","year":"2007","unstructured":"Qin, S.J., Gao, F., Wen, Q.Y., Zhu, F.C.: Cryptanalysis of the Hillery\u2013Buzek\u2013Berthiaume quantum secret-sharing protocol. Phys. Rev. A 76(6), 062324 (2007)","journal-title":"Phys. Rev. A"},{"issue":"5","key":"1628_CR58","doi-asserted-by":"crossref","first-page":"1468","DOI":"10.1016\/j.optcom.2010.10.095","volume":"284","author":"J Lin","year":"2011","unstructured":"Lin, J., Hwang, T.: An enhancement on Shi et al\u2019.s multiparty quantum secret sharing protocol. Opt. Commun. 284(5), 1468\u20131471 (2011)","journal-title":"Opt. Commun."},{"issue":"10","key":"1628_CR59","doi-asserted-by":"crossref","first-page":"1531","DOI":"10.1142\/S0129183109014576","volume":"20","author":"JH Chen","year":"1999","unstructured":"Chen, J.H., Lee, K.C., Hwang, T.: The enhancement of Zhou et al.\u2019s quantum secret sharing protocol. Int. J. Mod. Phys. C 20(10), 1531\u20131535 (1999)","journal-title":"Int. J. Mod. Phys. C"}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11128-017-1628-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-017-1628-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-017-1628-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T11:12:49Z","timestamp":1498216369000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11128-017-1628-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,6,5]]},"references-count":59,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2017,7]]}},"alternative-id":["1628"],"URL":"https:\/\/doi.org\/10.1007\/s11128-017-1628-5","relation":{},"ISSN":["1570-0755","1573-1332"],"issn-type":[{"value":"1570-0755","type":"print"},{"value":"1573-1332","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,6,5]]},"article-number":"177"}}