{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T13:01:00Z","timestamp":1762002060303,"version":"build-2065373602"},"reference-count":16,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2017,12,18]],"date-time":"2017-12-18T00:00:00Z","timestamp":1513555200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"name":"Ministry of Science and Technology of the Republic of China","award":["MOST 105-2221-E-006-162-MY2"],"award-info":[{"award-number":["MOST 105-2221-E-006-162-MY2"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"published-print":{"date-parts":[[2018,2]]},"DOI":"10.1007\/s11128-017-1788-3","type":"journal-article","created":{"date-parts":[[2017,12,18]],"date-time":"2017-12-18T09:27:39Z","timestamp":1513589259000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Statistics attack on \u2018quantum private comparison with a malicious third party\u2019 and its improvement"],"prefix":"10.1007","volume":"17","author":[{"given":"Jun","family":"Gu","sequence":"first","affiliation":[]},{"given":"Chih-Yung","family":"Ho","sequence":"additional","affiliation":[]},{"given":"Tzonelih","family":"Hwang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,12,18]]},"reference":[{"key":"1788_CR1","unstructured":"Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. In: International Conference on Computers, Systems and Signal Processing, pp. 175\u2013179. Bangalore, India (1984)"},{"key":"1788_CR2","doi-asserted-by":"crossref","first-page":"1077","DOI":"10.1007\/s11128-012-0454-z","volume":"12","author":"Y-J Chang","year":"2013","unstructured":"Chang, Y.-J., Tsai, C.-W., Hwang, T.: Multi-user private comparison protocol using GHZ class states. Quantum Inf. Process. 12, 1077\u20131088 (2013)","journal-title":"Quantum Inf. Process."},{"key":"1788_CR3","doi-asserted-by":"crossref","first-page":"2793","DOI":"10.1007\/s11128-013-0536-6","volume":"12","author":"FZ Guo","year":"2013","unstructured":"Guo, F.Z., Gao, F., Qin, S.J., Zhang, J., Wen, Q.Y.: Quantum private comparison protocol based on entanglement swapping of d-level Bell states. Quantum Inf. Process. 12, 2793\u20132802 (2013)","journal-title":"Quantum Inf. Process."},{"key":"1788_CR4","doi-asserted-by":"crossref","first-page":"4225","DOI":"10.1007\/s11128-015-1104-z","volume":"14","author":"S-L Huang","year":"2015","unstructured":"Huang, S.-L., Hwang, T., Gope, P.: Multi-party quantum private comparison with an almost-dishonest third party. Quantum Inf. Process. 14, 4225\u20134235 (2015)","journal-title":"Quantum Inf. Process."},{"key":"1788_CR5","doi-asserted-by":"crossref","first-page":"1450001","DOI":"10.1142\/S0219749914500014","volume":"12","author":"W-J Liu","year":"2014","unstructured":"Liu, W.-J., Liu, C., Chen, H.-W., Liu, Z.-H., Yuan, M.-X., Lu, J.-S.: Improvement on an efficient protocol for the quantum private comparison of equality with W state. Int. J. Quantum Inf. 12, 1450001 (2014)","journal-title":"Int. J. Quantum Inf."},{"key":"1788_CR6","doi-asserted-by":"crossref","first-page":"271","DOI":"10.1007\/s10773-013-1807-9","volume":"53","author":"W-J Liu","year":"2014","unstructured":"Liu, W.-J., Liu, C., Liu, Z.-H., Liu, J.-F., Geng, H.-T.: Same initial states attack in Yang et al\u2019.s quantum private comparison protocol and the improvement. Int. J. Theor. Phys. 53, 271\u2013276 (2014)","journal-title":"Int. J. Theor. Phys."},{"key":"1788_CR7","doi-asserted-by":"crossref","first-page":"1804","DOI":"10.1007\/s10773-013-1979-3","volume":"53","author":"W-J Liu","year":"2014","unstructured":"Liu, W.-J., Liu, C., Wang, H-b, Liu, J.-F., Wang, F., Yuan, X.-M.: Secure quantum private comparison of equality based on asymmetric W state. Int. J. Theor. Phys. 53, 1804\u20131813 (2014)","journal-title":"Int. J. Theor. Phys."},{"key":"1788_CR8","doi-asserted-by":"crossref","first-page":"3596","DOI":"10.1007\/s10773-012-1246-z","volume":"51","author":"W Liu","year":"2012","unstructured":"Liu, W., Wang, Y.-B.: Quantum private comparison based on GHZ entangled states. Int. J. Theor. Phys. 51, 3596\u20133604 (2012)","journal-title":"Int. J. Theor. Phys."},{"key":"1788_CR9","doi-asserted-by":"crossref","first-page":"1085","DOI":"10.1007\/s10773-013-1903-x","volume":"53","author":"W Liu","year":"2014","unstructured":"Liu, W., Wang, Y.-B., Wang, X.-M.: Multi-party quantum private comparison protocol using d-dimensional basis states without entanglement swapping. Int. J. Theor. Phys. 53, 1085\u20131091 (2014)","journal-title":"Int. J. Theor. Phys."},{"key":"1788_CR10","doi-asserted-by":"crossref","first-page":"065004","DOI":"10.1088\/0031-8949\/87\/06\/065004","volume":"87","author":"X-T Liu","year":"2013","unstructured":"Liu, X.-T., Zhao, J.-J., Wang, J., Tang, C.-J.: Cryptanalysis of the secure quantum private comparison protocol. Phys. Scripta 87, 065004 (2013)","journal-title":"Phys. Scripta"},{"key":"1788_CR11","doi-asserted-by":"crossref","first-page":"2343","DOI":"10.1007\/s11128-014-0805-z","volume":"13","author":"Q-b Luo","year":"2014","unstructured":"Luo, Q-b, Yang, G-w, She, K., Niu, W.-N., Wang, Y.-Q.: Multi-party quantum private comparison protocol based on d-dimensional entangled states. Quantum Inf. Process. 13, 2343\u20132352 (2014)","journal-title":"Quantum Inf. Process."},{"key":"1788_CR12","doi-asserted-by":"crossref","first-page":"2125","DOI":"10.1007\/s11128-015-0956-6","volume":"14","author":"Z Sun","year":"2015","unstructured":"Sun, Z., Jianping, Y., Wang, P., Xu, L., Wu, C.: Quantum private comparison with a malicious third party. Quantum Inf. Process. 14, 2125\u20132133 (2015)","journal-title":"Quantum Inf. Process."},{"key":"1788_CR13","doi-asserted-by":"crossref","first-page":"373","DOI":"10.1007\/s11128-011-0251-0","volume":"11","author":"H-Y Tseng","year":"2012","unstructured":"Tseng, H.-Y., Lin, J., Hwang, T.: New quantum private comparison protocol using EPR pairs. Quantum Inf. Process. 11, 373\u2013384 (2012)","journal-title":"Quantum Inf. Process."},{"key":"1788_CR14","doi-asserted-by":"crossref","first-page":"1250045","DOI":"10.1142\/S0219749912500451","volume":"10","author":"GA Xu","year":"2012","unstructured":"Xu, G.A., Chen, X.-B., Wei, Z.-H., Li, M.-J., Yang, Y.-X.: An efficient protocol for the quantum private comparison of equality with a four-qubit cluster state. Int. J. Quantum Inf. 10, 1250045 (2012)","journal-title":"Int. J. Quantum Inf."},{"key":"1788_CR15","doi-asserted-by":"crossref","first-page":"055305","DOI":"10.1088\/1751-8113\/42\/5\/055305","volume":"42","author":"Y-G Yang","year":"2009","unstructured":"Yang, Y.-G., Wen, Q.-Y.: An efficient two-party quantum private comparison protocol with decoy photons and two-photon entanglement. J. Phys. A Math. Theor. 42, 055305 (2009)","journal-title":"J. Phys. A Math. Theor."},{"key":"1788_CR16","doi-asserted-by":"crossref","first-page":"1466","DOI":"10.1007\/s10773-012-1464-4","volume":"52","author":"W-W Zhang","year":"2013","unstructured":"Zhang, W.-W., Li, D., Song, T.-T., Li, Y.-B.: Quantum private comparison based on quantum search algorithm. Int. J. Theor. Phys. 52, 1466\u20131473 (2013)","journal-title":"Int. J. Theor. Phys."}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11128-017-1788-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-017-1788-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-017-1788-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,2,8]],"date-time":"2018-02-08T23:54:20Z","timestamp":1518134060000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11128-017-1788-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,12,18]]},"references-count":16,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2018,2]]}},"alternative-id":["1788"],"URL":"https:\/\/doi.org\/10.1007\/s11128-017-1788-3","relation":{},"ISSN":["1570-0755","1573-1332"],"issn-type":[{"type":"print","value":"1570-0755"},{"type":"electronic","value":"1573-1332"}],"subject":[],"published":{"date-parts":[[2017,12,18]]},"article-number":"23"}}