{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,20]],"date-time":"2025-12-20T22:20:29Z","timestamp":1766269229885},"reference-count":61,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2018,5,18]],"date-time":"2018-05-18T00:00:00Z","timestamp":1526601600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"name":"ICT R&D programs of MSIP\/IITP","award":["B0101-16-1355"],"award-info":[{"award-number":["B0101-16-1355"]}]},{"name":"KIST research program","award":["2E27801"],"award-info":[{"award-number":["2E27801"]}]},{"name":"ICT R&D program of MSIP\/IITP","award":["1711057505"],"award-info":[{"award-number":["1711057505"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"published-print":{"date-parts":[[2018,7]]},"DOI":"10.1007\/s11128-018-1927-5","type":"journal-article","created":{"date-parts":[[2018,5,18]],"date-time":"2018-05-18T02:14:35Z","timestamp":1526609675000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":25,"title":["Controlled mutual quantum entity authentication with an untrusted third party"],"prefix":"10.1007","volume":"17","author":[{"given":"Min-Sung","family":"Kang","sequence":"first","affiliation":[]},{"given":"Jino","family":"Heo","sequence":"additional","affiliation":[]},{"given":"Chang-Ho","family":"Hong","sequence":"additional","affiliation":[]},{"given":"Hyung-Jin","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Sang-Wook","family":"Han","sequence":"additional","affiliation":[]},{"given":"Sung","family":"Moon","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,5,18]]},"reference":[{"key":"1927_CR1","unstructured":"Bennett, C.H., Brassard, G.: Quantum cryptography: public-key distribution and coin tossing. In: IEEE International Conference on Computers Systems and Signal Processing, Bangalore, India, pp. 175\u2013179. IEEE, New York (1984)"},{"issue":"6","key":"1927_CR2","doi-asserted-by":"publisher","first-page":"661","DOI":"10.1103\/PhysRevLett.67.661","volume":"67","author":"AK Ekert","year":"1991","unstructured":"Ekert, A.K.: Quantum cryptography based on Bell theorem. Phys. Rev. Lett. 67(6), 661\u2013663 (1991)","journal-title":"Phys. Rev. Lett."},{"issue":"21","key":"1927_CR3","doi-asserted-by":"publisher","first-page":"3121","DOI":"10.1103\/PhysRevLett.68.3121","volume":"68","author":"CH Bennett","year":"1992","unstructured":"Bennett, C.H.: Quantum cryptography using any two nonorthogonal states. Phys. Rev. Lett. 68(21), 3121\u20133124 (1992)","journal-title":"Phys. Rev. Lett."},{"key":"1927_CR4","doi-asserted-by":"publisher","first-page":"130503","DOI":"10.1103\/PhysRevLett.108.130503","volume":"108","author":"H-K Lo","year":"2012","unstructured":"Lo, H.-K., Curty, M., Qi, B.: Measurement-device-independent quantum key distribution. Phys. Rev. Lett. 108, 130503 (2012)","journal-title":"Phys. Rev. Lett."},{"key":"1927_CR5","doi-asserted-by":"publisher","first-page":"069901","DOI":"10.1103\/PhysRevLett.114.069901","volume":"114","author":"YL Tang","year":"2015","unstructured":"Tang, Y.L., Yin, H.L., Chen, S.J., et al.: Measurement-device-independent quantum key distribution over 200 km. Phys. Rev. Lett. 114, 069901 (2015)","journal-title":"Phys. Rev. Lett."},{"key":"1927_CR6","doi-asserted-by":"publisher","first-page":"1850012","DOI":"10.1142\/S0219749918500120","volume":"16","author":"J He","year":"2018","unstructured":"He, J., Li, Q., Wu, C., Chan, W.H., Zhang, S.: Measurement-device-independent semiquantum key distribution. Int. J. Quantum Inf. 16, 1850012 (2018)","journal-title":"Int. J. Quantum Inf."},{"key":"1927_CR7","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1038\/nature02643","volume":"430","author":"Z Zhao","year":"2004","unstructured":"Zhao, Z., Chen, Y.A., Zhang, A.N., Yang, T., Briegel, H.J., Pan, J.W.: Experimental demonstration of five-photon entanglement and open-destination teleportation. Nature 430, 54\u201358 (2004)","journal-title":"Nature"},{"key":"1927_CR8","doi-asserted-by":"publisher","first-page":"022338","DOI":"10.1103\/PhysRevA.72.022338","volume":"72","author":"FG Deng","year":"2005","unstructured":"Deng, F.G., Li, C.Y., Li, Y.S., Zhou, H.Y., Wang, Y.: Symmetric multiparty-controlled teleportation of an arbitrary two-particle entanglement. Phys. Rev. A 72, 022338 (2005)","journal-title":"Phys. Rev. A"},{"issue":"5","key":"1927_CR9","doi-asserted-by":"publisher","first-page":"893","DOI":"10.1088\/1009-1963\/14\/5\/006","volume":"14","author":"T Gao","year":"2005","unstructured":"Gao, T., Yan, F.L., Wang, Z.X.: Controlled quantum teleportation and secure direct communication. Chin. Phys. 14(5), 893\u2013897 (2005)","journal-title":"Chin. Phys."},{"key":"1927_CR10","doi-asserted-by":"publisher","first-page":"516","DOI":"10.1007\/s10773-008-9827-6","volume":"48","author":"K Yang","year":"2009","unstructured":"Yang, K., Huang, L., Yang, W., Song, F.: Quantum teleportation via GHZ-like state. Int. J. Theor. Phys. 48, 516\u2013521 (2009)","journal-title":"Int. J. Theor. Phys."},{"key":"1927_CR11","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1007\/s11128-009-0107-z","volume":"8","author":"XW Wang","year":"2009","unstructured":"Wang, X.W., Su, Y.H., Yang, G.J.: Controlled teleportation against uncooperation of part of supervisors. Quantum Inf. Process. 8, 319\u2013330 (2009)","journal-title":"Quantum Inf. Process."},{"issue":"4","key":"1927_CR12","doi-asserted-by":"publisher","first-page":"040307","DOI":"10.1088\/1674-1056\/20\/4\/040307","volume":"20","author":"TY Wang","year":"2011","unstructured":"Wang, T.Y., Wen, Q.Y.: Controlled quantum teleportation with Bell states. Chin. Phys. B 20(4), 040307 (2011)","journal-title":"Chin. Phys. B"},{"issue":"3","key":"1927_CR13","doi-asserted-by":"publisher","first-page":"1829","DOI":"10.1103\/PhysRevA.59.1829","volume":"59","author":"M Hillery","year":"1999","unstructured":"Hillery, M., Bu\u017eek, V., Berthiaume, A.: Quantum secret sharing. Phys. Rev. A 59(3), 1829\u20131834 (1999)","journal-title":"Phys. Rev. A"},{"issue":"1","key":"1927_CR14","doi-asserted-by":"publisher","first-page":"162","DOI":"10.1103\/PhysRevA.59.162","volume":"59","author":"A Karlsson","year":"1999","unstructured":"Karlsson, A., Koashi, M., Imoto, N.: Quantum entanglement for secret sharing and secret splitting. Phys. Rev. A 59(1), 162\u2013168 (1999)","journal-title":"Phys. Rev. A"},{"key":"1927_CR15","doi-asserted-by":"publisher","first-page":"052307","DOI":"10.1103\/PhysRevA.69.052307","volume":"69","author":"L Xiao","year":"2004","unstructured":"Xiao, L., Long, G.L., Deng, F.G., Pan, J.W.: Efficient multiparty quantum\u2013secret\u2013sharing schemes. Phys. Rev. A 69, 052307 (2004)","journal-title":"Phys. Rev. A"},{"key":"1927_CR16","doi-asserted-by":"publisher","first-page":"044301","DOI":"10.1103\/PhysRevA.72.044301","volume":"72","author":"FG Deng","year":"2005","unstructured":"Deng, F.G., Li, X.H., Li, C.Y., Zhou, P., Zhou, H.Y.: Multiparty quantum-state sharing of an arbitrary two-particle state with Einstein\u2013Podolsky\u2013Rosen pairs. Phys. Rev. A 72, 044301 (2005)","journal-title":"Phys. Rev. A"},{"key":"1927_CR17","doi-asserted-by":"publisher","first-page":"044302","DOI":"10.1103\/PhysRevA.72.044302","volume":"72","author":"FG Deng","year":"2005","unstructured":"Deng, F.G., Li, X.H., Zhou, H.Y.: Improving the security of multiparty quantum secret sharing against trojan horse attack. Phys. Rev. A 72, 044302 (2005)","journal-title":"Phys. Rev. A"},{"issue":"8","key":"1927_CR18","doi-asserted-by":"publisher","first-page":"1975","DOI":"10.1088\/0953-4075\/39\/8\/015","volume":"39","author":"XH Li","year":"2006","unstructured":"Li, X.H., Zhou, P., Li, C.Y., et al.: Efficient symmetric multiparty quantum state sharing of an arbitrary m-qubit state. J. Phys. B: At. Mol. Opt. Phys. 39(8), 1975\u20131983 (2006)","journal-title":"J. Phys. B: At. Mol. Opt. Phys."},{"issue":"5","key":"1927_CR19","doi-asserted-by":"publisher","first-page":"1084","DOI":"10.1088\/0256-307X\/23\/5\/006","volume":"23","author":"FG Deng","year":"2006","unstructured":"Deng, F.G., Zhou, P., Li, X.H., Li, C.Y., Zhou, H.Y.: Efficient multiparty quantum secret sharing with Greenberger-Horne-Zeilinger States. Chin. Phys. Lett. 23(5), 1084\u20131087 (2006)","journal-title":"Chin. Phys. Lett."},{"issue":"6","key":"1927_CR20","doi-asserted-by":"publisher","first-page":"1019","DOI":"10.1088\/0253-6102\/54\/6\/13","volume":"54","author":"CR Hsieh","year":"2010","unstructured":"Hsieh, C.R., Tsai, C.W., Hwang, T.: Quantum secret sharing using GHZ-like state. Commun. Theor. Phys. 54(6), 1019\u20131022 (2010)","journal-title":"Commun. Theor. Phys."},{"key":"1927_CR21","doi-asserted-by":"publisher","first-page":"365","DOI":"10.1007\/s11128-012-0379-6","volume":"12","author":"XB Chen","year":"2013","unstructured":"Chen, X.B., Niu, X.X., Zhou, X.J., Yang, Y.X.: Multi-party quantum secret sharing with the single-particle quantum state to encode the information. Quantum Inf. Process. 12, 365\u2013380 (2013)","journal-title":"Quantum Inf. Process."},{"issue":"78","key":"1927_CR22","first-page":"589","volume":"14","author":"XB Chen","year":"2014","unstructured":"Chen, X.B., Xu, G., Su, Y., Yang, Y.X.: Robust variations of secret sharing through noisy quantum channel. Quantum Inf. Comput. 14(78), 589\u2013607 (2014)","journal-title":"Quantum Inf. Comput."},{"issue":"1","key":"1927_CR23","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1088\/0256-307X\/22\/1\/006","volume":"22","author":"ZX Man","year":"2005","unstructured":"Man, Z.X., Zhang, Z.J., Li, Y.: Deterministic secure direct communication by using swapping quantum entanglement and local unitary operations. Chin. Phys. Lett. 22(1), 18\u201321 (2005)","journal-title":"Chin. Phys. Lett."},{"key":"1927_CR24","doi-asserted-by":"publisher","first-page":"5761","DOI":"10.1088\/0305-4470\/38\/25\/011","volume":"38","author":"T Gao","year":"2005","unstructured":"Gao, T., Yan, F.L., Wang, Z.X.: Deterministic secure direct communication using GHZ states and swapping quantum entanglement. J. Phys. A 38, 5761 (2005)","journal-title":"J. Phys. A"},{"key":"1927_CR25","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1016\/j.optcom.2005.04.048","volume":"253","author":"C Wang","year":"2005","unstructured":"Wang, C., Deng, F., Long, G.: Multi-step quantum secure direct communication using multi-particle Green-Horne-Zeilinger state. Opt. Commun. 253, 15 (2005)","journal-title":"Opt. Commun."},{"key":"1927_CR26","doi-asserted-by":"publisher","first-page":"042305","DOI":"10.1103\/PhysRevA.73.042305","volume":"73","author":"H Lee","year":"2006","unstructured":"Lee, H., Lim, J., Yang, H.: Quantum direct communication with authentication. Phys. Rev. A 73, 042305 (2006)","journal-title":"Phys. Rev. A"},{"issue":"1","key":"1927_CR27","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1016\/j.physleta.2006.01.035","volume":"354","author":"XR Jin","year":"2006","unstructured":"Jin, X.R., Ji, X., Zhang, Y.Q., Zhang, S., Hong, S.K., Yeon, K.H., Um, C.I.: Three-party quantum secure direct communication based on GHZ states. Phys. Lett. A 354(1), 67\u201370 (2006)","journal-title":"Phys. Lett. A"},{"key":"1927_CR28","doi-asserted-by":"publisher","first-page":"3855","DOI":"10.1088\/0953-4075\/39\/18\/015","volume":"39","author":"Z-X Man","year":"2006","unstructured":"Man, Z.-X., Xia, Y.-J., An, N.B.: Quantum secure direct communication by using GHZ states and entanglement swapping. J. Phys. B: At. Mol. Opt. Phys. 39, 3855\u20133864 (2006)","journal-title":"J. Phys. B: At. Mol. Opt. Phys."},{"key":"1927_CR29","doi-asserted-by":"publisher","first-page":"060308","DOI":"10.1088\/1674-1056\/22\/6\/060308","volume":"22","author":"SH Kao","year":"2013","unstructured":"Kao, S.H., Hwang, T.: Cryptanalysis and improvement of controlled secure direct communication. Chin. Phys. B 22, 060308 (2013)","journal-title":"Chin. Phys. B"},{"key":"1927_CR30","doi-asserted-by":"publisher","first-page":"905","DOI":"10.1016\/j.optcom.2010.09.089","volume":"284","author":"L Dong","year":"2011","unstructured":"Dong, L., Xiu, X.M., Gao, Y.J., Ren, Y.P., Liu, H.W.: Controlled three-party communication using GHZ-like state and imperfect Bell-state measurement. Opt. Commun. 284, 905\u2013908 (2011)","journal-title":"Opt. Commun."},{"key":"1927_CR31","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1016\/j.physleta.2006.02.050","volume":"355","author":"HY Dai","year":"2006","unstructured":"Dai, H.Y., Chen, P.X., Zhang, M., Li, C.Z.: Classical communication cost and remote preparation of the four-particle GHZ class state. Phys. Lett. A 355, 285\u2013288 (2006)","journal-title":"Phys. Lett. A"},{"key":"1927_CR32","doi-asserted-by":"publisher","first-page":"2325","DOI":"10.1007\/s11128-013-0530-z","volume":"12","author":"JY Peng","year":"2013","unstructured":"Peng, J.Y., Luo, M.X., Mo, Z.W.: Joint remote state preparation of arbitrary two-particle states via GHZ-type states. Quantum Inf. Process. 12, 2325\u20132342 (2013)","journal-title":"Quantum Inf. Process."},{"key":"1927_CR33","doi-asserted-by":"publisher","first-page":"513","DOI":"10.1007\/s11128-013-0667-9","volume":"13","author":"NR Zhou","year":"2014","unstructured":"Zhou, N.R., Cheng, H.L., Tao, X.Y., Gong, L.H.: Three-party remote state preparation schemes based on entanglement. Quantum Inf. Process. 13, 513 (2014)","journal-title":"Quantum Inf. Process."},{"key":"1927_CR34","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1007\/s11128-013-0669-7","volume":"13","author":"X-B Chen","year":"2014","unstructured":"Chen, X.-B., Dou, Z., Xu, G., Wang, C., Yang, Y.: A class of protocols for quantum private comparison based on the symmetry of states. Quantum Inf. Process. 13, 85 (2014)","journal-title":"Quantum Inf. Process."},{"issue":"8","key":"1927_CR35","doi-asserted-by":"publisher","first-page":"2505","DOI":"10.1007\/s10773-014-2478-x","volume":"54","author":"ZH Wei","year":"2015","unstructured":"Wei, Z.H., Chen, X.B., Niu, X.X., et al.: The quantum steganography protocol via quantum noisy channels. Int. J. Theor. Phys. 54(8), 2505\u20132515 (2015)","journal-title":"Int. J. Theor. Phys."},{"key":"1927_CR36","doi-asserted-by":"publisher","first-page":"2959","DOI":"10.1007\/s11128-015-1021-1","volume":"14","author":"G Xu","year":"2015","unstructured":"Xu, G., Chen, X.-B., Dou, Z., Yang, Y.-X., Li, Z.: A novel protocol for multiparty quantum key management. Quantum Inf. Process. 14, 2959\u20132980 (2015)","journal-title":"Quantum Inf. Process."},{"key":"1927_CR37","doi-asserted-by":"publisher","first-page":"075001","DOI":"10.1088\/1367-2630\/11\/7\/075001","volume":"11","author":"M Peev","year":"2009","unstructured":"Peev, M., Pacher, C., All\u00e9aume, R., et al.: The SECOQC quantum key distribution network in Vienna. New J. Phys. 11, 075001 (2009)","journal-title":"New J. Phys."},{"key":"1927_CR38","doi-asserted-by":"publisher","first-page":"10387","DOI":"10.1364\/OE.19.010387","volume":"19","author":"M Sasaki","year":"2011","unstructured":"Sasaki, M., Fujiwara, M., Ishizuka, H., et al.: Field test of quantum key distribution in the Tokyo QKD network. Opt. Express 19, 10387\u201310409 (2011)","journal-title":"Opt. Express"},{"key":"1927_CR39","doi-asserted-by":"publisher","first-page":"481","DOI":"10.1038\/nphys629","volume":"3","author":"R Ursin","year":"2007","unstructured":"Ursin, R., Tiefenbacher, F., Schmitt-Manderbach, T., et al.: Entanglement-based quantum communication over 144 km. Nat. Phys. 3, 481\u2013486 (2007)","journal-title":"Nat. Phys."},{"issue":"7465","key":"1927_CR40","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1038\/nature12493","volume":"501","author":"B Fr\u00f6hlich","year":"2013","unstructured":"Fr\u00f6hlich, B., Dynes, J.F., Lucamarini, M., Sharpe, A.W., Yuan, Z., Shields, A.J.: A quantum access network. Nature 501(7465), 69\u201372 (2013)","journal-title":"Nature"},{"key":"1927_CR41","first-page":"011024","volume":"6","author":"Y-L Tang","year":"2016","unstructured":"Tang, Y.-L., Yin, H.-L., Zhao, Q., et al.: Measurement-device-independent quantum key distribution over untrustful metropolitan network. Phys. Rev. X 6, 011024 (2016)","journal-title":"Phys. Rev. X"},{"key":"1927_CR42","doi-asserted-by":"publisher","first-page":"2644","DOI":"10.1016\/j.optcom.2010.02.037","volume":"283","author":"CH Hong","year":"2010","unstructured":"Hong, C.H., Heo, J., Khym, G.L., Lim, J.I., Hong, S.K., Yang, H.J.: N quantum channels are sufficient for multi-user quantum key distribution protocol between n users. Opt. Commun. 283, 2644 (2010)","journal-title":"Opt. Commun."},{"key":"1927_CR43","doi-asserted-by":"publisher","first-page":"050303","DOI":"10.1088\/0256-307X\/29\/5\/050303","volume":"29","author":"CH Hong","year":"2012","unstructured":"Hong, C.H., Heo, J., Lim, J.I., Yang, H.J.: A quantum network system of QSS-QDC using \u03c7-type entangled states. Chin. Phys. Lett. 29, 050303 (2012)","journal-title":"Chin. Phys. Lett."},{"key":"1927_CR44","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3938\/jkps.61.1","volume":"61","author":"CH Hong","year":"2012","unstructured":"Hong, C.H., Heo, J., Lim, J.I., Yang, H.J.: Multi-user quantum network system and quantum communication using \u03c7-type entangled states. J. Korean. Phys. Soc. 61, 1\u20135 (2012)","journal-title":"J. Korean. Phys. Soc."},{"key":"1927_CR45","doi-asserted-by":"publisher","first-page":"090309","DOI":"10.1088\/1674-1056\/23\/9\/090309","volume":"23","author":"CH Hong","year":"2014","unstructured":"Hong, C.H., Heo, J., Lim, J.I., Yang, H.J.: Quantum secure direct communication network with hyperentanglement. Chin. Phys. B 23, 090309 (2014)","journal-title":"Chin. Phys. B"},{"key":"1927_CR46","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1109\/LCOMM.2014.2379253","volume":"19","author":"J Li","year":"2015","unstructured":"Li, J., Chen, X.B., Xu, G., et al.: Perfect quantum network coding independent of classical network solutions. IEEE Commun. Lett. 19, 115\u2013118 (2015)","journal-title":"IEEE Commun. Lett."},{"key":"1927_CR47","doi-asserted-by":"crossref","unstructured":"Broadbent, A.J., Fitzsimons, F., Kashefi, E.: Universal blind quantum computation. In: Proceedings of the 50th Annual IEEE Symposium on Foundations of Computer Science, p. 517. IEEE Computer Society, Los Alamitos (2009)","DOI":"10.1109\/FOCS.2009.36"},{"key":"1927_CR48","doi-asserted-by":"publisher","first-page":"938","DOI":"10.1016\/j.physleta.2018.02.002","volume":"382","author":"Q Li","year":"2018","unstructured":"Li, Q., Li, Z., Chan, W.H., Zhang, S., Liu, C.: Blind quantum computation with identity authentication. Phys. Lett. A 382, 938 (2018)","journal-title":"Phys. Lett. A"},{"key":"1927_CR49","doi-asserted-by":"crossref","unstructured":"Naehrig, M., Lauter, K., Vaikuntanathan, V.: Can homomorphic encryption be practical? In: Proceedings of the 3rd ACM Workshop on Cloud Computing Security, pp. 113\u2013124 (2011)","DOI":"10.1145\/2046660.2046682"},{"key":"1927_CR50","first-page":"4","volume":"1","author":"M Tebaa","year":"2012","unstructured":"Tebaa, M., El Hajji, S., El Ghazi, A.: Homomorphic encryption applied to the cloud computing security. Proc. World Congr. Eng. 1, 4\u20136 (2012)","journal-title":"Proc. World Congr. Eng."},{"key":"1927_CR51","doi-asserted-by":"publisher","first-page":"090306","DOI":"10.1088\/1674-1056\/24\/9\/090306","volume":"24","author":"MS Kang","year":"2015","unstructured":"Kang, M.S., Hong, C.H., Heo, J., Lim, J.I., Yang, H.J.: Controlled mutual quantum entity authentication using entanglement swapping. Chin. Phys. B 24, 090306 (2015)","journal-title":"Chin. Phys. B"},{"issue":"1","key":"1927_CR52","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1088\/0253-6102\/67\/1\/33","volume":"67","author":"G Gao","year":"2017","unstructured":"Gao, G., Wang, Y.: Cryptanalysis of controlled mutual quantum entity authentication using entanglement swapping. Commun. Theor. Phys. 67(1), 33\u201336 (2017)","journal-title":"Commun. Theor. Phys."},{"key":"1927_CR53","doi-asserted-by":"crossref","unstructured":"Ingemarsson, I., Simmons, G.J.: A protocol to set up shared secret schemes without the assistance of a mutually trusted party. In: Advances in Cryptology\u2014Proceedings of Eurocrypt\u201990, pp. 266\u2013282. Springer, Berlin (1991)","DOI":"10.1007\/3-540-46877-3_24"},{"key":"1927_CR54","doi-asserted-by":"publisher","first-page":"110305","DOI":"10.1088\/0256-307X\/29\/11\/110305","volume":"29","author":"G Gao","year":"2012","unstructured":"Gao, G., Fang, M., Cheng, M.T.: Cryptanalysis and improvement of a quantum network system of QSS-QDC using chi-type entangled states. Chin. Phys. Lett. 29, 110305 (2012)","journal-title":"Chin. Phys. Lett."},{"key":"1927_CR55","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1007\/s11128-016-1459-9","volume":"16","author":"J Heo","year":"2017","unstructured":"Heo, J., Kang, M.S., Hong, C.H., Yang, H., Choi, S.G.: Schemes generating entangled states and entanglement swapping between photons and three-level atoms inside optical cavities for quantum communication. Quantum Inf. Process. 16, 24 (2017)","journal-title":"Quantum Inf. Process."},{"key":"1927_CR56","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1016\/j.optcom.2017.01.056","volume":"396","author":"J Heo","year":"2017","unstructured":"Heo, J., Kang, M.S., Hong, C.H., Choi, S.G., Hong, J.P.: Constructions of secure entanglement channels assisted by quantum dots inside single-sided optical cavities. Opt. Commun. 396, 239 (2017)","journal-title":"Opt. Commun."},{"key":"1927_CR57","doi-asserted-by":"publisher","first-page":"1049","DOI":"10.1088\/0256-307X\/22\/5\/006","volume":"22","author":"CY Li","year":"2005","unstructured":"Li, C.Y., Zhou, H.Y., Wang, Y., Deng, F.G.: Secure quantum key distribution network with Bell states and local unitary operations. Chin. Phys. Lett. 22, 1049 (2005)","journal-title":"Chin. Phys. Lett."},{"key":"1927_CR58","doi-asserted-by":"publisher","first-page":"2896","DOI":"10.1088\/0256-307X\/23\/11\/004","volume":"23","author":"CY Li","year":"2006","unstructured":"Li, C.Y., Li, X.H., et al.: Efficient quantum cryptography network without entanglement and quantum memory. Chin. Phys. Lett. 23, 2896 (2006)","journal-title":"Chin. Phys. Lett."},{"key":"1927_CR59","doi-asserted-by":"publisher","first-page":"015103","DOI":"10.1088\/0031-8949\/90\/1\/015103","volume":"90","author":"CS Yoon","year":"2015","unstructured":"Yoon, C.S., Kang, M.S., Lim, J.I., Yang, H.J.: Quantum signature scheme based on a quantum search algorithm. Phys. Scr. 90, 015103 (2015)","journal-title":"Phys. Scr."},{"key":"1927_CR60","doi-asserted-by":"publisher","first-page":"1733","DOI":"10.3938\/jkps.56.1733","volume":"56","author":"CH Hong","year":"2010","unstructured":"Hong, C.H., Lim, J.I., Kim, J.I., Yang, H.J.: Two-way quantum direct communication protocol using entanglement swapping. Korean Phys. Soc. 56, 1733 (2010)","journal-title":"Korean Phys. Soc."},{"issue":"10","key":"1927_CR61","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1007\/s11128-017-1681-0","volume":"16","author":"CH Hong","year":"2017","unstructured":"Hong, C.H., Heo, J., Jang, J.G., Kwon, D.: Quantum identity authentication with single photon. Quantum Inf. Process. 16(10), 236\u20132181 (2017)","journal-title":"Quantum Inf. Process."}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11128-018-1927-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-018-1927-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-018-1927-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,18]],"date-time":"2019-05-18T01:43:13Z","timestamp":1558143793000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11128-018-1927-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,5,18]]},"references-count":61,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2018,7]]}},"alternative-id":["1927"],"URL":"https:\/\/doi.org\/10.1007\/s11128-018-1927-5","relation":{},"ISSN":["1570-0755","1573-1332"],"issn-type":[{"value":"1570-0755","type":"print"},{"value":"1573-1332","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,5,18]]},"assertion":[{"value":"14 October 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 May 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 May 2018","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"159"}}