{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T01:26:34Z","timestamp":1773883594789,"version":"3.50.1"},"reference-count":61,"publisher":"Springer Science and Business Media LLC","issue":"8","license":[{"start":{"date-parts":[[2018,7,9]],"date-time":"2018-07-09T00:00:00Z","timestamp":1531094400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001412","name":"Council of Scientific and Industrial Research","doi-asserted-by":"publisher","award":["03(1369)\/16\/EMR-I"],"award-info":[{"award-number":["03(1369)\/16\/EMR-I"]}],"id":[{"id":"10.13039\/501100001412","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001843","name":"Science and Engineering Research Board","doi-asserted-by":"publisher","award":["EMR\/2016\/004019"],"award-info":[{"award-number":["EMR\/2016\/004019"]}],"id":[{"id":"10.13039\/501100001843","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"published-print":{"date-parts":[[2018,8]]},"DOI":"10.1007\/s11128-018-1974-y","type":"journal-article","created":{"date-parts":[[2018,7,9]],"date-time":"2018-07-09T16:19:45Z","timestamp":1531153185000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":21,"title":["Decoherence can help quantum cryptographic security"],"prefix":"10.1007","volume":"17","author":[{"given":"Vishal","family":"Sharma","sequence":"first","affiliation":[]},{"given":"U.","family":"Shrikant","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7581-2546","authenticated-orcid":false,"given":"R.","family":"Srikanth","sequence":"additional","affiliation":[]},{"given":"Subhashish","family":"Banerjee","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,7,9]]},"reference":[{"issue":"1","key":"1974_CR1","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1103\/RevModPhys.74.145","volume":"74","author":"N Gisin","year":"2002","unstructured":"Gisin, N., Ribordy, G., Tittel, W., Zbinden, H.: Quantum cryptography. Rev. Mod. Phys. 74(1), 145 (2002)","journal-title":"Rev. Mod. Phys."},{"key":"1974_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11128-012-0487-3","volume":"13","author":"N Srinatha","year":"2014","unstructured":"Srinatha, N., Omkar, S., Srikanth, R., Banerjee, S., Pathak, A.: The quantum cryptographic switch. Quantum Inf. Process. 13, 1\u201312 (2014)","journal-title":"Quantum Inf. Process."},{"issue":"2","key":"1974_CR3","doi-asserted-by":"publisher","first-page":"186","DOI":"10.14429\/dsj.66.9771","volume":"66","author":"V Sharma","year":"2016","unstructured":"Sharma, V.: Effect of noise on practical quantum communication systems. Def. Sci. J. 66(2), 186\u2013192 (2016)","journal-title":"Def. Sci. J."},{"issue":"9","key":"1974_CR4","doi-asserted-by":"publisher","first-page":"3441","DOI":"10.1007\/s11128-015-1038-5","volume":"14","author":"V Sharma","year":"2015","unstructured":"Sharma, V., Shukla, C., Banerjee, S., Pathak, A.: Controlled bidirectional remote state preparation in noisy environment: a generalized view. Quantum Inf. Process. 14(9), 3441\u20133464 (2015)","journal-title":"Quantum Inf. Process."},{"issue":"11","key":"1974_CR5","doi-asserted-by":"publisher","first-page":"4681","DOI":"10.1007\/s11128-016-1396-7","volume":"15","author":"V Sharma","year":"2016","unstructured":"Sharma, V., Thapliyal, K., Pathak, A., Banerjee, S.: A comparative study of protocols for secure quantum communication under noisy environment: single-qubit-based protocols versus entangled-state-based protocols. Quantum Inf. Process. 15(11), 4681\u20134710 (2016)","journal-title":"Quantum Inf. Process."},{"issue":"1","key":"1974_CR6","first-page":"1899","volume":"5","author":"V Sharma","year":"2014","unstructured":"Sharma, V., Sharma, R.: Analysis of spread spectrum in MATLAB. Int. J. Sci. Eng. Res. 5(1), 1899\u20131902 (2014)","journal-title":"Int. J. Sci. Eng. Res."},{"key":"1974_CR7","doi-asserted-by":"crossref","unstructured":"Wang, G., Shen, D., Chen, G., Pham, K., Blasch, E.: Polarization tracking for quantum satellite communications. In: Sensors and Systems for Space Applications VII, vol. 9085. International Society for Optics and Photonics, p. 90850T (2014)","DOI":"10.1117\/12.2050031"},{"key":"1974_CR8","unstructured":"Sharma, V., Banerjee, S.: Analysis of Atmospheric Effects on Satellite Based Quantum Communication: A Comparative Study (2017). arXiv:1711.08281"},{"issue":"P1","key":"1974_CR9","first-page":"7","volume":"560","author":"CH Bennett","year":"1984","unstructured":"Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. Theor. Comput. Sci. 560(P1), 7\u201311 (1984)","journal-title":"Theor. Comput. Sci."},{"issue":"6","key":"1974_CR10","doi-asserted-by":"publisher","first-page":"661","DOI":"10.1103\/PhysRevLett.67.661","volume":"67","author":"KE Artur","year":"1991","unstructured":"Artur, K.E.: Quantum cryptography based on bells theorem. Phys. Rev. Lett. 67(6), 661 (1991)","journal-title":"Phys. Rev. Lett."},{"issue":"21","key":"1974_CR11","doi-asserted-by":"publisher","first-page":"3121","DOI":"10.1103\/PhysRevLett.68.3121","volume":"68","author":"CH Bannett","year":"1992","unstructured":"Bannett, C.H.: Quantum cryptography using any two nonorthogonal states. Phys. Rev. Lett. 68(21), 3121 (1992)","journal-title":"Phys. Rev. Lett."},{"issue":"7","key":"1974_CR12","doi-asserted-by":"publisher","first-page":"1239","DOI":"10.1103\/PhysRevLett.75.1239","volume":"75","author":"L Goldenberg","year":"1995","unstructured":"Goldenberg, L., Vaidman, L.: Quantum cryptography based on orthogonal states. Phys. Rev. Lett. 75(7), 1239 (1995)","journal-title":"Phys. Rev. Lett."},{"issue":"5410","key":"1974_CR13","doi-asserted-by":"publisher","first-page":"2050","DOI":"10.1126\/science.283.5410.2050","volume":"283","author":"H-K Lo","year":"1999","unstructured":"Lo, H.-K., Chau, H.F.: Unconditional security of quantum key distribution over arbitrarily long distances. Science 283(5410), 2050\u20132056 (1999)","journal-title":"Science"},{"key":"1974_CR14","doi-asserted-by":"publisher","first-page":"012311","DOI":"10.1103\/PhysRevA.65.012311","volume":"65","author":"V Scarani","year":"2001","unstructured":"Scarani, V., Gisin, N.: Quantum key distribution between N partners: optimal eavesdropping and bell\u2019s inequalities. Phys. Rev. A 65, 012311 (2001)","journal-title":"Phys. Rev. A"},{"issue":"2","key":"1974_CR15","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1007\/s00145-004-0142-y","volume":"18","author":"H-K Lo","year":"2005","unstructured":"Lo, H.-K., Chau, H.F., Ardehali, M.: Efficient quantum key distribution scheme and a proof of its unconditional security. J. Cryptol. 18(2), 133\u2013165 (2005)","journal-title":"J. Cryptol."},{"issue":"3","key":"1974_CR16","doi-asserted-by":"publisher","first-page":"1301","DOI":"10.1103\/RevModPhys.81.1301","volume":"81","author":"V Scarani","year":"2009","unstructured":"Scarani, V., Bechmann-Pasquinucci, H., Cerf, N.J., Du\u0161ek, M., L\u00fctkenhaus, N., Peev, M.: The security of practical quantum key distribution. Rev. Mod. Phys. 81(3), 1301 (2009)","journal-title":"Rev. Mod. Phys."},{"key":"1974_CR17","doi-asserted-by":"crossref","DOI":"10.1201\/b15007","volume-title":"Elements of Quantum Computation and Quantum Communication","author":"A Pathak","year":"2013","unstructured":"Pathak, A.: Elements of Quantum Computation and Quantum Communication. Taylor & Francis, Abingdon (2013)"},{"issue":"1","key":"1974_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.12743\/quanta.v6i1.57","volume":"6","author":"A Shenoy-Hejamadi","year":"2017","unstructured":"Shenoy-Hejamadi, A., Pathak, A., Radhakrishna, S.: Quantum cryptography: key distribution and beyond. Quanta 6(1), 1\u201347 (2017)","journal-title":"Quanta"},{"key":"1974_CR19","doi-asserted-by":"publisher","first-page":"052319","DOI":"10.1103\/PhysRevA.69.052319","volume":"69","author":"F-G Deng","year":"2004","unstructured":"Deng, F.-G., Long, G.L.: Secure direct communication with a quantum one-time pad. Phys. Rev. A 69, 052319 (2004)","journal-title":"Phys. Rev. A"},{"issue":"18","key":"1974_CR20","doi-asserted-by":"publisher","first-page":"187902","DOI":"10.1103\/PhysRevLett.89.187902","volume":"89","author":"K Bostr\u00f6m","year":"2002","unstructured":"Bostr\u00f6m, K., Felbinger, T.: Deterministic secure direct communication using entanglement. Phys. Rev. Lett. 89(18), 187902 (2002)","journal-title":"Phys. Rev. Lett."},{"issue":"14","key":"1974_CR21","doi-asserted-by":"publisher","first-page":"140501","DOI":"10.1103\/PhysRevLett.94.140501","volume":"94","author":"M Lucamarini","year":"2005","unstructured":"Lucamarini, M., Mancini, S.: Secure deterministic communication without entanglement. Phys. Rev. Lett. 94(14), 140501 (2005)","journal-title":"Phys. Rev. Lett."},{"key":"1974_CR22","doi-asserted-by":"publisher","first-page":"1241009","DOI":"10.1142\/S0219749912410092","volume":"10","author":"C Shukla","year":"2012","unstructured":"Shukla, C., Pathak, A., Srikanth, R.: Beyond the Goldenberg-Vaidman protocol: Secure and e\u00ef\u0148\u010ccient quantum communication using arbitrary, orthogonal, multi-particle quantum states. Int. J. Quantum Inf. 10, 1241009 (2012)","journal-title":"Int. J. Quantum Inf."},{"key":"1974_CR23","doi-asserted-by":"publisher","first-page":"052305","DOI":"10.1103\/PhysRevA.84.052305","volume":"84","author":"A Pappa","year":"2011","unstructured":"Pappa, A., Chailloux, A., Diamanti, E., Kerenidis, I.: Practical quantum coin flipping. Phys. Rev. A 84, 052305 (2011)","journal-title":"Phys. Rev. A"},{"issue":"6","key":"1974_CR24","doi-asserted-by":"publisher","first-page":"062334","DOI":"10.1103\/PhysRevA.95.062334","volume":"95","author":"R Amiri","year":"2017","unstructured":"Amiri, R., Arrazola, J.M.: Quantum money with nearly optimal error tolerance. Phys. Rev. A 95(6), 062334 (2017)","journal-title":"Phys. Rev. A"},{"key":"1974_CR25","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1109\/TC.2017.2721404","volume":"67","author":"C-Y Wei","year":"2017","unstructured":"Wei, C.-Y., Cai, X.-Q., Liu, B., Wang, T., Gao, F.: A generic construction of quantum-oblivious-key-transfer-based private query with ideal database security and zero failure. IEEE Trans. Comput. 67, 2\u20138 (2017)","journal-title":"IEEE Trans. Comput."},{"key":"1974_CR26","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1016\/j.ins.2016.07.071","volume":"370","author":"R-h Shi","year":"2016","unstructured":"Shi, R-h, Yi, M., Zhong, H., Zhang, S., Cui, J.: Quantum private set intersection cardinality and its application to anonymous authentication. Inf. Sci. 370, 147\u2013158 (2016)","journal-title":"Inf. Sci."},{"issue":"2","key":"1974_CR27","first-page":"335","volume":"46","author":"S Banerjee","year":"2008","unstructured":"Banerjee, S., Srikanth, R.: Geometric phase of a qubit interacting with a squeezed-thermal bath. Eur. Phys. J. D Atom. Mol. Opt. Plasma Phys. 46(2), 335\u2013344 (2008)","journal-title":"Eur. Phys. J. D Atom. Mol. Opt. Plasma Phys."},{"issue":"1","key":"1974_CR28","doi-asserted-by":"publisher","first-page":"012318","DOI":"10.1103\/PhysRevA.77.012318","volume":"77","author":"R Srikanth","year":"2008","unstructured":"Srikanth, R., Banerjee, S.: Squeezed generalized amplitude damping channel. Phys. Rev. A 77(1), 012318 (2008)","journal-title":"Phys. Rev. A"},{"issue":"45","key":"1974_CR29","doi-asserted-by":"publisher","first-page":"13735","DOI":"10.1088\/1751-8113\/40\/45\/014","volume":"40","author":"R Ghosh","year":"2007","unstructured":"Ghosh, R.: Dynamics of decoherence without dissipation in a squeezed thermal bath. J. Phys. A: Math. Theor. 40(45), 13735 (2007)","journal-title":"J. Phys. A: Math. Theor."},{"issue":"12","key":"1974_CR30","doi-asserted-by":"publisher","first-page":"3725","DOI":"10.1007\/s11128-013-0628-3","volume":"12","author":"S Omkar","year":"2013","unstructured":"Omkar, S., Srikanth, R., Banerjee, S.: Dissipative and non-dissipative single-qubit channels: dynamics and geometry. Quantum Inf. Process. 12(12), 3725\u20133744 (2013)","journal-title":"Quantum Inf. Process."},{"issue":"4","key":"1974_CR31","doi-asserted-by":"publisher","first-page":"1451","DOI":"10.1007\/s11128-015-0941-0","volume":"14","author":"S Adhikari","year":"2015","unstructured":"Adhikari, S., Home, D., Majumdar, A.S., Pan, A.K., Shenoy, A., Srikanth, R.: Toward secure communication using intra-particle entanglement. Quantum Inf. Process. 14(4), 1451\u20131468 (2015)","journal-title":"Quantum Inf. Process."},{"key":"1974_CR32","doi-asserted-by":"publisher","first-page":"012332","DOI":"10.1103\/PhysRevA.72.012332","volume":"72","author":"R Renner","year":"2005","unstructured":"Renner, R., Gisin, N., Kraus, B.: Information-theoretic security proof for quantum-key-distribution protocols. Phys. Rev. A 72, 012332 (2005)","journal-title":"Phys. Rev. A"},{"key":"1974_CR33","doi-asserted-by":"publisher","first-page":"050503","DOI":"10.1103\/PhysRevLett.102.050503","volume":"102","author":"S Pirandola","year":"2009","unstructured":"Pirandola, S., Garc\u00eda-Patr\u00f3n, R., Braunstein, S.L., Lloyd, S.: Direct and reverse secret-key capacities of a quantum channel. Phys. Rev. Lett. 102, 050503 (2009)","journal-title":"Phys. Rev. Lett."},{"key":"1974_CR34","doi-asserted-by":"publisher","first-page":"130501","DOI":"10.1103\/PhysRevLett.102.130501","volume":"102","author":"R Garc\u00eda-Patr\u00f3n","year":"2009","unstructured":"Garc\u00eda-Patr\u00f3n, R., Cerf, N.J.: Continuous-variable quantum key distribution protocols over noisy channels. Phys. Rev. Lett. 102, 130501 (2009)","journal-title":"Phys. Rev. Lett."},{"key":"1974_CR35","doi-asserted-by":"publisher","first-page":"052316","DOI":"10.1103\/PhysRevA.78.052316","volume":"78","author":"R Subhashish Banerjee","year":"2008","unstructured":"Subhashish Banerjee, R., Srikanth, C., Chandrashekar, M., Rungta, P.: Symmetry-noise interplay in a quantum walk on an $$n$$ n -cycle. Phys. Rev. A 78, 052316 (2008)","journal-title":"Phys. Rev. A"},{"issue":"3","key":"1974_CR36","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1007\/s11467-007-0050-3","volume":"2","author":"G-l Long","year":"2007","unstructured":"Long, G-l, Deng, F-g, Wang, C., Li, X-h, Wen, K., Wang, W-y: Quantum secure direct communication and deterministic secure quantum communication. Front. Phys. China 2(3), 251\u2013272 (2007)","journal-title":"Front. Phys. China"},{"issue":"4","key":"1974_CR37","doi-asserted-by":"publisher","first-page":"044305","DOI":"10.1103\/PhysRevA.71.044305","volume":"71","author":"C Wang","year":"2005","unstructured":"Wang, C., Deng, F.-G., Li, Y.-S., Liu, X.-S., Long, G.L.: Quantum secure direct communication with high-dimension quantum superdense coding. Phys. Rev. A 71(4), 044305 (2005)","journal-title":"Phys. Rev. A"},{"issue":"5","key":"1974_CR38","doi-asserted-by":"publisher","first-page":"052319","DOI":"10.1103\/PhysRevA.69.052319","volume":"69","author":"F-G Deng","year":"2004","unstructured":"Deng, F.-G., Long, G.L.: Secure direct communication with a quantum one-time pad. Phys. Rev. A 69(5), 052319 (2004)","journal-title":"Phys. Rev. A"},{"issue":"10","key":"1974_CR39","doi-asserted-by":"publisher","first-page":"2473","DOI":"10.1088\/0256-307X\/22\/10\/005","volume":"22","author":"G Ting","year":"2005","unstructured":"Ting, G., Feng-Li, Y., Zhi-Xi, W.: A simultaneous quantum secure direct communication scheme between the central party and other m parties. Chin. Phys. Lett. 22(10), 2473 (2005)","journal-title":"Chin. Phys. Lett."},{"issue":"1","key":"1974_CR40","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1016\/j.optcom.2005.04.048","volume":"253","author":"C Wang","year":"2005","unstructured":"Wang, C., Deng, F.G., Long, G.L.: Multi-step quantum secure direct communication using multi-particle Green\u2013Horne\u2013Zeilinger state. Opt. Commun. 253(1), 15\u201320 (2005)","journal-title":"Opt. Commun."},{"key":"1974_CR41","unstructured":"Li, X.-H., Li, C.-Y., Deng, F.-G., Zhou, P., Liang, Y.-J., Zhou, H.-Y.: Quantum Secure Direct Communication with Quantum Encryption Based on Pure Entangled States. arXiv:quant-ph\/0512014 (2005)"},{"issue":"1","key":"1974_CR42","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1016\/j.physleta.2006.01.035","volume":"354","author":"X-R Jin","year":"2006","unstructured":"Jin, X.-R., Ji, X., Zhang, Y.-Q., Zhang, S., Hong, S.-K., Yeon, K.-H., Um, C.-I.: Three-party quantum secure direct communication based on GHZ states. Phys. Lett. A 354(1), 67\u201370 (2006)","journal-title":"Phys. Lett. A"},{"issue":"1","key":"1974_CR43","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1088\/0256-307X\/24\/1\/005","volume":"24","author":"M Zhong-Xiao","year":"2007","unstructured":"Zhong-Xiao, M., Yun-Jie, X.: Improvement of security of three-party quantum secure direct communication based on GHZ states. Chin. Phys. Lett. 24(1), 15 (2007)","journal-title":"Chin. Phys. Lett."},{"issue":"15","key":"1974_CR44","doi-asserted-by":"publisher","first-page":"157901","DOI":"10.1103\/PhysRevLett.90.157901","volume":"90","author":"A W\u00f3jcik","year":"2003","unstructured":"W\u00f3jcik, A.: Eavesdropping on the ping\u2013pong quantum communication protocol. Phys. Rev. Lett. 90(15), 157901 (2003)","journal-title":"Phys. Rev. Lett."},{"key":"1974_CR45","doi-asserted-by":"publisher","first-page":"4936","DOI":"10.1038\/srep04936","volume":"4","author":"Y-G Han","year":"2014","unstructured":"Han, Y.-G., Yin, Z.-Q., Li, H.-W., Chen, W., Wang, S., Guo, G.-C., Han, Z.-F.: Security of modified ping\u2013pong protocol in noisy and lossy channel. Sci. Rep. 4, 4936 (2014)","journal-title":"Sci. Rep."},{"key":"1974_CR46","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11128-011-0307-1","volume":"11","author":"P Zawadzki","year":"2012","unstructured":"Zawadzki, P.: Security of ping\u2013pong protocol based on pairs of completely entangled qudits. Quantum Inf. Process. 11, 1\u201312 (2012)","journal-title":"Quantum Inf. Process."},{"issue":"03","key":"1974_CR47","doi-asserted-by":"publisher","first-page":"1250032","DOI":"10.1142\/S0219749912500323","volume":"10","author":"P Zawadzki","year":"2012","unstructured":"Zawadzki, P.: The ping\u2013pong protocol with a prior privacy amplification. Int. J. Quantum Inf. 10(03), 1250032 (2012)","journal-title":"Int. J. Quantum Inf."},{"issue":"5","key":"1974_CR48","doi-asserted-by":"publisher","first-page":"054301","DOI":"10.1103\/PhysRevA.69.054301","volume":"69","author":"Q-Y Cai","year":"2004","unstructured":"Cai, Q.-Y., Li, B.-W.: Improving the capacity of the Bostr\u00f6m\u2013Felbinger protocol. Phys. Rev. A 69(5), 054301 (2004)","journal-title":"Phys. Rev. A"},{"key":"1974_CR49","doi-asserted-by":"publisher","first-page":"601","DOI":"10.1088\/0256-307X\/21\/4\/003","volume":"21","author":"Q-Y Cai","year":"2004","unstructured":"Cai, Q.-Y., Li, B.-W.: Deterministic secure communication without using entanglement. Chin. Phys. Lett. 21, 601 (2004)","journal-title":"Chin. Phys. Lett."},{"key":"1974_CR50","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1016\/j.physleta.2005.10.050","volume":"351","author":"Q-Y Cai","year":"2006","unstructured":"Cai, Q.-Y.: Eavesdropping on the two-way quantum communication protocols with invisible photons. Phys. Lett. A 351, 23 (2006)","journal-title":"Phys. Lett. A"},{"key":"1974_CR51","doi-asserted-by":"publisher","first-page":"3162012","DOI":"10.1155\/2016\/3162012","volume":"2016","author":"P Zawadzki","year":"2016","unstructured":"Zawadzki, P., Miszczak, J.A.: A general scheme for information interception in the ping-pong protocol. Adv. Math. Phys. 2016, 3162012 (2016)","journal-title":"Adv. Math. Phys."},{"key":"1974_CR52","first-page":"117","volume":"21","author":"J Li","year":"2012","unstructured":"Li, J., Song, D.J., Guo, X.J.: An improved security detection strategy based on w state in ping\u2013pong protocol. Chin. J. Electron. 21, 117\u2013120 (2012)","journal-title":"Chin. J. Electron."},{"issue":"1","key":"1974_CR53","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1007\/s11128-012-0363-1","volume":"12","author":"P Zawadzki","year":"2012","unstructured":"Zawadzki, P.: Improving security of the ping\u2013pong protocol. Quantum Inf. Process. 12(1), 149\u2013155 (2012)","journal-title":"Quantum Inf. Process."},{"issue":"1","key":"1974_CR54","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1016\/j.physleta.2004.10.025","volume":"333","author":"Z Zhang","year":"2004","unstructured":"Zhang, Z., Man, Z., Li, Y.: Improving w\u00f3jcik\u2019s eavesdropping attack on the ping\u2013pong protocol. Phys. Lett. A 333(1), 46\u201350 (2004)","journal-title":"Phys. Lett. A"},{"issue":"2","key":"1974_CR55","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1007\/s11128-010-0188-8","volume":"10","author":"VV Eugene","year":"2011","unstructured":"Eugene, V.V.: Non-coherent attack on the ping\u2013pong protocol with completely entangled pairs of qutrits. Quantum Inf. Process. 10(2), 189\u2013202 (2011)","journal-title":"Quantum Inf. Process."},{"issue":"4","key":"1974_CR56","doi-asserted-by":"publisher","first-page":"347","DOI":"10.1007\/s11128-009-0112-2","volume":"8","author":"A Chamoli","year":"2009","unstructured":"Chamoli, A., Bhandari, C.M.: Secure direct communication based on ping\u2013pong protocol. Quantum Inf. Process. 8(4), 347\u2013356 (2009)","journal-title":"Quantum Inf. Process."},{"issue":"22","key":"1974_CR57","doi-asserted-by":"publisher","first-page":"3953","DOI":"10.1016\/j.physleta.2008.03.048","volume":"372","author":"K Bostr\u00f6m","year":"2008","unstructured":"Bostr\u00f6m, K., Felbinger, T.: On the security of the ping\u2013pong protocol. Phys. Lett. A 372(22), 3953\u20133956 (2008)","journal-title":"Phys. Lett. A"},{"key":"1974_CR58","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511976667","volume-title":"Quantum Computation and Quantum Information","author":"MA Nielsen","year":"2010","unstructured":"Nielsen, M.A., Chuang, I.L.: Quantum Computation and Quantum Information. Cambridge University Press, Cambridge (2010)"},{"key":"1974_CR59","doi-asserted-by":"publisher","first-page":"3953","DOI":"10.1016\/j.physleta.2008.03.048","volume":"372","author":"K Bostr\u00f6m","year":"2008","unstructured":"Bostr\u00f6m, K., Felbinger, T.: On the security of the ping-pong protocol. Phys. Lett. A 372, 3953\u20133956 (2008)","journal-title":"Phys. Lett. A"},{"issue":"4","key":"1974_CR60","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1016\/j.physleta.2007.03.029","volume":"367","author":"R Srikanth","year":"2007","unstructured":"Srikanth, R., Banerjee, S.: An environment-mediated quantum deleter. Phys. Lett. A 367(4), 295\u2013299 (2007)","journal-title":"Phys. Lett. A"},{"key":"1974_CR61","first-page":"1231","volume":"546","author":"MA Nielsen","year":"2000","unstructured":"Nielsen, M.A., Chuang, I.L.: Quantum computation and quantum information. Quantum 546, 1231 (2000)","journal-title":"Quantum"}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11128-018-1974-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-018-1974-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-018-1974-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,5]],"date-time":"2020-11-05T11:12:19Z","timestamp":1604574739000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11128-018-1974-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,7,9]]},"references-count":61,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2018,8]]}},"alternative-id":["1974"],"URL":"https:\/\/doi.org\/10.1007\/s11128-018-1974-y","relation":{},"ISSN":["1570-0755","1573-1332"],"issn-type":[{"value":"1570-0755","type":"print"},{"value":"1573-1332","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,7,9]]},"assertion":[{"value":"22 January 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 July 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 July 2018","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"207"}}