{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T03:30:11Z","timestamp":1775014211052,"version":"3.50.1"},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2018,12,12]],"date-time":"2018-12-12T00:00:00Z","timestamp":1544572800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"the National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61572456"],"award-info":[{"award-number":["61572456"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"the National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61672487"],"award-info":[{"award-number":["61672487"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"the Anhui Initiative in Quantum Information Technologies","award":["No. AHY150300"],"award-info":[{"award-number":["No. AHY150300"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"published-print":{"date-parts":[[2019,1]]},"DOI":"10.1007\/s11128-018-2148-7","type":"journal-article","created":{"date-parts":[[2018,12,12]],"date-time":"2018-12-12T03:15:27Z","timestamp":1544584527000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Cryptanalysis and improvement of the novel quantum scheme for secure two-party distance computation"],"prefix":"10.1007","volume":"18","author":[{"given":"Bingren","family":"Chen","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8297-5108","authenticated-orcid":false,"given":"Wei","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Liusheng","family":"Huang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,12,12]]},"reference":[{"key":"2148_CR1","doi-asserted-by":"crossref","unstructured":"Yao, A.C.: Protocols for secure computations. In: 23rd Annual Symposium on Foundations of Computer Science (sfcs 1982), pp. 160\u2013164 (1982)","DOI":"10.1109\/SFCS.1982.38"},{"key":"2148_CR2","first-page":"165","volume-title":"Algorithms and Data Structures, Ser. Lecture Notes in Computer Science","author":"MJ Atallah","year":"2001","unstructured":"Atallah, M.J., Du, W.: Secure multi-party computational geometry. In: Dehne, F., Sack, J.R., Tamassia, R. (eds.) Algorithms and Data Structures, Ser. Lecture Notes in Computer Science, pp. 165\u2013179. Springer, Berlin (2001)"},{"issue":"2","key":"2148_CR3","doi-asserted-by":"publisher","first-page":"258","DOI":"10.1007\/s11390-005-0258-z","volume":"20","author":"SD Li","year":"2005","unstructured":"Li, S.D., Dai, Y.Q.: Secure two-party computational geometry. J. Comput. Sci. Technol. 20(2), 258\u2013263 (2005). \nhttps:\/\/doi.org\/10.1007\/s11390-005-0258-z","journal-title":"J. Comput. Sci. Technol."},{"key":"2148_CR4","unstructured":"Frikken, K.B., Atallah, M.J.: Privacy preserving route planning. In: Proceedings of the 2004 ACM Workshop on Privacy in the Electronic Society\u2014WPES \u201904. Washington DC, USA: ACM Press, p.\u00a08. (2004). \nhttp:\/\/portal.acm.org\/citation.cfm?doid=1029179.1029182"},{"key":"2148_CR5","first-page":"12","volume":"8","author":"B Yang","year":"2011","unstructured":"Yang, B., Sun, A., Zhang, W.: Secure two-party protocols on planar circles. J. Inf. 8, 12 (2011)","journal-title":"J. Inf."},{"issue":"3","key":"2148_CR6","first-page":"32","volume":"32","author":"L Wen","year":"2009","unstructured":"Wen, L., Luo, S.S., Yang, Y.X., Yang, X., Qian, X.: A study of secure two-party circle computation problem. J. Beijing Univ. Posts Telecommun. 32(3), 32\u201335 (2009)","journal-title":"J. Beijing Univ. Posts Telecommun."},{"issue":"12","key":"2148_CR7","doi-asserted-by":"publisher","first-page":"316","DOI":"10.1007\/s11128-017-1766-9","volume":"16","author":"Z Peng","year":"2017","unstructured":"Peng, Z., Shi, R., Zhong, H., Cui, J., Zhang, S.: A novel quantum scheme for secure two-party distance computation. Quantum Inf. Process. 16(12), 316 (2017). \nhttps:\/\/doi.org\/10.1007\/s11128-017-1766-9","journal-title":"Quantum Inf. Process."},{"issue":"20","key":"2148_CR8","doi-asserted-by":"publisher","first-page":"208901","DOI":"10.1103\/PhysRevLett.101.208901","volume":"101","author":"F Gao","year":"2008","unstructured":"Gao, F., Guo, F.-Z., Wen, Q.-Y., Zhu, F.-C.: Comment on experimental demonstration of a quantum protocol for byzantine agreement and liar detection. Phys. Rev. Lett. 101(20), 208901 (2008). \nhttps:\/\/doi.org\/10.1103\/PhysRevLett.101.208901","journal-title":"Phys. Rev. Lett."},{"issue":"3","key":"2148_CR9","first-page":"052312","volume":"63","author":"YS Zhang","year":"2012","unstructured":"Zhang, Y.S., Li, C.F., Guo, G.C.: Comment on quantum key distribution without alternative measurements [Phys. Rev. A, 052312 (2000)]. Physics 63(3), 052312 (2012)","journal-title":"Physics"},{"issue":"4","key":"2148_CR10","first-page":"329","volume":"7","author":"F Gao","year":"2007","unstructured":"Gao, F., Qin, S.J., Wen, Q.Y., Zhu, F.C.: A simple participant attack on the Br\u00e1dler-du\u0161ek protocol. Quantum Inf. Comput. 7(4), 329\u2013334 (2007)","journal-title":"Quantum Inf. Comput."},{"issue":"9","key":"2148_CR11","doi-asserted-by":"publisher","first-page":"3189","DOI":"10.1088\/1674-1056\/17\/9\/006","volume":"17","author":"G Fei","year":"2008","unstructured":"Fei, G., Qiao Yan, W., Fu Chen, Z.: Teleportation attack on the QSDC protocol with a random basis and order. Chin. Phys. B 17(9), 3189\u20133193 (2008)","journal-title":"Chin. Phys. B"},{"issue":"5","key":"2148_CR12","doi-asserted-by":"publisher","first-page":"630","DOI":"10.1109\/JQE.2011.2107889","volume":"47","author":"F Gao","year":"2011","unstructured":"Gao, F., Qin, S., Guo, F., Wen, Q.: Dense-Coding attack on three-party quantum key distribution protocols. IEEE J. Quantum Electron. 47(5), 630\u2013635 (2011)","journal-title":"IEEE J. Quantum Electron."},{"issue":"3","key":"2148_CR13","doi-asserted-by":"publisher","first-page":"491","DOI":"10.1007\/s11433-010-0145-7","volume":"53","author":"L Hao","year":"2010","unstructured":"Hao, L., Li, J., Long, G.: Eavesdropping in a quantum secret sharing protocol based on Grover algorithm and its solution. Sci. China Phys. Mech. Astron. 53(3), 491\u2013495 (2010). \nhttps:\/\/doi.org\/10.1007\/s11433-010-0145-7","journal-title":"Sci. China Phys. Mech. Astron."},{"issue":"2","key":"2148_CR14","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1016\/j.physleta.2006.04.030","volume":"357","author":"SJ Qin","year":"2006","unstructured":"Qin, S.J., Gao, F., Wen, Q.Y., Zhu, F.C.: Improving the security of multiparty quantum secret sharing against an attack with a fake signal. Phys. Lett. A 357(2), 101\u2013103 (2006)","journal-title":"Phys. Lett. A"},{"issue":"15","key":"2148_CR15","doi-asserted-by":"publisher","first-page":"157901","DOI":"10.1103\/PhysRevLett.90.157901","volume":"90","author":"A Wojcik","year":"2003","unstructured":"Wojcik, A.: Eavesdropping on the \u201cPing-Pong\u201d Quantum Communication Protocol. Physical Review Letters 90(15), 157901 (2003). \nhttps:\/\/doi.org\/10.1103\/PhysRevLett.90.157901","journal-title":"Physical Review Letters"},{"key":"2148_CR16","doi-asserted-by":"publisher","first-page":"016301","DOI":"10.1103\/PhysRevA.71.016301","volume":"71","author":"A W\u00f3jcik","year":"2005","unstructured":"W\u00f3jcik, A.: Comment on quantum dense key distribution. Phys. Rev. A 71, 016301 (2005). \nhttps:\/\/doi.org\/10.1103\/PhysRevA.71.016301","journal-title":"Phys. Rev. A"},{"key":"2148_CR17","doi-asserted-by":"crossref","unstructured":"Cai, Q.: The ping-pong protocol can be attacked without eavesdropping. Phys. Rev. Lett. 91(10), (2003). \narXiv:quant-ph\/0402052","DOI":"10.1103\/PhysRevLett.91.109801"},{"issue":"1","key":"2148_CR18","doi-asserted-by":"publisher","first-page":"014302","DOI":"10.1103\/PhysRevA.77.014302","volume":"77","author":"F Gao","year":"2008","unstructured":"Gao, F., Guo, F.Z., Wen, Q.Y., Zhu, F.C.: Consistency of shared reference frames should be reexamined. Phys. Rev. A 77(1), 014302 (2008). \nhttps:\/\/doi.org\/10.1103\/PhysRevA.77.014302","journal-title":"Phys. Rev. A"},{"issue":"6","key":"2148_CR19","doi-asserted-by":"publisher","first-page":"746","DOI":"10.1016\/j.physleta.2006.08.016","volume":"360","author":"F Gao","year":"2007","unstructured":"Gao, F., Yan, W., Qiao, Z., Fu, C.: Comment on: quantum exam [Phys. Lett. A 350 (2006) 174]. Phys. Lett. A 360(6), 746\u2013747 (2007)","journal-title":"Phys. Lett. A"},{"issue":"5","key":"2148_CR20","doi-asserted-by":"publisher","first-page":"1561","DOI":"10.1088\/0256-307X\/25\/5\/011","volume":"25","author":"G Fei","year":"2008","unstructured":"Fei, G., Song, L., Qiao Yan, W., Fu Chen, Z.: A special eavesdropping on one-sender versus n -receiver QSDC protocol. Chin. Phys. Lett. 25(5), 1561 (2008)","journal-title":"Chin. Phys. Lett."},{"issue":"1","key":"2148_CR21","doi-asserted-by":"publisher","first-page":"192","DOI":"10.1016\/j.optcom.2009.09.047","volume":"283","author":"F Gao","year":"2010","unstructured":"Gao, F., Qin, S.J., Wen, Q.Y., Zhu, F.C.: Cryptanalysis of multiparty controlled quantum secure direct communication using Greenberger Horne Zeilinger state. Opt. Commun. 283(1), 192\u2013195 (2010)","journal-title":"Opt. Commun."},{"issue":"2","key":"2148_CR22","doi-asserted-by":"publisher","first-page":"022320","DOI":"10.1103\/PhysRevA.73.022320","volume":"73","author":"N Gisin","year":"2006","unstructured":"Gisin, N., Fasel, S., Kraus, B., Zbinden, H., Ribordy, G.: Trojan-horse attacks on quantum-key-distribution systems. Phys. Rev. A 73(2), 022320 (2006). \nhttps:\/\/doi.org\/10.1103\/PhysRevA.73.022320","journal-title":"Phys. Rev. A"},{"issue":"4","key":"2148_CR23","first-page":"440","volume":"72","author":"FG Deng","year":"2005","unstructured":"Deng, F.G., Li, X.H., Zhou, H.Y., Zhang, Z.J.: Erratum: improving the security of multiparty quantum secret sharing against Trojan horse attack [Phys. Rev. A 72, 044302 (2005)]. Phys. Rev. A 72(4), 440\u2013450 (2005)","journal-title":"Phys. Rev. A"},{"issue":"15","key":"2148_CR24","doi-asserted-by":"publisher","first-page":"9388","DOI":"10.1364\/OE.15.009388","volume":"15","author":"A Lamaslinares","year":"2007","unstructured":"Lamaslinares, A., Kurtsiefer, C.: Breaking a quantum key distribution system through a timing side channel. Opt. Exp. 15(15), 9388 (2007)","journal-title":"Opt. Exp."},{"key":"2148_CR25","doi-asserted-by":"publisher","first-page":"1850012","DOI":"10.1142\/S0219749918500120","volume":"16","author":"J He","year":"2018","unstructured":"He, J., Li, Q., Wu, C., Chan, W.H., Zhang, S.: Measurement-device-independent semiquantum key distribution. Int. J. Quantum Inf. 16, 1850012 (2018)","journal-title":"Int. J. Quantum Inf."},{"issue":"13","key":"2148_CR26","doi-asserted-by":"publisher","first-page":"130502","DOI":"10.1103\/PhysRevLett.108.130502","volume":"108","author":"SL Braunstein","year":"2012","unstructured":"Braunstein, S.L., Pirandola, S.: Side-channel-free quantum key distribution. Phys. Rev. Lett. 108(13), 130502 (2012)","journal-title":"Phys. Rev. Lett."},{"issue":"23","key":"2148_CR27","doi-asserted-by":"publisher","first-page":"230502","DOI":"10.1103\/PhysRevLett.100.230502","volume":"100","author":"V Giovannetti","year":"2008","unstructured":"Giovannetti, V., Lloyd, S., Maccone, L.: Quantum private queries. Phys. Rev. Lett. 100(23), 230502 (2008). \nhttps:\/\/doi.org\/10.1103\/PhysRevLett.100.230502","journal-title":"Phys. Rev. Lett."},{"issue":"2","key":"2148_CR28","doi-asserted-by":"publisher","first-page":"3242","DOI":"10.1103\/PhysRevA.84.022313","volume":"84","author":"L Olejnik","year":"2011","unstructured":"Olejnik, L.: Secure quantum private information retrieval using phase-encoded queries. Phys. Rev. A 84(2), 3242\u20133244 (2011)","journal-title":"Phys. Rev. A"},{"issue":"4\u20135","key":"2148_CR29","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1016\/j.physleta.2006.02.050","volume":"355","author":"H Dai","year":"2006","unstructured":"Dai, H., Chen, P., Liang, L., Li, C.: Classical communication cost and remote preparation of the four-particle GHZ class state. Phys. Lett. A 355(4\u20135), 285\u2013288 (2006)","journal-title":"Phys. Lett. A"},{"issue":"3","key":"2148_CR30","doi-asserted-by":"publisher","first-page":"313","DOI":"10.1088\/0253-6102\/60\/3\/10","volume":"60","author":"H Dai","year":"2013","unstructured":"Dai, H., Zhang, M., Zhang, Z., Xi, Z.: Probabilistic remote preparation of a four-particle entangled w state for the general case and for all kinds of the special cases. Commun. Theor. Phys. 60(3), 313\u2013322 (2013)","journal-title":"Commun. Theor. Phys."},{"issue":"1","key":"2148_CR31","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1088\/1674-1056\/17\/1\/005","volume":"17","author":"D Hongyi","year":"2008","unstructured":"Hongyi, D., Pingxing, C., Ming, Z., Chengzu, L.: Remote preparation of an entangled two-qubit state with three parties. Chin. Phys. B 17(1), 27\u201333 (2008)","journal-title":"Chin. Phys. B"},{"issue":"9","key":"2148_CR32","doi-asserted-by":"publisher","first-page":"2115","DOI":"10.1007\/s11128-014-0799-6","volume":"13","author":"J Wei","year":"2014","unstructured":"Wei, J., Dai, H., Zhang, M.: Two efficient schemes for probabilistic remote state preparation and the combination of both schemes. Quantum Inf. Process. 13(9), 2115\u20132125 (2014). \nhttps:\/\/doi.org\/10.1007\/s11128-014-0799-6","journal-title":"Quantum Inf. Process."},{"key":"2148_CR33","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1007\/s00145-004-0150-y","volume":"18","author":"M Fitzi","year":"2005","unstructured":"Fitzi, M., Garay, J.A., Maurer, U., Ostrovsky, R.: Minimal complete primitives for secure multi-party computation. J. Cryptol. 18, 37\u201361 (2005)","journal-title":"J. Cryptol."},{"issue":"5","key":"2148_CR34","doi-asserted-by":"publisher","first-page":"055305","DOI":"10.1088\/1751-8113\/42\/5\/055305","volume":"42","author":"Y-G Yang","year":"2009","unstructured":"Yang, Y.-G., Wen, Q.-Y.: An efficient two-party quantum private comparison protocol with decoy photons and two-photon entanglement. J. Phys. A: Math. Theor. 42(5), 055305 (2009)","journal-title":"J. Phys. A: Math. Theor."}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11128-018-2148-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-018-2148-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-018-2148-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,12,11]],"date-time":"2019-12-11T19:19:19Z","timestamp":1576091959000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11128-018-2148-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12,12]]},"references-count":34,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2019,1]]}},"alternative-id":["2148"],"URL":"https:\/\/doi.org\/10.1007\/s11128-018-2148-7","relation":{},"ISSN":["1570-0755","1573-1332"],"issn-type":[{"value":"1570-0755","type":"print"},{"value":"1573-1332","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,12,12]]},"assertion":[{"value":"22 April 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 December 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 December 2018","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"35"}}