{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T04:18:42Z","timestamp":1773807522798,"version":"3.50.1"},"reference-count":69,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2019,5,16]],"date-time":"2019-05-16T00:00:00Z","timestamp":1557964800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,5,16]],"date-time":"2019-05-16T00:00:00Z","timestamp":1557964800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100004663","name":"the Ministry of Science and Technology, Taiwan, R.O.C.","doi-asserted-by":"publisher","award":["No. MOST 107-2221-E-006 -077 -"],"award-info":[{"award-number":["No. MOST 107-2221-E-006 -077 -"]}],"id":[{"id":"10.13039\/501100004663","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004663","name":"Ministry of Science and Technology, Taiwan","doi-asserted-by":"publisher","award":["MOST 107-2218-E-218 -004 -MY2"],"award-info":[{"award-number":["MOST 107-2218-E-218 -004 -MY2"]}],"id":[{"id":"10.13039\/501100004663","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004663","name":"Ministry of Science and Technology, Taiwan","doi-asserted-by":"publisher","award":["MOST 107-2627-E-006 -001 -."],"award-info":[{"award-number":["MOST 107-2627-E-006 -001 -."]}],"id":[{"id":"10.13039\/501100004663","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"published-print":{"date-parts":[[2019,7]]},"DOI":"10.1007\/s11128-019-2251-4","type":"journal-article","created":{"date-parts":[[2019,5,16]],"date-time":"2019-05-16T17:32:11Z","timestamp":1558027931000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":63,"title":["Efficient semi-quantum private comparison using single photons"],"prefix":"10.1007","volume":"18","author":[{"given":"Po-Hua","family":"Lin","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4005-4199","authenticated-orcid":false,"given":"Tzonelih","family":"Hwang","sequence":"additional","affiliation":[]},{"given":"Chia-Wei","family":"Tsai","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,5,16]]},"reference":[{"key":"2251_CR1","unstructured":"Bennett, C. H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. In: Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, 10\u201312 December 1984, pp. 175\u2013179"},{"issue":"23","key":"2251_CR2","doi-asserted-by":"publisher","first-page":"230504","DOI":"10.1103\/PhysRevLett.94.230504","volume":"94","author":"H-K Lo","year":"2005","unstructured":"Lo, H.-K., Ma, X.-F., Chen, K.: Decoy state quantum key distribution. Phys. Rev. Lett. 94(23), 230504 (2005)","journal-title":"Phys. Rev. Lett."},{"issue":"2","key":"2251_CR3","doi-asserted-by":"publisher","first-page":"441","DOI":"10.1103\/PhysRevLett.85.441","volume":"85","author":"PW Shor","year":"2000","unstructured":"Shor, P.W., Preskill, J.: Simple proof of security of the BB84 quantum key distribution protocol. Phys. Rev. Lett. 85(2), 441 (2000)","journal-title":"Phys. Rev. Lett."},{"issue":"2","key":"2251_CR4","doi-asserted-by":"publisher","first-page":"022321","DOI":"10.1103\/PhysRevA.78.022321","volume":"78","author":"X-H Li","year":"2008","unstructured":"Li, X.-H., Deng, F.-G., Zhou, H.-Y.: Efficient quantum key distribution over a collective noise channel. Phys. Rev. A 78(2), 022321 (2008)","journal-title":"Phys. Rev. A"},{"issue":"3","key":"2251_CR5","doi-asserted-by":"publisher","first-page":"785","DOI":"10.1140\/epjd\/e2010-10320-y","volume":"61","author":"T Hwang","year":"2011","unstructured":"Hwang, T., Hwang, C.-C., Tsai, C.-W.: Quantum key distribution protocol using dense coding of three-qubit W state. Eur. Phys. J. D 61(3), 785\u2013790 (2011)","journal-title":"Eur. Phys. J. D"},{"issue":"3","key":"2251_CR6","doi-asserted-by":"crossref","first-page":"1829","DOI":"10.1103\/PhysRevA.59.1829","volume":"59","author":"M Hillery","year":"1999","unstructured":"Hillery, M., Bu\u017eek, V., Berthiaume, A.: Quantum secret sharing. Phys. Rev. A 59(3), 1829 (1999)","journal-title":"Phys. Rev. A"},{"issue":"5","key":"2251_CR7","doi-asserted-by":"publisher","first-page":"052307","DOI":"10.1103\/PhysRevA.69.052307","volume":"69","author":"X Li","year":"2004","unstructured":"Li, X., Long, G.-L., Deng, F.-G., Pan, J.-W.: Efficient multiparty quantum-secret-sharing schemes. Phys. Rev. A 69(5), 052307 (2004)","journal-title":"Phys. Rev. A"},{"issue":"18","key":"2251_CR8","doi-asserted-by":"publisher","first-page":"1149","DOI":"10.1049\/el:20045183","volume":"40","author":"N-R Zhou","year":"2004","unstructured":"Zhou, N.-R., Zeng, G.-H., Xiong, J.: Quantum key agreement protocol. Electron. Lett. 40(18), 1149\u20131150 (2004)","journal-title":"Electron. Lett."},{"issue":"23","key":"2251_CR9","doi-asserted-by":"publisher","first-page":"230502","DOI":"10.1103\/PhysRevLett.100.230502","volume":"100","author":"V Giovannetti","year":"2008","unstructured":"Giovannetti, V., Lloyd, S., Maccone, L.: Quantum private queries. Phys. Rev. Lett. 100(23), 230502 (2008)","journal-title":"Phys. Rev. Lett."},{"issue":"12","key":"2251_CR10","doi-asserted-by":"publisher","first-page":"120311","DOI":"10.1007\/s11433-017-9085-0","volume":"60","author":"Y-G Yang","year":"2017","unstructured":"Yang, Y.-G., Liu, Z.-C., Chen, X.-B., Zhou, Y.-H., Shi, W.-M.: Robust QKD-based private database queries based on alternative sequences of single-qubit measurements. Sci. China Phys. Mech. Astron. 60(12), 120311 (2017)","journal-title":"Sci. China Phys. Mech. Astron."},{"issue":"7","key":"2251_CR11","doi-asserted-by":"publisher","first-page":"70301","DOI":"10.1007\/s11433-018-9324-6","volume":"62","author":"F Gao","year":"2019","unstructured":"Gao, F., Qin, S.-J., Huang, W., Wen, Q.-Y.: Quantum private query: a new kind of practical quantum cryptographic. Sci. China Phys. Mech. Astron. 62(7), 70301 (2019)","journal-title":"Sci. China Phys. Mech. Astron."},{"issue":"3","key":"2251_CR12","doi-asserted-by":"publisher","first-page":"032302","DOI":"10.1103\/PhysRevA.65.032302","volume":"65","author":"G-L Long","year":"2002","unstructured":"Long, G.-L., Liu, X.-S.: Theoretically efficient high-capacity quantum-key-distribution scheme. Phys. Rev. A 65(3), 032302 (2002)","journal-title":"Phys. Rev. A"},{"issue":"4","key":"2251_CR13","doi-asserted-by":"publisher","first-page":"042317","DOI":"10.1103\/PhysRevA.68.042317","volume":"68","author":"F-G Deng","year":"2003","unstructured":"Deng, F.-G., Long, G.-L., Liu, X.-S.: Two-step quantum direct communication protocol using the Einstein\u2013Podolsky\u2013Rosen pair block. Phys. Rev. A 68(4), 042317 (2003)","journal-title":"Phys. Rev. A"},{"issue":"5","key":"2251_CR14","doi-asserted-by":"publisher","first-page":"052319","DOI":"10.1103\/PhysRevA.69.052319","volume":"69","author":"F-G Deng","year":"2004","unstructured":"Deng, F.-G., Long, G.-L.: Secure direct communication with a quantum one-time pad. Phys. Rev. A 69(5), 052319 (2004)","journal-title":"Phys. Rev. A"},{"issue":"14","key":"2251_CR15","doi-asserted-by":"publisher","first-page":"1025","DOI":"10.1016\/j.scib.2017.06.007","volume":"62","author":"Y-B Sheng","year":"2017","unstructured":"Sheng, Y.-B., Zhou, L.: Distributed secure quantum machine learning. Sci. Bull. 62(14), 1025\u20131029 (2017)","journal-title":"Sci. Bull."},{"issue":"5","key":"2251_CR16","doi-asserted-by":"publisher","first-page":"055305","DOI":"10.1088\/1751-8113\/42\/5\/055305","volume":"42","author":"Y-G Yang","year":"2009","unstructured":"Yang, Y.-G., Wen, Q.-Y.: An efficient two-party quantum private comparison protocol with decoy photons and two-photon entanglement. J. Phys. A Math. Theor. 42(5), 055305 (2009)","journal-title":"J. Phys. A Math. Theor."},{"issue":"1","key":"2251_CR17","doi-asserted-by":"publisher","first-page":"545","DOI":"10.1016\/j.optcom.2010.09.005","volume":"284","author":"H-Y Jia","year":"2011","unstructured":"Jia, H.-Y., Wen, Q.-Y., Song, T.-T., Gao, F.: Quantum protocol for millionaire problem. Opt. Commun. 284(1), 545\u2013549 (2011)","journal-title":"Opt. Commun."},{"issue":"2","key":"2251_CR18","doi-asserted-by":"publisher","first-page":"1077","DOI":"10.1007\/s11128-012-0454-z","volume":"12","author":"Y-J Chang","year":"2013","unstructured":"Chang, Y.-J., Tsai, C.-W., Hwang, T.: Multi-user private comparison protocol using GHZ class states. Quantum Inf. Process. 12(2), 1077\u20131088 (2013)","journal-title":"Quantum Inf. Process."},{"issue":"10","key":"2251_CR19","doi-asserted-by":"publisher","first-page":"2343","DOI":"10.1007\/s11128-014-0805-z","volume":"13","author":"Q-B Luo","year":"2014","unstructured":"Luo, Q.-B., Yang, G.-W., She, K., Niu, W.-N., Wang, Y.-Q.: Multi-party quantum private comparison protocol based on d-dimensional entangled states. Quantum Inf. Process. 13(10), 2343\u20132352 (2014)","journal-title":"Quantum Inf. Process."},{"issue":"2","key":"2251_CR20","doi-asserted-by":"publisher","first-page":"373","DOI":"10.1007\/s11128-011-0251-0","volume":"11","author":"H-Y Tseng","year":"2012","unstructured":"Tseng, H.-Y., Lin, J., Hwang, T.: New quantum private comparison protocol using EPR pairs. Quantum Inf. Process. 11(2), 373\u2013384 (2012)","journal-title":"Quantum Inf. Process."},{"issue":"12","key":"2251_CR21","doi-asserted-by":"publisher","first-page":"3160","DOI":"10.1016\/j.optcom.2011.02.017","volume":"284","author":"W Liu","year":"2011","unstructured":"Liu, W., Wang, Y.-B., Jiang, Z.-T.: An efficient protocol for the quantum private comparison of equality with W state. Opt. Commun. 284(12), 3160\u20133163 (2011)","journal-title":"Opt. Commun."},{"issue":"4","key":"2251_CR22","doi-asserted-by":"publisher","first-page":"583","DOI":"10.1088\/0253-6102\/57\/4\/11","volume":"57","author":"L Wen","year":"2012","unstructured":"Wen, L., Yong-Bin, W., Wei, C.: Quantum private comparison protocol based on Bell entangled states. Commun. Theor. Phys. 57(4), 583 (2012)","journal-title":"Commun. Theor. Phys."},{"issue":"5","key":"2251_CR23","doi-asserted-by":"publisher","first-page":"1981","DOI":"10.1007\/s11128-012-0507-3","volume":"12","author":"W-W Zhang","year":"2013","unstructured":"Zhang, W.-W., Zhang, K.-J.: Cryptanalysis and improvement of the quantum private comparison protocol with semi-honest third party. Quantum Inf. Process. 12(5), 1981\u20131990 (2013)","journal-title":"Quantum Inf. Process."},{"issue":"6","key":"2251_CR24","doi-asserted-by":"publisher","first-page":"2969","DOI":"10.1007\/s10773-016-2929-7","volume":"55","author":"S-L Huang","year":"2016","unstructured":"Huang, S.-L., Hwang, T., Gope, P.: Multi-party quantum private comparison protocol with an almost-dishonest third party using GHZ states. Int. J. Theor. Phys. 55(6), 2969\u20132976 (2016)","journal-title":"Int. J. Theor. Phys."},{"issue":"2","key":"2251_CR25","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1007\/s11128-016-1498-2","volume":"16","author":"S-M Hung","year":"2017","unstructured":"Hung, S.-M., Hwang, S.-L., Hwang, T., Kao, S.-H.: Multiparty quantum private comparison with almost dishonest third parties for strangers. Quantum Inf. Process. 16(2), 36 (2017)","journal-title":"Quantum Inf. Process."},{"issue":"9","key":"2251_CR26","doi-asserted-by":"publisher","first-page":"090312","DOI":"10.1007\/s11433-017-9056-6","volume":"60","author":"T-Y Ye","year":"2017","unstructured":"Ye, T.-Y., Ji, Z.-X.: Multi-user quantum private comparison with scattered preparation and one-way convergent transmission of quantum states. Sci. China Phys. Mech. Astron. 60(9), 090312 (2017)","journal-title":"Sci. China Phys. Mech. Astron."},{"issue":"06","key":"2251_CR27","doi-asserted-by":"publisher","first-page":"1250065","DOI":"10.1142\/S0219749912500657","volume":"10","author":"Y-G Yang","year":"2012","unstructured":"Yang, Y.-G., Xia, J., Jia, X., Shi, L.: New quantum private comparison protocol without entanglement. Int. J. Quantum Inf. 10(06), 1250065 (2012)","journal-title":"Int. J. Quantum Inf."},{"issue":"2","key":"2251_CR28","doi-asserted-by":"publisher","first-page":"887","DOI":"10.1007\/s11128-012-0439-y","volume":"12","author":"B Liu","year":"2013","unstructured":"Liu, B., Gao, F., Jia, H.-y., Huang, W., Zhang, W.-W., Wen, Q.-Y.: Efficient quantum private comparison employing single photons and collective detection. Quantum Inf. Process. 12(2), 887\u2013897 (2013)","journal-title":"Quantum Inf. Process."},{"issue":"6","key":"2251_CR29","doi-asserted-by":"publisher","first-page":"065002","DOI":"10.1088\/0031-8949\/80\/06\/065002","volume":"80","author":"Y-G Yang","year":"2009","unstructured":"Yang, Y.-G., Cao, W.-F., Wen, Q.-Y.: Secure quantum private comparison. Phys. Scr. 80(6), 065002 (2009)","journal-title":"Phys. Scr."},{"issue":"5","key":"2251_CR30","doi-asserted-by":"publisher","first-page":"1466","DOI":"10.1007\/s10773-012-1464-4","volume":"52","author":"W-W Zhang","year":"2013","unstructured":"Zhang, W.-W., Li, D., Song, T.-T., Li, Y.-B.: Quantum private comparison based on quantum search algorithm. Int. J. Theor. Phys. 52(5), 1466\u20131473 (2013)","journal-title":"Int. J. Theor. Phys."},{"key":"2251_CR31","doi-asserted-by":"publisher","first-page":"482","DOI":"10.1038\/nature03064","volume":"432","author":"B Julsgaard","year":"2004","unstructured":"Julsgaard, B., Sherson, J., Cirac, J.I., Fiur\u00e1\u0161ek, J., Polzik, E.S.: Experimental demonstration of quantum memory for light. Nature 432, 482\u2013486 (2004)","journal-title":"Nature"},{"key":"2251_CR32","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1038\/nphoton.2011.354","volume":"6","author":"X-C Yao","year":"2012","unstructured":"Yao, X.-C., Wang, T.-X., Ping, X., He, L., Pan, G.-S., Bao, X.-H., et al.: Observation of eight-photon entanglement. Nat. Photonics 6, 225\u2013228 (2012)","journal-title":"Nat. Photonics"},{"key":"2251_CR33","volume-title":"Quantum computation and quantum information","author":"MA Nielsen","year":"2002","unstructured":"Nielsen, M.A., Chuang, I.: Quantum computation and quantum information. AAPT, College Park (2002)"},{"key":"2251_CR34","unstructured":"Boyer, M., Kenigsberg, D., Mor, T.: Quantum key distribution with classical Bob. In: First International Conference on Quantum, Nano, and Micro Technologies, 2007. ICQNM\u201907. IEEE (2007)"},{"key":"2251_CR35","doi-asserted-by":"publisher","first-page":"032341","DOI":"10.1103\/PhysRevA.79.032341","volume":"79","author":"M Boyer","year":"2009","unstructured":"Boyer, M., Gelles, R., Kenigsberg, D., Mor, T.: Semiquantum key distribution. Phys. Rev. A 79, 032341 (2009)","journal-title":"Phys. Rev. A"},{"issue":"5","key":"2251_CR36","doi-asserted-by":"publisher","first-page":"052312","DOI":"10.1103\/PhysRevA.79.052312","volume":"79","author":"X Zou","year":"2009","unstructured":"Zou, X., Qiu, D., Li, L., Lihua, W., Li, L.: Semiquantum-key distribution using less than four quantum states. Phys. Rev. A 79(5), 052312 (2009)","journal-title":"Phys. Rev. A"},{"issue":"10","key":"2251_CR37","doi-asserted-by":"publisher","first-page":"100301","DOI":"10.1088\/0256-307X\/26\/10\/100301","volume":"28","author":"W Jian","year":"2011","unstructured":"Jian, W., Sheng, Z., Quan, Z., Chao-Jing, T.: Semiquantum key distribution using entangled states. Chin. Phys. Lett. 28(10), 100301 (2011)","journal-title":"Chin. Phys. Lett."},{"issue":"4","key":"2251_CR38","doi-asserted-by":"publisher","first-page":"1700206","DOI":"10.1002\/andp.201700206","volume":"530","author":"Z-R Liu","year":"2018","unstructured":"Liu, Z.-R., Hwang, T.: Mediated semi-quantum key distribution without invoking quantum measurement. Ann. Phys. 530(4), 1700206 (2018)","journal-title":"Ann. Phys."},{"key":"2251_CR39","doi-asserted-by":"publisher","first-page":"19898","DOI":"10.1038\/srep19898","volume":"6","author":"Q Li","year":"2016","unstructured":"Li, Q., Chan, W.H., Zhang, S.: Semiquantum key distribution with secure delegated quantum computation. Sci. Rep. 6, 19898 (2016)","journal-title":"Sci. Rep."},{"issue":"6","key":"2251_CR40","doi-asserted-by":"publisher","first-page":"1457","DOI":"10.1007\/s11128-014-0740-z","volume":"13","author":"K-F Yu","year":"2014","unstructured":"Yu, K.-F., Yang, C.-W., Liao, C.-H., Hwang, T.: Authenticated semi-quantum key distribution protocol using Bell states. Quantum Inf. Process. 13(6), 1457\u20131465 (2014)","journal-title":"Quantum Inf. Process."},{"issue":"8","key":"2251_CR41","doi-asserted-by":"publisher","first-page":"2981","DOI":"10.1007\/s11128-015-1015-z","volume":"14","author":"X-F Zou","year":"2015","unstructured":"Zou, X.-F., Qiu, D.-W., Zhang, S., Mateus, P.: Semiquantum key distribution without invoking the classical party\u2019s measurement capability. Quantum Inf. Process. 14(8), 2981\u20132996 (2015)","journal-title":"Quantum Inf. Process."},{"issue":"3","key":"2251_CR42","doi-asserted-by":"publisher","first-page":"032323","DOI":"10.1103\/PhysRevA.91.032323","volume":"91","author":"WO Krawec","year":"2015","unstructured":"Krawec, W.O.: Mediated semiquantum key distribution. Phys. Rev. A 91(3), 032323 (2015)","journal-title":"Phys. Rev. A"},{"issue":"05","key":"2251_CR43","doi-asserted-by":"publisher","first-page":"1350052","DOI":"10.1142\/S0219749913500524","volume":"11","author":"C-W Yang","year":"2013","unstructured":"Yang, C.-W., Hwang, T.: Efficient key construction on semi-quantum secret sharing protocols. Int. J. Quantum Inf. 11(05), 1350052 (2013)","journal-title":"Int. J. Quantum Inf."},{"issue":"2","key":"2251_CR44","doi-asserted-by":"publisher","first-page":"022303","DOI":"10.1103\/PhysRevA.82.022303","volume":"82","author":"Q Li","year":"2010","unstructured":"Li, Q., Chan, W.H., Long, D.-Y.: Semiquantum secret sharing using entangled states. Phys. Rev. A 82(2), 022303 (2010)","journal-title":"Phys. Rev. A"},{"issue":"05","key":"2251_CR45","doi-asserted-by":"publisher","first-page":"1250050","DOI":"10.1142\/S0219749912500505","volume":"10","author":"J Wang","year":"2012","unstructured":"Wang, J., Zhang, S., Zhang, Q., Tang, C.-J.: Semiquantum secret sharing using two-particle entangled state. Int. J. Quantum Inf. 10(05), 1250050 (2012)","journal-title":"Int. J. Quantum Inf."},{"issue":"4","key":"2251_CR46","doi-asserted-by":"publisher","first-page":"045304","DOI":"10.1088\/1751-8113\/46\/4\/045304","volume":"46","author":"L Li","year":"2013","unstructured":"Li, L., Qiu, D., Mateus, P.: Quantum secret sharing with classical Bobs. J. Phys. A Math. Theor. 46(4), 045304 (2013)","journal-title":"J. Phys. A Math. Theor."},{"issue":"8","key":"2251_CR47","doi-asserted-by":"publisher","first-page":"194","DOI":"10.1007\/s11128-017-1631-x","volume":"16","author":"K-F Yu","year":"2017","unstructured":"Yu, K.-F., Jun, G., Hwang, T., Gope, P.: Multi-party semi-quantum key distribution-convertible multi-party semi-quantum secret sharing. Quantum Inf. Process. 16(8), 194 (2017)","journal-title":"Quantum Inf. Process."},{"issue":"2","key":"2251_CR48","doi-asserted-by":"publisher","first-page":"947","DOI":"10.1007\/s11128-015-1182-y","volume":"15","author":"Y-P Luo","year":"2016","unstructured":"Luo, Y.-P., Hwang, T.: Authenticated semi-quantum direct communication protocols using Bell states. Quantum Inf. Process. 15(2), 947\u2013958 (2016)","journal-title":"Quantum Inf. Process."},{"issue":"9","key":"2251_CR49","doi-asserted-by":"publisher","first-page":"1696","DOI":"10.1007\/s11433-014-5542-x","volume":"57","author":"X-F Zou","year":"2014","unstructured":"Zou, X.-F., Qiu, D.-W.: Three-step semiquantum secure direct communication protocol. Sci. China Phy. Mech. Astron. 57(9), 1696\u20131702 (2014)","journal-title":"Sci. China Phy. Mech. Astron."},{"issue":"12","key":"2251_CR50","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1007\/s11128-017-1736-2","volume":"16","author":"C Shukla","year":"2017","unstructured":"Shukla, C., Thapliyal, K., Pathak, A.: Semi-quantum communication: protocols for key agreement, controlled secure direct communication and dialogue. Quantum Inf. Process. 16(12), 295 (2017)","journal-title":"Quantum Inf. Process."},{"key":"2251_CR51","unstructured":"Chou, W.-H., Hwang, T., Gu, J.: Semi-quantum private comparison protocol under an almost-dishonest third party. arXiv preprint \n                    arXiv:1607.07961\n                    \n                   (2016)"},{"issue":"10","key":"2251_CR52","doi-asserted-by":"publisher","first-page":"3048","DOI":"10.1007\/s10773-018-3823-2","volume":"57","author":"Y-F Lang","year":"2018","unstructured":"Lang, Y.-F.: Semi-quantum private comparison using single photons. Int. J. Theor. Phys. 57(10), 3048\u20133055 (2018)","journal-title":"Int. J. Theor. Phys."},{"issue":"12","key":"2251_CR53","doi-asserted-by":"publisher","first-page":"3819","DOI":"10.1007\/s10773-018-3894-0","volume":"57","author":"T-Y Ye","year":"2018","unstructured":"Ye, T.-Y., Ye, C.-Q.: Measure-resend semi-quantum private comparison without entanglement. Int. J. Theor. Phys. 57(12), 3819\u20133834 (2018)","journal-title":"Int. J. Theor. Phys."},{"issue":"2","key":"2251_CR54","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1007\/s11128-016-1498-2","volume":"16","author":"S-M Hung","year":"2017","unstructured":"Hung, S.-M., Hwang, S.-L., Hwang, T., Kao, S.-H.: Multiparty quantum private comparison with almost dishonest third parties for strangers. Quantum Inf. Process. 16(2), 36 (2017)","journal-title":"Quantum Inf. Process."},{"issue":"1","key":"2251_CR55","doi-asserted-by":"publisher","first-page":"4225","DOI":"10.1007\/s11128-015-1104-z","volume":"14","author":"S-L Huang","year":"2015","unstructured":"Huang, S.-L., Hwang, T., Gope, P.: Multi-party quantum private comparison with an almost-dishonest third party. Quantum Inf. Process. 14(1), 4225\u20134235 (2015)","journal-title":"Quantum Inf. Process."},{"issue":"5","key":"2251_CR56","doi-asserted-by":"publisher","first-page":"1981","DOI":"10.1007\/s11128-012-0507-3","volume":"12","author":"W-W Zhang","year":"2013","unstructured":"Zhang, W.-W., Zhang, K.-J.: Cryptanalysis and improvement of the quantum private comparison protocol with semi-honest third party. Quantum Inf. Process. 12(5), 1981\u20131990 (2013)","journal-title":"Quantum Inf. Process."},{"key":"2251_CR57","doi-asserted-by":"publisher","first-page":"4287","DOI":"10.1103\/PhysRevLett.71.4287","volume":"71","author":"M \u017bukowski","year":"1993","unstructured":"\u017bukowski, M., Zeilinger, A., Horne, M.A., Ekert, A.K.: \u201cEvent-ready-detectors\u201d Bell experiment via entanglement swapping. Phys. Rev. Lett. 71, 4287\u20134290 (1993)","journal-title":"Phys. Rev. Lett."},{"issue":"20","key":"2251_CR58","doi-asserted-by":"publisher","first-page":"208901","DOI":"10.1103\/PhysRevLett.101.208901","volume":"101","author":"F Gao","year":"2008","unstructured":"Gao, F., Guo, F.-Z., Wen, Q.-Y., Zhu, F.-C.: Comment on \u201cExperimental demonstration of a quantum protocol for byzantine agreement and liar detection\u201d. Phys. Rev. Lett. 101(20), 208901 (2008)","journal-title":"Phys. Rev. Lett."},{"key":"2251_CR59","doi-asserted-by":"publisher","first-page":"140501","DOI":"10.1103\/PhysRevLett.99.140501","volume":"99","author":"M Boyer","year":"2007","unstructured":"Boyer, M., Kenigsberg, D., Mor, T.: Quantum key distribution with classical Bob. Phys. Rev. Lett. 99, 140501 (2007)","journal-title":"Phys. Rev. Lett."},{"issue":"1\u20132","key":"2251_CR60","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1016\/j.physleta.2005.10.050","volume":"351","author":"Q-Y Cai","year":"2006","unstructured":"Cai, Q.-Y.: Eavesdropping on the two-way quantum communication protocols with invisible photons. Phys. Lett. A 351(1\u20132), 23\u201325 (2006)","journal-title":"Phys. Lett. A"},{"issue":"4","key":"2251_CR61","doi-asserted-by":"publisher","first-page":"044302","DOI":"10.1103\/PhysRevA.72.044302","volume":"72","author":"F-G Deng","year":"2005","unstructured":"Deng, F.-G., Li, X.-H., Zhou, H.-Y., Zhang, Z.-J.: Improving the security of multiparty quantum secret sharing against Trojan horse attack. Phys. Rev. A 72(4), 044302 (2005)","journal-title":"Phys. Rev. A"},{"key":"2251_CR62","doi-asserted-by":"publisher","first-page":"2125","DOI":"10.1007\/s11128-015-0956-6","volume":"14","author":"Z Sun","year":"2015","unstructured":"Sun, Z., Jianping, Yu., Wang, P., Lingling, X., Chunhui, W.: Quantum private comparison with a malicious third party. Quantum Inf. Process. 14, 2125\u20132133 (2015)","journal-title":"Quantum Inf. Process."},{"key":"2251_CR63","doi-asserted-by":"publisher","first-page":"042331","DOI":"10.1103\/PhysRevA.84.042331","volume":"84","author":"WP Grice","year":"2011","unstructured":"Grice, W.P.: Arbitrarily complete Bell-state measurement using only linear optical elements. Phys. Rev. A 84, 042331 (2011)","journal-title":"Phys. Rev. A"},{"issue":"06","key":"2251_CR64","doi-asserted-by":"publisher","first-page":"1195","DOI":"10.1142\/S0219749908004353","volume":"6","author":"H Lu","year":"2008","unstructured":"Lu, H., Cai, Q.-Y.: Quantum key distribution with classical Alice. Int. J. Quantum Inf. 6(06), 1195\u20131202 (2008)","journal-title":"Int. J. Quantum Inf."},{"issue":"11","key":"2251_CR65","doi-asserted-by":"publisher","first-page":"2417","DOI":"10.1007\/s11128-014-0802-2","volume":"13","author":"WO Krawec","year":"2014","unstructured":"Krawec, W.O.: Restricted attacks on semi-quantum key distribution protocols. Quantum Inf. Process. 13(11), 2417\u20132436 (2014)","journal-title":"Quantum Inf. Process."},{"issue":"2","key":"2251_CR66","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1007\/s11128-017-1788-3","volume":"17","author":"G Jun","year":"2018","unstructured":"Jun, G., Ho, C.-Y., Hwang, T.: Statistics attack on \u2018quantum private comparison with a malicious third party\u2019and its improvement. Quantum Inf. Process. 17(2), 23 (2018)","journal-title":"Quantum Inf. Process."},{"issue":"18","key":"2251_CR67","doi-asserted-by":"publisher","first-page":"187901","DOI":"10.1103\/PhysRevLett.89.187901","volume":"89","author":"A Beveratos","year":"2002","unstructured":"Beveratos, A., Brouri, R., Gacoin, T., Villing, A., Poizat, J.-P., Grangier, P.: Single photon quantum cryptography. Phys. Rev. Lett. 89(18), 187901 (2002)","journal-title":"Phys. Rev. Lett."},{"key":"2251_CR68","doi-asserted-by":"publisher","first-page":"16025","DOI":"10.1038\/npjqi.2016.25","volume":"2","author":"E Diamanti","year":"2016","unstructured":"Diamanti, E., Lo, H.-K., Qi, B., Yuan, Z.: Practical challenges in quantum key distribution. Npj Quantum Inf. 2, 16025 (2016)","journal-title":"Npj Quantum Inf."},{"issue":"3","key":"2251_CR69","doi-asserted-by":"publisher","first-page":"1863","DOI":"10.1103\/PhysRevA.51.1863","volume":"51","author":"B Huttner","year":"1995","unstructured":"Huttner, B., Imoto, N., Gisin, N., Mor, T.: Quantum cryptography with coherent states. Phys. Rev. A 51(3), 1863 (1995)","journal-title":"Phys. Rev. A"}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-019-2251-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11128-019-2251-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-019-2251-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,14]],"date-time":"2020-05-14T23:44:06Z","timestamp":1589499846000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11128-019-2251-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,5,16]]},"references-count":69,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2019,7]]}},"alternative-id":["2251"],"URL":"https:\/\/doi.org\/10.1007\/s11128-019-2251-4","relation":{},"ISSN":["1570-0755","1573-1332"],"issn-type":[{"value":"1570-0755","type":"print"},{"value":"1573-1332","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,5,16]]},"assertion":[{"value":"5 September 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 March 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 May 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"207"}}