{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T11:27:26Z","timestamp":1740137246248,"version":"3.37.3"},"reference-count":17,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2019,12,19]],"date-time":"2019-12-19T00:00:00Z","timestamp":1576713600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,12,19]],"date-time":"2019-12-19T00:00:00Z","timestamp":1576713600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"published-print":{"date-parts":[[2020,2]]},"DOI":"10.1007\/s11128-019-2543-8","type":"journal-article","created":{"date-parts":[[2019,12,19]],"date-time":"2019-12-19T16:02:38Z","timestamp":1576771358000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Quantum bit commitment on IBM QX"],"prefix":"10.1007","volume":"19","author":[{"given":"Dhoha A.","family":"Almubayedh","sequence":"first","affiliation":[]},{"given":"Ghadeer","family":"Alazman","sequence":"additional","affiliation":[]},{"given":"Mashael","family":"Alkhalis","sequence":"additional","affiliation":[]},{"given":"Manal","family":"Alabdali","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5325-0781","authenticated-orcid":false,"given":"Naya","family":"Nagy","sequence":"additional","affiliation":[]},{"given":"Marius","family":"Nagy","sequence":"additional","affiliation":[]},{"given":"Ahmet Emin","family":"Tatar","sequence":"additional","affiliation":[]},{"given":"Malak","family":"Alfosail","sequence":"additional","affiliation":[]},{"given":"Atta","family":"Rahman","sequence":"additional","affiliation":[]},{"given":"Norah","family":"AlMubairik","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,12,19]]},"reference":[{"issue":"1","key":"2543_CR1","first-page":"31","volume":"11","author":"NU Ain","year":"2016","unstructured":"Ain, N.U., Atta-ur-Rahman, : Quantum cryptography: a comprehensive survey. J. Inf. Assur. Secur. (JIAS) 11(1), 31\u201338 (2016)","journal-title":"J. Inf. Assur. Secur. (JIAS)"},{"key":"2543_CR2","unstructured":"Ain, N., Atta-ur-Rahman, Nadeem, M., Abbasi, A.G.: Quantum cryptography trends: a milestone in information security. In: International Conference on Hybrid Intelligent Systems, Springer, pp. 25\u201339, November 16\u201318, 2015, Seoul, Korea"},{"key":"2543_CR3","series-title":"Lecture Notes in Computer Science","volume-title":"Advances in Cryptology, CRYPTO 1984","author":"CH Bennett","year":"1984","unstructured":"Bennett, C.H., Brassard, G.: An update on quantum cryptography. In: Blakley, G.R., Chaum, D. (eds.) Advances in Cryptology, CRYPTO 1984. Lecture Notes in Computer Science, vol. 196. Springer, Berlin (1984)"},{"issue":"3","key":"2543_CR4","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1145\/235666.235669","volume":"27","author":"G Brassard","year":"1996","unstructured":"Brassard, G., Cr\u00e9peau, C.: 25 Years of quantum cryptography. SIGACT News 27(3), 13\u201324 (1996)","journal-title":"SIGACT News"},{"key":"2543_CR5","doi-asserted-by":"publisher","unstructured":"Bravo, J. M.: Calculating Hamming Distance with the IBM Q Experience, 16 April 2018. https:\/\/doi.org\/10.20944\/preprints201804.0164.v2","DOI":"10.20944\/preprints201804.0164.v2"},{"key":"2543_CR6","doi-asserted-by":"crossref","unstructured":"Cr\u00e9peau, C., Salvail, L.: Quantum oblivious mutual identification. In: Guillou, L.C., Quisquater, J.J. (eds.), Proceedings of the 14th Annual International Conference on Theory and Application of Cryptographic Techniques (EUROCRYPT\u201995), Springer, Berlin, pp. 133\u2013146 (1995)","DOI":"10.1007\/3-540-49264-X_11"},{"key":"2543_CR7","volume-title":"Data Communications and Networking","author":"BA Forouzan","year":"2007","unstructured":"Forouzan, B.A., Fegan, S.C.: Data Communications and Networking. McGraw-Hill Higher Education, New York (2007)"},{"issue":"7","key":"2543_CR8","doi-asserted-by":"publisher","first-page":"4687","DOI":"10.1109\/TIT.2013.2247463","volume":"59","author":"J Kaniewski","year":"2013","unstructured":"Kaniewski, J., Tomamichel, M., Hanggi, E., Wehner, S.: Secure bit commitment from relativistic constraints. IEEE Trans. Inf. Theory 59(7), 4687\u20134699 (2013)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"2543_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"343","DOI":"10.1007\/3-540-68697-5_26","volume-title":"Advances in Cryptology, CRYPTO\u201996","author":"D Mayers","year":"1996","unstructured":"Mayers, D.: Quantum key distribution and string oblivious transfer in noisy channels. In: Koblitz, N. (ed.) Advances in Cryptology, CRYPTO\u201996. Lecture Notes in Computer Science, vol. 1109, pp. 343\u2013357. Springer, Berlin (1996)"},{"key":"2543_CR10","unstructured":"MedCalc, Comparison of standard deviations (f-test) (2018). https:\/\/www.medcalc.org\/manual\/comparison_of_standard_deviations_f-test.php"},{"key":"2543_CR11","doi-asserted-by":"crossref","unstructured":"Mitra, S., Jana, B., Bhattacharya, S., Pal, P., Poray, J.: Quantum cryptography: overview, security issues and future challenges. In: 2017 4th International Conference on Opto-Electronics and Applied Optics (Optronix) (2017)","DOI":"10.1109\/OPTRONIX.2017.8350006"},{"key":"2543_CR12","unstructured":"Nagy, N., Nagy, M.: Quantum bit commitment-within an equivalence class. In: Unconventional Computing (2016)"},{"key":"2543_CR13","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511976667","volume-title":"Quantum Computation and Quantum Information","author":"AM Nielsen","year":"2010","unstructured":"Nielsen, A.M., Chuang, I.L.: Quantum Computation and Quantum Information. Cambridge University Press, Cambridge (2010)"},{"key":"2543_CR14","doi-asserted-by":"publisher","first-page":"012310","DOI":"10.1103\/PhysRevA.65.012310","volume":"65","author":"RW Spekkens","year":"2002","unstructured":"Spekkens, R.W., Rudolph, T.: Degrees of concealment and bindingness in quantum bit commitment protocols. Phys. Rev. Lett. A 65, 012310 (2002)","journal-title":"Phys. Rev. Lett. A"},{"issue":"1","key":"2543_CR15","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1109\/JPROC.2018.2869760","volume":"107","author":"E Testa","year":"2019","unstructured":"Testa, E., Soeken, M., Amaru, L.G., Michelli, G.D.: Logic synthesis for established and emerging computing. Proc. IEEE 107(1), 165\u2013184 (2019)","journal-title":"Proc. IEEE"},{"key":"2543_CR16","doi-asserted-by":"publisher","first-page":"152","DOI":"10.1007\/s11128-019-2272-z","volume":"18","author":"G Vissers","year":"2019","unstructured":"Vissers, G., Bouten, L.: Implementing quantum stochastic differential equations on a quantum computer. Quantum Inf. Process. 18, 152 (2019)","journal-title":"Quantum Inf. Process."},{"key":"2543_CR17","unstructured":"Zulehner, A., Paler, A., Wille, R.: Efficient mapping of quantum circuits to the IBM QX Architectures. In: IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems (2018)\u2014Early Access. Initial version in 2018 Design, Automation and Test in Europe Conference and Exhibition, pp. 1135\u20131138"}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-019-2543-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11128-019-2543-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-019-2543-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,12,18]],"date-time":"2020-12-18T00:30:01Z","timestamp":1608251401000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11128-019-2543-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12,19]]},"references-count":17,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2020,2]]}},"alternative-id":["2543"],"URL":"https:\/\/doi.org\/10.1007\/s11128-019-2543-8","relation":{},"ISSN":["1570-0755","1573-1332"],"issn-type":[{"type":"print","value":"1570-0755"},{"type":"electronic","value":"1573-1332"}],"subject":[],"published":{"date-parts":[[2019,12,19]]},"assertion":[{"value":"26 May 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 December 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 December 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"55"}}