{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T03:33:15Z","timestamp":1774927995364,"version":"3.50.1"},"reference-count":41,"publisher":"Springer Science and Business Media LLC","issue":"11","license":[{"start":{"date-parts":[[2020,11,1]],"date-time":"2020-11-01T00:00:00Z","timestamp":1604188800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,11,1]],"date-time":"2020-11-01T00:00:00Z","timestamp":1604188800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61672517"],"award-info":[{"award-number":["61672517"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National Cryptography Development Fund","award":["MMJJ20170108"],"award-info":[{"award-number":["MMJJ20170108"]}]},{"DOI":"10.13039\/501100009592","name":"Beijing Municipal Science and Technology Commission","doi-asserted-by":"crossref","award":["Z191100007119006"],"award-info":[{"award-number":["Z191100007119006"]}],"id":[{"id":"10.13039\/501100009592","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"published-print":{"date-parts":[[2020,11]]},"DOI":"10.1007\/s11128-020-02912-1","type":"journal-article","created":{"date-parts":[[2020,11,13]],"date-time":"2020-11-13T08:03:07Z","timestamp":1605254587000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Quantum public-key encryption schemes based on conjugate coding"],"prefix":"10.1007","volume":"19","author":[{"given":"Li","family":"Yang","sequence":"first","affiliation":[]},{"given":"Biyao","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Chong","family":"Xiang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,11,13]]},"reference":[{"key":"2912_CR1","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"RL Rivest","year":"1978","unstructured":"Rivest, R.L., Shamir, A., Adleman, L.A.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21, 120\u2013126 (1978)","journal-title":"Commun. ACM"},{"key":"2912_CR2","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"31","author":"T ElGamal","year":"1985","unstructured":"ElGamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inf. Theory 31, 469\u2013471 (1985)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"2912_CR3","unstructured":"Shor, P.W.: Algorithms for quantum computation: discrete logarithms and factoring. In: Goldwasser, S. (ed.) Proceedings of the 35th Annual Symposium on the Foundations of Computer Science, pp.\u00a0124\u2013134 (1994)"},{"key":"2912_CR4","unstructured":"Bennett, C.H., Brassard, G.: Quantum cryptography: public-key distribution and coin tossing. In: Proceedings of the IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, India. IEEE, New York (1984)"},{"key":"2912_CR5","doi-asserted-by":"crossref","unstructured":"Ekert, A.K.: Quantum cryptography based on Bell?s theorem. Phys. Rev. Lett. 67, (1991)","DOI":"10.1103\/PhysRevLett.67.661"},{"key":"2912_CR6","doi-asserted-by":"crossref","unstructured":"Bennett, C.H.: Quantum cryptography using any two nonorthogonal states. Phys. Rev. Lett. 68, (1992)","DOI":"10.1103\/PhysRevLett.68.3121"},{"key":"2912_CR7","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1007\/s11128-018-1991-x","volume":"17","author":"L Wang","year":"2018","unstructured":"Wang, L., Zhou, Y., Zhou, X., et al.: New scheme for measurement-device-independent quantum key distribution. Quantum Inf. Process. 17, 231 (2018)","journal-title":"Quantum Inf. Process."},{"key":"2912_CR8","doi-asserted-by":"publisher","first-page":"1005","DOI":"10.1007\/s11128-014-0904-x","volume":"14","author":"C Lee","year":"2015","unstructured":"Lee, C., Mower, J., Zhang, Z., et al.: Finite-key analysis of high-dimensional time\u2013energy entanglement-based quantum key distribution. Quantum Inf. Process. 14, 1005\u20131015 (2015)","journal-title":"Quantum Inf. Process."},{"key":"2912_CR9","doi-asserted-by":"crossref","unstructured":"Okamoto, T., Tanaka, K., Uchiyama, S.: Quantum Public-key cryptosystems. In: Bellare, M. (ed.) Advances in Cryptology: Crypto 2000 Proceedings, LNCS, vol. 1880, pp. 147\u2013165 (2000)","DOI":"10.1007\/3-540-44598-6_9"},{"key":"2912_CR10","unstructured":"Gottesman, D.: Quantum public key cryptography with information-theoretic security. In: Workshop on Classical and Quantum Information Security, pp. 15\u201318 (2005)"},{"key":"2912_CR11","doi-asserted-by":"crossref","unstructured":"Kawachi, A., Koshiba, T., Nishimura, H., Yamakami, T.: Computational indistinguishability between quantum states and its cryptographic application. In: Cramer, R. (ed.) Advances in Cryptology: Eurocrypt 2005 Proceedings, LNCS, vol. 3494, pp. 268\u2013284 (2005)","DOI":"10.1007\/11426639_16"},{"issue":"3","key":"2912_CR12","doi-asserted-by":"publisher","first-page":"528","DOI":"10.1007\/s00145-011-9103-4","volume":"25","author":"A Kawachi","year":"2012","unstructured":"Kawachi, A., Koshiba, T., Nishimura, H., Yamakami, T.: Computational indistinguishability between quantum states and its cryptographic application. J. Cryptol. 25(3), 528\u2013555 (2012)","journal-title":"J. Cryptol."},{"key":"2912_CR13","doi-asserted-by":"publisher","first-page":"032348","DOI":"10.1103\/PhysRevA.77.032348","volume":"77","author":"GM Nikolopoulos","year":"2008","unstructured":"Nikolopoulos, G.M.: Applications of single-qubit rotations in quantum public-key cryptography. Phys. Rev. A. 77, 032348 (2008)","journal-title":"Phys. Rev. A."},{"key":"2912_CR14","doi-asserted-by":"publisher","first-page":"042327","DOI":"10.1103\/PhysRevA.79.042327","volume":"79","author":"GM Nikolopoulos","year":"2009","unstructured":"Nikolopoulos, G.M.: Deterministic quantum-public-key encryption: forward search attack and randomization. Phys. Rev. A. 79, 042327 (2009)","journal-title":"Phys. Rev. A."},{"issue":"3\u20134","key":"2912_CR15","first-page":"181","volume":"12","author":"H Fujita","year":"2012","unstructured":"Fujita, H.: Quantum McEliece public-key cryptosystem. Quantum Inf. Comput. 12(3\u20134), 181\u2013202 (2012)","journal-title":"Quantum Inf. Comput."},{"key":"2912_CR16","doi-asserted-by":"crossref","unstructured":"Yang, L.: A public-key cryptosystem for quantum message transmission. In: Proceedings of the SPIE vol. 5631(1), pp. 233\u2013236 (2005)","DOI":"10.1117\/12.576938"},{"key":"2912_CR17","unstructured":"Yang, L., Liang, M., Li, B., Hu, L., Feng, D.G.: Quantum public-key cryptosystems based on induced trapdoor one-way transformations, e-print arXiv:1012.5249 (2010)"},{"issue":"9","key":"2912_CR18","doi-asserted-by":"publisher","first-page":"1618","DOI":"10.1007\/s11433-011-4806-y","volume":"55","author":"M Liang","year":"2012","unstructured":"Liang, M., Yang, L.: Public-key encryption and authentication of quantum information. Sci. China Phys. Mech. Astron. 55(9), 1618\u20131629 (2012)","journal-title":"Sci. China Phys. Mech. Astron."},{"key":"2912_CR19","doi-asserted-by":"publisher","first-page":"1925","DOI":"10.1007\/s11433-009-0299-3","volume":"52","author":"F Gao","year":"2009","unstructured":"Gao, F., Wen, Q.Y., Qin, S.J., Zhu, F.C.: Quantum asymmetric cryptography with symmetric keys. Sci. China Ser. G Phys. Mech. Astron. 52, 1925\u20131931 (2009)","journal-title":"Sci. China Ser. G Phys. Mech. Astron."},{"key":"2912_CR20","doi-asserted-by":"crossref","unstructured":"Yang, L., Yang, B., Pan, J.: Quantum public-key encryption protocols with information-theoretic security. In: Proceedings of the SPIE, vol. 8440, pp. 84400E-1\u201384400E-7 (2012)","DOI":"10.1117\/12.922444"},{"issue":"8","key":"2912_CR21","doi-asserted-by":"publisher","first-page":"3285","DOI":"10.1007\/s11128-016-1339-3","volume":"15","author":"C Wu","year":"2016","unstructured":"Wu, C., Yang, L.: Bit-oriented quantum public-key encryption based on quantum perfect encryption. Quantum Inf. Process. 15(8), 3285\u20133300 (2016)","journal-title":"Quantum Inf. Process."},{"key":"2912_CR22","first-page":"183","volume":"3","author":"C Wu","year":"2017","unstructured":"Wu, C., Yang, L.: Qubit-wise teleportation and its application in public-key secret communication. Sci. China (Inf. Sci.) 3, 183\u2013194 (2017)","journal-title":"Sci. China (Inf. Sci.)"},{"key":"2912_CR23","doi-asserted-by":"crossref","unstructured":"Wu, W., Cai, Q., Zhang, H., et al.: Quantum public key cryptosystem based on bell states. Int. J. Theor. Phys. (2017)","DOI":"10.1007\/s10773-017-3506-4"},{"key":"2912_CR24","doi-asserted-by":"crossref","unstructured":"Wang, Y., She, K.: A practical quantum public-key encryption model. In: 2017 3rd International Conference on Information Management (ICIM), Chengdu, pp. 367\u2013372 (2017)","DOI":"10.1109\/INFOMAN.2017.7950410"},{"issue":"1","key":"2912_CR25","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1145\/1008908.1008920","volume":"15","author":"S Wiesner","year":"1983","unstructured":"Wiesner, S.: Conjugate coding. SIGACT News 15(1), 78\u201388 (1983)","journal-title":"SIGACT News"},{"key":"2912_CR26","unstructured":"Rabin, M.O.: How to exchange secrets by oblivious transfer. Harvard University: Aiken Computation Laboratory, Technical Report TR-81 (1981)"},{"key":"2912_CR27","volume-title":"Advances in Cryptology","author":"S Even","year":"1983","unstructured":"Even, S., Goldreich, O., Lempel, A.: A randomized protocol for signing contracts. In: Chaum, D., Rivest, R.L., Sherman, A.T. (eds.) Advances in Cryptology. Springer, Boston (1983)"},{"issue":"5","key":"2912_CR28","doi-asserted-by":"publisher","first-page":"052319","DOI":"10.1103\/PhysRevA.69.052319","volume":"69","author":"FG Deng","year":"2004","unstructured":"Deng, F.G., Long, G.L.: Secure direct communication with a quantum one-time pad. Phys. Rev. A 69(5), 052319 (2004)","journal-title":"Phys. Rev. A"},{"issue":"2","key":"2912_CR29","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1109\/CC.2013.6472855","volume":"10","author":"L Yang","year":"2013","unstructured":"Yang, L., Xiang, C., Li, B.: Quantum probabilistic encryption protocol based on cojugate coding. China Commun. 10(2), 19\u201326 (2013)","journal-title":"China Commun."},{"issue":"3","key":"2912_CR30","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1109\/3.825881","volume":"36","author":"DS Bethune","year":"2000","unstructured":"Bethune, D.S., Risk, W.P.: An autocompensating fiber-optic quantum cryptography system based on polarization splitting of light. J. Quantum Electron. 36(3), 100 (2000)","journal-title":"J. Quantum Electron."},{"key":"2912_CR31","unstructured":"Pan, J.Y., Yang, L.: Quantum public-key encryption with information theoretic security, e-print arXiv:1006.0354 (2010)"},{"key":"2912_CR32","volume-title":"Quantum Computation and Quantum Information","author":"MA Nielsen","year":"2000","unstructured":"Nielsen, M.A., Chuang, I.L.: Quantum Computation and Quantum Information. Cambridge University Press, Cambridge (2000)"},{"key":"2912_CR33","first-page":"0345","volume":"8","author":"M Hayashi","year":"2008","unstructured":"Hayashi, M., Kawachi, A., Cobayashi, H.: Quantum measurements for hidden subgroup problems with optimal sample complexity. Quantum Inf. Comput. 8, 0345\u20130358 (2008)","journal-title":"Quantum Inf. Comput."},{"key":"2912_CR34","volume-title":"Handbook of Applied Cryptography","author":"AJ Menezes","year":"1997","unstructured":"Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1997)"},{"key":"2912_CR35","unstructured":"Barnum, H., Crepeau, C., Gottesman, D.: Authentication of quantum messages. In: The 34rd Annual IEEE Symposium on Foundations of Computer Science, November 16, et al.: November 19, 2002, Vancouver, BC, p. 2002. Institute of Electrical and Electronics Engineers Computer Society, Canada (2002)"},{"key":"2912_CR36","volume-title":"Quantum Optics and Applications in Computing and Communications II. Proceedings of SPIE Vol. 5631","author":"L Yang","year":"2005","unstructured":"Yang, L., Hu, L., Feng, D.: Quantum message authentication based on algebraic coding theory. In: Guo, G.-C., Lo, H.-K., Sasaki, M., Liu, S. (eds.) Quantum Optics and Applications in Computing and Communications II. Proceedings of SPIE Vol. 5631. SPIE, Bellingham (2005)"},{"key":"2912_CR37","doi-asserted-by":"crossref","unstructured":"Garg, S., Yuen, H., Zhandry, M.: New security notions and feasibility results for authentication of quantum data. In: Annual International Cryptology Conference, pp. 342\u2013371. Springer (2017)","DOI":"10.1007\/978-3-319-63715-0_12"},{"key":"2912_CR38","doi-asserted-by":"crossref","unstructured":"Broadbent, A., Gutoski, G., Stebila, D.: Quantum one-time programs. In: Advances in CryptologyCCRYPTO 2013, pp. 344\u2013360. Springer (2013)","DOI":"10.1007\/978-3-642-40084-1_20"},{"key":"2912_CR39","unstructured":"Aharonov, D., Ben-Or, M., Eban, E.: Interactive proofs for quantum computations. In: Proceedings of Innovations in Computer Science. Tsinghua University Press (2010)"},{"key":"2912_CR40","doi-asserted-by":"crossref","unstructured":"Broadbent, A., Wainewright, E.: Efficient simulation for quantum message authentication. In: Nascimento, A., Barreto, P. (eds.) Information Theoretic Security. ICITS 2016. Lecture Notes in Computer Science, vol. 10015. Springer","DOI":"10.1007\/978-3-319-49175-2_4"},{"issue":"16","key":"2912_CR41","doi-asserted-by":"publisher","first-page":"167902","DOI":"10.1103\/PhysRevLett.87.167902","volume":"87","author":"H Buhrman","year":"2001","unstructured":"Buhrman, H., Cleve, R., Watrous, J., De Wolf, R.: Quantum fingerprinting. Phys. Rev.Lett. 87(16), 167902 (2001)","journal-title":"Phys. Rev.Lett."}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-020-02912-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11128-020-02912-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-020-02912-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,14]],"date-time":"2021-04-14T04:49:09Z","timestamp":1618375749000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11128-020-02912-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11]]},"references-count":41,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2020,11]]}},"alternative-id":["2912"],"URL":"https:\/\/doi.org\/10.1007\/s11128-020-02912-1","relation":{},"ISSN":["1570-0755","1573-1332"],"issn-type":[{"value":"1570-0755","type":"print"},{"value":"1573-1332","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,11]]},"assertion":[{"value":"24 April 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 October 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 November 2020","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"415"}}