{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T15:49:18Z","timestamp":1774367358751,"version":"3.50.1"},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"published-print":{"date-parts":[[2021,1]]},"DOI":"10.1007\/s11128-020-02927-8","type":"journal-article","created":{"date-parts":[[2021,1,6]],"date-time":"2021-01-06T07:03:09Z","timestamp":1609916589000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":28,"title":["Qutrit-based semi-quantum key distribution protocol"],"prefix":"10.1007","volume":"20","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3635-6143","authenticated-orcid":false,"given":"Hasnaa","family":"Hajji","sequence":"first","affiliation":[]},{"given":"Morad","family":"El Baz","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,1,6]]},"reference":[{"key":"2927_CR1","doi-asserted-by":"publisher","first-page":"140501","DOI":"10.1103\/PhysRevLett.99.140501","volume":"99","author":"M Boyer","year":"2007","unstructured":"Boyer, M., Kenigsberg, D., Mor, T.: Quantum key distribution with classical Bob. Phys. Rev. Lett. 99, 140501 (2007)","journal-title":"Phys. Rev. Lett."},{"key":"2927_CR2","doi-asserted-by":"publisher","first-page":"032341","DOI":"10.1103\/PhysRevA.79.032341","volume":"79","author":"M Boyer","year":"2009","unstructured":"Boyer, M., Gelles, R., Kenigsberg, D., Mor, T.: Semiquantum key distribution. Phys. Rev. A 79, 032341 (2009)","journal-title":"Phys. Rev. A"},{"key":"2927_CR3","doi-asserted-by":"publisher","first-page":"052312","DOI":"10.1103\/PhysRevA.79.052312","volume":"79","author":"X Zou","year":"2009","unstructured":"Zou, X., Qiu, D., Li, L., Wu, L., Li, L.: Semiquantum-key distribution using less than four quantum states. Phys. Rev. A 79, 052312 (2009)","journal-title":"Phys. Rev. A"},{"key":"2927_CR4","doi-asserted-by":"publisher","first-page":"2417","DOI":"10.1007\/s11128-014-0802-2","volume":"13","author":"WO Krawec","year":"2014","unstructured":"Krawec, W.O.: Restricted attacks on semi-quantum key distribution protocols. Quantum Inf. Process. 13, 2417 (2014)","journal-title":"Quantum Inf. Process."},{"key":"2927_CR5","doi-asserted-by":"publisher","first-page":"100301","DOI":"10.1088\/0256-307X\/28\/10\/100301","volume":"28","author":"J Wang","year":"2011","unstructured":"Wang, J., Zhang, S., Zhang, Q., Tang, C.J.: Semiquantum key distribution using entangled states. Chin. Phys. Lett. 28, 100301 (2011)","journal-title":"Chin. Phys. Lett."},{"key":"2927_CR6","doi-asserted-by":"publisher","first-page":"1195","DOI":"10.1142\/S0219749908004353","volume":"06","author":"H Lu","year":"2008","unstructured":"Lu, H., Cai, Q.Y.: Quantum key distribution with classical Alice. Int. J. Quantum Inf. 06, 1195 (2008)","journal-title":"Int. J. Quantum Inf."},{"key":"2927_CR7","doi-asserted-by":"publisher","first-page":"2981","DOI":"10.1007\/s11128-015-1015-z","volume":"14","author":"X Zou","year":"2015","unstructured":"Zou, X., Qiu, D., Zhang, S., Mateus, P.: Semiquantum key distribution without invoking the classical party\u2019s measurement capability. Quantum Inf. Process. 14, 2981 (2015)","journal-title":"Quantum Inf. Process."},{"key":"2927_CR8","doi-asserted-by":"publisher","first-page":"1457","DOI":"10.1007\/s11128-014-0740-z","volume":"13","author":"KF Yu","year":"2014","unstructured":"Yu, K.F., Yang, C.W., Liao, C.H., Hwang, T.: Authenticated semi-quantum key distribution protocol using Bell states. Quantum Inf. Process. 13, 1457\u20131465 (2014)","journal-title":"Quantum Inf. Process."},{"key":"2927_CR9","doi-asserted-by":"crossref","unstructured":"Krawec, W.O.: Security proof of a semi-quantum key distribution protocol. In: 2015 IEEE International Symposium on Information Theory (ISIT), pp. 686\u2013690 (2015)","DOI":"10.1109\/ISIT.2015.7282542"},{"key":"2927_CR10","first-page":"209","volume":"17","author":"WO Krawec","year":"2017","unstructured":"Krawec, W.O.: Quantum key distribution with mismatched measurements over arbitrary channels. Quantum Inf. Comput. 17, 209\u2013241 (2017)","journal-title":"Quantum Inf. Comput."},{"key":"2927_CR11","unstructured":"Zhang, W., Qiu, D.: A single-state semi-quantum key distribution protocol and its security proof. arXiv:1612.03087 [quant-ph] (2016)"},{"issue":"05","key":"2927_CR12","doi-asserted-by":"publisher","first-page":"1350052","DOI":"10.1142\/S0219749913500524","volume":"11","author":"CW Yang","year":"2013","unstructured":"Yang, C.W., Hwang, T.: Efficient key construction on semi-quantum secret sharing protocols. Int. J. Quantum Inf. 11(05), 1350052 (2013)","journal-title":"Int. J. Quantum Inf."},{"key":"2927_CR13","doi-asserted-by":"publisher","first-page":"194","DOI":"10.1007\/s11128-017-1631-x","volume":"16","author":"KF Yu","year":"2017","unstructured":"Yu, K.F., Gu, J., Hwang, T., Gope, P.: Multi-party semi-quantum key distribution-convertible multi-party semi-quantum secret sharing. Quantum Inf. Process. 16, 194 (2017)","journal-title":"Quantum Inf. Process."},{"key":"2927_CR14","doi-asserted-by":"publisher","first-page":"022303","DOI":"10.1103\/PhysRevA.82.022303","volume":"82","author":"Q Li","year":"2010","unstructured":"Li, Q., Chan, W.H., Long, D.Y.: Semiquantum secret sharing using entangled states. Phys. Rev. A 82, 022303 (2010)","journal-title":"Phys. Rev. A"},{"key":"2927_CR15","doi-asserted-by":"publisher","first-page":"1850047","DOI":"10.1142\/S0219749918500478","volume":"16","author":"K Thapliyal","year":"2018","unstructured":"Thapliyal, K., Sharma, R.D., Pathak, A.: Orthogonal-state-based and semi-quantum protocols for quantum private comparison in noisy environment. Int. J. Quantum Inf. 16, 1850047 (2018)","journal-title":"Int. J. Quantum Inf."},{"key":"2927_CR16","unstructured":"Chou, W.H., Hwang, T., Gu, J.: Semi-quantum private comparison protocol under an almost-dishonest third party. arXiv:1607.07961 (2016)"},{"key":"2927_CR17","doi-asserted-by":"publisher","first-page":"3048","DOI":"10.1007\/s10773-018-3823-2","volume":"57","author":"L Yan-Feng","year":"2018","unstructured":"Yan-Feng, L.: Semi-quantum private comparison using single photons. Int. J. Theor. Phys. 57, 3048 (2018)","journal-title":"Int. J. Theor. Phys."},{"key":"2927_CR18","doi-asserted-by":"crossref","unstructured":"Shukla, C., Thapliyal, K., Pathak, A.: Semi-quantum communication: protocols for key agreement, controlled secure direct communication and dialogue. Quantum Inf. Process. 16, 295 (2017)","DOI":"10.1007\/s11128-017-1736-2"},{"key":"2927_CR19","unstructured":"Zou, X., Qiu, D.: Three-step semiquantum secure direct communication protocol. Sci. China Phys. Mech. Astron. 57, 1696\u20131702 (2014)"},{"key":"2927_CR20","doi-asserted-by":"publisher","first-page":"947","DOI":"10.1007\/s11128-015-1182-y","volume":"15","author":"YP Luo","year":"2016","unstructured":"Luo, Y.P., Hwang, T.: Authenticated semi-quantum direct communication protocols using Bell states. Quantum Inf. Process. 15, 947 (2016)","journal-title":"Quantum Inf. Process."},{"key":"2927_CR21","volume-title":"Quantum Theory: Concepts and Methods","author":"A Peres","year":"2006","unstructured":"Peres, A.: Quantum Theory: Concepts and Methods, vol. 57. Springer, Berlin (2006)"},{"key":"2927_CR22","doi-asserted-by":"crossref","unstructured":"Wang, Y., Hu, Z., Sanders, B.C., Kais, S.: Qudits and high-dimensional quantum computing. arXiv preprint arXiv:2008.00959 (2020)","DOI":"10.3389\/fphy.2020.589504"},{"key":"2927_CR23","doi-asserted-by":"publisher","first-page":"3313","DOI":"10.1103\/PhysRevLett.85.3313","volume":"85","author":"H Bechmann-Pasquinucci","year":"2000","unstructured":"Bechmann-Pasquinucci, H., Peres, A.: Quantum Cryptography with 3-State Systems. Phys. Rev. Lett. 85, 3313 (2000)","journal-title":"Phys. Rev. Lett."},{"key":"2927_CR24","doi-asserted-by":"publisher","first-page":"111","DOI":"10.22331\/q-2018-12-04-111","volume":"2","author":"F Bouchard","year":"2018","unstructured":"Bouchard, F., Heshami, K., England, D., Fickler, R., Boyd, R.W., Englert, B.G., S\u00e1nchez-Soto, L.L., Karimi, E.: Experimental investigation of high-dimensional quantum key distribution protocols with twisted photons. Quantum 2, 111 (2018). https:\/\/doi.org\/10.22331\/q-2018-12-04-111","journal-title":"Quantum"},{"issue":"11","key":"2927_CR25","doi-asserted-by":"publisher","first-page":"110311","DOI":"10.1007\/s11433-019-1438-6","volume":"62","author":"ZX Cui","year":"2019","unstructured":"Cui, Z.X., Zhong, W., Zhou, L., Sheng, Y.B.: Measurement-device-independent quantum key distribution with hyper-encoding. Sci. China Phys. Mech. Astron. 62(11), 110311 (2019)","journal-title":"Sci. China Phys. Mech. Astron."},{"key":"2927_CR26","volume-title":"Quantum Computation and Quantum Information: 10th Anniversary Edition","author":"MA Nielsen","year":"2011","unstructured":"Nielsen, M.A., Chuang, I.L.: Quantum Computation and Quantum Information: 10th Anniversary Edition, 10th edn. Cambridge University Press, Cambridge (2011)","edition":"10"},{"key":"2927_CR27","unstructured":"Bennett, C.H., Brassard, G.: Quantum cryptography: Public key distribution and coin tossing. arXiv preprint arXiv:2003.06557 (2020)"},{"key":"2927_CR28","doi-asserted-by":"publisher","first-page":"1301","DOI":"10.1103\/RevModPhys.81.1301","volume":"81","author":"V Scarani","year":"2009","unstructured":"Scarani, V., Bechmann-Pasquinucci, H., Cerf, N.J., Du\u0161ek, M., L\u00fctkenhaus, N., Peev, M.: The security of practical quantum key distribution. Rev. Mod. Phys. 81, 1301 (2009)","journal-title":"Rev. Mod. Phys."},{"key":"2927_CR29","unstructured":"Devetak, I., Winter, A.: Distillation of secret key and entanglement from quantum states. Proc. R. Soc. A: Math. Phys. Eng. Sci. 461, 207\u2013235 (2003)"},{"key":"2927_CR30","doi-asserted-by":"publisher","first-page":"012332","DOI":"10.1103\/PhysRevA.72.012332","volume":"72","author":"R Renner","year":"2005","unstructured":"Renner, R., Gisin, N., Kraus, B.: Information-theoretic security proof for quantum-key-distribution protocols. Phys. Rev. A 72, 012332 (2005)","journal-title":"Phys. Rev. A"},{"key":"2927_CR31","unstructured":"Christandl, M., Renner, R., Ekert, A.: A Generic Security Proof for Quantum Key Distribution. arXiv:quant-ph\/0402131"},{"key":"2927_CR32","doi-asserted-by":"publisher","first-page":"020504","DOI":"10.1103\/PhysRevLett.102.020504","volume":"102","author":"M Christandl","year":"2009","unstructured":"Christandl, M., K\u00f6nig, R., Renner, R.: Postselection technique for quantum channels with applications to quantum cryptography. Phys. Rev. Lett. 102, 020504 (2009)","journal-title":"Phys. Rev. Lett."},{"key":"2927_CR33","doi-asserted-by":"publisher","first-page":"645","DOI":"10.1038\/nphys684","volume":"3","author":"R Renner","year":"2007","unstructured":"Renner, R.: Symmetry of large physical systems implies independence of subsystems. Nat. Phys. 3, 645 (2007)","journal-title":"Nat. Phys."},{"key":"2927_CR34","doi-asserted-by":"publisher","first-page":"073030","DOI":"10.1088\/1367-2630\/18\/7\/073030","volume":"18","author":"K Br\u00e1dler","year":"2016","unstructured":"Br\u00e1dler, K., Mirhosseini, M., Fickler, R., Broadbent, A., Boyd, R.: Finite-key security analysis for multilevel quantum key distribution. New J. Phys. 18, 073030 (2016)","journal-title":"New J. Phys."}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-020-02927-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11128-020-02927-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-020-02927-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,2,10]],"date-time":"2021-02-10T08:34:28Z","timestamp":1612946068000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11128-020-02927-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1]]},"references-count":34,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2021,1]]}},"alternative-id":["2927"],"URL":"https:\/\/doi.org\/10.1007\/s11128-020-02927-8","relation":{},"ISSN":["1570-0755","1573-1332"],"issn-type":[{"value":"1570-0755","type":"print"},{"value":"1573-1332","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,1]]},"assertion":[{"value":"22 June 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 October 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 January 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"4"}}