{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T11:27:29Z","timestamp":1740137249416,"version":"3.37.3"},"reference-count":12,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2020,3,2]],"date-time":"2020-03-02T00:00:00Z","timestamp":1583107200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,3,2]],"date-time":"2020-03-02T00:00:00Z","timestamp":1583107200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"name":"National Research Foundation of Korea(NRF) grant funded by the Korea governmen","award":["No. 2019R1A2C2006381"],"award-info":[{"award-number":["No. 2019R1A2C2006381"]}]},{"name":"KIST research program","award":["Grant No. 2E27801"],"award-info":[{"award-number":["Grant No. 2E27801"]}]},{"name":"R&D Convergence program of NST(National Research Council of Science and Technology) of Republic of Korea","award":["Grant No. CAP-18-08-KRISS"],"award-info":[{"award-number":["Grant No. CAP-18-08-KRISS"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"published-print":{"date-parts":[[2020,4]]},"DOI":"10.1007\/s11128-020-2608-8","type":"journal-article","created":{"date-parts":[[2020,3,2]],"date-time":"2020-03-02T13:03:08Z","timestamp":1583154188000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Response to \u201cComment on \u2018Controlled mutual quantum entity authentication with an untrusted third party\u2019\u201d"],"prefix":"10.1007","volume":"19","author":[{"given":"Min-Sung","family":"Kang","sequence":"first","affiliation":[]},{"given":"Jino","family":"Heo","sequence":"additional","affiliation":[]},{"given":"Chang-Ho","family":"Hong","sequence":"additional","affiliation":[]},{"given":"Hyung-Jin","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Sung","family":"Moon","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4098-3326","authenticated-orcid":false,"given":"Sang-Wook","family":"Han","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,3,2]]},"reference":[{"key":"2608_CR1","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1007\/s11128-018-1927-5","volume":"17","author":"MS Kang","year":"2018","unstructured":"Kang, M.S., Heo, J., Hong, C.H., Yang, H.J., Han, S.W., Moon, S.: Controlled mutual quantum entity authentication with an untrusted third party. Quantum Inf. Process. 17, 159 (2018)","journal-title":"Quantum Inf. Process."},{"key":"2608_CR2","doi-asserted-by":"publisher","first-page":"090306","DOI":"10.1088\/1674-1056\/24\/9\/090306","volume":"24","author":"MS Kang","year":"2015","unstructured":"Kang, M.S., Hong, C.H., Heo, J., Lim, J.I., Yang, H.J.: Controlled mutual quantum entity authentication using entanglement swapping. Chin. Phys. B 24, 090306 (2015)","journal-title":"Chin. Phys. B"},{"issue":"1","key":"2608_CR3","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1088\/0253-6102\/67\/1\/33","volume":"67","author":"G Gao","year":"2017","unstructured":"Gao, G., Wang, Y.: Cryptanalysis of controlled mutual quantum entity authentication using entanglement swapping. Commun. Theor. Phys. 67(1), 33\u201336 (2017)","journal-title":"Commun. Theor. Phys."},{"key":"2608_CR4","doi-asserted-by":"publisher","DOI":"10.1007\/s11128-020-2611-0","author":"Q Wang","year":"2019","unstructured":"Wang, Q., Zhang, S., Wang, S., Shi, R.: Comment on \u201cControlled mutual quantum entity authentication with an untrusted third party\u201d. Quantum Inf. Process. (2019). https:\/\/doi.org\/10.1007\/s11128-020-2611-0","journal-title":"Quantum Inf. Process."},{"issue":"2","key":"2608_CR5","doi-asserted-by":"publisher","first-page":"575","DOI":"10.1007\/s10773-018-3955-4","volume":"58","author":"ZH Liu","year":"2019","unstructured":"Liu, Z.H., Chen, H.W.: Analyzing and revising quantum dialogue without information leakage based on the entanglement swapping between any two bell states and the shared secret bell state. Int. J. Theor. Phys. 58(2), 575\u2013583 (2019)","journal-title":"Int. J. Theor. Phys."},{"key":"2608_CR6","doi-asserted-by":"publisher","first-page":"2208","DOI":"10.1103\/PhysRevA.57.2208","volume":"57","author":"JW Pan","year":"1998","unstructured":"Pan, J.W., Zeilinger, A.: Greenberger\u2013Horne\u2013Zeilinger-state analyzer. Phys. Rev. A 57, 2208\u20132211 (1998)","journal-title":"Phys. Rev. A"},{"key":"2608_CR7","doi-asserted-by":"publisher","first-page":"4435","DOI":"10.1103\/PhysRevLett.86.4435","volume":"86","author":"JW Pan","year":"2001","unstructured":"Pan, J.W., Daniell, M., Gasparoni, S., Weihs, G., Zeilinger, A.: Experimental demonstration of four-photon entanglement and high-fidelity teleportation. Phys. Rev. Lett. 86, 4435\u20134438 (2001)","journal-title":"Phys. Rev. Lett."},{"issue":"22","key":"2608_CR8","doi-asserted-by":"publisher","first-page":"1519","DOI":"10.1016\/j.scib.2017.10.023","volume":"62","author":"F Zhu","year":"2017","unstructured":"Zhu, F., Zhang, W., Sheng, Y., et al.: Experimental long-distance quantum secure direct communication. Sci. Bull. 62(22), 1519\u20131524 (2017)","journal-title":"Sci. Bull."},{"issue":"22","key":"2608_CR9","doi-asserted-by":"publisher","first-page":"29539","DOI":"10.1364\/OE.26.029539","volume":"26","author":"YS Kim","year":"2018","unstructured":"Kim, Y.S., Pramanik, T., Cho, Y., Yang, M., Han, S.W., Lee, S.Y., Kang, M.S., Moon, S.: Informationally symmetrical Bell state preparation and measurement. Opt. Express 26(22), 29539\u201329549 (2018)","journal-title":"Opt. Express"},{"key":"2608_CR10","doi-asserted-by":"publisher","first-page":"14905","DOI":"10.1038\/s41598-017-14515-5","volume":"7","author":"J Heo","year":"2017","unstructured":"Heo, J., Hong, C.H., Kang, M.S., Yang, H., Yang, H.J., Hong, J.P., Choi, S.G.: Implementation of controlled quantum teleportation with an arbitrator for secure quantum channels via quantum dots inside optical cavities. Sci. Rep. 7, 14905 (2017)","journal-title":"Sci. Rep."},{"key":"2608_CR11","doi-asserted-by":"publisher","first-page":"1845","DOI":"10.1016\/j.physleta.2017.01.052","volume":"381","author":"J Heo","year":"2017","unstructured":"Heo, J., Kang, M.S., Hong, C.H., Choi, S.G., Hong, J.P.: Scheme for secure swapping two unknown states of a photonic qubit and an electron-spin qubit using simultaneous quantum transmission and teleportation via quantum dots inside single-sided optical cavities. Phys. Lett. A 381, 1845 (2017)","journal-title":"Phys. Lett. A"},{"issue":"4","key":"2608_CR12","doi-asserted-by":"publisher","first-page":"363","DOI":"10.1088\/0031-8949\/76\/4\/014","volume":"76","author":"Y Xia","year":"2007","unstructured":"Xia, Y., Song, J., Song, H.S.: Quantum dialogue using non-maximally entangled states based on entanglement swapping. Phys. Scr. 76(4), 363\u2013369 (2007)","journal-title":"Phys. Scr."}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-020-2608-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11128-020-2608-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-020-2608-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,3,2]],"date-time":"2021-03-02T00:33:38Z","timestamp":1614645218000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11128-020-2608-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,3,2]]},"references-count":12,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2020,4]]}},"alternative-id":["2608"],"URL":"https:\/\/doi.org\/10.1007\/s11128-020-2608-8","relation":{},"ISSN":["1570-0755","1573-1332"],"issn-type":[{"type":"print","value":"1570-0755"},{"type":"electronic","value":"1573-1332"}],"subject":[],"published":{"date-parts":[[2020,3,2]]},"assertion":[{"value":"24 January 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 February 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 March 2020","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"124"}}