{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T05:16:43Z","timestamp":1768281403570,"version":"3.49.0"},"reference-count":44,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2021,4,1]],"date-time":"2021-04-01T00:00:00Z","timestamp":1617235200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,4,1]],"date-time":"2021-04-01T00:00:00Z","timestamp":1617235200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"Key Research and Development Project of Guangdong Province","award":["2020B0303300001"],"award-info":[{"award-number":["2020B0303300001"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"published-print":{"date-parts":[[2021,4]]},"DOI":"10.1007\/s11128-021-03080-6","type":"journal-article","created":{"date-parts":[[2021,4,16]],"date-time":"2021-04-16T07:07:13Z","timestamp":1618556833000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":21,"title":["Entanglement-based quantum key distribution with untrusted third party"],"prefix":"10.1007","volume":"20","author":[{"given":"Chang-Yue","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Zhu-Jun","family":"Zheng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,4,16]]},"reference":[{"issue":"10","key":"3080_CR1","doi-asserted-by":"publisher","first-page":"696","DOI":"10.1103\/PhysRev.47.777","volume":"47","author":"A Einstein","year":"1935","unstructured":"Einstein, A., Podolsky, B., Rosen, N.: Can quantum-mechanical description of physical reality be considered complete? [J]. Phys. Rev. 47(10), 696\u2013702 (1935)","journal-title":"Phys. Rev."},{"issue":"1","key":"3080_CR2","doi-asserted-by":"publisher","first-page":"807","DOI":"10.1007\/BF01491891","volume":"23","author":"E Schr\u00f6dinger","year":"1935","unstructured":"Schr\u00f6dinger, E.: Die gegenw\u00e4rtige situation in der quantenmechanik. Naturwissenschaften 23(1), 807\u2013812 (1935)","journal-title":"Naturwissenschaften"},{"issue":"25","key":"3080_CR3","doi-asserted-by":"publisher","first-page":"4656","DOI":"10.1103\/PhysRevLett.76.4656","volume":"76","author":"K Mattle","year":"1996","unstructured":"Mattle, K., Weinfurter, H., Kwiat, P.G., et al.: Dense coding in experimental quantum communication[J]. Phys. Rev. Lett. 76(25), 4656 (1996)","journal-title":"Phys. Rev. Lett."},{"key":"3080_CR4","doi-asserted-by":"publisher","first-page":"85719","DOI":"10.1109\/ACCESS.2019.2925635","volume":"7","author":"X Lou","year":"2019","unstructured":"Lou, X., Long, H., Tang, W., et al.: Continuous-variable arbitrated quantum signature based on dense coding and teleportation[J]. IEEE Access 7, 85719\u201385726 (2019)","journal-title":"IEEE Access"},{"issue":"26","key":"3080_CR5","doi-asserted-by":"publisher","first-page":"1709","DOI":"10.1016\/j.physleta.2018.04.033","volume":"382","author":"S Roy","year":"2018","unstructured":"Roy, S., Chanda, T., Das, T., et al.: Deterministic quantum dense coding networks[J]. Phys. Lett. A 382(26), 1709 (2018)","journal-title":"Phys. Lett. A"},{"issue":"13","key":"3080_CR6","doi-asserted-by":"publisher","first-page":"1895","DOI":"10.1103\/PhysRevLett.70.1895","volume":"70","author":"CH Bennett","year":"1993","unstructured":"Bennett, C.H., Brassard, G., Crdpeau, C., et al.: Teleporting an unknown quantum state via dual classical and Einstein-Podolsky-Rosen channels. Phy. Rev. Lett. 70(13), 1895\u20131899 (1993)","journal-title":"Phy. Rev. Lett."},{"issue":"6","key":"3080_CR7","doi-asserted-by":"publisher","first-page":"4394","DOI":"10.1103\/PhysRevA.58.4394","volume":"58","author":"A Karlsson","year":"2002","unstructured":"Karlsson, A., Bourennane, M.: Quantum teleportation using three-particle entanglement[J]. Phys. Rev. A 58(6), 4394\u20134400 (2002)","journal-title":"Phys. Rev. A"},{"issue":"6","key":"3080_CR8","doi-asserted-by":"publisher","first-page":"062338","DOI":"10.1103\/PhysRevA.97.062338","volume":"97","author":"K Jun-Ichirou","year":"2018","unstructured":"Jun-Ichirou, K., Gen, K., Kengo, M.: Quantum teleportation in vacuum only via Unruh-DeWitt detectors[J]. Phys. Rev. A 97(6), 062338 (2018)","journal-title":"Phys. Rev. A"},{"issue":"17","key":"3080_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1103\/PhysRevLett.122.170501","volume":"122","author":"A Barasinski","year":"2019","unstructured":"Barasinski, A., Cernoch, A., Lemr, K.: Demonstration of controlled quantum teleportation for discrete variables on linear optical devices[J]. Phys. Rev. Lett. 122(17), 1\u20136 (2019)","journal-title":"Phys. Rev. Lett."},{"key":"3080_CR10","doi-asserted-by":"publisher","first-page":"44269","DOI":"10.1109\/ACCESS.2019.2901960","volume":"7","author":"RG Zhou","year":"2019","unstructured":"Zhou, R.G., Xu, R., Lan, H.: Bidirectional quantum teleportation by using six-qubit cluster state[J]. IEEE Access 7, 44269\u201344276 (2019)","journal-title":"IEEE Access"},{"issue":"3","key":"3080_CR11","doi-asserted-by":"publisher","first-page":"1829","DOI":"10.1103\/PhysRevA.59.1829","volume":"59","author":"M Hillery","year":"1999","unstructured":"Hillery, M., Bulzek, V., Berthiaume, A.: Quantum secret sharing[J]. Phys. Rev. A 59(3), 1829\u20131834 (1999)","journal-title":"Phys. Rev. A"},{"issue":"1","key":"3080_CR12","doi-asserted-by":"publisher","first-page":"1523","DOI":"10.1103\/PhysRevA.72.012304","volume":"72","author":"FL Yan","year":"2005","unstructured":"Yan, F.L., Gao, T.: Quantum secret sharing between multiparty and multiparty without entanglement[J]. Phys. Rev. A 72(1), 1523 (2005)","journal-title":"Phys. Rev. A"},{"issue":"6","key":"3080_CR13","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1007\/s11128-019-2301-y","volume":"18","author":"G Gao","year":"2019","unstructured":"Gao, G.: Cryptanalysis and improvement of dynamic quantum secret sharing protocol based on two-particle transform of Bell states[J]. Quantum Inform. Process. 18(6), 186 (2019)","journal-title":"Quantum Inform. Process."},{"issue":"6","key":"3080_CR14","doi-asserted-by":"publisher","first-page":"661","DOI":"10.1103\/PhysRevLett.67.661","volume":"67","author":"AK Ekert","year":"1991","unstructured":"Ekert, A.K.: Quantum cryptography based on Bells theorem[J]. Phys. Rev. Lett. 67(6), 661\u2013663 (1991)","journal-title":"Phys. Rev. Lett."},{"issue":"1","key":"3080_CR15","doi-asserted-by":"publisher","first-page":"012313","DOI":"10.1103\/PhysRevA.62.012313","volume":"62","author":"HK Lo","year":"2000","unstructured":"Lo, H.K.: Classical-communication cost in distributed quantum-information processing: a generalization of quantum-communication complexity[J]. Phys. Rev. A 62(1), 012313 (2000)","journal-title":"Phys. Rev. A"},{"issue":"6","key":"3080_CR16","doi-asserted-by":"publisher","first-page":"1653","DOI":"10.1007\/s11128-011-0326-y","volume":"11","author":"XB Chen","year":"2012","unstructured":"Chen, X.B., Ma, S.Y., Su, Y., et al.: Controlled remote state preparation of arbitrary two and three qubit states via the Brown state[J]. Quantum Inform. Process. 11(6), 1653\u20131667 (2012)","journal-title":"Quantum Inform. Process."},{"issue":"11","key":"3080_CR17","doi-asserted-by":"publisher","first-page":"4263","DOI":"10.1007\/s11128-015-1122-x","volume":"14","author":"JY Peng","year":"2015","unstructured":"Peng, J.Y., Bai, M.Q., Mo, Z.W.: Bidirectional controlled joint remote state preparation[J]. Quantum Inf. Process. 14(11), 4263\u20134278 (2015)","journal-title":"Quantum Inf. Process."},{"issue":"6","key":"3080_CR18","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1007\/s11128-018-1917-7","volume":"17","author":"CY Zhang","year":"2018","unstructured":"Zhang, C.Y., Bai, M.Q., Zhou, S.Q.: Cyclic joint remote state preparation in noisy environment[J]. Quantum Inform. Process. 17(6), 146 (2018)","journal-title":"Quantum Inform. Process."},{"issue":"7","key":"3080_CR19","doi-asserted-by":"publisher","first-page":"077902","DOI":"10.1103\/PhysRevLett.87.077902","volume":"87","author":"CH Bennett","year":"2001","unstructured":"Bennett, C.H., Divincenzo, D.P., Shor, P.W., et al.: Remote state preparation[J]. Phys. Rev. Lett. 87(7), 077902 (2001)","journal-title":"Phys. Rev. Lett."},{"issue":"1","key":"3080_CR20","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11128-019-2535-8","volume":"19","author":"Z Du","year":"2020","unstructured":"Du, Z., Li, X.: Deterministic joint remote state preparation of four-qubit cluster type with tripartite involvement[J]. Quantum Inform. Process. 19(1), 1\u201311 (2020)","journal-title":"Quantum Inform. Process."},{"issue":"10","key":"3080_CR21","doi-asserted-by":"publisher","first-page":"126204","DOI":"10.1016\/j.physleta.2019.126204","volume":"384","author":"YJ Qian","year":"2019","unstructured":"Qian, Y.J., Xue, S.B., Jiang, M.: Deterministic remote preparation of arbitrary single-qubit state via one intermediate node in noisy environment[J]. Phys. Lett. A 384(10), 126204 (2019)","journal-title":"Phys. Lett. A"},{"issue":"4","key":"3080_CR22","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1007\/s11128-019-2231-8","volume":"18","author":"BS Choudhury","year":"2019","unstructured":"Choudhury, B.S., Samanta, S.: An optional remote state preparation protocol for a four-qubit entangled state[J]. Quantum Inform. Process. 18(4), 118 (2019)","journal-title":"Quantum Inform. Process."},{"key":"3080_CR23","unstructured":"Bennett, C.H., Brassard, G.: Public key distribution and coin tossing[C]. Presented at the (1984)"},{"issue":"14","key":"3080_CR24","doi-asserted-by":"publisher","first-page":"3018","DOI":"10.1103\/PhysRevLett.81.3018","volume":"81","author":"D Bruss","year":"1998","unstructured":"Bruss, D.: Optimal eavesdropping in quantum cryptography with six states[J]. Phys. Rev. Lett. 81(14), 3018\u20133021 (1998)","journal-title":"Phys. Rev. Lett."},{"issue":"5","key":"3080_CR25","doi-asserted-by":"publisher","first-page":"1900005","DOI":"10.1002\/qute.201900005","volume":"2","author":"A Tomita","year":"2019","unstructured":"Tomita, A.: Implementation security certification of decoy-BB84 quantum key distribution systems[J]. Adv. Quantum Technol. 2(5), 1900005 (2019)","journal-title":"Adv. Quantum Technol."},{"issue":"23","key":"3080_CR26","doi-asserted-by":"publisher","first-page":"230501","DOI":"10.1103\/PhysRevLett.98.230501","volume":"98","author":"A Ac\u00edn","year":"2001","unstructured":"Ac\u00edn, A., Brunner, N., Gisin, N., et al.: Device-independent security of quantum cryptography against collective attacks. Phys. Rev. Lett. 98(23), 230501 (2001)","journal-title":"Phys. Rev. Lett."},{"issue":"13","key":"3080_CR27","doi-asserted-by":"publisher","first-page":"130503","DOI":"10.1103\/PhysRevLett.108.130503","volume":"108","author":"HK Lo","year":"2011","unstructured":"Lo, H.K., Curty, M., Qi, B.: Measurement-device-independent quantum key distribution[J]. Phys. Rev. Lett. 108(13), 130503 (2011)","journal-title":"Phys. Rev. Lett."},{"issue":"7705","key":"3080_CR28","doi-asserted-by":"publisher","first-page":"400","DOI":"10.1038\/s41586-018-0066-6","volume":"557","author":"M Lucamarini","year":"2018","unstructured":"Lucamarini, M., Yuan, Z.L., Dynes, J.F., et al.: Overcoming the ratedistance limit of quantum key distribution without quantum repeaters[J]. Nature 557(7705), 400\u2013403 (2018)","journal-title":"Nature"},{"issue":"6","key":"3080_CR29","doi-asserted-by":"publisher","first-page":"0623623","DOI":"10.1103\/PhysRevA.98.062323","volume":"98","author":"XB Wang","year":"2018","unstructured":"Wang, X.B., Yu, Z.W., Hu, X.L.: Twin-field quantum key distribution with large misalignment error[J]. Phys. Rev. A 98(6), 0623623 (2018)","journal-title":"Phys. Rev. A"},{"issue":"3","key":"3080_CR30","first-page":"031043","volume":"8","author":"XF Ma","year":"2018","unstructured":"Ma, X.F., Zeng, P., Zhou, H.Y.: Phase-matching quantum key distribution[J]. Phys. Rev. X 8(3), 031043 (2018)","journal-title":"Phys. Rev. X"},{"issue":"5","key":"3080_CR31","doi-asserted-by":"publisher","first-page":"52310","DOI":"10.1103\/PhysRevA.65.052310","volume":"65","author":"E Waks","year":"2002","unstructured":"Waks, E., Zeevi, A., Yamamoto, Y.: Security of quantum key distribution with entangled photons against individual attacks[J]. Phys. Rev. A 65(5), 52310 (2002)","journal-title":"Phys. Rev. A"},{"issue":"4","key":"3080_CR32","doi-asserted-by":"publisher","first-page":"3004","DOI":"10.1364\/OE.19.003004","volume":"19","author":"A Scherer","year":"2011","unstructured":"Scherer, A., Sanders, B.C., Tittel, W.: Long-distance practical quantum key distribution by entanglement swapping[J]. Opt. Express 19(4), 3004 (2011)","journal-title":"Opt. Express"},{"issue":"26","key":"3080_CR33","doi-asserted-by":"publisher","first-page":"4287","DOI":"10.1103\/PhysRevLett.71.4287","volume":"71","author":"M \u017bukowski","year":"1993","unstructured":"\u017bukowski, M., Zeilinger, A., Horne, M.A., Ekert, K.: Event-ready-detectors Bell experiment via entanglement swapping[J]. Phys. Rev. Lett. 71(26), 4287\u20134290 (1993)","journal-title":"Phys. Rev. Lett."},{"issue":"5","key":"3080_CR34","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1103\/PhysRevLett.68.557","volume":"68","author":"CH Bennett","year":"1992","unstructured":"Bennett, C.H., Brassard, G., Mermin, N.D.: Quantum cryptography without Bell\u2019s theorem[J]. Phys. Rev. Lett. 68(5), 557 (1992)","journal-title":"Phys. Rev. Lett."},{"issue":"5","key":"3080_CR35","doi-asserted-by":"publisher","first-page":"1210","DOI":"10.1134\/S1054660X10090124","volume":"20","author":"FAA El-Orany","year":"2010","unstructured":"El-Orany, F.A.A., Wahiddin, M.R.B., Mat-Nor, M., et al.: Quantum key distribution in terms of the Greenberger-Horne-Zeilinger state: multi-key generation[J]. Laser Phys. 20(5), 1210\u20131214 (2010)","journal-title":"Laser Phys."},{"issue":"3","key":"3080_CR36","doi-asserted-by":"publisher","first-page":"034301","DOI":"10.1103\/PhysRevA.69.034301","volume":"69","author":"D Song","year":"2004","unstructured":"Song, D.: Secure key distribution by swapping quantum entanglement[J]. Phys. Rev. A 69(3), 034301 (2004)","journal-title":"Phys. Rev. A"},{"issue":"3","key":"3080_CR37","doi-asserted-by":"publisher","first-page":"785","DOI":"10.1140\/epjd\/e2010-10320-y","volume":"61","author":"T Hwang","year":"2011","unstructured":"Hwang, T., Hwang, C.C., Tsai, C.W.: Quantum key distribution protocol using dense coding of three-qubit W state[J]. Eur. Phys. J. D 61(3), 785\u2013790 (2011)","journal-title":"Eur. Phys. J. D"},{"issue":"3","key":"3080_CR38","doi-asserted-by":"publisher","first-page":"032302","DOI":"10.1103\/PhysRevA.65.032302","volume":"65","author":"GL Long","year":"2002","unstructured":"Long, G.L., Liu, X.S.: Theoretically efficient high-capacity quantum-key-distribution scheme[J]. Phys. Rev. A 65(3), 032302 (2002)","journal-title":"Phys. Rev. A"},{"key":"3080_CR39","doi-asserted-by":"crossref","unstructured":"Abushgra, A. A., Elleithy, K. M.: QKD protocol based on entangled states by trusted third party[C]\/\/ Systems, Applications Technology Conference. IEEE (2017)","DOI":"10.1109\/LISAT.2017.8001969"},{"key":"3080_CR40","unstructured":"Elliott, C., Colvin, A., Pearson, D., et al.: Current status of the DARPA Quantum Network[J]. Proceedings of SPIE - The International Society for Optical Engineering 5815(1), 138\u2013149 (2005)"},{"key":"3080_CR41","doi-asserted-by":"publisher","first-page":"075001","DOI":"10.1088\/1367-2630\/11\/7\/075001","volume":"11","author":"M Peev","year":"2009","unstructured":"Peev, M., Pacher, C., All\u00e9aume, R., et al.: The SECOQC quantum key distribution network in Vienna[J]. New J. Phys. 11, 075001 (2009)","journal-title":"New J. Phys."},{"key":"3080_CR42","doi-asserted-by":"publisher","first-page":"103887","DOI":"10.1364\/OE.19.010387","volume":"19","author":"M Sasaki","year":"2011","unstructured":"Sasaki, M., Fujiwara, M., Ishizuka, H., et al.: Field test of quantum key distribution in the Tokyo QKD Network[J]. Opt. Express 19, 103887\u201310409 (2011)","journal-title":"Opt. Express"},{"issue":"6343","key":"3080_CR43","doi-asserted-by":"publisher","first-page":"1140","DOI":"10.1126\/science.aan3211","volume":"356","author":"J Yin","year":"2017","unstructured":"Yin, J., Cao, Y., Li, Y.H., et al.: Satellite$$-$$based entanglement distribution over 1200 kilometers. Science 356(6343), 1140\u20131144 (2017)","journal-title":"Science"},{"issue":"1","key":"3080_CR44","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1007\/s003400000484","volume":"72","author":"J Calsamiglia","year":"2001","unstructured":"Calsamiglia, J., Lutkenhaus, N.: Maximum efficiency of a linear-optical Bell-state analyzer[J]. Appl. Phys. B 72(1), 67\u201371 (2001)","journal-title":"Appl. Phys. B"}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-021-03080-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11128-021-03080-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-021-03080-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,31]],"date-time":"2023-01-31T16:18:36Z","timestamp":1675181916000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11128-021-03080-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4]]},"references-count":44,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2021,4]]}},"alternative-id":["3080"],"URL":"https:\/\/doi.org\/10.1007\/s11128-021-03080-6","relation":{},"ISSN":["1570-0755","1573-1332"],"issn-type":[{"value":"1570-0755","type":"print"},{"value":"1573-1332","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,4]]},"assertion":[{"value":"7 November 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 March 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 April 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"146"}}