{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,2]],"date-time":"2025-06-02T17:07:51Z","timestamp":1748884071822},"reference-count":32,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2021,5,1]],"date-time":"2021-05-01T00:00:00Z","timestamp":1619827200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,5,1]],"date-time":"2021-05-01T00:00:00Z","timestamp":1619827200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"published-print":{"date-parts":[[2021,5]]},"DOI":"10.1007\/s11128-021-03099-9","type":"journal-article","created":{"date-parts":[[2021,5,3]],"date-time":"2021-05-03T08:24:38Z","timestamp":1620030278000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Quantum private query with authentication"],"prefix":"10.1007","volume":"20","author":[{"given":"Min","family":"Xiao","sequence":"first","affiliation":[]},{"given":"Shumei","family":"Lei","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,5,3]]},"reference":[{"issue":"3","key":"3099_CR1","doi-asserted-by":"publisher","first-page":"592","DOI":"10.1006\/jcss.1999.1689","volume":"60","author":"Y Gertner","year":"2000","unstructured":"Gertner, Y., Ishai, Y., Kushilevitz, E., Malkin, T.: Protecting data privacy in private information retrieval schemes. J. Comput. Syst. Sci. 60(3), 592\u2013629 (2000)","journal-title":"J. Comput. Syst. Sci."},{"key":"3099_CR2","unstructured":"Chor, B., Goldreich, O., Kushilevitz, E., Sudan, M.: Private information retrieval. In: Proceedings of Foundations of Computer Science, pp. 41\u201350 (1995)"},{"issue":"2","key":"3099_CR3","doi-asserted-by":"publisher","first-page":"1154","DOI":"10.1103\/PhysRevA.56.1154","volume":"56","author":"HK Lo","year":"1997","unstructured":"Lo, H.K.: Insecurity of quantum secure computations. Phys. Rev. A. 56(2), 1154\u20131162 (1997)","journal-title":"Phys. Rev. A."},{"issue":"23","key":"3099_CR4","doi-asserted-by":"publisher","first-page":"230502","DOI":"10.1103\/PhysRevLett.100.230502","volume":"100","author":"V Giovannetti","year":"2008","unstructured":"Giovannetti, V., Lloyd, S., Maccone, L.: Quantum private queries. Phys. Rev. Lett. 100(23), 230502 (2008)","journal-title":"Phys. Rev. Lett."},{"issue":"1","key":"3099_CR5","doi-asserted-by":"publisher","first-page":"010302","DOI":"10.1103\/PhysRevA.80.010302","volume":"80","author":"FD Martini","year":"2009","unstructured":"Martini, F.D., Giovannetti, V., Lloyd, S., Maccone, L., Nagali, E., Sansoni, L., Sciarrino, F.: Experimental quantum private queries with linear optics. Phys. Rev. A. 80(1), 010302 (2009)","journal-title":"Phys. Rev. A."},{"issue":"7","key":"3099_CR6","doi-asserted-by":"publisher","first-page":"3465","DOI":"10.1109\/TIT.2010.2048446","volume":"56","author":"V Giovannetti","year":"2010","unstructured":"Giovannetti, V., Lloyd, S., Maccone, L.: Quantum private queries: security analysis. IEEE Trans. Inf. Theory 56(7), 3465\u20133477 (2010)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"2","key":"3099_CR7","doi-asserted-by":"publisher","first-page":"022313","DOI":"10.1103\/PhysRevA.84.022313","volume":"84","author":"L Olejnik","year":"2011","unstructured":"Olejnik, L.: Secure quantum private information retrieval using phase-encoded queries. Phys. Rev. A. 84(2), 022313 (2011)","journal-title":"Phys. Rev. A."},{"issue":"2","key":"3099_CR8","doi-asserted-by":"publisher","first-page":"773","DOI":"10.1103\/PhysRevA.83.022301","volume":"83","author":"M Jakobi","year":"2011","unstructured":"Jakobi, M., Simon, C., Gisin, N., Bancal, J.D., Branciard, C., Walenta, N., Zbinden, H.: Practical private database queries based on a quantum-key-distribution protocol. Phys. Rev. A. 83(2), 773\u2013781 (2011)","journal-title":"Phys. Rev. A."},{"issue":"5","key":"3099_CR9","doi-asserted-by":"publisher","first-page":"057901","DOI":"10.1103\/PhysRevLett.92.057901","volume":"92","author":"V Scarani","year":"2004","unstructured":"Scarani, V., Acin, A., Ribordy, G., Gisin, N.: Quantum cryptography protocols robust against photon number splitting attacks for weak laser pulse implementations. Phys. Rev. Lett. 92(5), 057901 (2004)","journal-title":"Phys. Rev. Lett."},{"issue":"16","key":"3099_CR10","doi-asserted-by":"publisher","first-page":"17411","DOI":"10.1364\/OE.20.017411","volume":"20","author":"F Gao","year":"2012","unstructured":"Gao, F., Liu, B., Wen, Q.Y.: Flexible quantum private queries based on quantum key distribution. Opt. Express. 20(16), 17411\u201317420 (2012)","journal-title":"Opt. Express."},{"issue":"1","key":"3099_CR11","doi-asserted-by":"publisher","first-page":"012331","DOI":"10.1103\/PhysRevA.87.012331","volume":"87","author":"MV Panduranga Rao","year":"2013","unstructured":"Panduranga Rao, M.V., Jakobi, M.: Towards communication-efficient quantum oblivious key distribution. Phys. Rev. A. 87(1), 012331 (2013)","journal-title":"Phys. Rev. A."},{"issue":"3","key":"3099_CR12","doi-asserted-by":"publisher","first-page":"6600111","DOI":"10.1109\/JSTQE.2014.2358192","volume":"21","author":"F Gao","year":"2015","unstructured":"Gao, F., Liu, B., Huang, W., Wen, Q.Y.: Postprocessing of the oblivious key in quantum private queries. IEEE. J. Sel. Top. Quant. 21(3), 6600111 (2015)","journal-title":"IEEE. J. Sel. Top. Quant."},{"issue":"10","key":"3099_CR13","doi-asserted-by":"publisher","first-page":"100301","DOI":"10.1007\/s11433-015-5714-3","volume":"58","author":"B Liu","year":"2015","unstructured":"Liu, B., Gao, F., Huang, W., Wen, Q.Y.: QKD-based quantum private query without a failure probability. Sci. China Phys. Mech. Astron. 58(10), 100301 (2015)","journal-title":"Sci. China Phys. Mech. Astron."},{"issue":"4","key":"3099_CR14","doi-asserted-by":"publisher","first-page":"042344","DOI":"10.1103\/PhysRevA.95.042344","volume":"95","author":"A Maitra","year":"2017","unstructured":"Maitra, A., Goutam, P., Sarbani, R.: Device-independent quantum private query. Phys. Rev. A. 95(4), 042344 (2017)","journal-title":"Phys. Rev. A."},{"issue":"1","key":"3099_CR15","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1109\/TC.2017.2721404","volume":"67","author":"C Wei","year":"2018","unstructured":"Wei, C., Cai, X., Liu, B.: A generic construction of quantum-oblivious-key-transfer-based private query with ideal database security and zero failure. IEEE Trans. Comput. 67(1), 2\u20138 (2018)","journal-title":"IEEE Trans. Comput."},{"issue":"23","key":"3099_CR16","doi-asserted-by":"crossref","first-page":"5233","DOI":"10.1038\/srep05233","volume":"4","author":"P Chan","year":"2014","unstructured":"Chan, P., Lucio-Martinez, I., Mo, X.: Performing private database queries in a real-world environment using a quantum protocol. Sci. Rep. 4(23), 5233 (2014)","journal-title":"Sci. Rep."},{"issue":"12","key":"3099_CR17","doi-asserted-by":"publisher","first-page":"120311","DOI":"10.1007\/s11433-017-9085-0","volume":"60","author":"Y Yang","year":"2017","unstructured":"Yang, Y., Liu, Z., Chen, X., Zhou, Y., Shi, W.: Robust QKD-based private database queries based on alternative sequences of single-qubit measurements. Sci. China Phys. Mech. Astron. 60(12), 120311 (2017)","journal-title":"Sci. China Phys. Mech. Astron."},{"issue":"3","key":"3099_CR18","doi-asserted-by":"publisher","first-page":"517","DOI":"10.1109\/JSAC.2020.2968998","volume":"38","author":"CY Wei","year":"2020","unstructured":"Wei, C.Y., Cai, X.Q., Wang, T.Y., Qin, S.J., Gao, F., Wen, Q.Y.: Error tolerance bound in QKD-based quantum private query. IEEE J. Sel. Areas Commun. 38(3), 517\u2013527 (2020)","journal-title":"IEEE J. Sel. Areas Commun."},{"issue":"19","key":"3099_CR19","doi-asserted-by":"publisher","first-page":"5538","DOI":"10.1016\/j.ijleo.2014.06.084","volume":"125","author":"YG Yang","year":"2014","unstructured":"Yang, Y.G., Sun, S.J., Tian, J., Xu, P.: Secure quantum private query with real-time security check. Opt. Int. J. Light Electron Opt. 125(19), 5538\u20135541 (2014)","journal-title":"Opt. Int. J. Light Electron Opt."},{"issue":"4","key":"3099_CR20","doi-asserted-by":"publisher","first-page":"042318","DOI":"10.1103\/PhysRevA.93.042318","volume":"93","author":"CY Wei","year":"2016","unstructured":"Wei, C.Y., Wang, T.Y., Gao, F.: Practical quantum private query with better performance in resisting joint-measurement attack. Phys. Rev. A. 93(4), 042318 (2016)","journal-title":"Phys. Rev. A."},{"issue":"3","key":"3099_CR21","doi-asserted-by":"publisher","first-page":"030301","DOI":"10.1088\/0256-307X\/36\/3\/030301","volume":"36","author":"M Xiao","year":"2019","unstructured":"Xiao, M., Zhang, D.F.: Practical quantum private query with classical participants. Chin. Phys. Lett. 36(3), 030301 (2019)","journal-title":"Chin. Phys. Lett."},{"issue":"7","key":"3099_CR22","doi-asserted-by":"publisher","first-page":"1983","DOI":"10.1007\/s10773-018-3723-5","volume":"57","author":"X Gao","year":"2018","unstructured":"Gao, X., Chang, Y., Zhang, S.: Quantum private query based on bell state and single photons. Int. J. Theor. Phys. 57(7), 1983\u20131989 (2018)","journal-title":"Int. J. Theor. Phys."},{"issue":"24","key":"3099_CR23","doi-asserted-by":"publisher","first-page":"1950196","DOI":"10.1142\/S0217732319501967","volume":"34","author":"T Zheng","year":"2019","unstructured":"Zheng, T., Zhang, S., Gao, X.: Practical quantum private query based on Bell state. Mod. Phys. Lett. A 34(24), 1950196 (2019)","journal-title":"Mod. Phys. Lett. A"},{"key":"3099_CR24","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1007\/s11128-020-02732-3","volume":"19","author":"H Yang","year":"2020","unstructured":"Yang, H., Xiao, M.: Multi-user quantum private query. Quantum Inf. Process. 19, 253 (2020)","journal-title":"Quantum Inf. Process."},{"issue":"7","key":"3099_CR25","doi-asserted-by":"publisher","first-page":"70301","DOI":"10.1007\/s11433-018-9324-6","volume":"62","author":"F Gao","year":"2019","unstructured":"Gao, F., Qin, S.J., Huang, W., Wen, Q.Y.: Quantum private query: a new kind of practical quantum cryptographic protocol. Sci. China Phys. Mech. Astron. 62(7), 70301 (2019)","journal-title":"Sci. China Phys. Mech. Astron."},{"issue":"2","key":"3099_CR26","doi-asserted-by":"publisher","first-page":"022303","DOI":"10.1103\/PhysRevA.61.022303","volume":"61","author":"G Zeng","year":"2000","unstructured":"Zeng, G., Zhang, W.: Identity verification in quantum key distribution. Phys. Rev. A. 61(2), 022303 (2000)","journal-title":"Phys. Rev. A."},{"issue":"2","key":"3099_CR27","doi-asserted-by":"publisher","first-page":"022305","DOI":"10.1103\/PhysRevA.62.022305","volume":"62","author":"D Ljunggren","year":"2000","unstructured":"Ljunggren, D., Bourennane, M., Karlsson, A.: Authority-based user authentication in quantum key distribution. Phys. Rev. A. 62(2), 022305 (2000)","journal-title":"Phys. Rev. A."},{"issue":"4","key":"3099_CR28","doi-asserted-by":"publisher","first-page":"042305","DOI":"10.1103\/PhysRevA.73.042305","volume":"73","author":"H Lee","year":"2005","unstructured":"Lee, H., Yang, H.J., Lim, J.: Quantum direct communication with authentication. Phys. Rev. A. 73(4), 042305 (2005)","journal-title":"Phys. Rev. A."},{"issue":"14","key":"3099_CR29","doi-asserted-by":"publisher","first-page":"938","DOI":"10.1016\/j.physleta.2018.02.002","volume":"382","author":"Q Li","year":"2018","unstructured":"Li, Q., Li, Z., Chan, W.H.: Blind quantum computation with identity authentication. Phys. Lett. A 382(14), 938\u2013941 (2018)","journal-title":"Phys. Lett. A"},{"issue":"6","key":"3099_CR30","doi-asserted-by":"publisher","first-page":"062309","DOI":"10.1103\/PhysRevA.64.062309","volume":"64","author":"C Marcos","year":"2001","unstructured":"Marcos, C., David, J.S.: Quantum authentication of classical messages. Phys. Rev. A. 64(6), 062309 (2001)","journal-title":"Phys. Rev. A."},{"issue":"8","key":"3099_CR31","doi-asserted-by":"publisher","first-page":"199","DOI":"10.14257\/ijmue.2015.10.8.20","volume":"10","author":"X Xin","year":"2015","unstructured":"Xin, X., Li, F.: Quantum authentication of classical messages without entangled state as authentication key. Int. J. Multimed. Ubiquitous Eng. 10(8), 199\u2013206 (2015)","journal-title":"Int. J. Multimed. Ubiquitous Eng."},{"issue":"4","key":"3099_CR32","doi-asserted-by":"publisher","first-page":"2383","DOI":"10.1103\/PhysRevA.57.2383","volume":"57","author":"BA Slutsky","year":"1998","unstructured":"Slutsky, B.A., Rao, R.R., Sun, P.C., Fainman, Y.: Security of quantum cryptography against individual attacks. Phys. Rev. A. 57(4), 2383\u20132398 (1998)","journal-title":"Phys. Rev. A."}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-021-03099-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11128-021-03099-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-021-03099-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,3]],"date-time":"2023-11-03T05:14:15Z","timestamp":1698988455000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11128-021-03099-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5]]},"references-count":32,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2021,5]]}},"alternative-id":["3099"],"URL":"https:\/\/doi.org\/10.1007\/s11128-021-03099-9","relation":{},"ISSN":["1570-0755","1573-1332"],"issn-type":[{"value":"1570-0755","type":"print"},{"value":"1573-1332","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,5]]},"assertion":[{"value":"2 September 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 April 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 May 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"166"}}