{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,17]],"date-time":"2026-03-17T07:00:13Z","timestamp":1773730813794,"version":"3.50.1"},"reference-count":67,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2021,4,1]],"date-time":"2021-04-01T00:00:00Z","timestamp":1617235200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,4,1]],"date-time":"2021-04-01T00:00:00Z","timestamp":1617235200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"name":"Shanghai Science and Technology Project","award":["20040501500"],"award-info":[{"award-number":["20040501500"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"published-print":{"date-parts":[[2021,4]]},"DOI":"10.1007\/s11128-021-03104-1","type":"journal-article","created":{"date-parts":[[2021,4,25]],"date-time":"2021-04-25T06:16:22Z","timestamp":1619331382000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":22,"title":["Three-party semi-quantum protocol for deterministic secure quantum dialogue based on GHZ states"],"prefix":"10.1007","volume":"20","author":[{"given":"Ri-Gui","family":"Zhou","sequence":"first","affiliation":[]},{"given":"Xiaoxue","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Fengxin","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,4,24]]},"reference":[{"issue":"6","key":"3104_CR1","doi-asserted-by":"crossref","first-page":"661","DOI":"10.1103\/PhysRevLett.67.661","volume":"67","author":"AK Ekert","year":"1991","unstructured":"Ekert, A.K.: Quantum cryptography based on Bell\u2019s theorem. Phys. Rev Lett 67(6), 661\u2013663 (1991)","journal-title":"Phys. Rev Lett"},{"key":"3104_CR2","doi-asserted-by":"crossref","first-page":"557","DOI":"10.1103\/PhysRevLett.68.557","volume":"68","author":"CH Bennett","year":"1992","unstructured":"Bennett, C.H., Brassard, G., Mermin, N.D.: Quantum cryptography without Bell theorem. Phys. Rev Lett 68, 557\u2013559 (1992)","journal-title":"Phys. Rev Lett"},{"key":"3104_CR3","doi-asserted-by":"crossref","first-page":"12874","DOI":"10.1038\/srep12874","volume":"5","author":"M Tiersch","year":"2015","unstructured":"Tiersch, M., Ganahl, E.J., Briegel, H.J.: Adaptive quantum computation in changing environments using projective simulation. Sci. Rep. 5, 12874 (2015)","journal-title":"Sci. Rep."},{"key":"3104_CR4","doi-asserted-by":"crossref","first-page":"2567","DOI":"10.1007\/s11128-014-0809-8","volume":"13","author":"M Schuld","year":"2014","unstructured":"Schuld, M., Sinayskiy, I., Petruccione, F.: The quest for a quantum neural network. Quantum Inf. Process. 13, 2567 (2014)","journal-title":"Quantum Inf. Process."},{"issue":"4","key":"3104_CR5","doi-asserted-by":"crossref","first-page":"044003","DOI":"10.1088\/2058-9565\/ab9f93","volume":"5","author":"YaoChong Li","year":"2020","unstructured":"Li, YaoChong, Zhou, Ri-Gui., RuiQing, Xu., Luo, Jia, WenWen, Hu.: A quantum deep convolutional neural network for image recognition. Quantum Sci. Technol. 5(4), 044003 (2020)","journal-title":"Quantum Sci. Technol."},{"key":"3104_CR6","doi-asserted-by":"publisher","DOI":"10.1088\/2058-9565\/abbe66","author":"YC Li","year":"2020","unstructured":"Li, Y.C., Zhou, R.-G., Xu, R.Q., Hu, W.W., Fan, P.: Quantum algorithm for the nonlinear dimensionality reduction with arbitrary kernel. Quantum Sci. Technol. (2020). https:\/\/doi.org\/10.1088\/2058-9565\/abbe66","journal-title":"Quantum Sci. Technol."},{"key":"3104_CR7","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2020.3000734","author":"Y Li","year":"2020","unstructured":"Li, Y., Zhou, R., Xu, R., Luo, J., Jiang, S.: A quantum mechanics-based framework for EEG signal feature extraction and classification. IEEE Trans Emerg Top Comput (2020). https:\/\/doi.org\/10.1109\/TETC.2020.3000734","journal-title":"IEEE Trans Emerg Top Comput"},{"issue":"3","key":"3104_CR8","doi-asserted-by":"crossref","first-page":"1727","DOI":"10.1103\/PhysRevA.51.R1727","volume":"51","author":"SL Braunstein","year":"1995","unstructured":"Braunstein, S.L., Mann, A.: Measurement of the Bell operator and quantum teleportation. Phys. Rev A 51(3), 1727\u20131730 (1995)","journal-title":"Phys. Rev A"},{"issue":"3","key":"3104_CR9","doi-asserted-by":"crossref","first-page":"032302","DOI":"10.1103\/PhysRevA.65.032302","volume":"65","author":"G Long","year":"2002","unstructured":"Long, G., Liu, X.: Theoretically efficient high-capacity quantum-key-distribution scheme. Phys. Rev. A 65(3), 032302 (2002)","journal-title":"Phys. Rev. A"},{"issue":"4","key":"3104_CR10","doi-asserted-by":"crossref","first-page":"042317","DOI":"10.1103\/PhysRevA.68.042317","volume":"68","author":"FG Deng","year":"2003","unstructured":"Deng, F.G., Long, G.L., Liu, X.S.: Two-step quantum direct communication protocol using the Einstein-Podolsky-Rosen pair block. Phys. Rev. A 68(4), 042317 (2003)","journal-title":"Phys. Rev. A"},{"key":"3104_CR11","first-page":"521","volume":"69","author":"FG Deng","year":"2004","unstructured":"Deng, F.G., Long, G.L.: Secure direct communication with a quantum one-time pad. Phys. Rev. A. 69, 521\u2013524 (2004)","journal-title":"Phys. Rev. A."},{"issue":"1","key":"3104_CR12","doi-asserted-by":"crossref","first-page":"67","DOI":"10.1016\/j.physleta.2006.01.035","volume":"354","author":"XR Jin","year":"2006","unstructured":"Jin, X.R., Ji, X., Zhang, Y.Q., et al.: Three-party quantum secure direct communication based on GHZ states. Phys. Lett. A 354(1), 67\u201370 (2006)","journal-title":"Phys. Lett. A"},{"issue":"9","key":"3104_CR13","doi-asserted-by":"crossref","first-page":"2923","DOI":"10.1007\/s10773-012-1171-1","volume":"51","author":"D Liu","year":"2012","unstructured":"Liu, D., Chen, J.L., Jiang, W.: High-capacity quantum secure direct communication with single photons in both polarization and spatial-mode degrees of freedom. Int. J. Theor. Phys. 51(9), 2923\u20132929 (2012)","journal-title":"Int. J. Theor. Phys."},{"issue":"3","key":"3104_CR14","doi-asserted-by":"crossref","first-page":"1829","DOI":"10.1103\/PhysRevA.59.1829","volume":"59","author":"M Hillery","year":"1999","unstructured":"Hillery, M., Buzek, V., Berthiaume, A.: Quantum secret sharing. Phys. Rev. A. 59(3), 1829\u20131834 (1999)","journal-title":"Phys. Rev. A."},{"issue":"1","key":"3104_CR15","doi-asserted-by":"crossref","first-page":"162","DOI":"10.1103\/PhysRevA.59.162","volume":"59","author":"A Karlsson","year":"1999","unstructured":"Karlsson, A., Koashi, M., Imoto, N.: Quantum entanglement for secret sharing and secret splitting. Phys. Rev. A. 59(1), 162\u2013168 (1999)","journal-title":"Phys. Rev. A."},{"issue":"4","key":"3104_CR16","doi-asserted-by":"crossref","first-page":"247","DOI":"10.1016\/S0375-9601(03)00074-4","volume":"310","author":"GP Guo","year":"2003","unstructured":"Guo, G.P., Guo, G.C.: Quantum secret sharing without entanglement. Phys. Lett. A. 310(4), 247\u2013251 (2003)","journal-title":"Phys. Lett. A."},{"issue":"5","key":"3104_CR17","doi-asserted-by":"crossref","first-page":"052307","DOI":"10.1103\/PhysRevA.69.052307","volume":"69","author":"L Xiao","year":"2004","unstructured":"Xiao, L., Long, G.L., Deng, F.G., et al.: Efficient multiparty quantum secret sharing schemes. Phys. Rev. A. 69(5), 052307 (2004)","journal-title":"Phys. Rev. A."},{"key":"3104_CR18","doi-asserted-by":"crossref","first-page":"042315","DOI":"10.1103\/PhysRevA.68.042315","volume":"68","author":"FG Deng","year":"2003","unstructured":"Deng, F.G., Long, G.L.: Controlled order rearrangement encryption for quantum key distribution. Phys Rev A 68, 042315 (2003)","journal-title":"Phys Rev A"},{"key":"3104_CR19","doi-asserted-by":"crossref","first-page":"012311","DOI":"10.1103\/PhysRevA.70.012311","volume":"70","author":"FG Deng","year":"2004","unstructured":"Deng, F.G., Long, G.L.: Bidirectional quantum key distribution protocol with practical faint laser pulses. Phys Rev A 70, 012311 (2004)","journal-title":"Phys Rev A"},{"key":"3104_CR20","doi-asserted-by":"crossref","first-page":"3309","DOI":"10.1007\/s10773-016-2960-8","volume":"55","author":"T Wang","year":"2016","unstructured":"Wang, T., Wang, S., Ma, J.: Robust quantum private queries. Int. J. Theor. Phys. 55, 3309\u20133317 (2016)","journal-title":"Int. J. Theor. Phys."},{"issue":"2","key":"3104_CR21","doi-asserted-by":"crossref","first-page":"022301","DOI":"10.1103\/PhysRevA.83.022301","volume":"83","author":"M Jakobi","year":"2011","unstructured":"Jakobi, M., Simon, C., Gisin, N., Bancal, J.D., Branciard, C., Walenta, N., Zbinden, H.: Practical private database queries based on a quantum-key-distribution protocol. Phys. Rev. A 83(2), 022301 (2011)","journal-title":"Phys. Rev. A"},{"key":"3104_CR22","doi-asserted-by":"crossref","first-page":"1636","DOI":"10.1007\/s11433-013-5170-x","volume":"56","author":"M Wang","year":"2013","unstructured":"Wang, M., Chen, X., Yang, Y.: A blind quantum signature protocol using the GHZ states. Sci. China Phys. Mech. Astron. 56, 1636\u20131641 (2013)","journal-title":"Sci. China Phys. Mech. Astron."},{"key":"3104_CR23","doi-asserted-by":"crossref","first-page":"70","DOI":"10.1007\/s11128-017-1531-0","volume":"16","author":"L Zhang","year":"2017","unstructured":"Zhang, L., Sun, H., Zhang, K., et al.: An improved arbitrated quantum signature protocol based on the key-controlled chained CNOT encryption. Quantum Inf. Process 16, 70 (2017)","journal-title":"Quantum Inf. Process"},{"issue":"1","key":"3104_CR24","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1016\/j.physleta.2004.06.009","volume":"328","author":"BA Nguyen","year":"2004","unstructured":"Nguyen, B.A.: Quantum dialogue. Phys. Lett A 328(1), 6\u201310 (2004)","journal-title":"Phys. Lett A"},{"key":"3104_CR25","doi-asserted-by":"crossref","first-page":"1418","DOI":"10.1088\/1009-1963\/15\/7\/005","volume":"15","author":"X Ji","year":"2006","unstructured":"Ji, X., Zhang, S.: Secure quantum dialogue based on single-photon. Chin Phys 15, 1418\u20131420 (2006)","journal-title":"Chin Phys"},{"issue":"5","key":"3104_CR26","doi-asserted-by":"crossref","first-page":"558","DOI":"10.1007\/s11433-007-0057-3","volume":"50","author":"YG Yang","year":"2007","unstructured":"Yang, Y.G., Wen, Q.Y.: Quasi-secure quantum dialogue using single photons. Sci. China Ser. G-Phys. Mech. Astron. 50(5), 558\u2013562 (2007)","journal-title":"Sci. China Ser. G-Phys. Mech. Astron."},{"issue":"1","key":"3104_CR27","first-page":"24","volume":"48","author":"Y Xia","year":"2006","unstructured":"Xia, Y., Fu, C.B., Zhang, S., et al.: Quantum dialogue by using the GHZ state. J.-Korean Phys. Soc. 48(1), 24\u201327 (2006)","journal-title":"J.-Korean Phys. Soc."},{"issue":"5","key":"3104_CR28","doi-asserted-by":"crossref","first-page":"853","DOI":"10.1088\/0253-6102\/52\/5\/19","volume":"52","author":"L Dong","year":"2009","unstructured":"Dong, L., Xiu, X.M., Gao, Y.J., et al.: Quantum Dialogue Protocol Using a Class of Three-Photon W States[J]. Commun. Theor. Phys. 52(5), 853\u2013856 (2009)","journal-title":"Commun. Theor. Phys."},{"key":"3104_CR29","doi-asserted-by":"crossref","first-page":"371","DOI":"10.1007\/s10773-017-3569-2","volume":"57","author":"W Li","year":"2018","unstructured":"Li, W., Zha, X., Yu, Y.: Secure quantum dialogue protocol based on four-qubit cluster state. Int. J Theor. Phys. 57, 371\u2013380 (2018)","journal-title":"Int. J Theor. Phys."},{"key":"3104_CR30","doi-asserted-by":"crossref","first-page":"559","DOI":"10.1007\/s11433-008-0065-y","volume":"51","author":"F Gao","year":"2008","unstructured":"Gao, F., Guo, F., Wen, Q., et al.: Revisiting the security of quantum dialogue and bidirectional quantum secure direct communication. Sci. China Ser. G-Phys. Mech. As 51, 559\u2013566 (2008)","journal-title":"Sci. China Ser. G-Phys. Mech. As"},{"issue":"9","key":"3104_CR31","doi-asserted-by":"crossref","first-page":"1984","DOI":"10.1016\/j.optcom.2010.01.007","volume":"283","author":"GF Shi","year":"2010","unstructured":"Shi, G.F., Xi, X.Q., Hu, M.L., et al.: Quantum secure dialogue by using single photons. Opt Commun 283(9), 1984\u20131986 (2010)","journal-title":"Opt Commun"},{"key":"3104_CR32","doi-asserted-by":"crossref","first-page":"2451","DOI":"10.1007\/s11128-014-0803-1","volume":"13","author":"Y Luo","year":"2014","unstructured":"Luo, Y., Lin, C., Hwang, T.: Efficient quantum dialogue using single photons. Quantum Inf. Process 13, 2451\u20132461 (2014)","journal-title":"Quantum Inf. Process"},{"key":"3104_CR33","doi-asserted-by":"crossref","first-page":"3829","DOI":"10.1007\/s10773-014-2135-4","volume":"53","author":"N Zhou","year":"2014","unstructured":"Zhou, N., Hua, T., Wu, G., et al.: Single-photon secure quantum dialogue protocol without information leakage. Int. J Theor. Phys. 53, 3829\u20133837 (2014)","journal-title":"Int. J Theor. Phys."},{"key":"3104_CR34","doi-asserted-by":"crossref","first-page":"1457","DOI":"10.1007\/s11128-014-0740-z","volume":"13","author":"KF Yu","year":"2014","unstructured":"Yu, K.F., Yang, C.W., Liao, C.H., Hwang, T.: Authenticated semi-quantum key distribution protocol using Bell states. Quantum Inf. Process. 13, 1457 (2014)","journal-title":"Quantum Inf. Process."},{"key":"3104_CR35","doi-asserted-by":"crossref","first-page":"032341","DOI":"10.1103\/PhysRevA.79.032341","volume":"79","author":"M Boyer","year":"2009","unstructured":"Boyer, M., Gelles, R., Kenigsberg, D., Mor, T.: Semi-quantum key distribution. Phys. Rev. A 79, 032341 (2009)","journal-title":"Phys. Rev. A"},{"key":"3104_CR36","doi-asserted-by":"crossref","first-page":"140501","DOI":"10.1103\/PhysRevLett.99.140501","volume":"99","author":"M Boyer","year":"2007","unstructured":"Boyer, M., Kenigsberg, D., Mor, T.: Quantum key distribution with classical bob. Phys. Rev. Lett. 99, 140501 (2007)","journal-title":"Phys. Rev. Lett."},{"key":"3104_CR37","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1007\/s11128-019-2550-9","volume":"19","author":"C Yang","year":"2020","unstructured":"Yang, C.: Efficient and secure semi-quantum secure direct communication protocol against double CNOT attack. Quantum Inf. Process 19, 50 (2020)","journal-title":"Quantum Inf. Process"},{"key":"3104_CR38","doi-asserted-by":"crossref","first-page":"182","DOI":"10.1007\/s11128-018-1953-3","volume":"17","author":"J Gu","year":"2018","unstructured":"Gu, J., Lin, P., Hwang, T.: Double C-NOT attack and counterattack on \u2018Three-step semi-quantum secure direct communication protocol.\u2019 Quantum Inf. Process 17, 182 (2018)","journal-title":"Quantum Inf. Process"},{"key":"3104_CR39","doi-asserted-by":"crossref","first-page":"1881","DOI":"10.1007\/s10773-018-3713-7","volume":"57","author":"C Xie","year":"2018","unstructured":"Xie, C., Li, L., Situ, H., et al.: Semi-quantum Secure Direct Communication Scheme Based on Bell States. Int. J Theor. Phys. 57, 1881\u20131887 (2018)","journal-title":"Int. J Theor. Phys."},{"issue":"10","key":"3104_CR40","doi-asserted-by":"crossref","first-page":"100301","DOI":"10.1088\/0256-307X\/28\/10\/100301","volume":"28","author":"J Wang","year":"2011","unstructured":"Wang, J., Zhang, S., Zhang, Q., Tang, C.J.: Semi-quantum key distribution using entangled states. Chin. Phys. Lett. 28(10), 100301 (2011)","journal-title":"Chin. Phys. Lett."},{"issue":"11","key":"3104_CR41","doi-asserted-by":"crossref","first-page":"2417","DOI":"10.1007\/s11128-014-0802-2","volume":"13","author":"WO Krawec","year":"2014","unstructured":"Krawec, W.O.: Restricted attacks on semi-quantum key distribution protocols. Quantum Inf. Process. 13(11), 2417\u20132436 (2014)","journal-title":"Quantum Inf. Process."},{"issue":"5","key":"3104_CR42","doi-asserted-by":"crossref","first-page":"2067","DOI":"10.1007\/s11128-016-1266-3","volume":"15","author":"WO Krawec","year":"2016","unstructured":"Krawec, W.O.: Security of a semi-quantum protocol where reflections contribute to the secret key. Quantum Inf. Process. 15(5), 2067\u20132090 (2016)","journal-title":"Quantum Inf. Process."},{"issue":"5","key":"3104_CR43","doi-asserted-by":"crossref","first-page":"052312","DOI":"10.1103\/PhysRevA.79.052312","volume":"79","author":"XF Zou","year":"2009","unstructured":"Zou, X.F., Qiu, D.W., Li, L.Z., Wu, L.H., Li, L.J.: Semi-quantum key distribution using less than four quantum states. Phys. Rev. A 79(5), 052312 (2009)","journal-title":"Phys. Rev. A"},{"issue":"2","key":"3104_CR44","doi-asserted-by":"crossref","first-page":"022303","DOI":"10.1103\/PhysRevA.82.022303","volume":"82","author":"Q Li","year":"2010","unstructured":"Li, Q., Chan, W.H., Long, D.Y.: Semi-quantum secret sharing using entangled states. Phys. Rev. A 82(2), 022303 (2010)","journal-title":"Phys. Rev. A"},{"key":"3104_CR45","doi-asserted-by":"crossref","first-page":"224","DOI":"10.1007\/s11128-020-02690-w","volume":"19","author":"C Tsai","year":"2020","unstructured":"Tsai, C., Chang, Y., Lai, Y., et al.: Cryptanalysis of limited resource semi-quantum secret sharing. Quantum Inf. Process 19, 224 (2020)","journal-title":"Quantum Inf. Process"},{"issue":"10","key":"3104_CR46","doi-asserted-by":"crossref","first-page":"3819","DOI":"10.1007\/s10773-015-2622-2","volume":"54","author":"C Xie","year":"2015","unstructured":"Xie, C., Li, L.Z., Qiu, D.W.: A novel semi-quantum secret sharing scheme of specific bits. Int. J. Theor. Phys. 54(10), 3819\u20133824 (2015)","journal-title":"Int. J. Theor. Phys."},{"key":"3104_CR47","doi-asserted-by":"crossref","first-page":"207","DOI":"10.1007\/s11128-019-2251-4","volume":"18","author":"P Lin","year":"2019","unstructured":"Lin, P., Hwang, T., Tsai, C.: Efficient semi-quantum private comparison using single photons. Quantum Inf. Process 18, 207 (2019)","journal-title":"Quantum Inf. Process"},{"key":"3104_CR48","doi-asserted-by":"crossref","first-page":"180","DOI":"10.1007\/s11128-020-02674-w","volume":"19","author":"L Jiang","year":"2020","unstructured":"Jiang, L.: Semi-quantum private comparison based on Bell states. Quantum Inf. Process 19, 180 (2020)","journal-title":"Quantum Inf. Process"},{"key":"3104_CR49","doi-asserted-by":"crossref","first-page":"295","DOI":"10.1007\/s11128-017-1736-2","volume":"16","author":"C Shukla","year":"2017","unstructured":"Shukla, C., Thapliyal, K., Pathak, A.: Semi-quantum communication: protocols for key agreement, controlled secure direct communication and dialogue. Quantum Inf. Process. 16, 295 (2017)","journal-title":"Quantum Inf. Process."},{"issue":"5","key":"3104_CR50","doi-asserted-by":"crossref","first-page":"1440","DOI":"10.1007\/s10773-018-3672-z","volume":"57","author":"TY Ye","year":"2018","unstructured":"Ye, T.Y.: Semi-quantum dialogue based on single photons. Int. J. Theor. Phys. 57(5), 1440\u20131454 (2018)","journal-title":"Int. J. Theor. Phys."},{"key":"3104_CR51","doi-asserted-by":"crossref","first-page":"1364","DOI":"10.1007\/s10773-019-04335-w","volume":"59","author":"H Pan","year":"2020","unstructured":"Pan, H.: Semi-Quantum Dialogue with Bell Entangled States. Int. J Theor. Phys. 59, 1364\u20131371 (2020)","journal-title":"Int. J Theor. Phys."},{"issue":"8","key":"3104_CR52","doi-asserted-by":"crossref","first-page":"194","DOI":"10.1007\/s11128-017-1631-x","volume":"16","author":"K-F Yu","year":"2017","unstructured":"Yu, K.-F., Gu, J., Hwang, T., Gope, P.: Multi-party semi-quantum key distribution-convertible multiparty semi-quantum secret sharing. Quantum Inf. Process. 16(8), 194 (2017)","journal-title":"Quantum Inf. Process."},{"key":"3104_CR53","doi-asserted-by":"crossref","first-page":"126","DOI":"10.1007\/s11128-020-02623-7","volume":"19","author":"CW Yang","year":"2020","unstructured":"Yang, C.W., Tsai, C.W.: Advanced semi-quantum secure direct communication protocol based on bell states against flip attack. Quantum Inf Process 19, 126 (2020)","journal-title":"Quantum Inf Process"},{"key":"3104_CR54","first-page":"235","volume-title":"Quantum information","author":"M Boyer","year":"2007","unstructured":"Boyer, M., et al.: Semi-quantum key distribution. In: Quantum information, pp. 235\u2013274. Springer, Berlin (2007)"},{"key":"3104_CR55","doi-asserted-by":"crossref","first-page":"054302","DOI":"10.1103\/PhysRevA.74.054302","volume":"74","author":"XH Li","year":"2006","unstructured":"Li, X.H., Deng, F.G., Zhou, H.Y.: Improving the security of secure direct communication based on the secret transmitting order of particles. Phys. Rev. A. 74, 054302 (2006)","journal-title":"Phys. Rev. A."},{"key":"3104_CR56","doi-asserted-by":"crossref","unstructured":"Sun, Z., Qi, R., Lin, Z., Yin, L., Long, G., Lu, J.: Design and implementation of a practical quantum secure direct communication system. In 2018 IEEE Globecom Workshops (GC Wkshps) (pp. 1\u20136) (2018). IEEE.","DOI":"10.1109\/GLOCOMW.2018.8644424"},{"issue":"9","key":"3104_CR57","doi-asserted-by":"crossref","first-page":"5778","DOI":"10.1109\/TCOMM.2020.3006201","volume":"68","author":"Z Sun","year":"2020","unstructured":"Sun, Z., et al.: Toward practical quantum secure direct communication: a quantum-memory-free protocol and code design. IEEE Trans. Commun. 68(9), 5778\u20135792 (2020)","journal-title":"IEEE Trans. Commun."},{"key":"3104_CR58","doi-asserted-by":"crossref","first-page":"121146","DOI":"10.1109\/ACCESS.2020.3006136","volume":"8","author":"D Pan","year":"2020","unstructured":"Pan, D., et al.: Single-photon-memory two-step quantum secure direct communication relying on Einstein\u2013Podolsky\u2013Rosen pairs. IEEE Access 8, 121146\u2013121161 (2020)","journal-title":"IEEE Access"},{"issue":"1","key":"3104_CR59","doi-asserted-by":"crossref","first-page":"e22","DOI":"10.1038\/s41377-019-0132-3","volume":"8","author":"R Qi","year":"2019","unstructured":"Qi, R., et al.: Implementation and security analysis of practical quantum secure direct communication. Light Sci. Appl. 8(1), e22 (2019)","journal-title":"Light Sci. Appl."},{"issue":"4","key":"3104_CR60","first-page":"e26","volume":"1","author":"J Wu","year":"2019","unstructured":"Wu, J., et al.: Security of quantum secure direct communication based on Wyner\u2019s wiretap channel theory. Quantum Eng. 1(4), e26 (2019)","journal-title":"Quantum Eng."},{"issue":"10","key":"3104_CR61","first-page":"1","volume":"19","author":"P-H Niu","year":"2020","unstructured":"Niu, P.-H., et al.: Security analysis of measurement-device-independent quantum secure direct communication. Quantum Inf. Process. 19(10), 1\u201314 (2020)","journal-title":"Quantum Inf. Process."},{"issue":"9","key":"3104_CR62","doi-asserted-by":"crossref","first-page":"1522","DOI":"10.1364\/PRJ.388790","volume":"8","author":"D Pan","year":"2020","unstructured":"Pan, D., et al.: Experimental free-space quantum secure direct communication and its security analysis. Photon. Res. 8(9), 1522\u20131531 (2020)","journal-title":"Photon. Res."},{"key":"3104_CR63","doi-asserted-by":"crossref","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","volume":"28","author":"CE Shannon","year":"1949","unstructured":"Shannon, C.E.: Communication theory of secrecy system. Bell Syst. Tech. J. 28, 656\u2013715 (1949)","journal-title":"Bell Syst. Tech. J."},{"issue":"4","key":"3104_CR64","doi-asserted-by":"crossref","first-page":"049901","DOI":"10.1103\/PhysRevA.73.049901","volume":"73","author":"FG Deng","year":"2006","unstructured":"Deng, F.G., Li, X.H., Zhou, H.Y., Zhang, Zh.J.: Erratum: Improving the security of multiparty quantum secret sharing against Trojan horse attack. Phys. Rev. A 72, 044302. Phys. Rev. A 73(4), 049901 (2006)","journal-title":"Phys. Rev. A"},{"issue":"1\u20132","key":"3104_CR65","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1016\/j.physleta.2005.10.050","volume":"351","author":"QY Cai","year":"2006","unstructured":"Cai, Q.Y.: Eavesdropping on the two-way quantum communication protocols with invisible photons. Phys. Lett. A 351(1\u20132), 23\u201325 (2006)","journal-title":"Phys. Lett. A"},{"issue":"5","key":"3104_CR66","doi-asserted-by":"crossref","first-page":"117","DOI":"10.1007\/s11128-017-1573-3","volume":"16","author":"MH Zhang","year":"2017","unstructured":"Zhang, M.H., Li, H.F., Peng, J.Y.: Semiquantum secure direct communication using ERP pairs. Quantum Inf. Process 16(5), 117 (2017)","journal-title":"Quantum Inf. Process"},{"key":"3104_CR67","doi-asserted-by":"crossref","first-page":"5635","DOI":"10.1103\/PhysRevLett.85.5635","volume":"85","author":"A Cabello","year":"2000","unstructured":"Cabello, A.: Quantum key distribution in the Holevo limit. Phys. Rev. Lett. 85, 5635 (2000)","journal-title":"Phys. Rev. Lett."}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-021-03104-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11128-021-03104-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-021-03104-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,5]],"date-time":"2021-05-05T20:31:59Z","timestamp":1620246719000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11128-021-03104-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4]]},"references-count":67,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2021,4]]}},"alternative-id":["3104"],"URL":"https:\/\/doi.org\/10.1007\/s11128-021-03104-1","relation":{},"ISSN":["1570-0755","1573-1332"],"issn-type":[{"value":"1570-0755","type":"print"},{"value":"1573-1332","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,4]]},"assertion":[{"value":"16 December 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 April 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 April 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"153"}}