{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,18]],"date-time":"2026-01-18T07:45:23Z","timestamp":1768722323593,"version":"3.49.0"},"reference-count":44,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2021,6,1]],"date-time":"2021-06-01T00:00:00Z","timestamp":1622505600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,6,1]],"date-time":"2021-06-01T00:00:00Z","timestamp":1622505600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"published-print":{"date-parts":[[2021,6]]},"DOI":"10.1007\/s11128-021-03129-6","type":"journal-article","created":{"date-parts":[[2021,6,5]],"date-time":"2021-06-05T07:03:05Z","timestamp":1622876585000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["High-capacity measurement-device-independent deterministic secure quantum communication"],"prefix":"10.1007","volume":"20","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4040-2448","authenticated-orcid":false,"given":"Yu-Guang","family":"Yang","sequence":"first","affiliation":[]},{"given":"Jing-Ru","family":"Dong","sequence":"additional","affiliation":[]},{"given":"Yong-Li","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Jian","family":"Li","sequence":"additional","affiliation":[]},{"given":"Yi-Hua","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Wei-Min","family":"Shi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,6,5]]},"reference":[{"issue":"3","key":"3129_CR1","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1007\/s11467-007-0050-3","volume":"2","author":"G-L Long","year":"2007","unstructured":"Long, G.-L., Deng, F.-G., Wang, C., et al.: Quantum secure direct communication and deterministic secure quantum communication. Front. Phys. China 2(3), 251\u2013272 (2007)","journal-title":"Front. Phys. China"},{"issue":"1","key":"3129_CR2","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1103\/PhysRevA.60.157","volume":"60","author":"K Shimizu","year":"1999","unstructured":"Shimizu, K., Imoto, N.: Communication channels secured from eavesdropping via transmission of photonic Bell states. Phys. Rev. A 60(1), 157\u2013166 (1999)","journal-title":"Phys. Rev. A"},{"issue":"28","key":"3129_CR3","doi-asserted-by":"publisher","first-page":"L407","DOI":"10.1088\/0305-4470\/35\/28\/103","volume":"35","author":"A Beige","year":"2002","unstructured":"Beige, A., Englert, B.-G., Kurtsiefer, C., Weinfurter, H.: Secure communication with single-photon two-qubit states. J. Phys. A: Math. Gen. 35(28), L407\u2013L413 (2002)","journal-title":"J. Phys. A: Math. Gen."},{"issue":"18","key":"3129_CR4","doi-asserted-by":"publisher","first-page":"187902\/1","DOI":"10.1103\/PhysRevLett.89.187902","volume":"89","author":"K Bostr\u00f6m","year":"2002","unstructured":"Bostr\u00f6m, K., Felbinger, T.: Deterministic secure direct communication using entanglement. Phys. Rev. Lett. 89(18), 187902\/1-187902\/4 (2002)","journal-title":"Phys. Rev. Lett."},{"issue":"14","key":"3129_CR5","doi-asserted-by":"publisher","first-page":"140501\/1","DOI":"10.1103\/PhysRevLett.94.140501","volume":"94","author":"M Lucamarini","year":"2005","unstructured":"Lucamarini, M., Mancini, S.: Secure deterministic communication without entanglement. Phys. Rev. Lett. 94(14), 140501\/1-140501\/4 (2005)","journal-title":"Phys. Rev. Lett."},{"issue":"4","key":"3129_CR6","doi-asserted-by":"publisher","first-page":"601","DOI":"10.1088\/0256-307X\/21\/4\/003","volume":"21","author":"Q-Y Cai","year":"2004","unstructured":"Cai, Q.-Y., Li, B.-W.: Deterministic secure communication without using entanglement. Chin. Phys. Lett. 21(4), 601\u2013603 (2004)","journal-title":"Chin. Phys. Lett."},{"issue":"4","key":"3129_CR7","first-page":"1354","volume":"49","author":"X-H Li","year":"2006","unstructured":"Li, X.-H., Deng, F.-G., Li, C.-Y., et al.: Deterministic secure quantum communication without maximally entangled states. J. Korean Phys. Soc. 49(4), 1354\u20131359 (2006)","journal-title":"J. Korean Phys. Soc."},{"issue":"3","key":"3129_CR8","doi-asserted-by":"publisher","first-page":"689","DOI":"10.1142\/S0219749909004530","volume":"7","author":"H Yuan","year":"2009","unstructured":"Yuan, H., Song, J.: An efficient deterministic secure quantum communication scheme with Cluster state. Int. J. Quant. Inform. 7(3), 689\u2013696 (2009)","journal-title":"Int. J. Quant. Inform."},{"issue":"2","key":"3129_CR9","doi-asserted-by":"publisher","first-page":"360","DOI":"10.1007\/s11432-011-4371-z","volume":"55","author":"ZH Liu","year":"2012","unstructured":"Liu, Z.H., Chen, H.W., Liu, W.J., Xu, J., Li, Z.Q.: Deterministic secure quantum communication without unitary operation based on high-dimensional entanglement swapping. Sci. Chin.-Inf. Sci. 55(2), 360\u2013367 (2012)","journal-title":"Sci. Chin.-Inf. Sci."},{"key":"3129_CR10","doi-asserted-by":"publisher","first-page":"1903","DOI":"10.1007\/s11433-013-5191-5","volume":"56","author":"CW Tsai","year":"2013","unstructured":"Tsai, C.W., Hwang, T.: Deterministic quantum communication using the symmetric W state. Sci. Chin. Ser. G-Phys. Mech. Astron. 56, 1903\u20131908 (2013)","journal-title":"Sci. Chin. Ser. G-Phys. Mech. Astron."},{"issue":"8","key":"3129_CR11","doi-asserted-by":"publisher","first-page":"2558","DOI":"10.1007\/s10773-014-2053-5","volume":"53","author":"H Yuan","year":"2014","unstructured":"Yuan, H., Zhang, Q., Hong, L., et al.: Scheme for deterministic secure quantum communication with three-qubit GHZ state. Int. J. Theor. Phys. 53(8), 2558\u20132564 (2014)","journal-title":"Int. J. Theor. Phys."},{"issue":"9","key":"3129_CR12","doi-asserted-by":"publisher","first-page":"2831","DOI":"10.1007\/s10773-018-3803-6","volume":"57","author":"Y-G Hu","year":"2018","unstructured":"Hu, Y.-G.: Deterministic secure quantum communication with four-qubit GHZ states. Int. J. Theor. Phys. 57(9), 2831\u20132842 (2018)","journal-title":"Int. J. Theor. Phys."},{"issue":"11","key":"3129_CR13","doi-asserted-by":"publisher","first-page":"3658","DOI":"10.1007\/s10773-019-04234-0","volume":"58","author":"H Yuan","year":"2019","unstructured":"Yuan, H., Song, J., Liu, X.-Y., Yin, X.-F.: Deterministic secure four-qubit GHZ states three-step protocol for quantum communication. Int. J. Theor. Phys. 58(11), 3658\u20133666 (2019)","journal-title":"Int. J. Theor. Phys."},{"issue":"2","key":"3129_CR14","doi-asserted-by":"publisher","first-page":"025101","DOI":"10.1088\/1402-4896\/abce34","volume":"96","author":"TA Elsayed","year":"2021","unstructured":"Elsayed, T.A.: Deterministic secure quantum communication with and without entanglement. Phys. Scrip. 96(2), 025101 (2021)","journal-title":"Phys. Scrip."},{"key":"3129_CR15","doi-asserted-by":"publisher","first-page":"065003","DOI":"10.1088\/1367-2630\/11\/6\/065003","volume":"11","author":"V Makarov","year":"2009","unstructured":"Makarov, V.: Controlling passively quenched single photon detectors by bright light. New J. Phys. 11, 065003 (2009)","journal-title":"New J. Phys."},{"issue":"10","key":"3129_CR16","doi-asserted-by":"publisher","first-page":"686","DOI":"10.1038\/nphoton.2010.214","volume":"4","author":"L Lydersen","year":"2010","unstructured":"Lydersen, L., Wiechers, C., Wittmann, C., et al.: Hacking commercial quantum cryptography systems by tailored bright illumination. Nat. Photon. 4(10), 686\u2013689 (2010)","journal-title":"Nat. Photon."},{"issue":"26","key":"3129_CR17","doi-asserted-by":"publisher","first-page":"27938","DOI":"10.1364\/OE.18.027938","volume":"18","author":"L Lydersen","year":"2010","unstructured":"Lydersen, L., Wiechers, C., Wittmann, C., et al.: Thermal blinding of gated detectors in quantum cryptography. Opt. Exp. 18(26), 27938\u201327954 (2010)","journal-title":"Opt. Exp."},{"issue":"1","key":"3129_CR18","doi-asserted-by":"publisher","first-page":"349","DOI":"10.1038\/ncomms1348","volume":"2","author":"I Gerhardt","year":"2011","unstructured":"Gerhardt, I., Liu, Q., Lamas-Linares, A.A., et al.: Full-field implementation of a perfect eavesdropper on a quantum cryptography system. Nat. Commun. 2(1), 349 (2011)","journal-title":"Nat. Commun."},{"issue":"1","key":"3129_CR19","doi-asserted-by":"publisher","first-page":"012312","DOI":"10.1103\/PhysRevA.98.012312","volume":"98","author":"H Qin","year":"2018","unstructured":"Qin, H., Kumar, R., Makarov, V., et al.: Homodyne-detector-blinding attack in continuous-variable quantum key distribution. Phys. Rev. A 98(1), 012312 (2018)","journal-title":"Phys. Rev. A"},{"issue":"13","key":"3129_CR20","doi-asserted-by":"publisher","first-page":"130503","DOI":"10.1103\/PhysRevLett.108.130503","volume":"108","author":"H-K Lo","year":"2012","unstructured":"Lo, H.-K., Curty, M., Qi, B.: Measurement-device-independent quantum key distribution. Phys. Rev. Lett. 108(13), 130503 (2012)","journal-title":"Phys. Rev. Lett."},{"key":"3129_CR21","first-page":"336","volume":"6","author":"SP Walborn","year":"2006","unstructured":"Walborn, S.P., Almeida, M.P., Souto Ribeiro, P.H., Monken, C.H.: Quantum information processing with hyperentangled photon states. Quantum Inf. Comput. 6, 336 (2006)","journal-title":"Quantum Inf. Comput."},{"key":"3129_CR22","doi-asserted-by":"publisher","first-page":"354","DOI":"10.1007\/s11128-020-02864-6","volume":"19","author":"X-D Wu","year":"2020","unstructured":"Wu, X.-D., Zhou, L., Zhong, W., Sheng, Y.-B.: High-capacity measurement-device-independent quantum secure direct communication. Quantum Inf. Process. 19, 354 (2020)","journal-title":"Quantum Inf. Process."},{"issue":"4","key":"3129_CR23","doi-asserted-by":"publisher","first-page":"040305","DOI":"10.1088\/0256-307X\/28\/4\/040305","volume":"28","author":"T-J Wang","year":"2011","unstructured":"Wang, T.-J., Li, T., Du, F.-F., Deng, F.-G.: High-capacity quantum secure direct communication based on quantum hyperdense coding with hyperentanglement. Chin. Phys. Lett. 28(4), 040305 (2011)","journal-title":"Chin. Phys. Lett."},{"key":"3129_CR24","doi-asserted-by":"publisher","first-page":"2923","DOI":"10.1007\/s10773-012-1171-1","volume":"51","author":"D Liu","year":"2012","unstructured":"Liu, D., Chen, J.-L., Jiang, W.: High-capacity quantum secure direct communication with single photons in both polarization and spatial-mode degrees of freedom. Int. J. Theor. Phys. 51, 2923\u20132929 (2012)","journal-title":"Int. J. Theor. Phys."},{"key":"3129_CR25","doi-asserted-by":"publisher","first-page":"065204","DOI":"10.1088\/1555-6611\/ab85c9","volume":"30","author":"R-T Zhao","year":"2020","unstructured":"Zhao, R.-T., Cheng, L.-L.: High capacity information transmission with single-photon in polarization and spatial mode degrees of freedom over a collective noisy channel. Laser Phys. 30, 065204 (2020)","journal-title":"Laser Phys."},{"key":"3129_CR26","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1140\/epjd\/e2019-90374-y","volume":"73","author":"L Xu","year":"2019","unstructured":"Xu, L., Zhao, Z.-W.: High-capacity quantum private comparison protocol with two-photon hyperentangled Bell states in multiple-degree of freedom. Eur. Phys. J. D 73, 58 (2019)","journal-title":"Eur. Phys. J. D"},{"key":"3129_CR27","doi-asserted-by":"publisher","first-page":"060305(R)","DOI":"10.1103\/PhysRevA.75.060305","volume":"75","author":"T-C Wei","year":"2007","unstructured":"Wei, T.-C., Barreiro, J.T., Kwiat, P.G.: Hyperentangled Bell state analysis. Phys. Rev. A 75, 060305(R) (2007)","journal-title":"Phys. Rev. A"},{"key":"3129_CR28","doi-asserted-by":"publisher","first-page":"022340","DOI":"10.1103\/PhysRevA.84.022340","volume":"84","author":"N Pisenti","year":"2011","unstructured":"Pisenti, N., Gaebler, C.P.E., Lynn, T.W.: Distinguishability of hyperentangled Bell states by linear evolution and local projective measurement. Phys. Rev. A 84, 022340 (2011)","journal-title":"Phys. Rev. A"},{"key":"3129_CR29","doi-asserted-by":"publisher","first-page":"032318","DOI":"10.1103\/PhysRevA.82.032318","volume":"82","author":"YB Sheng","year":"2010","unstructured":"Sheng, Y.B., Deng, F.G., Long, G.L.: Complete hyperentangled-Bell-state analysis for quantum communication. Phys. Rev. A 82, 032318 (2010)","journal-title":"Phys. Rev. A"},{"key":"3129_CR30","doi-asserted-by":"publisher","first-page":"1029","DOI":"10.1364\/JOSAB.29.001029","volume":"29","author":"Y Xia","year":"2012","unstructured":"Xia, Y., Chen, Q.Q., Song, J., Song, H.S.: Efficient hyperentangled Greenberger-Horne-Zeilinger states analysis with cross-Kerr nonlinearity. J. Opt. Soc. Am. B 29, 1029 (2012)","journal-title":"J. Opt. Soc. Am. B"},{"key":"3129_CR31","doi-asserted-by":"publisher","first-page":"022302","DOI":"10.1103\/PhysRevA.93.022302","volume":"93","author":"XH Li","year":"2016","unstructured":"Li, X.H., Ghose, S.: Self-assisted complete maximally hyperentangled state analysis via the cross-Kerr nonlinearity. Phys. Rev. A 93, 022302 (2016)","journal-title":"Phys. Rev. A"},{"key":"3129_CR32","doi-asserted-by":"publisher","first-page":"020303","DOI":"10.1103\/PhysRevA.96.020303","volume":"96","author":"XH Li","year":"2017","unstructured":"Li, X.H., Ghose, S.: Hyperentangled Bell-state analysis and hyperdense coding assisted by auxiliary entanglement. Phys. Rev. A 96, 020303 (2017)","journal-title":"Phys. Rev. A"},{"key":"3129_CR33","doi-asserted-by":"crossref","unstructured":"Aharonov, D., Ta-Shma, A., Vazirani, U.V., et al.: Quantum bit escrow. Proceedings of the thirty-second annual ACM symposium on Theory of computing pp. 705\u2013714 (2000)","DOI":"10.1145\/335305.335404"},{"key":"3129_CR34","doi-asserted-by":"publisher","first-page":"2623(R)","DOI":"10.1103\/PhysRevA.58.R2623","volume":"58","author":"PG Kwiat","year":"1998","unstructured":"Kwiat, P.G., Weinfurter, H.: Embedded Bell-state analysis. Phys. Rev. A 58, 2623(R) (1998)","journal-title":"Phys. Rev. A"},{"key":"3129_CR35","doi-asserted-by":"publisher","first-page":"190501","DOI":"10.1103\/PhysRevLett.96.190501","volume":"96","author":"C Schuck","year":"2006","unstructured":"Schuck, C., Huber, G., Kurtsiefer, C., Weinfurter, H.: Phys. Rev. Lett. 96, 190501 (2006)","journal-title":"Phys. Rev. Lett."},{"issue":"6","key":"3129_CR36","doi-asserted-by":"publisher","first-page":"062327","DOI":"10.1103\/PhysRevA.92.062327","volume":"92","author":"L Zhao","year":"2015","unstructured":"Zhao, L., Yin, Z., Wang, S., et al.: Measurement-device-independent quantum coin tossing. Phys. Rev. A 92(6), 062327 (2015)","journal-title":"Phys. Rev. A"},{"issue":"3","key":"3129_CR37","doi-asserted-by":"publisher","first-page":"230362","DOI":"10.1007\/s11433-019-1450-8","volume":"63","author":"ZR Zhou","year":"2020","unstructured":"Zhou, Z.R., Sheng, Y.B., Niu, P.H., Yin, L.G., Long, G.L., Hanzo, L.: Measurement-device-independent quantum secure direct communication. Sci. Chin. Phys. Mech. Astron. 63(3), 230362 (2020)","journal-title":"Sci. Chin. Phys. Mech. Astron."},{"key":"3129_CR38","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1103\/RevModPhys.74.145","volume":"74","author":"N Gisin","year":"2002","unstructured":"Gisin, N., Ribordy, G., Tittel, W., Zbinden, H.: Quantum cryptography. Rev. Mod. Phys. 74, 145 (2002)","journal-title":"Rev. Mod. Phys."},{"issue":"2","key":"3129_CR39","doi-asserted-by":"publisher","first-page":"436","DOI":"10.1007\/s10773-019-04337-8","volume":"59","author":"DH Jiang","year":"2020","unstructured":"Jiang, D.H., Wang, J., Liang, X.Q., Xu, G.B., Qi, H.F.: Quantum voting scheme based on locally indistinguishable orthogonal product states. Int. J. Theor. Phys. 59(2), 436\u2013444 (2020)","journal-title":"Int. J. Theor. Phys."},{"key":"3129_CR40","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1007\/s11128-021-03062-8","volume":"20","author":"GB Xu","year":"2021","unstructured":"Xu, G.B., Jiang, D.H.: Novel methods to construct nonlocal sets of orthogonal product states in an arbitrary bipartite high-dimensional system. Quantum Inf. process. 20, 128 (2021)","journal-title":"Quantum Inf. process."},{"issue":"4","key":"3129_CR41","doi-asserted-by":"publisher","first-page":"1374","DOI":"10.1007\/s10773-021-04763-7","volume":"60","author":"G Du","year":"2021","unstructured":"Du, G., Zhou, B.M., Ma, C.G., Zhang, S., Li, J.Y.: A secure quantum voting scheme based on orthogonal product states. Int. J. Theor. Phys. 60(4), 1374\u20131383 (2021)","journal-title":"Int. J. Theor. Phys."},{"issue":"4","key":"3129_CR42","doi-asserted-by":"publisher","first-page":"1237","DOI":"10.1007\/s10773-021-04749-5","volume":"60","author":"MM Lin","year":"2021","unstructured":"Lin, M.M., Xue, D.W., Wang, Y., Zhang, K.J.: A new quantum payment protocol based on a set of local indistinguishable orthogonal product states. Int. J. Theor. Phys. 60(4), 1237\u20131245 (2021)","journal-title":"Int. J. Theor. Phys."},{"issue":"5","key":"3129_CR43","doi-asserted-by":"publisher","first-page":"1442","DOI":"10.1007\/s10773-020-04413-4","volume":"59","author":"DH Jiang","year":"2020","unstructured":"Jiang, D.H., Hu, Q.Z., Liang, X.Q., Xu, G.B.: A trusted third-party E-payment protocol based on locally indistinguishable orthogonal product states. Int. J. Theor. Phys. 59(5), 1442\u20131450 (2020)","journal-title":"Int. J. Theor. Phys."},{"issue":"16","key":"3129_CR44","doi-asserted-by":"publisher","first-page":"2050172","DOI":"10.1142\/S0217984920501729","volume":"34","author":"YL Xu","year":"2020","unstructured":"Xu, Y.L., Xu, G.B., Jiang, D.H.: Novel quantum proxy signature scheme based on orthogonalquantum product states. Mod. Phys. Lett. B 34(16), 2050172 (2020)","journal-title":"Mod. Phys. Lett. B"}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-021-03129-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11128-021-03129-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-021-03129-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,3]],"date-time":"2023-02-03T14:40:53Z","timestamp":1675435253000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11128-021-03129-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6]]},"references-count":44,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2021,6]]}},"alternative-id":["3129"],"URL":"https:\/\/doi.org\/10.1007\/s11128-021-03129-6","relation":{},"ISSN":["1570-0755","1573-1332"],"issn-type":[{"value":"1570-0755","type":"print"},{"value":"1573-1332","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,6]]},"assertion":[{"value":"14 December 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 May 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 June 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"203"}}