{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,22]],"date-time":"2025-11-22T17:07:37Z","timestamp":1763831257238,"version":"3.37.3"},"reference-count":69,"publisher":"Springer Science and Business Media LLC","issue":"8","license":[{"start":{"date-parts":[[2021,8,1]],"date-time":"2021-08-01T00:00:00Z","timestamp":1627776000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,8,1]],"date-time":"2021-08-01T00:00:00Z","timestamp":1627776000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U1636106","61671087"],"award-info":[{"award-number":["U1636106","61671087"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61962009"],"award-info":[{"award-number":["61962009"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004826","name":"Natural Science Foundation of Beijing Municipality","doi-asserted-by":"publisher","award":["4182006"],"award-info":[{"award-number":["4182006"]}],"id":[{"id":"10.13039\/501100004826","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["2019XD-A02"],"award-info":[{"award-number":["2019XD-A02"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"published-print":{"date-parts":[[2021,8]]},"DOI":"10.1007\/s11128-021-03194-x","type":"journal-article","created":{"date-parts":[[2021,8,6]],"date-time":"2021-08-06T06:02:57Z","timestamp":1628229777000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":32,"title":["Efficient semi-quantum private comparison without using entanglement resource and pre-shared key"],"prefix":"10.1007","volume":"20","author":[{"given":"Ye","family":"Chongqiang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6237-2307","authenticated-orcid":false,"given":"Li","family":"Jian","sequence":"additional","affiliation":[]},{"given":"Chen","family":"Xiubo","sequence":"additional","affiliation":[]},{"given":"Tian","family":"Yuan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,8,6]]},"reference":[{"key":"3194_CR1","unstructured":"Bennett, C,H., Brassard, G.: Quantum cryptography: public-key distribution and coin tossing. In: Proceedings of the IEEE International Conference on Computers, Systems and Signal Processing. Bangalore: IEEE Press, (1984), 175-179"},{"key":"3194_CR2","doi-asserted-by":"crossref","unstructured":"Ekert, A.K.: Quantum cryptography based on Bell\u2019s theorem. Phys. Rev. Lett 67(6), 661\u2013663 (1991)","DOI":"10.1103\/PhysRevLett.67.661"},{"key":"3194_CR3","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1103\/PhysRevLett.68.557","volume":"68","author":"CH Bennett","year":"1992","unstructured":"Bennett, C.H., Brassard, G., Mermin, N.D.: Quantum cryptography without Bell theorem. Phys. Rev. Lett 68, 557\u2013559 (1992)","journal-title":"Phys. Rev. Lett"},{"key":"3194_CR4","doi-asserted-by":"publisher","first-page":"5635","DOI":"10.1103\/PhysRevLett.85.5635","volume":"85","author":"A Cabello","year":"2000","unstructured":"Cabello, A.: Quantum key distribution in the Holevo limit. Phys. Rev. Lett 85, 5635 (2000)","journal-title":"Phys. Rev. Lett"},{"issue":"2","key":"3194_CR5","doi-asserted-by":"publisher","first-page":"441","DOI":"10.1103\/PhysRevLett.85.441","volume":"85","author":"PW Shor","year":"2000","unstructured":"Shor, P.W., Preskill, J.: Simple proof of security of the BB84 quantum key distribution protocol. Phys. Rev. Lett 85(2), 441 (2000)","journal-title":"Phys. Rev. Lett"},{"issue":"3","key":"3194_CR6","doi-asserted-by":"publisher","first-page":"1829","DOI":"10.1103\/PhysRevA.59.1829","volume":"59","author":"M Hillery","year":"1999","unstructured":"Hillery, M., Bu\u017eek, V., Berthiaume, A.: Quantum secret sharing. Phys. Rev. A 59(3), 1829 (1999)","journal-title":"Phys. Rev. A"},{"key":"3194_CR7","doi-asserted-by":"publisher","first-page":"052307","DOI":"10.1103\/PhysRevA.69.052307","volume":"69","author":"L Xiao","year":"2004","unstructured":"Xiao, L., Long, G.L., Deng, F.G., Pan, J.W.: Efficient multiparty quantum-secret-sharing schemes. Phys. Rev. A 69, 052307 (2004)","journal-title":"Phys. Rev. A"},{"issue":"45","key":"3194_CR8","doi-asserted-by":"publisher","first-page":"14089","DOI":"10.1088\/0305-4470\/39\/45\/018","volume":"39","author":"FG Deng","year":"2006","unstructured":"Deng, F.G., Zhou, H.Y., Long, G.L.: Circular quantum secret sharing. J. Phys. A: Math. Theor 39(45), 14089\u201314099 (2006)","journal-title":"J. Phys. A: Math. Theor"},{"issue":"24","key":"3194_CR9","doi-asserted-by":"publisher","first-page":"6130","DOI":"10.1016\/j.optcom.2008.09.026","volume":"281","author":"TY Wang","year":"2008","unstructured":"Wang, T.Y., Wen, Q.Y., Chen, X.B., et al.: An efficient and secure multiparty quantum secret sharing scheme based on single photons. Optics. Communications 281(24), 6130\u20136134 (2008)","journal-title":"Optics. Communications"},{"key":"3194_CR10","doi-asserted-by":"crossref","unstructured":"Yang, C.W., Tsai, C.W.: Efficient and secure dynamic quantum secret sharing protocol based on bell states. Quantum Inf. Process, 19(5) (2020)","DOI":"10.1007\/s11128-020-02662-0"},{"key":"3194_CR11","doi-asserted-by":"crossref","unstructured":"Deng, F.G., Long, G.L., Liu, X,S.: Two-step quantum direct communication protocol using the Einstein-Podolsky-Rosen pair block. Phys. Rev. A, 68:042317 (2003)","DOI":"10.1103\/PhysRevA.68.042317"},{"key":"3194_CR12","doi-asserted-by":"publisher","first-page":"052319","DOI":"10.1103\/PhysRevA.69.052319","volume":"69","author":"FG Deng","year":"2004","unstructured":"Deng, F.G., Long, G.L.: Secure direct communication with a quantum one-time pad. Phys. Rev. A 69, 052319 (2004)","journal-title":"Phys. Rev. A"},{"issue":"4","key":"3194_CR13","doi-asserted-by":"publisher","first-page":"899","DOI":"10.1142\/S0219749908004195","volume":"6","author":"XB Chen","year":"2008","unstructured":"Chen, X.B., Wen, Q.Y., Guo, F.Z., Sun, Y., Xu, G., Zhu, F.C.: Controlled quantum secure direct communication with W state. Int. J. Quant. Inform 6(4), 899\u2013906 (2008)","journal-title":"Int. J. Quant. Inform"},{"issue":"21","key":"3194_CR14","doi-asserted-by":"publisher","first-page":"2541","DOI":"10.1007\/s11434-014-0339-x","volume":"59","author":"Y Chang","year":"2014","unstructured":"Chang, Y., Xu, C.X., Zhang, S.B., et al.: Controlled quantum secure direct communication and authentication protocol based on five-particle cluster state and quantum one-time pad. Chin. Sci. Bull 59(21), 2541\u20132546 (2014)","journal-title":"Chin. Sci. Bull"},{"issue":"23","key":"3194_CR15","doi-asserted-by":"publisher","first-page":"230502","DOI":"10.1103\/PhysRevLett.100.230502","volume":"100","author":"V Giovannetti","year":"2008","unstructured":"Giovannetti, V., Lloyd, S., Maccone, L.: Quantum private queries. Phys. Rev. Lett 100(23), 230502 (2008)","journal-title":"Phys. Rev. Lett"},{"key":"3194_CR16","doi-asserted-by":"publisher","first-page":"022301","DOI":"10.1103\/PhysRevA.83.022301","volume":"83","author":"M Jakobi","year":"2011","unstructured":"Jakobi, M., Simon, C., Gisin, N., et al.: Practical private database queries based on a quantum-key- distribution protocol. Phys. Rev. A 83, 022301 (2011)","journal-title":"Phys. Rev. A"},{"key":"3194_CR17","doi-asserted-by":"publisher","first-page":"6600111","DOI":"10.1109\/JSTQE.2014.2358192","volume":"21","author":"F Gao","year":"2015","unstructured":"Gao, F., Liu, B., Huang, W., Wen, Q.Y.: Postprocessing of the oblivious key in quantum private query. IEEE. J. Sel. Top. Quant 21, 6600111 (2015)","journal-title":"IEEE. J. Sel. Top. Quant"},{"key":"3194_CR18","doi-asserted-by":"publisher","first-page":"042318","DOI":"10.1103\/PhysRevA.93.042318","volume":"93","author":"CY Wei","year":"2016","unstructured":"Wei, C.Y., Wang, T.Y., Gao, F.: Practical quantum private query with better performance in resisting joint- measurement attack. Phys. Rev. A 93, 042318 (2016)","journal-title":"Phys. Rev. A"},{"key":"3194_CR19","doi-asserted-by":"crossref","unstructured":"Yao, A.C.: Protocols for secure computations. In: Proceedings of 23rd IEEE Symposium on Foundations of Computer Science (FOCS\u201982), Washington, DC, (1982), p.160","DOI":"10.1109\/SFCS.1982.38"},{"issue":"5","key":"3194_CR20","doi-asserted-by":"publisher","first-page":"055305","DOI":"10.1088\/1751-8113\/42\/5\/055305","volume":"42","author":"YG Yang","year":"2009","unstructured":"Yang, Y.G., Wen, Q.Y.: An efficient two-party quantum private comparison protocol with decoy photons and two-photon entanglement. J. Phys. A: Math and Theor 42(5), 055305 (2009)","journal-title":"J. Phys. A: Math and Theor"},{"issue":"6","key":"3194_CR21","doi-asserted-by":"publisher","first-page":"065002","DOI":"10.1088\/0031-8949\/80\/06\/065002","volume":"80","author":"YG Yang","year":"2009","unstructured":"Yang, Y.G., Gao, W.F., Wen, Q.Y.: Secure quantum private comparison. Phys. Scr 80(6), 065002 (2009)","journal-title":"Phys. Scr"},{"issue":"1","key":"3194_CR22","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1007\/s11128-012-0505-5","volume":"13","author":"XB Chen","year":"2014","unstructured":"Chen, X.B., Su, Y., Niu, X.X., Yang, Y.X.: Efficient and feasible quantum private comparison of equality against the collective amplitude damping noise. Quantum Inf. Process 13(1), 101\u2013112 (2014)","journal-title":"Quantum Inf. Process"},{"issue":"2","key":"3194_CR23","doi-asserted-by":"publisher","first-page":"887","DOI":"10.1007\/s11128-012-0439-y","volume":"12","author":"B Liu","year":"2013","unstructured":"Liu, B., Gao, F., Jia, H.Y., Huang, W., Zhang, W.W., Wen, Q.Y.: Efficient quantum private comparison employing single photons and collective detection. Quantum Inf. Process 12(2), 887\u2013897 (2013)","journal-title":"Quantum Inf. Process"},{"issue":"2","key":"3194_CR24","doi-asserted-by":"publisher","first-page":"373","DOI":"10.1007\/s11128-011-0251-0","volume":"11","author":"HY Tseng","year":"2012","unstructured":"Tseng, H.Y., Lin, J., Hwang, T.: New quantum private comparison protocol using EPR pairs. Quantum Inf. Process 11(2), 373\u2013384 (2012)","journal-title":"Quantum Inf. Process"},{"issue":"2","key":"3194_CR25","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1007\/s11128-013-0645-2","volume":"13","author":"J Lin","year":"2014","unstructured":"Lin, J., Yang, C.W., Hwang, T.: Quantum private comparison of equality protocol without a third party. Quantum Inf. Process 13(2), 239\u2013247 (2014)","journal-title":"Quantum Inf. Process"},{"issue":"7","key":"3194_CR26","doi-asserted-by":"publisher","first-page":"1561","DOI":"10.1016\/j.optcom.2009.11.085","volume":"283","author":"XB Chen","year":"2010","unstructured":"Chen, X.B., Xu, G., Niu, X.X., Wen, Q.Y., Yang, Y.X.: An efficient protocol for the private comparison of equal information based on the triplet entangled state and single-particle measurement. Opt. Commun 283(7), 1561\u20131565 (2010)","journal-title":"Opt. Commun"},{"issue":"2","key":"3194_CR27","doi-asserted-by":"publisher","first-page":"1077","DOI":"10.1007\/s11128-012-0454-z","volume":"12","author":"YJ Chang","year":"2013","unstructured":"Chang, Y.J., Tsai, C.W., Hwang, T.: Multi-user private comparison protocol using GHZ class states. Quantum Inf. Process 12(2), 1077\u20131088 (2013)","journal-title":"Quantum Inf. Process"},{"issue":"12","key":"3194_CR28","doi-asserted-by":"publisher","first-page":"3160","DOI":"10.1016\/j.optcom.2011.02.017","volume":"284","author":"W Liu","year":"2011","unstructured":"Liu, W., Wang, Y.B., Jiang, Z.T.: An efficient protocol for the quantum private comparison of equality with W state. Opt. Commun 284(12), 3160\u20133163 (2011)","journal-title":"Opt. Commun"},{"issue":"7","key":"3194_CR29","doi-asserted-by":"publisher","first-page":"2167","DOI":"10.1007\/s10773-013-1983-7","volume":"53","author":"J Li","year":"2014","unstructured":"Li, J., Zhou, H.F., Jia, L., Zhang, T.T.: An efficient protocol for the private comparison of equal information based on four-particle entangled W state and Bell entangled states swapping. Int. J. Theor. Phys 53(7), 2167\u20132176 (2014)","journal-title":"Int. J. Theor. Phys"},{"issue":"5","key":"3194_CR30","doi-asserted-by":"publisher","first-page":"1723","DOI":"10.1007\/s10773-013-1970-z","volume":"53","author":"WW Zhang","year":"2014","unstructured":"Zhang, W.W., Li, D., Li, Y.B.: Quantum private comparison protocol with W states. Int. J. Theor. Phys 53(5), 1723\u20131729 (2014)","journal-title":"Int. J. Theor. Phys"},{"issue":"4","key":"3194_CR31","doi-asserted-by":"publisher","first-page":"1250045","DOI":"10.1142\/S0219749912500451","volume":"10","author":"GA Xu","year":"2012","unstructured":"Xu, G.A., Chen, X.B., Wei, Z.H., Li, M.J., Yang, Y.X.: An efficient protocol for the quantum private comparison of equality with a four-qubit cluster state. Int. J. Quant. Inform 10(4), 1250045 (2012)","journal-title":"Int. J. Quant. Inform"},{"key":"3194_CR32","doi-asserted-by":"crossref","unstructured":"Li, C.Y., Chen, X.B., et\u00a0al.: Efficient quantum private comparison protocol based on the entanglement swapping between four-qubit cluster state and extended Bell state. Quantum Inf. Process, 18(5) (2019)","DOI":"10.1007\/s11128-019-2266-x"},{"issue":"9","key":"3194_CR33","doi-asserted-by":"publisher","first-page":"090312","DOI":"10.1007\/s11433-017-9056-6","volume":"60","author":"TY Ye","year":"2017","unstructured":"Ye, T.Y., Ji, Z.X.: Multi-user quantum private comparison with scattered preparation and one-way convergent transmission of quantum states. Sci. China Phys. Mech. Astron. 60(9), 090312 (2017)","journal-title":"Sci. China Phys. Mech. Astron."},{"issue":"2","key":"3194_CR34","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1007\/s11128-016-1498-2","volume":"16","author":"SM Hung","year":"2017","unstructured":"Hung, S.M., Hwang, S.L., Hwang, T., Kao, S.H.: Multiparty quantum private comparison with almost dishonest third parties for strangers. Quantum Inf. Process 16(2), 36 (2017)","journal-title":"Quantum Inf. Process"},{"issue":"11","key":"3194_CR35","doi-asserted-by":"publisher","first-page":"2375","DOI":"10.1007\/s11128-014-0774-2","volume":"13","author":"QL Wang","year":"2014","unstructured":"Wang, Q.L., Sun, H.X., Huang, W.: Multi-party quantum private comparison protocol with n-level entangled states. Quantum Inf. Process 13(11), 2375\u20132389 (2014)","journal-title":"Quantum Inf. Process"},{"issue":"4","key":"3194_CR36","doi-asserted-by":"publisher","first-page":"1282","DOI":"10.1007\/s10773-019-04019-5","volume":"58","author":"CQ Ye","year":"2019","unstructured":"Ye, C.Q., Ye, T.Y.: Circular Multi-party quantum private comparison with-level single-particle states. Int. J. Theor. Phys 58(4), 1282\u20131294 (2019)","journal-title":"Int. J. Theor. Phys"},{"issue":"2","key":"3194_CR37","doi-asserted-by":"publisher","first-page":"1154","DOI":"10.1103\/PhysRevA.56.1154","volume":"56","author":"HK Lo","year":"1997","unstructured":"Lo, H.K.: Insecurity of quantum secure computations. Phys. Rev. A 56(2), 1154\u20131162 (1997)","journal-title":"Phys. Rev. A"},{"issue":"14","key":"3194_CR38","doi-asserted-by":"publisher","first-page":"140501","DOI":"10.1103\/PhysRevLett.99.140501","volume":"99","author":"M Boyer","year":"2007","unstructured":"Boyer, M., Kenigsberg, D., Mor, T.: Quantum key distribution with classical Bob. Phys. Rev. Lett 99(14), 140501 (2007)","journal-title":"Phys. Rev. Lett"},{"issue":"3","key":"3194_CR39","doi-asserted-by":"publisher","first-page":"032341","DOI":"10.1103\/PhysRevA.79.032341","volume":"79","author":"M Boyer","year":"2009","unstructured":"Boyer, M., Gelles, R., Kenigsberg, D., Mor, T.: Semiquantum key distribution. Phys. Rev. A 79(3), 032341 (2009)","journal-title":"Phys. Rev. A"},{"issue":"6","key":"3194_CR40","doi-asserted-by":"publisher","first-page":"1195","DOI":"10.1142\/S0219749908004353","volume":"6","author":"H Lu","year":"2008","unstructured":"Lu, H., Cai, Q.Y.: Quantum key distribution with classical Alice. Int. J. Quant. Inform 6(6), 1195\u20131202 (2008)","journal-title":"Int. J. Quant. Inform"},{"issue":"5","key":"3194_CR41","doi-asserted-by":"publisher","first-page":"052312","DOI":"10.1103\/PhysRevA.79.052312","volume":"79","author":"XF Zou","year":"2009","unstructured":"Zou, X.F., Qiu, D.W., Li, L.Z., Wu, L.H., Li, L.J.: Semiquantum-key distribution using less than four quantum states. Phys. Rev. A 79(5), 052312 (2009)","journal-title":"Phys. Rev. A"},{"issue":"1","key":"3194_CR42","doi-asserted-by":"publisher","first-page":"1350005","DOI":"10.1142\/S0219749913500056","volume":"11","author":"ZW Sun","year":"2003","unstructured":"Sun, Z.W., Du, R.G., Long, D.Y.: Quantum key distribution with limited classical Bob. Int. J. Quant. Inform 11(1), 1350005 (2003)","journal-title":"Int. J. Quant. Inform"},{"key":"3194_CR43","doi-asserted-by":"crossref","unstructured":"Zou, X.F., Qiu, D.W., Zhang, S.Y., Mateus, P.: Semiquantum key distribution without invoking the classical party\u2019s measurement capability. Quantum Inf. Process 14(8), 2981\u20132996 (2015)","DOI":"10.1007\/s11128-015-1015-z"},{"issue":"11","key":"3194_CR44","doi-asserted-by":"publisher","first-page":"2417","DOI":"10.1007\/s11128-014-0802-2","volume":"13","author":"WO Krawec","year":"2014","unstructured":"Krawec, W.O.: Restricted attacks on semi-quantum key distribution protocols. Quantum Inf. Process 13(11), 2417\u20132436 (2014)","journal-title":"Quantum Inf. Process"},{"issue":"5","key":"3194_CR45","doi-asserted-by":"publisher","first-page":"2067","DOI":"10.1007\/s11128-016-1266-3","volume":"15","author":"WO Krawec","year":"2016","unstructured":"Krawec, W.O.: Security of a semi-quantum protocol where reflections contribute to the secret key. Quantum Inf. Process 15(5), 2067\u20132090 (2016)","journal-title":"Quantum Inf. Process"},{"issue":"3","key":"3194_CR46","doi-asserted-by":"publisher","first-page":"032323","DOI":"10.1103\/PhysRevA.91.032323","volume":"91","author":"WO Krawec","year":"2015","unstructured":"Krawec, W.O.: Mediated semi-quantum key distribution. Phys. Rev. A 91(3), 032323 (2015)","journal-title":"Phys. Rev. A"},{"issue":"9","key":"3194_CR47","doi-asserted-by":"publisher","first-page":"1696","DOI":"10.1007\/s11433-014-5542-x","volume":"57","author":"XF Zou","year":"2014","unstructured":"Zou, X.F., Qiu, D.W.: Three-step semiquantum secure direct communication protocol. Sci. China-Phys Mech. Astron 57(9), 1696\u20131702 (2014)","journal-title":"Sci. China-Phys Mech. Astron"},{"issue":"2","key":"3194_CR48","doi-asserted-by":"publisher","first-page":"947","DOI":"10.1007\/s11128-015-1182-y","volume":"15","author":"YP Luo","year":"2016","unstructured":"Luo, Y.P., Hwang, T.: Authenticated semi-quantum direct communication protocols using Bell states. Quantum Inf. Process 15(2), 947\u2013958 (2016)","journal-title":"Quantum Inf. Process"},{"issue":"5","key":"3194_CR49","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1007\/s11128-017-1573-3","volume":"16","author":"MH Zhang","year":"2017","unstructured":"Zhang, M.H., Li, H.F., Xia, Z.Q., et al.: Semiquantum secure direct communication using EPR pairs. Quantum Inf. Process 16(5), 117 (2017)","journal-title":"Quantum Inf. Process"},{"issue":"2","key":"3194_CR50","doi-asserted-by":"publisher","first-page":"022303","DOI":"10.1103\/PhysRevA.82.022303","volume":"82","author":"Q Li","year":"2010","unstructured":"Li, Q., Chan, W.H., Long, D.Y.: Semiquantum secret sharing using entangled states. Phys. Rev. A 82(2), 022303 (2010)","journal-title":"Phys. Rev. A"},{"issue":"5","key":"3194_CR51","doi-asserted-by":"publisher","first-page":"1250050","DOI":"10.1142\/S0219749912500505","volume":"10","author":"J Wang","year":"2012","unstructured":"Wang, J., Zhang, S., Zhang, Q., et al.: Semiquantum secret sharing using two-particle entangled state. Int. J. Quantum Inf 10(5), 1250050 (2012)","journal-title":"Int. J. Quantum Inf"},{"issue":"4","key":"3194_CR52","doi-asserted-by":"publisher","first-page":"045304","DOI":"10.1088\/1751-8113\/46\/4\/045304","volume":"46","author":"LZ Li","year":"2013","unstructured":"Li, L.Z., Qiu, D.W., Mateus, P.: Quantum secret sharing with classical Bobs. J. Phys. A Math. Theor 46(4), 045304 (2013)","journal-title":"J. Phys. A Math. Theor"},{"issue":"1","key":"3194_CR53","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1007\/s10773-012-1314-4","volume":"52","author":"J Lin","year":"2013","unstructured":"Lin, J., Yang, C.W., Tsai, C.W., et al.: Intercept-resend attacks on semi-quantum secret sharing and the improvements. Int. J. Theor. Phys 52(1), 156\u2013162 (2013)","journal-title":"Int. J. Theor. Phys"},{"issue":"5","key":"3194_CR54","doi-asserted-by":"publisher","first-page":"1350052","DOI":"10.1142\/S0219749913500524","volume":"11","author":"CW Yang","year":"2013","unstructured":"Yang, C.W., Hwang, T.: Efficient key construction on semi-quantum secret sharing protocols. Int. J. Quant. Inform 11(5), 1350052 (2013)","journal-title":"Int. J. Quant. Inform"},{"issue":"10","key":"3194_CR55","doi-asserted-by":"publisher","first-page":"1650130","DOI":"10.1142\/S021798491650130X","volume":"30","author":"G Gao","year":"2016","unstructured":"Gao, G., Wang, Y., Wang, D.: Multiparty semiquantum secret sharing based on rearranging orders of qubits. Mod. Phys. Lett. B 30(10), 1650130 (2016)","journal-title":"Mod. Phys. Lett. B"},{"issue":"10","key":"3194_CR56","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11128-017-1770-0","volume":"17","author":"Z Li","year":"2018","unstructured":"Li, Z., Li, Q., Liu, C., et al.: Limited resource semiquantum secret sharing. Quantum Inf. Process 17(10), 1\u201311 (2018)","journal-title":"Quantum Inf. Process"},{"key":"3194_CR57","unstructured":"Chou, W.H., Hwang, T., Gu, J.: Semi-quantum private comparison protocol under an almost-dishonest third party. http:\/\/arxiv.org\/pdf\/quant-ph\/160707961.pdf"},{"key":"3194_CR58","unstructured":"Thapliyala, K., Sharmab, R.D., Pathak, A.: Orthogonal-state-based and semi-quantum protocols for quantum private comparison in noisy environment. Int. J. Quant. Inform, (2016)"},{"issue":"6","key":"3194_CR59","doi-asserted-by":"publisher","first-page":"180","DOI":"10.1007\/s11128-020-02674-w","volume":"19","author":"L-Z Jiang","year":"2020","unstructured":"Jiang, L.-Z.: Semi-Quantum Private Comparison Based on Bell States. Quantum Inf. Process 19(6), 180 (2020)","journal-title":"Quantum Inf. Process"},{"issue":"12","key":"3194_CR60","doi-asserted-by":"publisher","first-page":"3819","DOI":"10.1007\/s10773-018-3894-0","volume":"57","author":"TY Ye","year":"2018","unstructured":"Ye, T.Y., Ye, C.Q.: Measure-Resend Semi-Quantum Private Comparison Without Entanglement. Int. J. Theor. Phys 57(12), 3819\u20133834 (2018)","journal-title":"Int. J. Theor. Phys"},{"key":"3194_CR61","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1007\/s11128-019-2251-4","volume":"18","author":"PH Lin","year":"2019","unstructured":"Lin, P.H., Hwang, T., Tsai, C.W.: Efficient semi-quantum private comparison using single photons. Quantum Inf. Process. 18, 207 (2019)","journal-title":"Quantum Inf. Process."},{"key":"3194_CR62","doi-asserted-by":"crossref","unstructured":"Yan, L.L., Zhang, S.B., Chang,Y., et\u00a0al.: Semi-quantum private comparison protocol with three-particle G-like states. Quantum Inf. Process, 20(1), (2021)","DOI":"10.1007\/s11128-020-02960-7"},{"issue":"18","key":"3194_CR63","doi-asserted-by":"publisher","first-page":"187901","DOI":"10.1103\/PhysRevLett.89.187901","volume":"89","author":"A Beveratos","year":"2002","unstructured":"Beveratos, A., Brouri, R., Gacoin, T., Villing, A., Poizat, J.-P., Grangier, P.: Single photon quantum cryptography. Phys. Rev. Lett 89(18), 187901 (2002)","journal-title":"Phys. Rev. Lett"},{"key":"3194_CR64","doi-asserted-by":"publisher","first-page":"16025","DOI":"10.1038\/npjqi.2016.25","volume":"2","author":"E Diamanti","year":"2016","unstructured":"Diamanti, E., Lo, H.-K., Qi, B., Yuan, Z.: Practical challenges in quantum key distribution. Npj. Quantum. Inf 2, 16025 (2016)","journal-title":"Npj. Quantum. Inf"},{"issue":"5","key":"3194_CR65","doi-asserted-by":"publisher","first-page":"057901","DOI":"10.1103\/PhysRevLett.91.057901","volume":"91","author":"WY Hwang","year":"2003","unstructured":"Hwang, W.Y.: Quantum key distribution with high loss: toward global secure communication. Phys. Rev. Lett 91(5), 057901 (2003)","journal-title":"Phys. Rev. Lett"},{"issue":"23","key":"3194_CR66","doi-asserted-by":"publisher","first-page":"230504","DOI":"10.1103\/PhysRevLett.94.230504","volume":"94","author":"HK Lo","year":"2005","unstructured":"Lo, H.K., Ma, X., Chen, K.: Decoy state quantum key distribution. Phys. Rev. Lett 94(23), 230504 (2005)","journal-title":"Phys. Rev. Lett"},{"issue":"23","key":"3194_CR67","doi-asserted-by":"publisher","first-page":"230503","DOI":"10.1103\/PhysRevLett.94.230503","volume":"94","author":"XB Wang","year":"2005","unstructured":"Wang, X.B.: Beating the photon-number-splitting attack in practical quantum cryptography. Phys. Rev. Lett 94(23), 230503 (2005)","journal-title":"Phys. Rev. Lett"},{"issue":"1","key":"3194_CR68","doi-asserted-by":"publisher","first-page":"010503","DOI":"10.1103\/PhysRevLett.98.010503","volume":"98","author":"D Rosenberg","year":"2007","unstructured":"Rosenberg, D., Harrington, J.W., Rice, P.R., Hiskett, P.A., Peterson, C.G., Hughes, R.J., Lita, A.E., Nam, S.W., Nordholt, J.E.: Long-distance decoy-state quantum key distribution in optical fiber. Phys. Rev. Lett 98(1), 010503 (2007)","journal-title":"Phys. Rev. Lett"},{"issue":"1","key":"3194_CR69","doi-asserted-by":"publisher","first-page":"6366","DOI":"10.1038\/s41598-017-06486-4","volume":"7","author":"XL Song","year":"2017","unstructured":"Song, X.L., Liu, Y.B., Deng, H.Y., Xiao, Y.G.: (t, n) threshold d-level quantum secret sharing. Sci. Rep. 7(1), 6366 (2017)","journal-title":"Sci. Rep."}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-021-03194-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11128-021-03194-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-021-03194-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,5]],"date-time":"2023-02-05T14:25:18Z","timestamp":1675607118000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11128-021-03194-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,8]]},"references-count":69,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2021,8]]}},"alternative-id":["3194"],"URL":"https:\/\/doi.org\/10.1007\/s11128-021-03194-x","relation":{},"ISSN":["1570-0755","1573-1332"],"issn-type":[{"type":"print","value":"1570-0755"},{"type":"electronic","value":"1573-1332"}],"subject":[],"published":{"date-parts":[[2021,8]]},"assertion":[{"value":"29 October 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 July 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 August 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"262"}}