{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,8]],"date-time":"2026-03-08T23:27:17Z","timestamp":1773012437038,"version":"3.50.1"},"reference-count":29,"publisher":"Springer Science and Business Media LLC","issue":"11","license":[{"start":{"date-parts":[[2021,10,26]],"date-time":"2021-10-26T00:00:00Z","timestamp":1635206400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,10,26]],"date-time":"2021-10-26T00:00:00Z","timestamp":1635206400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61962009"],"award-info":[{"award-number":["61962009"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["92046001"],"award-info":[{"award-number":["92046001"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"published-print":{"date-parts":[[2021,11]]},"DOI":"10.1007\/s11128-021-03294-8","type":"journal-article","created":{"date-parts":[[2021,10,26]],"date-time":"2021-10-26T08:05:47Z","timestamp":1635235547000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":23,"title":["An efficient semi-quantum private comparison without pre-shared keys"],"prefix":"10.1007","volume":"20","author":[{"given":"Yuan","family":"Tian","sequence":"first","affiliation":[]},{"given":"Jian","family":"Li","sequence":"additional","affiliation":[]},{"given":"Xiu-Bo","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Chong-Qiang","family":"Ye","sequence":"additional","affiliation":[]},{"given":"Chao-Yang","family":"Li","sequence":"additional","affiliation":[]},{"given":"Yan-Yan","family":"Hou","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,10,26]]},"reference":[{"key":"3294_CR1","unstructured":"Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. In: Proceedings of the IEEE International Conference on Computers, Systems and Signal Processing, Bangalore, pp. 175\u2013179 (1984)"},{"issue":"10","key":"3294_CR2","doi-asserted-by":"publisher","first-page":"669","DOI":"10.1038\/s41578-019-0136-x","volume":"4","author":"X Liu","year":"2019","unstructured":"Liu, X., Hersam, M.C.: 2D materials for quantum information science. Nat. Rev. Mater. 4(10), 669\u2013684 (2019)","journal-title":"Nat. Rev. Mater."},{"issue":"3","key":"3294_CR3","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.65.032302","volume":"65","author":"GL Long","year":"2002","unstructured":"Long, G.L., Liu, X.S.: Theoretically efficient high-capacity quantum key distribution scheme. Phys. Rev. A 65(3), 032302 (2002)","journal-title":"Phys. Rev. A"},{"key":"3294_CR4","doi-asserted-by":"publisher","first-page":"6915","DOI":"10.1109\/ACCESS.2018.2890166","volume":"7","author":"LL Li","year":"2019","unstructured":"Li, L.L., Li, J., Li, C.Y., et al.: Deterministic quantum secure direct communication protocol based on Omega state. IEEE Access 7, 6915\u20136921 (2019)","journal-title":"IEEE Access"},{"issue":"8","key":"3294_CR5","doi-asserted-by":"publisher","first-page":"668","DOI":"10.1038\/s41565-020-0714-5","volume":"15","author":"Y Dong","year":"2020","unstructured":"Dong, Y., Wang, Y.K., Yuan, F., et al.: Bipolar-shell resurfacing for blue LEDs based on strongly confined perovskite quantum dots. Nat. Nanotechnol. 15(8), 668\u2013674 (2020)","journal-title":"Nat. Nanotechnol."},{"issue":"6","key":"3294_CR6","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.99.062311","volume":"99","author":"BP Williams","year":"2019","unstructured":"Williams, B.P., Lukens, J.M., Peters, N.A., et al.: Quantum secret sharing with polarization- entangled photon pairs. Phys. Rev. A 99(6), 062311 (2019)","journal-title":"Phys. Rev. A"},{"key":"3294_CR7","doi-asserted-by":"crossref","unstructured":"Yao, A.C.: Protocols for secure computation. In: Proceeding of the 23rd Annual Symposium on Foundations of Computer Science, pp. 160\u2013164 (1982)","DOI":"10.1109\/SFCS.1982.38"},{"issue":"8","key":"3294_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11128-018-1967-x","volume":"17","author":"Z Dou","year":"2018","unstructured":"Dou, Z., Xu, G., Chen, X.B., et al.: Rational protocol of quantum secure multi-party computation. Quantum Inf. Process. 17(8), 1\u201322 (2018)","journal-title":"Quantum Inf. Process."},{"issue":"2","key":"3294_CR9","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1137\/S0036144598347011","volume":"41","author":"PW Shor","year":"1999","unstructured":"Shor, P.W.: Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. Siam Rev. 41(2), 303\u2013332 (1999)","journal-title":"Siam Rev."},{"issue":"5","key":"3294_CR10","first-page":"30","volume":"42","author":"YG Yang","year":"2009","unstructured":"Yang, Y.G., Wen, Q.Y.: An efficient two-party quantum private comparison protocol with decoy photons and two-photon entanglement. J. Phys. Math. Theor. 42(5), 30 (2009)","journal-title":"J. Phys. Math. Theor."},{"key":"3294_CR11","doi-asserted-by":"publisher","first-page":"2191","DOI":"10.1007\/s11128-012-0517-1","volume":"12","author":"YB Li","year":"2013","unstructured":"Li, Y.B., Qin, S.J., Yuan, Z., et al.: Quantum private comparison against decoherence noise. Quantum Inf. Process. 12, 2191\u20132205 (2013)","journal-title":"Quantum Inf. Process."},{"key":"3294_CR12","doi-asserted-by":"publisher","first-page":"2818","DOI":"10.1007\/s10773-013-1573-8","volume":"52","author":"YB Li","year":"2013","unstructured":"Li, Y.B., Wang, T.Y., Chen, H.Y., et al.: Fault-tolerate quantum private comparison based on GHZ states and ECC. Int. J. Theor. Phys. 52, 2818\u20132825 (2013)","journal-title":"Int. J. Theor. Phys."},{"issue":"5","key":"3294_CR13","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1007\/s11128-019-2266-x","volume":"18","author":"CY Li","year":"2019","unstructured":"Li, C.Y., Chen, X.B., Li, H.J., et al.: Efficient quantum private comparison protocol based on the entanglement swapping between four-qubit cluster state and extended Bell state. Quantum Inf. Process. 18(5), 158 (2019)","journal-title":"Quantum Inf. Process."},{"issue":"20","key":"3294_CR14","doi-asserted-by":"publisher","first-page":"2881","DOI":"10.1103\/PhysRevLett.69.2881","volume":"69","author":"CH Bennett","year":"1992","unstructured":"Bennett, C.H., Wiesner, S.J.: Communication via one- and two-particle operators on Einstein-Podolsky-Rosen states. Phys. Rev. Lett. 69(20), 2881\u20132884 (1992)","journal-title":"Phys. Rev. Lett."},{"issue":"14","key":"3294_CR15","first-page":"140501.1","volume":"99","author":"M Boyer","year":"2007","unstructured":"Boyer, M., Kenigsberg, D., Mor, T.: Quantum key distribution with classical bob. Phys. Rev. Lett. 99(14), 140501.1-140501.4 (2007)","journal-title":"Phys. Rev. Lett."},{"issue":"9","key":"3294_CR16","first-page":"1","volume":"18","author":"MM Wang","year":"2019","unstructured":"Wang, M.M., Gong, L.M., Shao, L.H.: Efficient semi-quantum key distribution without entanglement. Quantum Inf. Process. 18(9), 1\u201310 (2019)","journal-title":"Quantum Inf. Process."},{"key":"3294_CR17","first-page":"563","volume":"7\u20138","author":"Y Tian","year":"2021","unstructured":"Tian, Y., Li, J., Yuan, K.G., et al.: An efficient semi-quantum key distribution protocol based on EPR and single-particle hybridization. Quantum Inf. Comput. 7\u20138, 563\u2013576 (2021)","journal-title":"Quantum Inf. Comput."},{"issue":"4","key":"3294_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11128-020-02623-7","volume":"19","author":"CW Yang","year":"2020","unstructured":"Yang, C.W., Tsai, C.W.: Advanced semi-quantum secure direct communication protocol based on bell states against flip attack. Quantum Inf. Process. 19(4), 1\u201313 (2020)","journal-title":"Quantum Inf. Process."},{"issue":"2","key":"3294_CR19","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.82.022303","volume":"82","author":"Q Li","year":"2010","unstructured":"Li, Q., Chan, W.H., Long, D.Y.: Semi-quantum secret sharing using entangled states. Phys. Rev. A 82(2), 022303 (2010)","journal-title":"Phys. Rev. A"},{"key":"3294_CR20","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1007\/s11128-021-03157-2","volume":"20","author":"Y Tian","year":"2021","unstructured":"Tian, Y., Li, J., Chen, X.B., et al.: An efficient semi-quantum secret sharing protocol of specific bits. Quantum Inf. Process. 20, 217 (2021)","journal-title":"Quantum Inf. Process."},{"key":"3294_CR21","unstructured":"Chou, W., H., Hwang, T., Gu, J.: Semi-quantum private comparison protocol under an almost-dishonest third party. http:\/\/arxiv.org\/pdf\/quant-ph\/160707961.pdf (2016)"},{"issue":"5","key":"3294_CR22","doi-asserted-by":"publisher","first-page":"1850047","DOI":"10.1142\/S0219749918500478","volume":"16","author":"K Thapliyal","year":"2016","unstructured":"Thapliyal, K., Sharma, R.D., Pathak, A.: Orthogonal-state-based and semi-quantum protocols for quantum private comparison in noisy environment. Int. J. Quantum Inf. 16(5), 1850047 (2016)","journal-title":"Int. J. Quantum Inf."},{"issue":"10","key":"3294_CR23","doi-asserted-by":"publisher","first-page":"3048","DOI":"10.1007\/s10773-018-3823-2","volume":"57","author":"YF Lang","year":"2018","unstructured":"Lang, Y.F.: Semi-quantum private comparison using single photons. Int. J. Theor. Phys. 57(10), 3048\u20133055 (2018)","journal-title":"Int. J. Theor. Phys."},{"issue":"12","key":"3294_CR24","doi-asserted-by":"publisher","first-page":"3819","DOI":"10.1007\/s10773-018-3894-0","volume":"57","author":"TY Ye","year":"2018","unstructured":"Ye, T.Y., Ye, C.Q.: Measure-resend semi-quantum private comparison without entanglement. Int. J. Theor. Phys. 57(12), 3819\u20133834 (2018)","journal-title":"Int. J. Theor. Phys."},{"key":"3294_CR25","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11128-018-2112-6","volume":"18","author":"Efficient semi-quantum private comparison using single photons","year":"2019","unstructured":"Efficient semi-quantum private comparison using single photons: Lin, P., H., Hwang, T., Tsai, C., W. Quantum Inf. Process. 18, 1\u201314 (2019)","journal-title":"Quantum Inf. Process."},{"issue":"1","key":"3294_CR26","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11128-015-1195-6","volume":"20","author":"LL Yan","year":"2021","unstructured":"Yan, L.L., Zhang, S.B., Chang, Y., et al.: Semi-quantum private comparison protocol with three-particle G-like states. Quantum Inf. Process. 20(1), 1\u201316 (2021)","journal-title":"Quantum Inf. Process."},{"issue":"5","key":"3294_CR27","doi-asserted-by":"publisher","first-page":"1981","DOI":"10.1007\/s11128-012-0507-3","volume":"12","author":"WW Zhang","year":"2013","unstructured":"Zhang, W.W., Zhang, K.J.: Cryptanalysis and improvement of the quantum private comparison protocol with semi-honest third party. Quantum Inf. Process. 12(5), 1981\u20131990 (2013)","journal-title":"Quantum Inf. Process."},{"issue":"2","key":"3294_CR28","doi-asserted-by":"publisher","first-page":"877","DOI":"10.1007\/s11128-012-0433-4","volume":"12","author":"YG Yang","year":"2013","unstructured":"Yang, Y.G., Xia, J., Jia, X., et al.: Comment on quantum private comparison protocols with a semi-honest third party. Quantum Inf. Process. 12(2), 877\u2013885 (2013)","journal-title":"Quantum Inf. Process."},{"issue":"26","key":"3294_CR29","doi-asserted-by":"publisher","first-page":"5635","DOI":"10.1103\/PhysRevLett.85.5635","volume":"85","author":"A Cabello","year":"2000","unstructured":"Cabello, A.: Quantum key distribution in the Holevo limit. Phys. Rev. Lett. 85(26), 5635\u20135638 (2000)","journal-title":"Phys. Rev. Lett."}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-021-03294-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11128-021-03294-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-021-03294-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,23]],"date-time":"2021-11-23T20:10:34Z","timestamp":1637698234000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11128-021-03294-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,26]]},"references-count":29,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2021,11]]}},"alternative-id":["3294"],"URL":"https:\/\/doi.org\/10.1007\/s11128-021-03294-8","relation":{},"ISSN":["1570-0755","1573-1332"],"issn-type":[{"value":"1570-0755","type":"print"},{"value":"1573-1332","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,10,26]]},"assertion":[{"value":"7 May 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 October 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 October 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"360"}}