{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,15]],"date-time":"2026-01-15T23:58:40Z","timestamp":1768521520150,"version":"3.49.0"},"reference-count":78,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2021,12,21]],"date-time":"2021-12-21T00:00:00Z","timestamp":1640044800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,12,21]],"date-time":"2021-12-21T00:00:00Z","timestamp":1640044800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"published-print":{"date-parts":[[2022,1]]},"DOI":"10.1007\/s11128-021-03330-7","type":"journal-article","created":{"date-parts":[[2021,12,21]],"date-time":"2021-12-21T08:02:25Z","timestamp":1640073745000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Deterministic secure quantum communication based on spatial encoding"],"prefix":"10.1007","volume":"21","author":[{"given":"Jie","family":"Li","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4040-2448","authenticated-orcid":false,"given":"Yu-Guang","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Jian","family":"Li","sequence":"additional","affiliation":[]},{"given":"Yue-Chao","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Yong-Li","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Yi-Hua","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Wei-Min","family":"Shi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,12,21]]},"reference":[{"issue":"3","key":"3330_CR1","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1007\/s11467-007-0050-3","volume":"2","author":"G-L Long","year":"2007","unstructured":"Long, G.-L., Deng, F.-G., Wang, C., et al.: Quantum secure direct communication and deterministic secure quantum communication. Front. Phys. China 2(3), 251\u2013272 (2007)","journal-title":"Front. Phys. China"},{"issue":"1","key":"3330_CR2","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1103\/PhysRevA.60.157","volume":"60","author":"K Shimizu","year":"1999","unstructured":"Shimizu, K., Imoto, N.: Communication channels secured from eavesdropping via transmission of photonic Bell states. Phys. Rev. A 60(1), 157\u2013166 (1999)","journal-title":"Phys. Rev. A"},{"issue":"28","key":"3330_CR3","doi-asserted-by":"publisher","first-page":"L407","DOI":"10.1088\/0305-4470\/35\/28\/103","volume":"35","author":"A Beige","year":"2002","unstructured":"Beige, A., Englert, B.-G., Kurtsiefer, C., Weinfurter, H.: Secure communication with single photon two-qubit states. J. Phys. A: Math. Gen. 35(28), L407\u2013L413 (2002)","journal-title":"J. Phys. A: Math. Gen."},{"issue":"18","key":"3330_CR4","doi-asserted-by":"publisher","first-page":"187902","DOI":"10.1103\/PhysRevLett.89.187902","volume":"89","author":"K Bostr\u00f6m","year":"2002","unstructured":"Bostr\u00f6m, K., Felbinger, T.: Deterministic secure direct communication using entanglement. Phys. Rev. Lett. 89(18), 187902 (2002)","journal-title":"Phys. Rev. Lett."},{"issue":"1","key":"3330_CR5","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1140\/epjb\/e2004-00296-4","volume":"41","author":"F-L Yan","year":"2004","unstructured":"Yan, F.-L., Zhang, X.-Q.: A scheme for secure direct communication using EPR pairs and teleportation. Euro. Phys. J. B 41(1), 75\u201378 (2004)","journal-title":"Euro. Phys. J. B"},{"issue":"25","key":"3330_CR6","doi-asserted-by":"publisher","first-page":"5761","DOI":"10.1088\/0305-4470\/38\/25\/011","volume":"38","author":"T Gao","year":"2005","unstructured":"Gao, T., Yan, F.L., Wang, Z.X.: Deterministic secure direct communication using GHZ states and swapping quantum entanglement. J. Phys. A-Math. Gen. 38(25), 5761\u20135770 (2005)","journal-title":"J. Phys. A-Math. Gen."},{"issue":"12","key":"3330_CR7","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1007\/s11128-017-1736-2","volume":"16","author":"C Shukla","year":"2017","unstructured":"Shukla, C., Thapliyal, K., Pathak, A.: Semi-quantum communication: protocols for key agreement, controlled secure direct communication and dialogue. Quantum Inf. Process. 16(12), 295 (2017)","journal-title":"Quantum Inf. Process."},{"issue":"5","key":"3330_CR8","doi-asserted-by":"publisher","first-page":"1767","DOI":"10.1007\/s10773-021-04797-x","volume":"60","author":"R-G Zhou","year":"2021","unstructured":"Zhou, R.-G., Zhang, X.X.: Controlled deterministic secure semi-quantum communication. Int. J. Theor. Phys. 60(5), 1767\u20131782 (2021)","journal-title":"Int. J. Theor. Phys."},{"key":"3330_CR9","doi-asserted-by":"publisher","first-page":"44934","DOI":"10.1038\/srep44934","volume":"7","author":"D Jiang","year":"2017","unstructured":"Jiang, D., Chen, Y.Y., Gu, X.M., Xie, L., Chen, L.J.: Deterministic secure quantum communication using a single d-level system. Sci. Rep. 7, 44934 (2017)","journal-title":"Sci. Rep."},{"key":"3330_CR10","doi-asserted-by":"crossref","unstructured":"Yang, Y.-G., Dong, J.-R., Yang, Y.-L., Li, J., Zhou, Y.-H., Shi, W.-M.: High-capacity measurement-device-independent\u00a0deterministic\u00a0secure quantum\u00a0communication. Quantum Inf. Process. 20(6), 203 (2021)","DOI":"10.1007\/s11128-021-03129-6"},{"issue":"1","key":"3330_CR11","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1088\/0256-307X\/22\/1\/006","volume":"22","author":"ZX Man","year":"2005","unstructured":"Man, Z.X., Zhang, Z.J., Li, Y.: Deterministic secure direct communication by using swapping quantum entanglement and local unitary operations. Chin. Phys. Lett. 22(1), 18\u201321 (2005)","journal-title":"Chin. Phys. Lett."},{"issue":"14","key":"3330_CR12","doi-asserted-by":"publisher","first-page":"140501","DOI":"10.1103\/PhysRevLett.94.140501","volume":"94","author":"M Lucamarini","year":"2005","unstructured":"Lucamarini, M., Mancini, S.: Secure deterministic communication without entanglement. Phys. Rev. Lett. 94(14), 140501 (2005)","journal-title":"Phys. Rev. Lett."},{"issue":"2","key":"3330_CR13","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1016\/j.physleta.2006.05.007","volume":"358","author":"JS Shaari","year":"2006","unstructured":"Shaari, J.S., Lucamarini, M., Wahiddin, M.R.B.: Deterministic six states protocol for quantum communication. Phys. Lett. A 358(2), 85\u201390 (2006)","journal-title":"Phys. Lett. A"},{"issue":"4","key":"3330_CR14","first-page":"1354","volume":"49","author":"X-H Li","year":"2006","unstructured":"Li, X.-H., Deng, F.-G., Li, C.-Y., et al.: Deterministic secure quantum communication without maximally entangled states. J. Korean Phys. Soc. 49(4), 1354\u20131359 (2006)","journal-title":"J. Korean Phys. Soc."},{"issue":"4","key":"3330_CR15","doi-asserted-by":"publisher","first-page":"601","DOI":"10.1088\/0256-307X\/21\/4\/003","volume":"21","author":"Q-Y Cai","year":"2004","unstructured":"Cai, Q.-Y., Li, B.-W.: Deterministic secure communication without using entanglement. Chin. Phys. Lett. 21(4), 601\u2013603 (2004)","journal-title":"Chin. Phys. Lett."},{"issue":"3","key":"3330_CR16","doi-asserted-by":"publisher","first-page":"689","DOI":"10.1142\/S0219749909004530","volume":"7","author":"H Yuan","year":"2009","unstructured":"Yuan, H., Song, J.: An efficient deterministic secure quantum communication scheme with Cluster state. Int. J. Quant. Inform. 7(3), 689\u2013696 (2009)","journal-title":"Int. J. Quant. Inform."},{"key":"3330_CR17","doi-asserted-by":"publisher","first-page":"1903","DOI":"10.1007\/s11433-013-5191-5","volume":"56","author":"CW Tsai","year":"2013","unstructured":"Tsai, C.W., Hwang, T.: Deterministic quantum communication using the symmetric W state. Sci. Chin. Ser. G-Phys. Mech. Astron. 56, 1903\u20131908 (2013)","journal-title":"Sci. Chin. Ser. G-Phys. Mech. Astron."},{"issue":"8","key":"3330_CR18","doi-asserted-by":"publisher","first-page":"2558","DOI":"10.1007\/s10773-014-2053-5","volume":"53","author":"H Yuan","year":"2014","unstructured":"Yuan, H., Zhang, Q., Hong, L., et al.: Scheme for deterministic secure quantum communication with three-qubit GHZ state. Int. J. Theor. Phys. 53(8), 2558\u20132564 (2014)","journal-title":"Int. J. Theor. Phys."},{"issue":"9","key":"3330_CR19","doi-asserted-by":"publisher","first-page":"2831","DOI":"10.1007\/s10773-018-3803-6","volume":"57","author":"Y-G Hu","year":"2018","unstructured":"Hu, Y.-G.: Deterministic secure quantum communication with four-qubit GHZ states. Int. J. Theor. Phys. 57(9), 2831\u20132842 (2018)","journal-title":"Int. J. Theor. Phys."},{"issue":"12","key":"3330_CR20","doi-asserted-by":"publisher","first-page":"3808","DOI":"10.1007\/s10773-018-3893-1","volume":"57","author":"C-L Tsai","year":"2018","unstructured":"Tsai, C.-L., Hwang, T.: Secure quantum communication scheme for six-qubit decoherence free states. Int. J. Theor. Phys. 57(12), 3808\u20133818 (2018)","journal-title":"Int. J. Theor. Phys."},{"issue":"11","key":"3330_CR21","doi-asserted-by":"publisher","first-page":"3658","DOI":"10.1007\/s10773-019-04234-0","volume":"58","author":"H Yuan","year":"2019","unstructured":"Yuan, H., Song, J., Liu, X.-Y., Yin, X.-F.: Deterministic secure four-qubit GHZ states three step protocol for quantum communication. Int. J. Theor. Phys. 58(11), 3658\u20133666 (2019)","journal-title":"Int. J. Theor. Phys."},{"issue":"9","key":"3330_CR22","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1140\/epjd\/e2020-10351-9","volume":"74","author":"Z Huang","year":"2020","unstructured":"Huang, Z., He, Z.: Deterministic secure quantum communication under vacuum fluctuation. Euro. Phys. J. D 74(9), 176 (2020)","journal-title":"Euro. Phys. J. D"},{"key":"3330_CR23","doi-asserted-by":"crossref","unstructured":"Joy, D., Surendran, S. P., Sabir, M.: Efficient deterministic secure quantum communication protocols using multipartite entangled states. Quantum Inf. Process. 16(6), 157 (2017)","DOI":"10.1007\/s11128-017-1613-z"},{"key":"3330_CR24","doi-asserted-by":"crossref","unstructured":"Elsayed, T.A.: Deterministic secure quantum communication with and without entanglement. Phys. Scr. 96(2), 025101 (2021)","DOI":"10.1088\/1402-4896\/abce34"},{"key":"3330_CR25","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1007\/s10773-012-1294-4","volume":"52","author":"QN Zhang","year":"2013","unstructured":"Zhang, Q.N., Li, C.C., Li, Y.H., Nie, Y.Y.: Quantum secure direct communication based on four-qubit Cluster states. Int. J. Theor. Phys. 52, 22\u201327 (2013)","journal-title":"Int. J. Theor. Phys."},{"key":"3330_CR26","doi-asserted-by":"publisher","first-page":"2835","DOI":"10.1007\/s11434-014-0333-3","volume":"59","author":"Y Chang","year":"2014","unstructured":"Chang, Y., Zhang, S.B., Yan, L.L., Li, J.: Deterministic secure quantum communication and authentication protocol based on three-particle W state and quantum one-time pad. Chin. Sci. Bull. 59, 2835\u20132840 (2014)","journal-title":"Chin. Sci. Bull."},{"issue":"9","key":"3330_CR27","doi-asserted-by":"publisher","first-page":"2810","DOI":"10.1007\/s10773-019-04165-w","volume":"58","author":"Y-G Yang","year":"2019","unstructured":"Yang, Y.-G., Gao, S., Zhou, Y.-H., et al.: New secure quantum dialogue protocols over collective noisy channels. Int. J. Theor. Phys. 58(9), 2810\u20132822 (2019)","journal-title":"Int. J. Theor. Phys."},{"key":"3330_CR28","doi-asserted-by":"publisher","first-page":"1913","DOI":"10.1007\/s11433-009-0303-y","volume":"52","author":"B Gu","year":"2009","unstructured":"Gu, B., Pei, S.X., Song, B., Zhong, K.: Deterministic secure quantum communication over a collective-noise channel. Sci. Chin. Ser. G: Phys. Mech. Astron. 52, 1913\u20131918 (2009)","journal-title":"Sci. Chin. Ser. G: Phys. Mech. Astron."},{"key":"3330_CR29","doi-asserted-by":"publisher","first-page":"2565","DOI":"10.1007\/s10773-014-2054-4","volume":"53","author":"H Yuan","year":"2014","unstructured":"Yuan, H., Zhang, Q., Hong, L., Yin, W.-J., Xu, D.: Faithful one-way trip deterministic secure quantum communication scheme against collective rotating noise based on order rearrangement of photon pairs. Int. J. Theor. Phys. 53, 2565\u20132570 (2014)","journal-title":"Int. J. Theor. Phys."},{"key":"3330_CR30","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1103\/RevModPhys.74.145","volume":"74","author":"N Gisin","year":"2002","unstructured":"Gisin, N., Ribordy, G., Tittel, W., Zbinden, H.: Quantum cryptography. Rev. Mod. Phys. 74, 145\u2013195 (2002)","journal-title":"Rev. Mod. Phys."},{"key":"3330_CR31","doi-asserted-by":"publisher","first-page":"044302","DOI":"10.1103\/PhysRevA.72.044302","volume":"72","author":"FG Deng","year":"2005","unstructured":"Deng, F.G., Li, X.H., Zhou, H.Y., Zhang, Z.: Improving the security of multiparty quantum secret sharing against Trojan horse attack. Phys. Rev. A 72, 044302 (2005)","journal-title":"Phys. Rev. A"},{"key":"3330_CR32","doi-asserted-by":"publisher","first-page":"054302","DOI":"10.1103\/PhysRevA.74.054302","volume":"74","author":"XH Li","year":"2006","unstructured":"Li, X.H., Deng, F.G., Zhou, H.Y.: Improving the security of secure direct communication based on the secret transmitting order of particles. Phys. Rev. A 74, 054302 (2006)","journal-title":"Phys. Rev. A"},{"key":"3330_CR33","doi-asserted-by":"publisher","first-page":"2050","DOI":"10.1126\/science.283.5410.2050","volume":"283","author":"HK Lo","year":"1999","unstructured":"Lo, H.K., Chau, H.F.: Unconditional security of quantum key distribution over arbitrarily long distances. Science 283, 2050\u20132056 (1999)","journal-title":"Science"},{"key":"3330_CR34","first-page":"1","volume":"3","author":"RJ Sadlier","year":"2016","unstructured":"Sadlier, R.J., Humble, T.S.: superdense coding interleaved with forward error correction. Quantum Meas. Quantum Metrol. 3, 1\u20138 (2016)","journal-title":"Quantum Meas. Quantum Metrol."},{"key":"3330_CR35","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1038\/s41377-019-0132-3","volume":"8","author":"R Qi","year":"2019","unstructured":"Qi, R., Sun, Z., Lin, Z., Niu, P., Hao, W., Song, L., Huang, Q., Gao, J., Yin, L., Long, G.L.: Implementation and security analysis of practical quantum secure direct communication. Light Sci. Appl. 8, 22 (2019)","journal-title":"Light Sci. Appl."},{"key":"3330_CR36","doi-asserted-by":"publisher","first-page":"1900050","DOI":"10.1002\/qute.201900050","volume":"2","author":"F Massa","year":"2019","unstructured":"Massa, F., Moqanaki, A., Baumeler, \u00c4., Del Santo, F., Kettlewell, J.A., Dakic, B., Walther, P.: Experimental two-way communication with one photon. Adv. Quantum Technol. 2, 1900050 (2019)","journal-title":"Adv. Quantum Technol."},{"key":"3330_CR37","doi-asserted-by":"publisher","first-page":"5635","DOI":"10.1103\/PhysRevLett.85.5635","volume":"85","author":"A Cabello","year":"2000","unstructured":"Cabello, A.: Quantum key distribution in the Holevo limit. Phys. Rev. Lett. 85, 5635 (2000)","journal-title":"Phys. Rev. Lett."},{"key":"3330_CR38","doi-asserted-by":"crossref","unstructured":"Hu, J.Y., Yu, B., Jing, M. Y., Xiao, L.T., Jia, S.T., Qin, G.Q., and Long, G. L.: Experimental quantum secure direct communication with single photons. Light Sci. Appl. 5, e16144 (2016)","DOI":"10.1038\/lsa.2016.144"},{"key":"3330_CR39","unstructured":"Sun, Z., Qi, R., Lin, Z., Yin, L., Long, G., and Lu, J.: Proc. IEEE Globecom Conf. Workshops (Piscataway, NJ: IEEE), pp 1\u20136 (2018)"},{"key":"3330_CR40","doi-asserted-by":"publisher","first-page":"910","DOI":"10.1007\/s10773-014-2286-3","volume":"54","author":"Y-G Yang","year":"2015","unstructured":"Yang, Y.-G., Sun, S.-J., Wang, Y.: Quantum oblivious transfer based on a quantum symmetrically private information retrieval protocol. Int. J. Theor. Phys. 54, 910\u2013916 (2015)","journal-title":"Int. J. Theor. Phys."},{"key":"3330_CR41","doi-asserted-by":"publisher","first-page":"3206","DOI":"10.1016\/j.ijleo.2015.07.149","volume":"126","author":"Y-G Yang","year":"2015","unstructured":"Yang, Y.-G., Sun, S.-J., Pan, Q.-X., Xu, P.: Reductions between private information retrieval and oblivious transfer at the quantum level. Optik 126, 3206\u20133209 (2015)","journal-title":"Optik"},{"key":"3330_CR42","doi-asserted-by":"publisher","first-page":"3838","DOI":"10.1016\/j.ijleo.2015.07.151","volume":"126","author":"Y-G Yang","year":"2015","unstructured":"Yang, Y.-G., Sun, S.-J., Pan, Q.-X., Xu, P.: Quantum oblivious transfer based on unambiguous set discrimination. Optik 126, 3838\u20133843 (2015)","journal-title":"Optik"},{"key":"3330_CR43","doi-asserted-by":"publisher","first-page":"3031","DOI":"10.1007\/s11128-015-1013-1","volume":"14","author":"Y-G Yang","year":"2015","unstructured":"Yang, Y.-G., Yang, R., Lei, H., Shi, W.-M., Zhou, Y.-H.: Quantum oblivious transfer with relaxed constraints on the receiver. Quantum Inf. Process. 14, 3031\u20133040 (2015)","journal-title":"Quantum Inf. Process."},{"issue":"18","key":"3330_CR44","doi-asserted-by":"publisher","first-page":"5409","DOI":"10.1016\/j.ijleo.2014.06.023","volume":"125","author":"Y-G Yang","year":"2014","unstructured":"Yang, Y.-G., Xu, P., Tian, J., et al.: Quantum oblivious transfer with an untrusted third party. Optik 125(18), 5409\u20135413 (2014)","journal-title":"Optik"},{"issue":"4","key":"3330_CR45","doi-asserted-by":"publisher","first-page":"1286","DOI":"10.1007\/s10773-016-3270-x","volume":"56","author":"Y-G Yang","year":"2017","unstructured":"Yang, Y.-G., Yang, R., Cao, W.-F., et al.: Flexible quantum oblivious transfer. Int. J. Theor. Phys. 56(4), 1286\u20131297 (2017)","journal-title":"Int. J. Theor. Phys."},{"key":"3330_CR46","doi-asserted-by":"publisher","first-page":"1829","DOI":"10.1103\/PhysRevA.59.1829","volume":"59","author":"M Hillery","year":"1999","unstructured":"Hillery, M., Bu\u017eek, V., Berthiaume, A.: Quantum secret sharing. Phys. Rev. A 59, 1829\u20131834 (1999)","journal-title":"Phys. Rev. A"},{"key":"3330_CR47","doi-asserted-by":"publisher","first-page":"162","DOI":"10.1103\/PhysRevA.59.162","volume":"59","author":"A Karlsson","year":"1999","unstructured":"Karlsson, A., Koashi, M., Imoto, N.: Quantum entanglement for secret sharing and secret splitting. Phys. Rev. A 59, 162\u2013168 (1999)","journal-title":"Phys. Rev. A"},{"key":"3330_CR48","doi-asserted-by":"publisher","DOI":"10.1002\/que2.76","volume":"3","author":"Y-G Yang","year":"2021","unstructured":"Yang, Y.-G., Liu, X.-X., Gao, S., Zhou, Y.-H., Shi, W.-M., Li, J., Li, D.: Detector-device-independent quantum secret sharing based on hyper-encoding and single-photon Bell-state measurement. Quantum Eng. 3, (2021)","journal-title":"Quantum Eng"},{"issue":"5","key":"3330_CR49","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1007\/s11128-019-2319-1","volume":"18","author":"Y-G Yang","year":"2019","unstructured":"Yang, Y.-G., Gao, S., Li, D., et al.: Three-party quantum secret sharing against collective noise. Quantum Inf. Process. 18(5), 215 (2019)","journal-title":"Quantum Inf. Process."},{"issue":"6","key":"3330_CR50","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1007\/s11433-021-1692-5","volume":"64","author":"Y-G Yang","year":"2021","unstructured":"Yang, Y.-G., Wang, Y.C., Yang, Y.L., Chen, X.B., Li, D., Y.-H., Shi, W.-M.: Participant attack on the deterministic measurement-device-independent quantum secret sharing protocol. Sci. China Phys. Mech. Astron. 64(6), 121\u2013124 (2021)","journal-title":"Sci. China Phys. Mech. Astron."},{"key":"3330_CR51","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1007\/s11128-021-03141-w","volume":"20","author":"Y-G Yang","year":"2021","unstructured":"Yang, Y.-G., Liu, X.-X., Gao, S., Chen, X.B., Li, D., Zhou, Y.-H., Shi, W.-M.: A stronger participant attack on the measurement-device-independent protocol for deterministic quantum secret sharing. Quantum Inf. Process. 20, 223 (2021)","journal-title":"Quantum Inf. Process."},{"issue":"4","key":"3330_CR52","doi-asserted-by":"publisher","first-page":"1202","DOI":"10.1007\/s10773-019-04012-y","volume":"58","author":"W-F Cao","year":"2019","unstructured":"Cao, W.-F., Yang, Y.-G.: Verifiable quantum secret sharing protocols based on four-qubit entangled states. Int. J. Theor. Phys. 58(4), 1202\u20131214 (2019). https:\/\/link.springer.com\/journal\/10773","journal-title":"Int. J. Theor. Phys."},{"key":"3330_CR53","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.68.042317","volume":"68","author":"FG Deng","year":"2003","unstructured":"Deng, F.G., Long, G.L., Liu, X.S.: Two-step quantum direct communication protocol using the Einstein\u2013Podolsky\u2013Rosen pair block. Phys. Rev. A 68, 042317 (2003)","journal-title":"Phys. Rev. A"},{"key":"3330_CR54","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.69.052319","volume":"69","author":"FG Deng","year":"2004","unstructured":"Deng, F.G., Long, G.L.: Secure direct communication with a quantum one-time pad. Phys. Rev. A 69, 052319 (2004)","journal-title":"Phys. Rev. A"},{"issue":"7","key":"3330_CR55","doi-asserted-by":"publisher","first-page":"1271","DOI":"10.1007\/s11433-010-3210-3","volume":"53","author":"W-F Cao","year":"2010","unstructured":"Cao, W.-F., Yang, Y.-G., Wen, Q.-Y.: Quantum secure direct communication with cluster states. Sci. China Ser. G-Phys. Astron. 53(7), 1271\u20131275 (2010)","journal-title":"Sci. China Ser. G-Phys. Astron."},{"key":"3330_CR56","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.118.220501","volume":"118","author":"W Zhang","year":"2017","unstructured":"Zhang, W., Ding, D.S., Sheng, Y.-B., et al.: Quantum secure direct communication with quantum memory. Phys. Rev. Lett. 118, 220501 (2017)","journal-title":"Phys. Rev. Lett."},{"issue":"9","key":"3330_CR57","doi-asserted-by":"publisher","first-page":"2810","DOI":"10.1007\/s10773-019-04165-w","volume":"58","author":"Y-G Yang","year":"2019","unstructured":"Yang, Y.-G., Gao, S., Zhou, Y.-H., et al.: New secure quantum dialogue protocols over collective noisy channels. Int. J. Theor. Phys. 58(9), 2810\u20132822 (2019)","journal-title":"Int. J. Theor. Phys."},{"issue":"4","key":"3330_CR58","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.65.042312","volume":"65","author":"G Zeng","year":"2002","unstructured":"Zeng, G., Keitel, C.H.: Arbitrated quantum-signature scheme. Phys. Rev. A 65(4), 042312 (2002)","journal-title":"Phys. Rev. A"},{"issue":"5","key":"3330_CR59","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.79.054307","volume":"79","author":"Q Li","year":"2009","unstructured":"Li, Q., Chan, W.H., Long, D.Y.: Arbitrated quantum signature scheme using Bell states. Phys. Rev. A. 79(5), 054307 (2009)","journal-title":"Phys. Rev. A."},{"issue":"2","key":"3330_CR60","doi-asserted-by":"publisher","first-page":"455","DOI":"10.1007\/s10773-011-0922-8","volume":"51","author":"XR Yin","year":"2012","unstructured":"Yin, X.R., Ma, W.P., Liu, W.Y.: A blind quantum signature scheme with x-type entangled states. Int. J. Theor. Phys. 51(2), 455\u2013461 (2012)","journal-title":"Int. J. Theor. Phys."},{"issue":"6","key":"3330_CR61","doi-asserted-by":"publisher","first-page":"2487","DOI":"10.1007\/s11128-016-1293-0","volume":"15","author":"YG Yang","year":"2016","unstructured":"Yang, Y.G., Lei, H., Liu, Z.C., et al.: Arbitrated quantum signature scheme based on cluster states. Quantum Inf. Process. 15(6), 2487\u20132497 (2016)","journal-title":"Quantum Inf. Process."},{"issue":"1","key":"3330_CR62","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11128-016-1458-x","volume":"16","author":"YG Yang","year":"2017","unstructured":"Yang, Y.G., Liu, Z.C., Li, J., et al.: Theoretically extensible quantum digital signature with star-like cluster states. Quantum Inf. Process. 16(1), 1\u201315 (2017)","journal-title":"Quantum Inf. Process."},{"issue":"3","key":"3330_CR63","doi-asserted-by":"publisher","first-page":"1036","DOI":"10.1007\/s10773-018-03995-4","volume":"58","author":"D-H Jiang","year":"2019","unstructured":"Jiang, D.-H., Xu, Y.-L., Xu, G.-B.: Arbitrary quantum signature based on local indistinguishability of orthogonal product states. Int. J. Theor. Phys. 58(3), 1036\u20131045 (2019)","journal-title":"Int. J. Theor. Phys."},{"key":"3330_CR64","doi-asserted-by":"publisher","first-page":"17411","DOI":"10.1364\/OE.20.017411","volume":"20","author":"F Gao","year":"2012","unstructured":"Gao, F., Liu, B., Wen, Q.-Y.: Flexible quantum private queries based on quantum key distribution. Opt. Exp. 20, 17411\u201317420 (2012)","journal-title":"Opt. Exp."},{"key":"3330_CR65","doi-asserted-by":"publisher","first-page":"805","DOI":"10.1007\/s11128-013-0692-8","volume":"13","author":"Y-G Yang","year":"2014","unstructured":"Yang, Y.-G., Sun, S.-J., Xu, P., et al.: Flexible protocol for quantum private query based on B92 protocol. Quantum Inf. Process. 13, 805\u2013813 (2014)","journal-title":"Quantum Inf. Process."},{"key":"3330_CR66","doi-asserted-by":"publisher","first-page":"6600111","DOI":"10.1109\/JSTQE.2014.2358192","volume":"21","author":"F Gao","year":"2015","unstructured":"Gao, F., Liu, B., Huang, W., et al.: Postprocessing of the oblivious key in quantum private query. IEEE. J. Sel. Top. Quant. 21, 6600111 (2015)","journal-title":"IEEE. J. Sel. Top. Quant."},{"key":"3330_CR67","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.93.042318","volume":"93","author":"CY Wei","year":"2016","unstructured":"Wei, C.Y., Wang, T.Y., Gao, F.: Practical quantum private query with better performance in resisting joint-measurement attack. Phys. Rev. A 93, 042318 (2016)","journal-title":"Phys. Rev. A"},{"issue":"48","key":"3330_CR68","doi-asserted-by":"publisher","first-page":"4033","DOI":"10.1016\/j.physleta.2016.10.017","volume":"380","author":"Y-G Yang","year":"2016","unstructured":"Yang, Y.-G., Liu, Z.-C., Li, J., et al.: Quantum private query with perfect user privacy against a joint-measurement attack. Phys. Lett. A 380(48), 4033\u20134038 (2016)","journal-title":"Phys. Lett. A"},{"key":"3330_CR69","doi-asserted-by":"publisher","first-page":"3833","DOI":"10.1007\/s11128-016-1367-z","volume":"15","author":"Y-G Yang","year":"2016","unstructured":"Yang, Y.-G., Liu, Z.C., Chen, X.B., et al.: Novel classical post-processing for quantum key distribution-based quantum private query. Quantum Inf. Process. 15, 3833\u20133840 (2016)","journal-title":"Quantum Inf. Process."},{"issue":"12","key":"3330_CR70","doi-asserted-by":"publisher","DOI":"10.1007\/s11433-017-9085-0","volume":"60","author":"Y-G Yang","year":"2017","unstructured":"Yang, Y.-G., Liu, Z.-C., Chen, X.-B., et al.: Robust QKD-based private database queries based on alternative sequences of single-qubit measurements. Sci. Chin. Phys. Mech. Astron. 60(12), 120311 (2017)","journal-title":"Sci. Chin. Phys. Mech. Astron."},{"key":"3330_CR71","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1016\/j.cose.2018.08.012","volume":"81","author":"Y-G Yang","year":"2019","unstructured":"Yang, Y.-G., Guo, X.-P., Xu, G., et al.: Reducing the communication complexity of quantum private database queries by subtle classical post-processing with relaxed quantum ability. Comput. Secur. 81, 15\u201324 (2019)","journal-title":"Comput. Secur."},{"key":"3330_CR72","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.104.052415","volume":"104","author":"Y-G Yang","year":"2021","unstructured":"Yang, Y.-G., Liu, X.-X., Gao, S., Zhou, Y.-H., Shi, W.-M., Li, J., Li, D.: Towards practical anonymous quantum communication: A measurement-device-independent approach. Phys. Rev. A 104, 052415 (2021)","journal-title":"Phys. Rev. A"},{"key":"3330_CR73","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.101.062311","volume":"101","author":"Y-G Yang","year":"2020","unstructured":"Yang, Y.-G., Yang, Y.-L., Lv, X.-L., Zhou, Y.-H., Shi, W.-M.: Examining the correctness of anonymity for practical quantum networks. Phys. Rev. A 101, 062311 (2020)","journal-title":"Phys. Rev. A"},{"key":"3330_CR74","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1007\/s11128-021-03062-8","volume":"20","author":"GB Xu","year":"2021","unstructured":"Xu, G.B., Jiang, D.H.: Novel methods to construct nonlocal sets of orthogonal product states in an arbitrary bipartite high-dimensional system. Quantum Inf. process. 20, 128 (2021)","journal-title":"Quantum Inf. process."},{"key":"3330_CR75","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-017-9190-0","volume":"61","author":"Y-G Yang","year":"2018","unstructured":"Yang, Y.-G., Yang, J.-J., Zhou, Y.-H., Shi, W.-M., Chen, X.-B., Li, J., Zuo, H.-J.: Quantum network communication: A discrete-time quantum-walk approach. Sci. China Inf. Sci. 61, 042501 (2018)","journal-title":"Sci. China Inf. Sci."},{"issue":"10","key":"3330_CR76","doi-asserted-by":"publisher","first-page":"322","DOI":"10.1007\/s11128-019-2434-z","volume":"18","author":"Y-G Yang","year":"2019","unstructured":"Yang, Y.-G., Li, B.-R., Li, D., Zhou, Y.-H., Shi, W.-M.: New quantum key agreement protocols based on Bell states. Quantum Inf. process. 18(10), 322 (2019)","journal-title":"Quantum Inf. process."},{"issue":"3","key":"3330_CR77","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1007\/s11128-019-2187-8","volume":"18","author":"Y-G Yang","year":"2019","unstructured":"Yang, Y.-G., Gao, S., Li, D., Zhou, Y.-H., Shi, W.-M.: Two-party quantum key agreement over a collective noisy channel. Quantum Inf. process. 18(3), 74 (2019)","journal-title":"Quantum Inf. process."},{"issue":"2","key":"3330_CR78","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/s11128-019-2200-2","volume":"18","author":"Y-G Yang","year":"2019","unstructured":"Yang, Y.-G., Li, B.-R., Kang, S.-Y., Chen, X.-B., Zhou, Y.-H., Shi, W.-M.: New quantum key agreement protocols based on cluster states. Quantum Inf. process. 18(2), 77 (2019)","journal-title":"Quantum Inf. process."}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-021-03330-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11128-021-03330-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-021-03330-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,11]],"date-time":"2023-02-11T21:35:51Z","timestamp":1676151351000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11128-021-03330-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12,21]]},"references-count":78,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2022,1]]}},"alternative-id":["3330"],"URL":"https:\/\/doi.org\/10.1007\/s11128-021-03330-7","relation":{},"ISSN":["1570-0755","1573-1332"],"issn-type":[{"value":"1570-0755","type":"print"},{"value":"1573-1332","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,12,21]]},"assertion":[{"value":"20 September 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 October 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 December 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"2"}}