{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T03:51:41Z","timestamp":1759117901042,"version":"3.37.3"},"reference-count":43,"publisher":"Springer Science and Business Media LLC","issue":"8","license":[{"start":{"date-parts":[[2022,8,20]],"date-time":"2022-08-20T00:00:00Z","timestamp":1660953600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,8,20]],"date-time":"2022-08-20T00:00:00Z","timestamp":1660953600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62071015"],"award-info":[{"award-number":["62071015"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"DOI":"10.1007\/s11128-022-03626-2","type":"journal-article","created":{"date-parts":[[2022,8,20]],"date-time":"2022-08-20T11:02:30Z","timestamp":1660993350000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Measurement-device-independent continuous variable semi-quantum key distribution protocol"],"prefix":"10.1007","volume":"21","author":[{"given":"Yi-Hua","family":"Zhou","sequence":"first","affiliation":[]},{"given":"Shu-Fen","family":"Qin","sequence":"additional","affiliation":[]},{"given":"Wei-Min","family":"Shi","sequence":"additional","affiliation":[]},{"given":"Yu-Guang","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,8,20]]},"reference":[{"key":"3626_CR1","doi-asserted-by":"publisher","unstructured":"Bennett, C.H., Brassard, G.: Quantum Cryptography: Public Key Distribution and Coin Tossing. In: Proceedings of IEEE International Conference on computers, systems and signal processing, Bangalore,10\u201319 Dec 1984, pp. 175\u2013179. https:\/\/doi.org\/10.1016\/j.tcs.2011.08.039.","DOI":"10.1016\/j.tcs.2011.08.039"},{"key":"3626_CR2","doi-asserted-by":"publisher","DOI":"10.1007\/s43673-021-00017-0","author":"LC Kwek","year":"2021","unstructured":"Kwek, L.C., Cao, L., Luo, W., et al.: Chip-based quantum key distribution. AAPPS Bull. (2021). https:\/\/doi.org\/10.1007\/s43673-021-00017-0","journal-title":"AAPPS Bull."},{"issue":"2","key":"3626_CR3","doi-asserted-by":"publisher","DOI":"10.1002\/que2.37","volume":"2","author":"G Chai","year":"2020","unstructured":"Chai, G., Li, D., et al.: Blind channel estimation for continuous-variable quantum key distribution. Quant. Eng. 2(2), e37 (2020). https:\/\/doi.org\/10.1002\/que2.37","journal-title":"Quant. Eng."},{"issue":"1","key":"3626_CR4","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1016\/j.fmre.2020.12.002","volume":"1","author":"H Guo","year":"2020","unstructured":"Guo, H., et al.: Toward practical quantum key distribution using telecom components. Fund. Res. 1(1), 96\u201398 (2020). https:\/\/doi.org\/10.1016\/j.fmre.2020.12.002","journal-title":"Fund. Res."},{"issue":"3","key":"3626_CR5","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.65.032302","volume":"65","author":"GL Long","year":"2002","unstructured":"Long, G.L., Xiao, S.L.: Theoretically efficient high-capacity quantum-key-distribution scheme. Phys. Rev. A 65(3), 032302 (2002). https:\/\/doi.org\/10.1103\/PhysRevA.65.032302","journal-title":"Phys. Rev. A"},{"key":"3626_CR6","doi-asserted-by":"publisher","DOI":"10.1038\/s41377-022-00769-w","author":"H Zhang","year":"2022","unstructured":"Zhang, H., et al.: Realization of quantum secure direct communication over 100 km fiber with time-bin and phase quantum states. Light Sci. Appl. (2022). https:\/\/doi.org\/10.1038\/s41377-022-00769-w","journal-title":"Light Sci. Appl."},{"key":"3626_CR7","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.99.140501","author":"M Boyer","year":"2007","unstructured":"Boyer, M., Kenigsberg, D., Mor, T.: Quantum key distribution with classical bob. Phys. Rev. Lett. (2007). https:\/\/doi.org\/10.1103\/PhysRevLett.99.140501","journal-title":"Phys. Rev. Lett."},{"issue":"10","key":"3626_CR8","doi-asserted-by":"publisher","first-page":"3164","DOI":"10.1007\/s10773-017-3484-6","volume":"56","author":"W-J Liu","year":"2017","unstructured":"Liu, W.-J., Chen, Z.-Y., Ji, S., Wang, H.-B., Zhang, J.: Multi-party semi-quantum key agreement with delegating quantum computation. Int. J. Theor. Phys. 56(10), 3164\u20133174 (2017). https:\/\/doi.org\/10.1007\/s10773-017-3484-6","journal-title":"Int. J. Theor. Phys."},{"key":"3626_CR9","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1007\/s11128-017-1736-2","volume":"16","author":"C Shukla","year":"2017","unstructured":"Shukla, C., Thapliyal, K., Pathak, A.: Semi-quantum communication: protocols for key agreement, controlled secure direct communication and dialogue. Quant. Inf. Process. 16, 295 (2017). https:\/\/doi.org\/10.1007\/s11128-017-1736-2","journal-title":"Quant. Inf. Process."},{"issue":"11","key":"3626_CR10","doi-asserted-by":"publisher","first-page":"3852","DOI":"10.1007\/s10773-019-04252-y","volume":"58","author":"L-L Yan","year":"2019","unstructured":"Yan, L.-L., Zhang, S.-B., et al.: Semi-quantum key agreement and private comparison protocols using bell states. Int. J. Theor. Phys. 58(11), 3852\u20133862 (2019). https:\/\/doi.org\/10.1007\/s10773-019-04252-y","journal-title":"Int. J. Theor. Phys."},{"key":"3626_CR11","doi-asserted-by":"publisher","DOI":"10.1007\/s11128-020-02879-z","author":"D Zhu","year":"2020","unstructured":"Zhu, D., Wang, X., Zhu, H.: Semi-quantum-honest key agreement scheme with three-particle entangled states in cross-realm setting. Quant Inf Process (2020). https:\/\/doi.org\/10.1007\/s11128-020-02879-z","journal-title":"Quant Inf Process"},{"issue":"2","key":"3626_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11128-020-02965-2","volume":"20","author":"Z Rong","year":"2021","unstructured":"Rong, Z., Qin, D., Mateus, P., et al.: Mediated semi-quantum secure direct communication. Quant. Inf. Process. 20(2), 1\u201313 (2021). https:\/\/doi.org\/10.1007\/s11128-020-02965-2","journal-title":"Quant. Inf. Process."},{"key":"3626_CR13","doi-asserted-by":"publisher","DOI":"10.1007\/s10773-020-04447-8","author":"Z Rong","year":"2020","unstructured":"Rong, Z., Qin, D., Zou, X.: Semi-Quantum secure direct communication using entanglement. Int. J. Theor. Phys. (2020). https:\/\/doi.org\/10.1007\/s10773-020-04447-8","journal-title":"Int. J. Theor. Phys."},{"key":"3626_CR14","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1007\/s11128-020-02627-3","volume":"19","author":"S Srikara","year":"2022","unstructured":"Srikara, S., Thapliyal, K., Pathak, A.: Continuous variable direct secure quantum communication using Gaussian states. Quant. Inf. Process. 19, 4 (2022). https:\/\/doi.org\/10.1007\/s11128-020-02627-3","journal-title":"Quant. Inf. Process."},{"key":"3626_CR15","doi-asserted-by":"publisher","DOI":"10.1007\/s10773-018-3713-7","author":"C Xie","year":"2018","unstructured":"Xie, C., Li, L., Situ, H.: Semi-quantum secure direct communication model based on Bell states. J. Theor. Phys. (2018). https:\/\/doi.org\/10.1007\/s10773-018-3713-7","journal-title":"J. Theor. Phys."},{"key":"3626_CR16","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1007\/s11128-020-02960-7","volume":"20","author":"L Yan","year":"2021","unstructured":"Yan, L., Zhang, S., Chang, Y., et al.: Semi-quantum private comparison protocol with three-ppaper G-like states. Quant. Inf. Process 20, 17 (2021). https:\/\/doi.org\/10.1007\/s11128-020-02960-7","journal-title":"Quant. Inf. Process"},{"key":"3626_CR17","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.79.032341","author":"M Boyer","year":"2009","unstructured":"Boyer, M., Gelles, R., Kenigsberg, D., Mor, T.: Semi-quantum key distribution. Phys. Rev. A. (2009). https:\/\/doi.org\/10.1103\/PhysRevA.79.032341","journal-title":"Phys. Rev. A."},{"issue":"5","key":"3626_CR18","doi-asserted-by":"publisher","first-page":"1744","DOI":"10.1103\/PhysRevA.79.052312","volume":"79","author":"X Zou","year":"2009","unstructured":"Zou, X., Qiu, D., Li, L., et al.: Semiquantum-key distribution using less than four quantum states. Phys. Rev. A 79(5), 1744\u20131747 (2009). https:\/\/doi.org\/10.1103\/PhysRevA.79.052312","journal-title":"Phys. Rev. A"},{"key":"3626_CR19","doi-asserted-by":"publisher","DOI":"10.1088\/0256-307X\/28\/10\/100301","author":"J Wang","year":"2011","unstructured":"Wang, J., Zhang, S., Zhang, Q., Tang, C.J.: Semi quantum key distribution using entangled states. Chin. Phys. Lett. (2011). https:\/\/doi.org\/10.1088\/0256-307X\/28\/10\/100301","journal-title":"Chin. Phys. Lett."},{"key":"3626_CR20","doi-asserted-by":"crossref","unstructured":"Hajji, H., Baz, M, E. (2021): Qutrit-based semi-quantum key distribution protocol. Quant. Inf. Process. 10. 1007 \/s11128\u2013020\u201302927\u20138","DOI":"10.1007\/s11128-020-02927-8"},{"key":"3626_CR21","doi-asserted-by":"publisher","first-page":"1457","DOI":"10.1007\/s11128-014-0740-z","volume":"13","author":"KF Yu","year":"2014","unstructured":"Yu, K.F., Yang, C.W., Liao, C.H., et al.: Authenticated semi-quantum key distribution protocol using Bell states. Quant. Inf. Process. 13, 1457\u20131465 (2014). https:\/\/doi.org\/10.1007\/s11128-014-0740-z","journal-title":"Quant. Inf. Process."},{"key":"3626_CR22","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1007\/s11128-016-1468-8","volume":"16","author":"A Meslouhi","year":"2017","unstructured":"Meslouhi, A., Hassouni, Y.: Cryptanalysis on authenticated semi-quantum key distribution protocolusing Bell states. Quant. Inf. Process. 16, 18 (2017). https:\/\/doi.org\/10.1007\/s11128-016-1468-8","journal-title":"Quant. Inf. Process."},{"key":"3626_CR23","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/s11128-019-2573-2","volume":"19","author":"S Zebboudj","year":"2020","unstructured":"Zebboudj, S., Djoudi, H., Lalaoui, D., et al.: Authenticated semi-quantum key distribution without entanglement. Quant. Inf. Process. 19, 77 (2020). https:\/\/doi.org\/10.1007\/s11128-019-2573-2","journal-title":"Quant. Inf. Process."},{"key":"3626_CR24","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.91.032323","author":"WO Krawec","year":"2015","unstructured":"Krawec, W.O.: Mediated semiquantum key distribution. Phys. Rev. A (2015). https:\/\/doi.org\/10.1103\/PhysRevA.91.032323","journal-title":"Phys. Rev. A"},{"key":"3626_CR25","doi-asserted-by":"publisher","DOI":"10.1002\/andp.201700206","author":"ZR Liu","year":"2018","unstructured":"Liu, Z.R., Hwang, T.: Mediated semiquantum key distribution without invoking quantum measurement. Ann. Phys. (2018). https:\/\/doi.org\/10.1002\/andp.201700206","journal-title":"Ann. Phys."},{"key":"3626_CR26","doi-asserted-by":"publisher","DOI":"10.1002\/andp.201800347","author":"PH Lin","year":"2019","unstructured":"Lin, P.H., Tsai, C.W., Hwang, T.: Mediated semiquantum key distribution using single photons. Ann. Phys. (2019). https:\/\/doi.org\/10.1002\/andp.201800347","journal-title":"Ann. Phys."},{"key":"3626_CR27","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.89.052301","author":"Z Li","year":"2014","unstructured":"Li, Z., Zhang, Y.-C., Feihu, X., Peng, X., Guo, H.: Continuous-variable measurement-device-independent quantum key distribution. Phys. Rev. A (2014). https:\/\/doi.org\/10.1103\/PhysRevA.89.052301","journal-title":"Phys. Rev. A"},{"key":"3626_CR28","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.97.042328","volume":"97","author":"Y Zhao","year":"2018","unstructured":"Zhao, Y., Zhang, Y., Xu, B., Yu, S., Guo, H.: Continuous-variable measurement-device-independent quantum key distribution with virtual photon subtraction. Phys. Rev. A 97, 042328 (2018). https:\/\/doi.org\/10.1103\/PhysRevA.97.042328","journal-title":"Phys. Rev. A"},{"key":"3626_CR29","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.91.022320","volume":"91","author":"C Ottaviani","year":"2015","unstructured":"Ottaviani, C., Spedalieri, G., Braunstein, S.L., Pirandola, S.: Continuous-variable quantum cryptography with an untrusted relay: detailed secret analysis of the symmetric configuration. Phys. Rev. A 91, 022320 (2015). https:\/\/doi.org\/10.1103\/PhysRevA.91.022320","journal-title":"Phys. Rev. A"},{"key":"3626_CR30","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.99.022322","author":"HX Ma","year":"2019","unstructured":"Ma, H.X., Huang, P., Bai, D.Y., Wang, T., Zeng, G.H.: Long-distance continuous-variable measurement-device-independent quantum key distribution with discrete modulation. Phys. Rev. A. (2019). https:\/\/doi.org\/10.1103\/PhysRevA.99.022322","journal-title":"Phys. Rev. A."},{"key":"3626_CR31","doi-asserted-by":"crossref","unstructured":"Wang, P, Wang, X.,Y., Li, Y., M.: Continuous-variable measurement-device-independent quantum key distribution using modulated squeezed states and optical amplifiers, Phys. Rev. A 99, 042309 (2019)","DOI":"10.1103\/PhysRevA.99.042309"},{"key":"3626_CR32","doi-asserted-by":"publisher","first-page":"397","DOI":"10.1038\/nphoton.2015.83","volume":"9","author":"S Pirandola","year":"2015","unstructured":"Pirandola, S., Ottaviani, C., Spedalieri, G., et al.: High-rate measurement-device-independent quantum cryptography. Nat. Photon 9, 397\u2013402 (2015). https:\/\/doi.org\/10.1038\/nphoton.2015.83","journal-title":"Nat. Photon"},{"key":"3626_CR33","doi-asserted-by":"publisher","first-page":"15043","DOI":"10.1038\/ncomms15043","volume":"8","author":"S Pirandola","year":"2017","unstructured":"Pirandola, S., Laurenza, R., Ottaviani, C.: Fundamental limits of repeaterless quantum communications. Nat. Commun. 8, 15043 (2017). https:\/\/doi.org\/10.1038\/ncomms15043","journal-title":"Nat. Commun."},{"issue":"12","key":"3626_CR34","doi-asserted-by":"publisher","first-page":"1448","DOI":"10.1088\/0253-6102\/71\/12\/1448","volume":"71","author":"Y-H Zhou","year":"2019","unstructured":"Zhou, Y.-H., Tan, J., Zhang, J., Shi, W.-M., Yang, Y.-G.: Three-party quantum key agreement protocol based on continuous variable single-mode squeezed states*. Commun. Theor. Phys. 71(12), 1448 (2019). https:\/\/doi.org\/10.1088\/0253-6102\/71\/12\/1448","journal-title":"Commun. Theor. Phys."},{"key":"3626_CR35","doi-asserted-by":"publisher","DOI":"10.1142\/S0217984920500839","author":"YH Zhou","year":"2020","unstructured":"Zhou, Y.H., Zhang, J., Shi, W.M., Yang, Y.G., Wang, M.F.: Continuous-variable multiparty quantum key agreement based on third party. Modern Phys. Lett. B (2020). https:\/\/doi.org\/10.1142\/S0217984920500839","journal-title":"Modern Phys. Lett. B"},{"key":"3626_CR36","doi-asserted-by":"publisher","first-page":"1598","DOI":"10.1007\/s10773-020-04427-y","volume":"59","author":"E Wu","year":"2020","unstructured":"Wu, E.: Continuous-variable quantum state sharing. Int. J. Theor. Phys. 59, 1598\u20131604 (2020). https:\/\/doi.org\/10.1007\/s10773-020-04427-y","journal-title":"Int. J. Theor. Phys."},{"key":"3626_CR37","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.93.170504","volume":"93","author":"C Weedbrook","year":"2004","unstructured":"Weedbrook, C., Lance, A.M., Bowen, W.P., Symul, T., Ralph, T.C., Ping, K.L.: Quantum cryptography without switching. Phys. Rev. Lett. 93, 170504 (2004). https:\/\/doi.org\/10.1103\/PhysRevLett.93.170504","journal-title":"Phys. Rev. Lett."},{"key":"3626_CR38","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.97.190503","author":"R Garc\u00eda-Patr\u00f3n","year":"2006","unstructured":"Garc\u00eda-Patr\u00f3n, R., Cerf, N.J.: Unconditional optimality of Gaussian attacks against continuous-variable quantum key distribution. Phys. Rev. Lett. (2006). https:\/\/doi.org\/10.1103\/PhysRevLett.97.190503","journal-title":"Phys. Rev. Lett."},{"key":"3626_CR39","doi-asserted-by":"publisher","first-page":"2112","DOI":"10.1103\/PhysRevA.81.062314","volume":"81","author":"A Leverrier","year":"2010","unstructured":"Leverrier, A., Grangier, P.: A simple proof that Gaussian attacks are optimal among collective attacks against continuous-variable quantum key distribution with a Gaussian modulation. Phys. Rev. A 81, 2112 (2010). https:\/\/doi.org\/10.1103\/PhysRevA.81.062314","journal-title":"Phys. Rev. A"},{"key":"3626_CR40","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.108.130503","volume":"108","author":"HK Lo","year":"2012","unstructured":"Lo, H.K., Curty, M., Bing, Q.: Measurement-device-independent quantum key distribution. Phys. Rev. Lett. 108, 130503 (2012). https:\/\/doi.org\/10.1103\/PhysRevLett.108.130503","journal-title":"Phys. Rev. Lett."},{"key":"3626_CR41","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.74.054302","author":"XH Li","year":"2006","unstructured":"Li, X.H., Deng, F.G., Zhou, H.Y.: Improving the security of secure direct communication based on the secret transmitting order of particles. Phys. Rev. (2006). https:\/\/doi.org\/10.1103\/PhysRevA.74.054302","journal-title":"Phys. Rev."},{"key":"3626_CR42","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1016\/j.physleta.2005.10.050","volume":"351","author":"QY Cai","year":"2006","unstructured":"Cai, Q.Y.: Eavesdropping on the two-way quantum communication protocols with invisible photons. Phys. Lett. A 351, 23\u201325 (2006). https:\/\/doi.org\/10.1016\/j.physleta.2005.10.050","journal-title":"Phys. Lett. A"},{"key":"3626_CR43","unstructured":"Zhang, S., L.: Design and analysis of continuous variable quantum cryptography. M. S. Dissertation, National University of Defense Technology, Changsha (2009) (in Chinese)."}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-022-03626-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11128-022-03626-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-022-03626-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,2]],"date-time":"2022-09-02T05:18:05Z","timestamp":1662095885000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11128-022-03626-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,8,20]]},"references-count":43,"journal-issue":{"issue":"8","published-online":{"date-parts":[[2022,8]]}},"alternative-id":["3626"],"URL":"https:\/\/doi.org\/10.1007\/s11128-022-03626-2","relation":{},"ISSN":["1573-1332"],"issn-type":[{"type":"electronic","value":"1573-1332"}],"subject":[],"published":{"date-parts":[[2022,8,20]]},"assertion":[{"value":"1 March 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 July 2022","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 August 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no relevant financial or nonfinancial interests to disclose.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interests"}}],"article-number":"303"}}