{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T00:32:34Z","timestamp":1760661154522,"version":"build-2065373602"},"reference-count":43,"publisher":"Springer Science and Business Media LLC","issue":"9","license":[{"start":{"date-parts":[[2025,9,4]],"date-time":"2025-09-04T00:00:00Z","timestamp":1756944000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,9,4]],"date-time":"2025-09-04T00:00:00Z","timestamp":1756944000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"DOI":"10.1007\/s11128-025-04909-0","type":"journal-article","created":{"date-parts":[[2025,9,4]],"date-time":"2025-09-04T06:04:25Z","timestamp":1756965865000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Mediated semi-quantum identity authentication protocol using single photons"],"prefix":"10.1007","volume":"24","author":[{"given":"Yuan","family":"Tian","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Praise O.","family":"Arowolo","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jiale","family":"Tian","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jian","family":"Li","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2025,9,4]]},"reference":[{"issue":"11","key":"4909_CR1","doi-asserted-by":"publisher","first-page":"369","DOI":"10.1007\/s11128-022-03717-0","volume":"21","author":"A Dutta","year":"2022","unstructured":"Dutta, A., Pathak, A.: A short review on quantum identity authentication protocols: how would bob know that he is talking with alice? Quantum Inf. Process. 21(11), 369 (2022)","journal-title":"Quantum Inf. Process."},{"key":"4909_CR2","doi-asserted-by":"crossref","unstructured":"Hong, C.\u00a0h, Heo, J., Jang, J.\u00a0G., Kwon, D.: Quantum identity authentication with single photon. Quantum Inf. Process. 16, 1\u201320 (2017)","DOI":"10.1007\/s11128-017-1681-0"},{"key":"4909_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11128-019-2308-4","volume":"18","author":"N-R Zhou","year":"2019","unstructured":"Zhou, N.-R., Zhu, K.-N., Bi, W., Gong, L.-H.: Semi-quantum identification. Quantum Inf. Process. 18, 1\u201317 (2019)","journal-title":"Quantum Inf. Process."},{"issue":"1","key":"4909_CR4","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1103\/PhysRevA.60.149","volume":"60","author":"M Du\u0161ek","year":"1999","unstructured":"Du\u0161ek, M., Haderka, O., Hendrych, M., My\u0161ka, R.: Quantum identification system. Phys. Rev. A 60(1), 149 (1999)","journal-title":"Phys. Rev. A"},{"issue":"2","key":"4909_CR5","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.61.022303","volume":"61","author":"G Zeng","year":"2000","unstructured":"Zeng, G., Zhang, W.: Identity verification in quantum key distribution. Phys. Rev. A 61(2), 022303 (2000)","journal-title":"Phys. Rev. A"},{"issue":"4\u20136","key":"4909_CR6","doi-asserted-by":"publisher","first-page":"380","DOI":"10.1016\/j.optcom.2005.06.002","volume":"254","author":"N Zhou","year":"2005","unstructured":"Zhou, N., Zeng, G., Zeng, W., Zhu, F.: Cross-center quantum identification scheme based on teleportation and entanglement swapping. Opt. Commun. 254(4\u20136), 380\u2013388 (2005)","journal-title":"Opt. Commun."},{"key":"4909_CR7","doi-asserted-by":"publisher","first-page":"2535","DOI":"10.1007\/s11128-014-0808-9","volume":"13","author":"H Yuan","year":"2014","unstructured":"Yuan, H., Liu, Y.-M., Pan, G.-Z., Zhang, G., Zhou, J., Zhang, Z.-J.: Quantum identity authentication based on ping-pong technique without entanglements. Quantum Inf. Process. 13, 2535\u20132549 (2014)","journal-title":"Quantum Inf. Process."},{"issue":"2","key":"4909_CR8","doi-asserted-by":"publisher","first-page":"452","DOI":"10.3390\/math11020452","volume":"11","author":"C-W Yang","year":"2023","unstructured":"Yang, C.-W., Wang, H.-W., Lin, J., Tsai, C.-W.: Semi-quantum identification without information leakage. Mathematics 11(2), 452 (2023)","journal-title":"Mathematics"},{"issue":"4","key":"4909_CR9","doi-asserted-by":"publisher","first-page":"483","DOI":"10.3390\/e24040483","volume":"24","author":"X Li","year":"2022","unstructured":"Li, X., Zhang, K., Zhang, L., Zhao, X.: A new quantum multiparty simultaneous identity authentication protocol with the classical third-party. Entropy 24(4), 483 (2022)","journal-title":"Entropy"},{"key":"4909_CR10","doi-asserted-by":"publisher","first-page":"1457","DOI":"10.1007\/s11128-014-0740-z","volume":"13","author":"K-F Yu","year":"2014","unstructured":"Yu, K.-F., Yang, C.-W., Liao, C.-H., Hwang, T.: Authenticated semi-quantum key distribution protocol using bell states. Quantum Inf. Process. 13, 1457\u20131465 (2014)","journal-title":"Quantum Inf. Process."},{"issue":"1","key":"4909_CR11","doi-asserted-by":"publisher","first-page":"19898","DOI":"10.1038\/srep19898","volume":"6","author":"Q Li","year":"2016","unstructured":"Li, Q., Chan, W.H., Zhang, S.: Semiquantum key distribution with secure delegated quantum computation. Sci. Rep. 6(1), 19898 (2016)","journal-title":"Sci. Rep."},{"issue":"3","key":"4909_CR12","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.91.032323","volume":"91","author":"WO Krawec","year":"2015","unstructured":"Krawec, W.O.: Mediated semiquantum key distribution. Phys. Rev. A 91(3), 032323 (2015)","journal-title":"Phys. Rev. A"},{"issue":"6","key":"4909_CR13","doi-asserted-by":"publisher","DOI":"10.1088\/1612-202X\/ad3f96","volume":"21","author":"S Zhou","year":"2024","unstructured":"Zhou, S., Xie, Q.-M., Zhou, N.-R.: Measurement-free mediated semi-quantum key distribution protocol based on single-particle states. Laser Phys. Lett. 21(6), 065207 (2024)","journal-title":"Laser Phys. Lett."},{"issue":"3","key":"4909_CR14","doi-asserted-by":"publisher","DOI":"10.1088\/2058-9565\/ac7412","volume":"7","author":"J Guskind","year":"2022","unstructured":"Guskind, J., Krawec, W.O.: Mediated semi-quantum key distribution with improved efficiency. Quantum Sci. Technol. 7(3), 035019 (2022)","journal-title":"Quantum Sci. Technol."},{"issue":"34","key":"4909_CR15","doi-asserted-by":"publisher","first-page":"1950281","DOI":"10.1142\/S021773231950281X","volume":"34","author":"C-W Tsai","year":"2019","unstructured":"Tsai, C.-W., Yang, C.-W., Lee, N.-Y.: Lightweight mediated semi-quantum key distribution protocol. Mod. Phys. Lett. A 34(34), 1950281 (2019)","journal-title":"Mod. Phys. Lett. A"},{"issue":"3","key":"4909_CR16","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.79.032341","volume":"79","author":"M Boyer","year":"2009","unstructured":"Boyer, M., Gelles, R., Kenigsberg, D., Mor, T.: Semiquantum key distribution. Phys. Rev. A 79(3), 032341 (2009)","journal-title":"Phys. Rev. A"},{"key":"4909_CR17","doi-asserted-by":"crossref","unstructured":"Krawec, W.\u00a0O.: An improved asymptotic key rate bound for a mediated semi-quantum key distribution protocol, arXiv preprint arXiv:1509.04797 (2015)","DOI":"10.1109\/ISIT.2015.7282542"},{"issue":"7","key":"4909_CR18","doi-asserted-by":"publisher","DOI":"10.1088\/1612-202X\/ab9444","volume":"17","author":"C-W Tsai","year":"2020","unstructured":"Tsai, C.-W., Yang, C.-W.: Lightweight authenticated semi-quantum key distribution protocol without trojan horse attack. Laser Phys. Lett. 17(7), 075202 (2020)","journal-title":"Laser Phys. Lett."},{"issue":"6","key":"4909_CR19","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1007\/s11128-021-03157-2","volume":"20","author":"Y Tian","year":"2021","unstructured":"Tian, Y., Li, J., Chen, X.-B., Ye, C.-Q., Li, H.-J.: An efficient semi-quantum secret sharing protocol of specific bits. Quantum Inf. Process. 20(6), 217 (2021)","journal-title":"Quantum Inf. Process."},{"issue":"05","key":"4909_CR20","doi-asserted-by":"publisher","first-page":"1350052","DOI":"10.1142\/S0219749913500524","volume":"11","author":"C-W Yang","year":"2013","unstructured":"Yang, C.-W., Hwang, T.: Efficient key construction on semi-quantum secret sharing protocols. Int. J. Quantum Inf. 11(05), 1350052 (2013)","journal-title":"Int. J. Quantum Inf."},{"key":"4909_CR21","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11128-017-1631-x","volume":"16","author":"K-F Yu","year":"2017","unstructured":"Yu, K.-F., Gu, J., Hwang, T., Gope, P.: Multi-party semi-quantum key distribution-convertible multi-party semi-quantum secret sharing. Quantum Inf. Process. 16, 1\u201314 (2017)","journal-title":"Quantum Inf. Process."},{"issue":"7","key":"4909_CR22","doi-asserted-by":"publisher","first-page":"2400116","DOI":"10.1002\/qute.202400116","volume":"7","author":"Y Tian","year":"2024","unstructured":"Tian, Y., Wang, J., Bian, G., Chang, J., Li, J.: Dynamic multi-party to multi-party quantum secret sharing based on bell states. Adv. Quantum Technol. 7(7), 2400116 (2024)","journal-title":"Adv. Quantum Technol."},{"key":"4909_CR23","doi-asserted-by":"publisher","first-page":"947","DOI":"10.1007\/s11128-015-1182-y","volume":"15","author":"Y-P Luo","year":"2016","unstructured":"Luo, Y.-P., Hwang, T.: Authenticated semi-quantum direct communication protocols using bell states. Quantum Inf. Process. 15, 947\u2013958 (2016)","journal-title":"Quantum Inf. Process."},{"issue":"11","key":"4909_CR24","doi-asserted-by":"publisher","DOI":"10.1088\/1674-1056\/abaedd","volume":"29","author":"H-H Li","year":"2020","unstructured":"Li, H.-H., Gong, L.-H., Zhou, N.-R.: New semi-quantum key agreement protocol based on high-dimensional single-particle states. Chin. Phys. B 29(11), 110304 (2020)","journal-title":"Chin. Phys. B"},{"issue":"4","key":"4909_CR25","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1007\/s11128-024-04356-3","volume":"23","author":"C Wang","year":"2024","unstructured":"Wang, C., Zhang, Q., Liang, S., Zhu, H.: Secure mutual authentication quantum key agreement scheme for two-party setting with key recycling. Quantum Inf. Process. 23(4), 139 (2024)","journal-title":"Quantum Inf. Process."},{"key":"4909_CR26","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11128-020-02887-z","volume":"19","author":"H Zhu","year":"2020","unstructured":"Zhu, H., Wang, L., Zhang, Y.: An efficient quantum identity authentication key agreement protocol without entanglement. Quantum Inf. Process. 19, 1\u201314 (2020)","journal-title":"Quantum Inf. Process."},{"key":"4909_CR27","doi-asserted-by":"publisher","first-page":"1696","DOI":"10.1007\/s11433-014-5542-x","volume":"57","author":"X Zou","year":"2014","unstructured":"Zou, X., Qiu, D.: Three-step semiquantum secure direct communication protocol. Sci. China Phys. Mech. Astron. 57, 1696\u20131702 (2014)","journal-title":"Sci. China Phys. Mech. Astron."},{"issue":"01","key":"4909_CR28","doi-asserted-by":"publisher","first-page":"1950004","DOI":"10.1142\/S0217732319500044","volume":"34","author":"Y Sun","year":"2019","unstructured":"Sun, Y., Yan, L., Chang, Y., Zhang, S., Shao, T., Zhang, Y.: Two semi-quantum secure direct communication protocols based on bell states. Mod. Phys. Lett. A 34(01), 1950004 (2019)","journal-title":"Mod. Phys. Lett. A"},{"key":"4909_CR29","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1007\/s10623-015-0157-4","volume":"78","author":"A Broadbent","year":"2016","unstructured":"Broadbent, A., Schaffner, C.: Quantum cryptography beyond quantum key distribution. Des. Codes Crypt. 78, 351\u2013382 (2016)","journal-title":"Des. Codes Crypt."},{"key":"4909_CR30","doi-asserted-by":"publisher","first-page":"2986","DOI":"10.1007\/s10773-019-04178-5","volume":"58","author":"Z Tao","year":"2019","unstructured":"Tao, Z., Chang, Y., Zhang, S., Dai, J., Li, X.: Two semi-quantum direct communication protocols with mutual authentication based on bell states. Int. J. Theor. Phys. 58, 2986\u20132993 (2019)","journal-title":"Int. J. Theor. Phys."},{"issue":"4","key":"4909_CR31","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.68.042317","volume":"68","author":"F-G Deng","year":"2003","unstructured":"Deng, F.-G., Long, G.L., Liu, X.-S.: Two-step quantum direct communication protocol using the einstein-podolsky-rosen pair block. Phys. Rev. A 68(4), 042317 (2003)","journal-title":"Phys. Rev. A"},{"key":"4909_CR32","doi-asserted-by":"publisher","first-page":"1807","DOI":"10.1007\/s10773-020-04447-8","volume":"59","author":"Z Rong","year":"2020","unstructured":"Rong, Z., Qiu, D., Zou, X.: Semi-quantum secure direct communication using entanglement. Int. J. Theor. Phys. 59, 1807\u20131819 (2020)","journal-title":"Int. J. Theor. Phys."},{"key":"4909_CR33","doi-asserted-by":"publisher","first-page":"3353","DOI":"10.1007\/s10773-021-04911-z","volume":"60","author":"S Jiang","year":"2021","unstructured":"Jiang, S., Zhou, R.-G., Hu, W.: Semi-quantum mutual identity authentication using bell states. Int. J. Theor. Phys. 60, 3353\u20133362 (2021)","journal-title":"Int. J. Theor. Phys."},{"key":"4909_CR34","doi-asserted-by":"publisher","first-page":"2067","DOI":"10.1007\/s11128-016-1266-3","volume":"15","author":"WO Krawec","year":"2016","unstructured":"Krawec, W.O.: Security of a semi-quantum protocol where reflections contribute to the secret key. Quantum Inf. Process. 15, 2067\u20132090 (2016)","journal-title":"Quantum Inf. Process."},{"issue":"7","key":"4909_CR35","doi-asserted-by":"publisher","first-page":"481","DOI":"10.1038\/nphys629","volume":"3","author":"R Ursin","year":"2007","unstructured":"Ursin, R., Tiefenbacher, F., Schmitt-Manderbach, T., Weier, H., Scheidl, T., Lindenthal, M., Blauensteiner, B., Jennewein, T., Perdigues, J., Trojek, P., et al.: Entanglement-based quantum communication over 144 km. Nat. Phys. 3(7), 481\u2013486 (2007)","journal-title":"Nat. Phys."},{"issue":"4","key":"4909_CR36","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1038\/scientificamerican1092-50","volume":"267","author":"CH Bennett","year":"1992","unstructured":"Bennett, C.H., Brassard, G., Ekert, A.K.: Quantum cryptography. Sci. Am. 267(4), 50\u201357 (1992)","journal-title":"Sci. Am."},{"key":"4909_CR37","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11128-019-2573-2","volume":"19","author":"S Zebboudj","year":"2020","unstructured":"Zebboudj, S., Djoudi, H., Lalaoui, D., Omar, M.: Authenticated semi-quantum key distribution without entanglement. Quantum Inf. Process. 19, 1\u201319 (2020)","journal-title":"Quantum Inf. Process."},{"issue":"8","key":"4909_CR38","doi-asserted-by":"publisher","first-page":"272","DOI":"10.1007\/s11128-021-03090-4","volume":"20","author":"C-H Chang","year":"2021","unstructured":"Chang, C.-H., Lu, Y.-C., Hwang, T.: Measure-resend authenticated semi-quantum key distribution with single photons. Quantum Inf. Process. 20(8), 272 (2021)","journal-title":"Quantum Inf. Process."},{"issue":"8","key":"4909_CR39","doi-asserted-by":"publisher","first-page":"1241","DOI":"10.3390\/math10081241","volume":"10","author":"H-W Wang","year":"2022","unstructured":"Wang, H.-W., Tsai, C.-W., Lin, J., Huang, Y.-Y., Yang, C.-W.: Efficient and secure measure-resend authenticated semi-quantum key distribution protocol against reflecting attack. Mathematics 10(8), 1241 (2022)","journal-title":"Mathematics"},{"issue":"6","key":"4909_CR40","doi-asserted-by":"publisher","first-page":"1023","DOI":"10.1364\/OL.42.001023","volume":"42","author":"Y-Y Ding","year":"2017","unstructured":"Ding, Y.-Y., Chen, W., Chen, H., Wang, C., Li, Y.-P., Wang, S., Yin, Z.-Q., Guo, G.-C., Han, Z.-F.: Polarization-basis tracking scheme for quantum key distribution using revealed sifted key bits. Opt. Lett. 42(6), 1023\u20131026 (2017)","journal-title":"Opt. Lett."},{"key":"4909_CR41","unstructured":"Chou, W.-H., Hwang, T., Gu, J.: Semi-quantum private comparison protocol under an almost-dishonest third party, arXiv preprint arXiv:1607.07961 (2016)"},{"issue":"4","key":"4909_CR42","doi-asserted-by":"publisher","first-page":"170","DOI":"10.1007\/s11128-023-03915-4","volume":"22","author":"C-Q Ye","year":"2023","unstructured":"Ye, C.-Q., Li, J., Chen, X.-B., Hou, Y., Dong, M., Ota, K.: Circular mediated semi-quantum key distribution. Quantum Inf. Process. 22(4), 170 (2023)","journal-title":"Quantum Inf. Process."},{"key":"4909_CR43","doi-asserted-by":"crossref","unstructured":"Deng, F.-G., Li, X.-H., Zhou, H.-Y., Zhang, Z.-j.: Improving the security of multiparty quantum secret sharing against trojan horse attack, Physical Review A-Atomic, Molecular, and Optical Physics 72\u00a0(4) (2005) 044302","DOI":"10.1103\/PhysRevA.72.044302"}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-025-04909-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11128-025-04909-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-025-04909-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T17:41:47Z","timestamp":1760636507000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11128-025-04909-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,4]]},"references-count":43,"journal-issue":{"issue":"9","published-online":{"date-parts":[[2025,9]]}},"alternative-id":["4909"],"URL":"https:\/\/doi.org\/10.1007\/s11128-025-04909-0","relation":{},"ISSN":["1573-1332"],"issn-type":[{"type":"electronic","value":"1573-1332"}],"subject":[],"published":{"date-parts":[[2025,9,4]]},"assertion":[{"value":"29 April 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 August 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 September 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no Conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"297"}}