{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,3]],"date-time":"2022-04-03T01:32:49Z","timestamp":1648949569574},"reference-count":42,"publisher":"Springer Science and Business Media LLC","issue":"11","license":[{"start":{"date-parts":[[2015,9,29]],"date-time":"2015-09-29T00:00:00Z","timestamp":1443484800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Sci. China Inf. Sci."],"published-print":{"date-parts":[[2015,11]]},"DOI":"10.1007\/s11432-015-5408-5","type":"journal-article","created":{"date-parts":[[2015,9,30]],"date-time":"2015-09-30T20:42:01Z","timestamp":1443645721000},"page":"1-11","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["A public key cryptosystem based on data complexity under quantum environment"],"prefix":"10.1007","volume":"58","author":[{"given":"WanQing","family":"Wu","sequence":"first","affiliation":[]},{"given":"HuanGuo","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"HouZhen","family":"Wang","sequence":"additional","affiliation":[]},{"given":"ShaoWu","family":"Mao","sequence":"additional","affiliation":[]},{"given":"JianWei","family":"Jia","sequence":"additional","affiliation":[]},{"given":"JinHui","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,9,29]]},"reference":[{"key":"5408_CR1","doi-asserted-by":"crossref","first-page":"553","DOI":"10.1098\/rspa.1992.0167","volume":"439","author":"D Deutsch","year":"1992","unstructured":"Deutsch D, Jozsa R. Rapid solution of problems by quantum computation. Math Phys Sci, 1992, 439: 553\u2013558","journal-title":"Math Phys Sci"},{"key":"5408_CR2","doi-asserted-by":"crossref","first-page":"1411","DOI":"10.1137\/S0097539796300921","volume":"26","author":"E Bernstein","year":"1997","unstructured":"Bernstein E, Vazirani U. Quantum complexity theory. SIAM J Comput, 1997, 26: 1411\u20131473","journal-title":"SIAM J Comput"},{"key":"5408_CR3","doi-asserted-by":"crossref","first-page":"1474","DOI":"10.1137\/S0097539796298637","volume":"26","author":"D R Simon","year":"1997","unstructured":"Simon D R. On the power of quantum computation. SIAM J Comput, 1997, 26: 1474\u20131483","journal-title":"SIAM J Comput"},{"key":"5408_CR4","doi-asserted-by":"crossref","first-page":"325","DOI":"10.1103\/PhysRevLett.79.325","volume":"79","author":"L K Grover","year":"1997","unstructured":"Grover L K. Quantum mechanics helps in searching for a needle in haystack. Phys Rev Lett, 1997, 79: 325\u2013328","journal-title":"Phys Rev Lett"},{"key":"5408_CR5","doi-asserted-by":"crossref","first-page":"1484","DOI":"10.1137\/S0097539795293172","volume":"26","author":"P W Shor","year":"1997","unstructured":"Shor P W. Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM J Comput, 1997, 26: 1484\u20131509","journal-title":"SIAM J Comput"},{"key":"5408_CR6","volume-title":"Proceedings of the 1st NASA International Conference on Quantum Computing and Quantum Communication","author":"M Mosca","year":"1999","unstructured":"Mosca M, Ekert A. The hidden subgroup problem and eigenvalue estimation on a quantum computer. In: Proceedings of the 1st NASA International Conference on Quantum Computing and Quantum Communication. Berlin: Springer, 1999"},{"key":"5408_CR7","doi-asserted-by":"crossref","first-page":"916","DOI":"10.1137\/S009753970139450X","volume":"32","author":"S Hallgren","year":"2003","unstructured":"Hallgren S, Russell A, Ta-Shma A. The hidden subgroup problem and quantum computation using group representations. SIAM J Comput, 2003, 32: 916\u2013934","journal-title":"SIAM J Comput"},{"key":"5408_CR8","first-page":"10","volume-title":"Proceedings of IEEE International Conference on Computers, Systems and Signal Processing","author":"C H Bennett","year":"1984","unstructured":"Bennett C H, Brassard G. Quantum cryptography:public key distribution and coin tossing. In: Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, Bangalor, 1984. 10\u201312"},{"key":"5408_CR9","doi-asserted-by":"crossref","first-page":"1895","DOI":"10.1103\/PhysRevLett.70.1895","volume":"70","author":"C H Bennett","year":"1993","unstructured":"Bennett C H, Brassard G, Cr\u00e9peau C, et al. Teleporting an unknown quantum state via dual classical and Einstein-Podolsky-Rosen channels. Phys Rev Lett, 1993, 70: 1895\u20131899","journal-title":"Phys Rev Lett"},{"key":"5408_CR10","doi-asserted-by":"crossref","first-page":"3824","DOI":"10.1103\/PhysRevA.54.3824","volume":"54","author":"C H Bennett","year":"1996","unstructured":"Bennett C H, DiVincenzo D P, Smolin J A, et al. Mixed-state entanglement and quantum error correction. Phys Rev A, 1996, 54: 3824\u20133851","journal-title":"Phys Rev A"},{"key":"5408_CR11","first-page":"14","volume":"2","author":"D W Leung","year":"2002","unstructured":"Leung D W. Quantum vernam cipher. Quantum Inf Comput, 2002, 2: 14\u201334","journal-title":"Quantum Inf Comput"},{"key":"5408_CR12","doi-asserted-by":"crossref","unstructured":"Shi J J, Shi R H, Guo Y, et al. Batch proxy quantum blind signature scheme. Sci China Inf Sci, 2013, 56: 052115","DOI":"10.1007\/s11432-011-4422-5"},{"key":"5408_CR13","doi-asserted-by":"crossref","unstructured":"Xiao F Y, Chen H W. Construction of minimal trellises for quantum stabilizer codes. Sci China Inf Sci, 2013, 56: 012306","DOI":"10.1007\/s11432-012-4595-6"},{"key":"5408_CR14","first-page":"233","volume-title":"Proceedings of the 5th Annual Meeting on DNA Based Computers","author":"A Gehani","year":"2003","unstructured":"Gehani A, Labean T H, Reif J H. DNA-based cryptography. In: Proceedings of the 5th Annual Meeting on DNA Based Computers, Cambridge, 2003. 233\u2013249"},{"key":"5408_CR15","doi-asserted-by":"crossref","first-page":"324","DOI":"10.1007\/s11432-007-0025-6","volume":"50","author":"M X Lu","year":"2007","unstructured":"Lu M X, Lai X J, Xiao G Z, et al. A symmetric key cryptography with DNA technology. Sci China Ser F-Inf Sci, 2007, 50: 324\u2013333","journal-title":"Sci China Ser F-Inf Sci"},{"key":"5408_CR16","doi-asserted-by":"crossref","first-page":"506","DOI":"10.1007\/s11432-010-0063-3","volume":"53","author":"X J Lai","year":"2010","unstructured":"Lai X J, Lu M X, Qin L, et al. Asymmetric encryption and signature method with DNA technology. Sci China Inf Sci, 2010, 53: 506\u2013514","journal-title":"Sci China Inf Sci"},{"key":"5408_CR17","first-page":"147","volume-title":"Proceedings of 20th Annual International Cryptology Conference","author":"T Okamoto","year":"2000","unstructured":"Okamoto T, Tanaka K, Uchiyama S. Quantum public-key cryptosystems. In: Proceedings of 20th Annual International Cryptology Conference, Santa Barbara, 2000. 147\u2013165"},{"key":"5408_CR18","volume-title":"Post-quantum Cryptography","author":"D J Bernstein","year":"2000","unstructured":"Bernstein D J, Buchmann J, Dahmen E. Post-quantum Cryptography. Berlin: Springer, 2000"},{"key":"5408_CR19","doi-asserted-by":"crossref","first-page":"1161","DOI":"10.1007\/s11432-011-4262-3","volume":"54","author":"H Z Wang","year":"2011","unstructured":"Wang H Z, Zhang H G, Wang Z Y, et al. Extended multivariate public key cryptosystems with secure encryption function. Sci China Inf Sci, 2011, 54: 1161\u20131171","journal-title":"Sci China Inf Sci"},{"key":"5408_CR20","first-page":"022304","volume":"57","author":"L W Mu","year":"2014","unstructured":"Mu L W, Liu X C, Liang C L. Improved construction of LDPC convolutional codes with semi-random parity-check matrices. Sci China Inf Sci, 2014, 57: 022304","journal-title":"Sci China Inf Sci"},{"key":"5408_CR21","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1007\/BF00630563","volume":"4","author":"E Biham","year":"1991","unstructured":"Biham E, Shamir A. Differential cryptanalysis of DES-like cryptosystems. J Cryptol, 1991, 4: 3\u201372","journal-title":"J Cryptol"},{"key":"5408_CR22","first-page":"487","volume-title":"Proceedings of the 12th Annual International Cryptology Conference","author":"E Biham","year":"1993","unstructured":"Biham E, Shamir A. Differential cryptanalysis of the full 16-round DES. In: Proceedings of the 12th Annual International Cryptology Conference, Santa Barbara, 1993. 487\u2013496"},{"key":"5408_CR23","volume-title":"Cryptanalysis (in Chinese)","author":"D G Feng","year":"2000","unstructured":"Feng D G. Cryptanalysis (in Chinese). Beijing: Tsinghua University Press, 2000"},{"key":"5408_CR24","doi-asserted-by":"crossref","first-page":"1510","DOI":"10.1137\/S0097539796300933","volume":"26","author":"C H Bennett","year":"1997","unstructured":"Bennett C H, Brassard G, Vazirani U, et al. Strengths and weaknesses of quantum computing. SIAM J Comput, 1997, 26: 1510\u20131523","journal-title":"SIAM J Comput"},{"key":"5408_CR25","doi-asserted-by":"crossref","first-page":"4087","DOI":"10.1103\/PhysRevLett.74.4087","volume":"74","author":"T Sleator","year":"1995","unstructured":"Sleator T, Weinfurter H. Realizable universal quantum logic gates. Phys Rev Lett, 1995, 74: 4087\u20134090","journal-title":"Phys Rev Lett"},{"key":"5408_CR26","doi-asserted-by":"crossref","first-page":"4083","DOI":"10.1103\/PhysRevLett.74.4083","volume":"74","author":"A Barenco","year":"1995","unstructured":"Barenco A, Deutsch D, Ekert A, et al. Conditional quantum dynamics and logic gates. Phys Rev Lett, 1995, 74: 4083\u20134086","journal-title":"Phys Rev Lett"},{"key":"5408_CR27","doi-asserted-by":"crossref","first-page":"4714","DOI":"10.1103\/PhysRevLett.75.4714","volume":"75","author":"C Monroe","year":"1995","unstructured":"Monroe C, Meekhof D M, King B E, et al. Demonstration of a fundamental quantum logic gate. Phys Rev Lett, 1995, 75: 4714\u20134717","journal-title":"Phys Rev Lett"},{"key":"5408_CR28","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1103\/PhysRevA.54.147","volume":"54","author":"V V Vedral","year":"1996","unstructured":"Vedral V V, Barenco A, Ekert A. Quantum networks for elementary arithmetic operations. Phys Rev A, 1996, 54: 147\u2013153","journal-title":"Phys Rev A"},{"key":"5408_CR29","doi-asserted-by":"crossref","first-page":"1034","DOI":"10.1103\/PhysRevA.54.1034","volume":"54","author":"D Beckman","year":"1996","unstructured":"Beckman D, Chari A N, Devabhaktuni S, et al. Efficient networks for quantum factoring. Phys Rev A, 1996, 54: 1034\u20131063","journal-title":"Phys Rev A"},{"key":"5408_CR30","unstructured":"Christof Z. Fast versions of Shor\u2019s quantum factoring algorithm. arXiv: quant-ph\/9806084"},{"key":"5408_CR31","doi-asserted-by":"crossref","first-page":"3049","DOI":"10.1103\/PhysRevLett.85.3049","volume":"85","author":"S Parker","year":"2000","unstructured":"Parker S, Plenio M B. Efficient factorization with a single pure qubit and logN mixed qubits. Phys Rev Lett, 2000, 85: 3049\u20133052","journal-title":"Phys Rev Lett"},{"key":"5408_CR32","volume-title":"Protecting Information: from Classical Error Correction to Quantum Cryptograph","author":"L Susan","year":"2006","unstructured":"Susan L. Protecting Information: from Classical Error Correction to Quantum Cryptograph. Cambridge: Cambridge University Press, 2006"},{"key":"5408_CR33","doi-asserted-by":"crossref","first-page":"773","DOI":"10.1038\/nature07607","volume":"456","author":"H Riedmatten de","year":"2008","unstructured":"de Riedmatten H, Afzelius M, Staudt M U, et al. A solid-state light-matter interface at the single-photon level. Nature, 2008, 456: 773\u2013777","journal-title":"Nature"},{"key":"5408_CR34","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1126\/science.1208517","volume":"334","author":"M Mariantoni","year":"2011","unstructured":"Mariantoni M, Wang H, Yamamoto T, et al. Implementing the quantum von Neumann architecture with superconducting circuits. Science, 2011, 334: 61\u201365","journal-title":"Science"},{"key":"5408_CR35","doi-asserted-by":"crossref","first-page":"050304","DOI":"10.1103\/PhysRevA.65.050304","volume":"65","author":"E Kashefi","year":"2002","unstructured":"Kashefi E, Kent A, Vedral V, et al. Comparison of quantum oracles. Phys Rev A, 2002, 65: 050304","journal-title":"Phys Rev A"},{"key":"5408_CR36","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511976667","volume-title":"Quantum Computation and Quantum Information","author":"M A Nielsen","year":"2010","unstructured":"Nielsen M A, Chuang I L. Quantum Computation and Quantum Information. Cambridge: Cambridge University Press, 2010"},{"key":"5408_CR37","doi-asserted-by":"crossref","first-page":"644","DOI":"10.1016\/0196-6774(90)90014-6","volume":"11","author":"J Hastad","year":"1990","unstructured":"Hastad J. Tensor rank is NP-complete. J Algorithms, 1990, 11: 644\u2013654","journal-title":"J Algorithms"},{"key":"5408_CR38","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1145\/2512329","volume":"60","author":"C J Hillar","year":"2013","unstructured":"Hillar C J, Lim L-H. Most tensor problems are NP hard. J ACM, 2013, 60: 45","journal-title":"J ACM"},{"key":"5408_CR39","doi-asserted-by":"crossref","first-page":"124","DOI":"10.1109\/CC.2014.6969777","volume":"11","author":"S Mao","year":"2014","unstructured":"Mao S, Zhang H G, Wu W Q, et al. A resistant quantum key exchange protocol and its corresponding encryption scheme. China Commun, 2014, 11: 124\u2013134","journal-title":"China Commun"},{"key":"5408_CR40","volume-title":"Applied Cryptography: Protocols, Algorithms, and Source Code in C","author":"B Schneier","year":"1996","unstructured":"Schneier B. Applied Cryptography: Protocols, Algorithms, and Source Code in C. New York: Wiley, 1996"},{"key":"5408_CR41","doi-asserted-by":"crossref","first-page":"813","DOI":"10.1007\/s11128-014-0909-5","volume":"14","author":"W Q Wu","year":"2015","unstructured":"Wu W Q, Zhang H G, Mao S W, et al. Quantum algorithm to find invariant linear structure of MD hash functions. Quantum Inf Process, 2015, 14: 813\u2013829","journal-title":"Quantum Inf Process"},{"key":"5408_CR42","doi-asserted-by":"crossref","first-page":"1215","DOI":"10.1007\/s11128-015-0940-1","volume":"14","author":"W Q Wu","year":"2015","unstructured":"Wu W Q, Zhang H G, Wang H Z, et al. Polynomial-time quantum algorithms for finding the linear structures of Boolean function. Quantum Inf Process, 2015, 14: 1215\u20131226","journal-title":"Quantum Inf Process"}],"container-title":["Science China Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-015-5408-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11432-015-5408-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-015-5408-5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T15:38:03Z","timestamp":1559403483000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11432-015-5408-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,9,29]]},"references-count":42,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2015,11]]}},"alternative-id":["5408"],"URL":"https:\/\/doi.org\/10.1007\/s11432-015-5408-5","relation":{},"ISSN":["1674-733X","1869-1919"],"issn-type":[{"value":"1674-733X","type":"print"},{"value":"1869-1919","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,9,29]]}}}