{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,18]],"date-time":"2026-01-18T11:52:43Z","timestamp":1768737163394,"version":"3.49.0"},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"8","license":[{"start":{"date-parts":[[2015,5,16]],"date-time":"2015-05-16T00:00:00Z","timestamp":1431734400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"published-print":{"date-parts":[[2015,8]]},"DOI":"10.1007\/s11128-015-1015-z","type":"journal-article","created":{"date-parts":[[2015,5,15]],"date-time":"2015-05-15T07:49:34Z","timestamp":1431676174000},"page":"2981-2996","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":78,"title":["Semiquantum key distribution without invoking the classical party\u2019s measurement capability"],"prefix":"10.1007","volume":"14","author":[{"given":"Xiangfu","family":"Zou","sequence":"first","affiliation":[]},{"given":"Daowen","family":"Qiu","sequence":"additional","affiliation":[]},{"given":"Shengyu","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Paulo","family":"Mateus","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,5,16]]},"reference":[{"key":"1015_CR1","unstructured":"Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. In: Proceedings of IEEE International Conference on Computers. Systems and Signal Processing, pp. 175\u2013179. IEEE, Bangalore India (1984)"},{"issue":"6","key":"1015_CR2","doi-asserted-by":"crossref","first-page":"661","DOI":"10.1103\/PhysRevLett.67.661","volume":"67","author":"AK Ekert","year":"1991","unstructured":"Ekert, A.K.: Quantum cryptography based on Bell\u2019s theorem. Phys. Rev. Lett. 67(6), 661\u2013663 (1991)","journal-title":"Phys. Rev. Lett."},{"issue":"5","key":"1015_CR3","doi-asserted-by":"crossref","first-page":"557","DOI":"10.1103\/PhysRevLett.68.557","volume":"68","author":"CH Bennett","year":"1992","unstructured":"Bennett, C.H., Brassard, G., Mermin, N.D.: Quantum cryptography without Bell\u2019s theorem. Phys. Rev. Lett. 68(5), 557\u2013559 (1992)","journal-title":"Phys. Rev. Lett."},{"issue":"5410","key":"1015_CR4","doi-asserted-by":"crossref","first-page":"2050","DOI":"10.1126\/science.283.5410.2050","volume":"283","author":"HK Lo","year":"1999","unstructured":"Lo, H.K., Chau, H.F.: Unconditional security of quantum key distribution over arbitrarily long distances. Science 283(5410), 2050 (1999)","journal-title":"Science"},{"issue":"2","key":"1015_CR5","doi-asserted-by":"crossref","first-page":"441","DOI":"10.1103\/PhysRevLett.85.441","volume":"85","author":"PW Shor","year":"2000","unstructured":"Shor, P.W., Preskill, J.: Simple proof of security of the BB84 quantum key distribution protocol. Phys. Rev. Lett. 85(2), 441\u2013444 (2000)","journal-title":"Phys. Rev. Lett."},{"issue":"14","key":"1015_CR6","doi-asserted-by":"crossref","first-page":"140501","DOI":"10.1103\/PhysRevLett.99.140501","volume":"99","author":"M Boyer","year":"2007","unstructured":"Boyer, M., Kenigsberg, D., Mor, T.: Quantum key distribution with classical Bob. Phys. Rev. Lett. 99(14), 140501 (2007)","journal-title":"Phys. Rev. Lett."},{"issue":"9","key":"1015_CR7","doi-asserted-by":"crossref","first-page":"098901","DOI":"10.1103\/PhysRevLett.102.098901","volume":"102","author":"YG Tan","year":"2009","unstructured":"Tan, Y.G., Lu, H., Cai, Q.Y.: Comment on \u201cQuantum key distribution with classical Bob\u201d. Phys. Rev. Lett. 102(9), 098901 (2009)","journal-title":"Phys. Rev. Lett."},{"issue":"9","key":"1015_CR8","doi-asserted-by":"crossref","first-page":"098902","DOI":"10.1103\/PhysRevLett.102.098902","volume":"102","author":"M Boyer","year":"2009","unstructured":"Boyer, M., Kenigsberg, D., Mor, T.: Boyer, Kenigsberg, and Mor Reply. Phys. Rev. Lett. 102(9), 098902 (2009)","journal-title":"Phys. Rev. Lett."},{"issue":"3","key":"1015_CR9","doi-asserted-by":"crossref","first-page":"032341","DOI":"10.1103\/PhysRevA.79.032341","volume":"79","author":"M Boyer","year":"2009","unstructured":"Boyer, M., Gelles, R., Kenigsberg, D., Mor, T.: Semiquantum key distribution. Phys. Rev. A 79(3), 032341 (2009)","journal-title":"Phys. Rev. A"},{"issue":"6","key":"1015_CR10","doi-asserted-by":"crossref","first-page":"1195","DOI":"10.1142\/S0219749908004353","volume":"6","author":"H Lu","year":"2008","unstructured":"Lu, H., Cai, Q.Y.: Quantum key distribution with classical Alice. Int. J. Quantum Inf. 6(6), 1195\u20131202 (2008)","journal-title":"Int. J. Quantum Inf."},{"issue":"5","key":"1015_CR11","doi-asserted-by":"crossref","first-page":"052312","DOI":"10.1103\/PhysRevA.79.052312","volume":"79","author":"X Zou","year":"2009","unstructured":"Zou, X., Qiu, D., Li, L., Wu, L., Li, L.: Semiquantum-key distribution using less than four quantum states. Phys. Rev. A 79(5), 052312 (2009)","journal-title":"Phys. Rev. A"},{"issue":"4","key":"1015_CR12","doi-asserted-by":"crossref","first-page":"046301","DOI":"10.1103\/PhysRevA.83.046301","volume":"83","author":"M Boyer","year":"2011","unstructured":"Boyer, M., Mor, T.: Comment on \u201cSemiquantum-key distribution using less than four quantum states\u201d. Phys. Rev. A 83(4), 046301 (2011)","journal-title":"Phys. Rev. A"},{"issue":"4","key":"1015_CR13","doi-asserted-by":"crossref","first-page":"046302","DOI":"10.1103\/PhysRevA.83.046302","volume":"83","author":"X Zou","year":"2011","unstructured":"Zou, X., Qiu, D.: Reply to \u201cComment on \u2018Semiquantum-key distribution using less than four quantum states\u201d\u2019. Phys. Rev. A 83(4), 046302 (2011)","journal-title":"Phys. Rev. A"},{"issue":"06","key":"1015_CR14","doi-asserted-by":"crossref","first-page":"1427","DOI":"10.1142\/S0219749911008118","volume":"9","author":"T Miyadera","year":"2011","unstructured":"Miyadera, T.: Relation between information and disturbance in quantum key distribution protocol with classical Alice. Int. J. Quantum Inf. 9(06), 1427\u20131435 (2011)","journal-title":"Int. J. Quantum Inf."},{"key":"1015_CR15","unstructured":"Boyer, M., Mor, T.: On the robustness of (photonic) quantum key distribution with classical Alice. arXiv:1012.2418 (2010)"},{"key":"1015_CR16","doi-asserted-by":"crossref","first-page":"2143","DOI":"10.1088\/1674-1056\/18\/12\/044","volume":"18","author":"XZ Zhang","year":"2009","unstructured":"Zhang, X.Z., Gong, W.G., Tan, Y.G., Ren, Z.Z., Guo, X.T.: Quantum key distribution series network protocol with $$M$$ M -classical Bobs. Chin. Phys. B 18, 2143\u20132148 (2009)","journal-title":"Chin. Phys. B"},{"key":"1015_CR17","doi-asserted-by":"crossref","first-page":"100301","DOI":"10.1088\/0256-307X\/28\/10\/100301","volume":"28","author":"J Wang","year":"2011","unstructured":"Wang, J., Zhang, S., Zhang, Q., Tang, C.J.: Semiquantum key distribution using entangled states. Chin. Phys. Lett. 28, 100301 (2011)","journal-title":"Chin. Phys. Lett."},{"issue":"6","key":"1015_CR18","doi-asserted-by":"crossref","first-page":"1457","DOI":"10.1007\/s11128-014-0740-z","volume":"13","author":"KF Yu","year":"2014","unstructured":"Yu, K.F., Yang, C.W., Liao, C.H., Hwang, T.: Authenticated semi-quantum key distribution protocol using Bell states. Quantum Inf. Process. 13(6), 1457\u20131465 (2014)","journal-title":"Quantum Inf. Process."},{"issue":"11","key":"1015_CR19","doi-asserted-by":"crossref","first-page":"2417","DOI":"10.1007\/s11128-014-0802-2","volume":"13","author":"WO Krawec","year":"2014","unstructured":"Krawec, W.O.: Restricted attacks on semi-quantum key distribution protocols. Quantum Inf. Process. 13(11), 2417\u20132436 (2014)","journal-title":"Quantum Inf. Process."},{"issue":"2","key":"1015_CR20","doi-asserted-by":"crossref","first-page":"681","DOI":"10.1007\/s11128-014-0872-1","volume":"14","author":"YG Yang","year":"2015","unstructured":"Yang, Y.G., Sun, S.J., Zhao, Q.Q.: Trojan-horse attacks on quantum key distribution with classical Bob. Quantum Inf. Process. 14(2), 681\u2013686 (2015)","journal-title":"Quantum Inf. Process."},{"issue":"2","key":"1015_CR21","doi-asserted-by":"crossref","first-page":"022303","DOI":"10.1103\/PhysRevA.82.022303","volume":"82","author":"Q Li","year":"2010","unstructured":"Li, Q., Chan, W.H., Long, D.Y.: Semiquantum secret sharing using entangled states. Phys. Rev. A 82(2), 022303 (2010)","journal-title":"Phys. Rev. A"},{"issue":"05","key":"1015_CR22","doi-asserted-by":"crossref","first-page":"1250050","DOI":"10.1142\/S0219749912500505","volume":"10","author":"J Wang","year":"2012","unstructured":"Wang, J., Zhang, S., Zhang, Q., Tang, C.J.: Semiquantum secret sharing using two-particle entangled state. Int. J. Quantum Inf. 10(05), 1250050 (2012)","journal-title":"Int. J. Quantum Inf."},{"issue":"4","key":"1015_CR23","doi-asserted-by":"crossref","first-page":"045304","DOI":"10.1088\/1751-8113\/46\/4\/045304","volume":"46","author":"L Li","year":"2013","unstructured":"Li, L., Qiu, D., Mateus, P.: Quantum secret sharing with classical Bobs. J. Phys. A Math. Theor. 46(4), 045304 (2013)","journal-title":"J. Phys. A Math. Theor."},{"issue":"9","key":"1015_CR24","doi-asserted-by":"crossref","first-page":"1696","DOI":"10.1007\/s11433-014-5542-x","volume":"57","author":"X Zou","year":"2014","unstructured":"Zou, X., Qiu, D.: Three-step semiquantum secure direct communication protocol. Sci. China Phys. Mech. Astron. 57(9), 1696\u20131702 (2014)","journal-title":"Sci. China Phys. Mech. Astron."},{"issue":"1","key":"1015_CR25","doi-asserted-by":"crossref","first-page":"145","DOI":"10.1103\/RevModPhys.74.145","volume":"74","author":"N Gisin","year":"2002","unstructured":"Gisin, N., Ribordy, G., Tittel, W., Zbinden, H.: Quantum cryptography. Rev. Mod. Phys. 74(1), 145\u2013195 (2002)","journal-title":"Rev. Mod. Phys."},{"issue":"3","key":"1015_CR26","doi-asserted-by":"crossref","first-page":"340","DOI":"10.1109\/3.825881","volume":"36","author":"DS Bethune","year":"2000","unstructured":"Bethune, D.S., Risk, W.P.: An autocompensating fiber-optic quantum cryptography system based on polarization splitting of light. IEEE J. Quantum Electron. 36(3), 340\u2013347 (2000)","journal-title":"IEEE J. Quantum Electron."},{"issue":"20","key":"1015_CR27","doi-asserted-by":"crossref","first-page":"200501","DOI":"10.1103\/PhysRevLett.96.200501","volume":"96","author":"A Cer\u00e8","year":"2006","unstructured":"Cer\u00e8, A., Lucamarini, M., Di Giuseppe, G., Tombesi, P.: Experimental test of two-way quantum key distribution in the presence of controlled noise. Phys. Rev. Lett. 96(20), 200501 (2006)","journal-title":"Phys. Rev. Lett."},{"issue":"9","key":"1015_CR28","doi-asserted-by":"crossref","first-page":"726","DOI":"10.1038\/nphys1018","volume":"4","author":"S Pirandola","year":"2008","unstructured":"Pirandola, S., Mancini, S., Lloyd, S., Braunstein, S.L.: Continuous-variable quantum cryptography using two-way quantum communication. Nat. Phys. 4(9), 726\u2013730 (2008)","journal-title":"Nat. Phys."},{"issue":"5","key":"1015_CR29","doi-asserted-by":"crossref","first-page":"057901","DOI":"10.1103\/PhysRevLett.92.057901","volume":"92","author":"V Scarani","year":"2004","unstructured":"Scarani, V., Ac\u00edn, A., Ribordy, G., Gisin, N.: Quantum cryptography protocols robust against photon number splitting attacks for weak laser pulse implementations. Phys. Rev. Lett. 92(5), 057901 (2004)","journal-title":"Phys. Rev. Lett."},{"issue":"6","key":"1015_CR30","doi-asserted-by":"crossref","first-page":"1330","DOI":"10.1103\/PhysRevLett.85.1330","volume":"85","author":"G Brassard","year":"2000","unstructured":"Brassard, G., L\u00fctkenhaus, N., Mor, T., Sanders, B.C.: Limitations on practical quantum cryptography. Phys. Rev. Lett. 85(6), 1330\u20131333 (2000)","journal-title":"Phys. Rev. Lett."},{"issue":"13","key":"1015_CR31","doi-asserted-by":"crossref","first-page":"2818","DOI":"10.1103\/PhysRevLett.77.2818","volume":"77","author":"D Deutsch","year":"1996","unstructured":"Deutsch, D., Ekert, A., Jozsa, R., Macchiavello, C., Popescu, S., Sanpera, A.: Quantum privacy amplification and the security of quantum cryptography over noisy channels. Phys. Rev. Lett. 77(13), 2818\u20132821 (1996)","journal-title":"Phys. Rev. Lett."},{"issue":"6","key":"1015_CR32","doi-asserted-by":"crossref","first-page":"1915","DOI":"10.1109\/18.476316","volume":"41","author":"CH Bennett","year":"1995","unstructured":"Bennett, C.H., Brassard, G., Cr\u00e9peau, C., Maurer, U.M.: Generalized privacy amplification. IEEE Trans. Inf. Theory 41(6), 1915\u20131923 (1995)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"1015_CR33","unstructured":"Khoo, K., Heng, S.H.: Universal hash functions over $$GF(2^{n})$$ G F ( 2 n ) . In: Proceedings of IEEE International Symposium on Information Theory, p. 205. IEEE, Chicago (2004)"},{"issue":"11","key":"1015_CR34","doi-asserted-by":"crossref","first-page":"2256","DOI":"10.1103\/PhysRevLett.78.2256","volume":"78","author":"E Biham","year":"1997","unstructured":"Biham, E., Mor, T.: Security of quantum cryptography against collective attacks. Phys. Rev. Lett. 78(11), 2256 (1997)","journal-title":"Phys. Rev. Lett."}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-015-1015-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11128-015-1015-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-015-1015-z","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T03:39:22Z","timestamp":1559360362000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11128-015-1015-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,5,16]]},"references-count":34,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2015,8]]}},"alternative-id":["1015"],"URL":"https:\/\/doi.org\/10.1007\/s11128-015-1015-z","relation":{},"ISSN":["1570-0755","1573-1332"],"issn-type":[{"value":"1570-0755","type":"print"},{"value":"1573-1332","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,5,16]]}}}