{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,22]],"date-time":"2025-11-22T17:01:34Z","timestamp":1763830894188,"version":"3.37.3"},"reference-count":41,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2018,4,25]],"date-time":"2018-04-25T00:00:00Z","timestamp":1524614400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"NSFC","doi-asserted-by":"crossref","award":["61272058","61572532"],"award-info":[{"award-number":["61272058","61572532"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"published-print":{"date-parts":[[2018,6]]},"DOI":"10.1007\/s11128-018-1904-z","type":"journal-article","created":{"date-parts":[[2018,4,25]],"date-time":"2018-04-25T08:10:03Z","timestamp":1524643803000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":49,"title":["Security of a single-state semi-quantum key distribution protocol"],"prefix":"10.1007","volume":"17","author":[{"given":"Wei","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Daowen","family":"Qiu","sequence":"additional","affiliation":[]},{"given":"Paulo","family":"Mateus","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,4,25]]},"reference":[{"key":"1904_CR1","unstructured":"Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. In: Proceedings of IEEE International Conference on Computers. Systems and Signal Processing, IEEE, Bangalore, pp. 175C179 (1984)"},{"key":"1904_CR2","doi-asserted-by":"publisher","first-page":"3121","DOI":"10.1103\/PhysRevLett.68.3121","volume":"68","author":"CH Bennett","year":"1992","unstructured":"Bennett, C.H.: Quantum cryptography using any two nonorthogonal states. Phys. Rev. Lett. 68, 3121\u20133124 (1992)","journal-title":"Phys. Rev. Lett."},{"key":"1904_CR3","doi-asserted-by":"publisher","first-page":"012309","DOI":"10.1103\/PhysRevA.69.012309","volume":"69","author":"A Acin","year":"2004","unstructured":"Acin, A., Gisin, N., Scarani, V.: Coherent-pulse implementations of quantum cryptography protocols resistant to photon-number-splitting attacks. Phys. Rev. A 69, 012309 (2004)","journal-title":"Phys. Rev. A"},{"key":"1904_CR4","doi-asserted-by":"publisher","first-page":"042342","DOI":"10.1103\/PhysRevA.74.042342","volume":"74","author":"CHF Fung","year":"2006","unstructured":"Fung, C.H.F., Lo, H.K.: Security proof of a three-state quantum-key-distribution protocol without rotational symmetry. Phys. Rev. A 74, 042342 (2006)","journal-title":"Phys. Rev. A"},{"issue":"5410","key":"1904_CR5","doi-asserted-by":"publisher","first-page":"2050","DOI":"10.1126\/science.283.5410.2050","volume":"283","author":"HK Lo","year":"1999","unstructured":"Lo, H.K., Chau, H.F.: Unconditional security of quantum key distribution over arbitrarily long distances. Science 283(5410), 2050 (1999)","journal-title":"Science"},{"issue":"2","key":"1904_CR6","doi-asserted-by":"publisher","first-page":"441","DOI":"10.1103\/PhysRevLett.85.441","volume":"85","author":"PW Shor","year":"2000","unstructured":"Shor, P.W., Preskill, J.: Simple proof of security of the BB84 quantum key distribution protocol. Phys. Rev. Lett. 85(2), 441\u2013444 (2000)","journal-title":"Phys. Rev. Lett."},{"issue":"3","key":"1904_CR7","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1145\/382780.382781","volume":"48","author":"D Mayers","year":"2001","unstructured":"Mayers, D.: Unconditional security in quantum cryptography. J. ACM (JACM) 48(3), 351\u2013406 (2001)","journal-title":"J. ACM (JACM)"},{"issue":"14","key":"1904_CR8","doi-asserted-by":"publisher","first-page":"140501","DOI":"10.1103\/PhysRevLett.99.140501","volume":"99","author":"M Boyer","year":"2007","unstructured":"Boyer, M., Kenigsberg, D., Mor, T.: Quantum key distribution with classical Bob. Phys. Rev. Lett. 99(14), 140501 (2007)","journal-title":"Phys. Rev. Lett."},{"issue":"06","key":"1904_CR9","doi-asserted-by":"publisher","first-page":"1195","DOI":"10.1142\/S0219749908004353","volume":"6","author":"L Hua","year":"2008","unstructured":"Hua, L., Cai, Q.Y.: Quantum key distribution with classical alice. Int. J. Quantum Inf. 6(06), 1195\u20131202 (2008)","journal-title":"Int. J. Quantum Inf."},{"key":"1904_CR10","doi-asserted-by":"publisher","first-page":"032341","DOI":"10.1103\/PhysRevA.79.032341","volume":"79","author":"M Boyer","year":"2009","unstructured":"Boyer, M., Gelles, R., Kenigsberg, D., Mor, T.: Semiquantum key distribution. Phys. Rev. A 79, 032341 (2009)","journal-title":"Phys. Rev. A"},{"key":"1904_CR11","doi-asserted-by":"publisher","first-page":"052312","DOI":"10.1103\/PhysRevA.79.052312","volume":"79","author":"X Zou","year":"2009","unstructured":"Zou, X., Qiu, D., Li, L., Wu, L., Li, L.: Semiquantum-key distribution using less than four quantum states. Phys. Rev. A 79, 052312 (2009)","journal-title":"Phys. Rev. A"},{"issue":"6","key":"1904_CR12","doi-asserted-by":"publisher","first-page":"2143","DOI":"10.1088\/1674-1056\/18\/6\/006","volume":"18","author":"XZ Zhang","year":"2009","unstructured":"Zhang, X.Z., Gong, W.G., Tan, Y.G.: Quantum key distribution series network protocol with m-classical bobs. Chin. Phys. B 18(6), 2143 (2009)","journal-title":"Chin. Phys. B"},{"issue":"10","key":"1904_CR13","doi-asserted-by":"publisher","first-page":"100301","DOI":"10.1088\/0256-307X\/28\/10\/100301","volume":"28","author":"J Wang","year":"2011","unstructured":"Wang, J., Zhang, S., Zhang, Q., Tang, C.: Semiquantum key distribution using entangled states. Chin. Phys. Lett. 28(10), 100301 (2011)","journal-title":"Chin. Phys. Lett."},{"issue":"1","key":"1904_CR14","doi-asserted-by":"publisher","first-page":"1350005","DOI":"10.1142\/S0219749913500056","volume":"11","author":"ZW Sun","year":"2013","unstructured":"Sun, Z.W., Du, R.G., Long, D.Y.: Quantum key distributionwith limited classical bob. Int. J. Quantum Inf. 11(1), 1350005 (2013)","journal-title":"Int. J. Quantum Inf."},{"issue":"6","key":"1904_CR15","doi-asserted-by":"publisher","first-page":"1457","DOI":"10.1007\/s11128-014-0740-z","volume":"13","author":"KF Yu","year":"2014","unstructured":"Yu, K.F., Yang, C.W., Liao, C.H., Hwang, T.: Authenticated semi-quantum key distribution protocol using bell states. Quantum Inf. Process. 13(6), 1457\u20131465 (2014)","journal-title":"Quantum Inf. Process."},{"issue":"3","key":"1904_CR16","doi-asserted-by":"publisher","first-page":"032323","DOI":"10.1103\/PhysRevA.91.032323","volume":"91","author":"WO Krawec","year":"2015","unstructured":"Krawec, W.O.: Mediated semiquantum key distribution. Phys. Rev. A 91(3), 032323 (2015)","journal-title":"Phys. Rev. A"},{"issue":"8","key":"1904_CR17","doi-asserted-by":"publisher","first-page":"2981","DOI":"10.1007\/s11128-015-1015-z","volume":"14","author":"X Zou","year":"2015","unstructured":"Zou, X., Qiu, D., Zhang, S., Mateus, P.: Semiquantum key distribution without invoking the classical partys measurement capability. Quantum Inf. Process. 14(8), 2981\u20132996 (2015)","journal-title":"Quantum Inf. Process."},{"key":"1904_CR18","doi-asserted-by":"crossref","unstructured":"Li, Q., Chan, W.H., Zhang, S.: Real semiquantum key distribution with secure delegated quantum computation. ArXiv preprint \n                    arXiv:1508.07090\n                    \n                   (2015)","DOI":"10.1038\/srep19898"},{"issue":"5","key":"1904_CR19","doi-asserted-by":"publisher","first-page":"2067","DOI":"10.1007\/s11128-016-1266-3","volume":"15","author":"WO Krawec","year":"2016","unstructured":"Krawec, W.O.: Security of a semi-quantum protocol where reflections contribute to the secret key. Quantum Inf. Process. 15(5), 2067\u20132090 (2016)","journal-title":"Quantum Inf. Process."},{"issue":"6","key":"1904_CR20","doi-asserted-by":"publisher","first-page":"1427","DOI":"10.1142\/S0219749911008118","volume":"9","author":"T Miyadera","year":"2011","unstructured":"Miyadera, T.: Relation between information and disturbance in quantum key distribution protocol with classical alice. Int. J. Quantum Inf. 9(6), 1427\u20131435 (2011)","journal-title":"Int. J. Quantum Inf."},{"issue":"11","key":"1904_CR21","doi-asserted-by":"publisher","first-page":"2417","DOI":"10.1007\/s11128-014-0802-2","volume":"13","author":"WO Krawec","year":"2014","unstructured":"Krawec, W.O.: Restricted attacks on semi-quantum key distribution protocols. Quantum Inf. Process. 13(11), 2417\u20132436 (2014)","journal-title":"Quantum Inf. Process."},{"key":"1904_CR22","doi-asserted-by":"crossref","unstructured":"Krawec, W.O.: Security proof of a semi-quantum key distribution protocol. In: IEEE International Symposium on Information Theory (ISIT), IEEE, pp. 686\u2013690 (2015)","DOI":"10.1109\/ISIT.2015.7282542"},{"key":"1904_CR23","unstructured":"Krawec, W.O.: Semi-Quantum Key Distribution. Ph.D. thesis, Stevens Institute of Technology (2015)"},{"key":"1904_CR24","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511976667","volume-title":"Quantum Computation and Quantum Information","author":"MA Nielsen","year":"2010","unstructured":"Nielsen, M.A., Chuang, I.L.: Quantum Computation and Quantum Information. Cambridge University Press, Cambridge (2010)"},{"key":"1904_CR25","unstructured":"Wilde, M.M.: From classical to quantum Shannon theory. \n                    arXiv:1106.1445\n                    \n                   (2011)"},{"key":"1904_CR26","doi-asserted-by":"publisher","first-page":"012332","DOI":"10.1103\/PhysRevA.72.012332","volume":"72","author":"R Renner","year":"2005","unstructured":"Renner, R., Gisin, N., Kraus, B.: Information-theoretic security proof for quantum-key-distribution protocols. Phys. Rev. A 72, 012332 (2005)","journal-title":"Phys. Rev. A"},{"issue":"2053","key":"1904_CR27","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1098\/rspa.2004.1372","volume":"461","author":"I Devetak","year":"2005","unstructured":"Devetak, I., Winter, A.: Distillation of secret key and entanglement from quantum states. Proc. R. Soc. A Math. Phys. Eng. Sci. 461(2053), 207\u2013235 (2005)","journal-title":"Proc. R. Soc. A Math. Phys. Eng. Sci."},{"key":"1904_CR28","doi-asserted-by":"publisher","first-page":"080501","DOI":"10.1103\/PhysRevLett.95.080501","volume":"95","author":"B Kraus","year":"2005","unstructured":"Kraus, B., Gisin, N., Renner, R.: Lower and upper bounds on the secret-key rate for quantum key distribution protocols using one-way classical communication. Phys. Rev. Lett. 95, 080501 (2005)","journal-title":"Phys. Rev. Lett."},{"issue":"2","key":"1904_CR29","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1007\/s00145-004-0142-y","volume":"18","author":"HK Lo","year":"2005","unstructured":"Lo, H.K., Fung, C.H.F., Ardehali, M.: Efficient quantum key distribution scheme and a proof of its unconditional security. J. Cryptol. 18(2), 133\u2013165 (2005)","journal-title":"J. Cryptol."},{"issue":"3","key":"1904_CR30","doi-asserted-by":"publisher","first-page":"1301","DOI":"10.1103\/RevModPhys.81.1301","volume":"81","author":"V Scarani","year":"2009","unstructured":"Scarani, V., Bechmann-Pasquinucci, H., Cerf, N.J., et al.: The security of practical quantum key distribution. Rev. Mod. Phys. 81(3), 1301 (2009)","journal-title":"Rev. Mod. Phys."},{"issue":"12","key":"1904_CR31","doi-asserted-by":"publisher","first-page":"122108","DOI":"10.1063\/1.2146188","volume":"46","author":"R K\u00f6nig","year":"2005","unstructured":"K\u00f6nig, R., Renner, R.: A de Finetti representation for finite symmetric quantum states. J. Math. Phys. 46(12), 122108 (2005)","journal-title":"J. Math. Phys."},{"issue":"12","key":"1904_CR32","doi-asserted-by":"publisher","first-page":"2501","DOI":"10.1080\/09500349314552491","volume":"40","author":"SM Barnett","year":"1993","unstructured":"Barnett, S.M., Huttner, B., Phoenix, S.J.D.: Eavesdropping strategies and rejected-data protocols in quantum cryptography. J. Mod. Opt. 40(12), 2501\u20132513 (1993)","journal-title":"J. Mod. Opt."},{"issue":"4","key":"1904_CR33","doi-asserted-by":"publisher","first-page":"042316","DOI":"10.1103\/PhysRevA.78.042316","volume":"78","author":"S Watanabe","year":"2008","unstructured":"Watanabe, S., Matsumoto, R., Uyematsu, T.: Tomography increases key rates of quantum-key-distribution protocols. Phys. Rev. A 78(4), 042316 (2008)","journal-title":"Phys. Rev. A"},{"issue":"10","key":"1904_CR34","doi-asserted-by":"publisher","first-page":"2870","DOI":"10.1093\/ietfec\/e91-a.10.2870","volume":"91","author":"R Matsumoto","year":"2008","unstructured":"Matsumoto, R., Watanabe, S.: Key rate available from mismatched measurements in the BB84 protocol and the uncertainty principle. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 91(10), 2870\u20132873 (2008)","journal-title":"IEICE Trans. Fundam. Electron. Commun. Comput. Sci."},{"issue":"14","key":"1904_CR35","doi-asserted-by":"publisher","first-page":"145302","DOI":"10.1088\/1751-8113\/43\/14\/145302","volume":"43","author":"R Matsumoto","year":"2010","unstructured":"Matsumoto, R., Watanabe, S.: Narrow basis angle doubles secret key in the BB84 protocol. J. Phys. A Math. Theor. 43(14), 145302 (2010)","journal-title":"J. Phys. A Math. Theor."},{"issue":"3\u20134","key":"1904_CR36","first-page":"209","volume":"17","author":"WO Krawec","year":"2017","unstructured":"Krawec, W.O.: Quantum key distribution with mismatched measurements over arbitrary channels. Quantum Inf. Comput. 17(3\u20134), 209\u2013241 (2017)","journal-title":"Quantum Inf. Comput."},{"key":"1904_CR37","unstructured":"Christandl, M., Renner, R., Ekert, A.: A Generic Security Proof for Quantum Key Distribution. ArXiv preprint quant-ph\/0402131 (2004)"},{"key":"1904_CR38","doi-asserted-by":"crossref","unstructured":"Matsumoto, R.: Improved asymptotic key rate of the B92 protocol. In: IEEE International Symposium on Information Theory Proceedings (ISIT), IEEE 2013, pp. 351\u2013353 (2013)","DOI":"10.1109\/ISIT.2013.6620246"},{"key":"1904_CR39","doi-asserted-by":"publisher","first-page":"5635","DOI":"10.1103\/PhysRevLett.85.5635","volume":"85","author":"A Cabello","year":"2000","unstructured":"Cabello, A.: Quantum key distribution in the Holevo limit. Phys. Rev. Lett. 85, 5635 (2000)","journal-title":"Phys. Rev. Lett."},{"key":"1904_CR40","doi-asserted-by":"crossref","unstructured":"Krawec, W.O.: A genetic algorithm to analyze the security of quantum cryptographic protocols. In Proceedings of 2016 IEEE Congress on Evolutionary Computation (CEC), IEEE, 2016, pp. 2098\u20132105 (2016)","DOI":"10.1109\/CEC.2016.7744047"},{"issue":"12","key":"1904_CR41","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1007\/s11128-017-1736-2","volume":"16","author":"C Shukla","year":"2017","unstructured":"Shukla, C., Thapliyal, K., Pathak, A.: Semi-quantum communication: protocols for key agreement, controlled secure direct communication and dialogue. Quantum Inf. Process. 16(12), 295 (2017)","journal-title":"Quantum Inf. Process."}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11128-018-1904-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-018-1904-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-018-1904-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,24]],"date-time":"2019-04-24T19:28:12Z","timestamp":1556134092000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11128-018-1904-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,4,25]]},"references-count":41,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2018,6]]}},"alternative-id":["1904"],"URL":"https:\/\/doi.org\/10.1007\/s11128-018-1904-z","relation":{},"ISSN":["1570-0755","1573-1332"],"issn-type":[{"type":"print","value":"1570-0755"},{"type":"electronic","value":"1573-1332"}],"subject":[],"published":{"date-parts":[[2018,4,25]]},"assertion":[{"value":"9 December 2016","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 April 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 April 2018","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"135"}}