{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,18]],"date-time":"2026-04-18T20:58:38Z","timestamp":1776545918095,"version":"3.51.2"},"reference-count":73,"publisher":"Springer Science and Business Media LLC","issue":"9","license":[{"start":{"date-parts":[[2014,6,27]],"date-time":"2014-06-27T00:00:00Z","timestamp":1403827200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Sci. China Phys. Mech. Astron."],"published-print":{"date-parts":[[2014,9]]},"DOI":"10.1007\/s11433-014-5542-x","type":"journal-article","created":{"date-parts":[[2014,6,27]],"date-time":"2014-06-27T01:46:24Z","timestamp":1403833584000},"page":"1696-1702","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":156,"title":["Three-step semiquantum secure direct communication protocol"],"prefix":"10.1007","volume":"57","author":[{"given":"XiangFu","family":"Zou","sequence":"first","affiliation":[]},{"given":"DaoWen","family":"Qiu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,6,27]]},"reference":[{"key":"5542_CR1","doi-asserted-by":"crossref","first-page":"124","DOI":"10.1109\/SFCS.1994.365700","volume-title":"Proceedings of the 35th Annual Symposium on Foundations of Computer Science","author":"P W Shor","year":"1994","unstructured":"Shor P W. Algorithms for quantum computation: Discrete logarithms and factoring. In: Proceedings of the 35th Annual Symposium on Foundations of Computer Science. Santa Fe: IEEE Computer Society Press, 1994. 124\u2013134"},{"key":"5542_CR2","first-page":"175","volume-title":"Proceedings of International Conference on Computers, Systems and Signal Processing","author":"C H Bennett","year":"1984","unstructured":"Bennett C H, Brassard G. Quantum cryptography: Public key distribution and coin tossing. In: Proceedings of International Conference on Computers, Systems and Signal Processing. Bangalore: IEEE, 1984. 175\u2013179"},{"key":"5542_CR3","doi-asserted-by":"crossref","first-page":"661","DOI":"10.1103\/PhysRevLett.67.661","volume":"67","author":"A K Ekert","year":"1991","unstructured":"Ekert A K. Quantum cryptography based on Bells theorem. Phys Rev Lett, 1991, 67: 661\u2013663","journal-title":"Phys Rev Lett"},{"key":"5542_CR4","doi-asserted-by":"crossref","first-page":"3121","DOI":"10.1103\/PhysRevLett.68.3121","volume":"68","author":"C H Bennett","year":"1992","unstructured":"Bennett C H. Quantum cryptography using any two nonorthogonal states. Phys Rev Lett, 1992, 68: 3121\u20133124","journal-title":"Phys Rev Lett"},{"key":"5542_CR5","doi-asserted-by":"crossref","first-page":"2050","DOI":"10.1126\/science.283.5410.2050","volume":"283","author":"H K Lo","year":"1999","unstructured":"Lo H K, Chau H F. Unconditional security of quantum key distribution over arbitrarily long distances. Science, 1999, 283: 2050","journal-title":"Science"},{"key":"5542_CR6","doi-asserted-by":"crossref","first-page":"441","DOI":"10.1103\/PhysRevLett.85.441","volume":"85","author":"P W Shor","year":"2000","unstructured":"Shor P W, Preskill J. Simple proof of security of the BB84 quantum key distribution protocol. Phys Rev Lett, 2000, 85: 441\u2013444","journal-title":"Phys Rev Lett"},{"key":"5542_CR7","doi-asserted-by":"crossref","first-page":"351","DOI":"10.1145\/382780.382781","volume":"48","author":"D Mayers","year":"2001","unstructured":"Mayers D. Unconditional security in quantum cryptography. J Assn Comput Mach, 2001, 48: 351\u2013406","journal-title":"J Assn Comput Mach"},{"key":"5542_CR8","doi-asserted-by":"crossref","first-page":"145","DOI":"10.1103\/RevModPhys.74.145","volume":"74","author":"N Gisin","year":"2002","unstructured":"Gisin N, Ribordy G, Tittel W, et al. Quantum cryptography. Rev Mod Phys, 2002, 74: 145\u2013195","journal-title":"Rev Mod Phys"},{"key":"5542_CR9","doi-asserted-by":"crossref","first-page":"042315","DOI":"10.1103\/PhysRevA.68.042315","volume":"68","author":"F G Deng","year":"2003","unstructured":"Deng F G, Long G L. Controlled order rearrangement encryption for quantum key distribution. Phys Rev A, 2003, 68: 042315","journal-title":"Phys Rev A"},{"key":"5542_CR10","doi-asserted-by":"crossref","first-page":"057901","DOI":"10.1103\/PhysRevLett.91.057901","volume":"91","author":"W Y Hwang","year":"2003","unstructured":"Hwang W Y. Quantum key distribution with high loss: Toward global secure communication. Phys Rev Lett, 2003, 91: 057901","journal-title":"Phys Rev Lett"},{"key":"5542_CR11","doi-asserted-by":"crossref","first-page":"012311","DOI":"10.1103\/PhysRevA.70.012311","volume":"70","author":"F G Deng","year":"2004","unstructured":"Deng F G, Long G L. Bidirectional quantum key distribution protocol with practical faint laser pulses. Phys Rev A, 2004, 70: 012311","journal-title":"Phys Rev A"},{"key":"5542_CR12","doi-asserted-by":"crossref","first-page":"230503","DOI":"10.1103\/PhysRevLett.94.230503","volume":"94","author":"X B Wang","year":"2005","unstructured":"Wang X B. Beating the photon-number-splitting attack in practical quantum cryptography. Phys Rev Lett, 2005, 94: 230503","journal-title":"Phys Rev Lett"},{"key":"5542_CR13","doi-asserted-by":"crossref","first-page":"230504","DOI":"10.1103\/PhysRevLett.94.230504","volume":"94","author":"H K Lo","year":"2005","unstructured":"Lo H K, Ma X, Chen K. Decoy state quantum key distribution. Phys Rev Lett, 2005, 94: 230504","journal-title":"Phys Rev Lett"},{"key":"5542_CR14","first-page":"022321","volume":"78","author":"X H Li","year":"2008","unstructured":"Li X H, Deng F G, Zhou H Y. Efficient quantum key distribution over a collective noise channel. Phys Rev Lett, 2008, 78: 022321","journal-title":"Phys Rev Lett"},{"key":"5542_CR15","doi-asserted-by":"crossref","first-page":"140501","DOI":"10.1103\/PhysRevLett.99.140501","volume":"99","author":"M Boyer","year":"2007","unstructured":"Boyer M, Kenigsberg D, Mor T. Quantum key distribution with classical Bob. Phys Rev Lett, 2007, 99: 140501","journal-title":"Phys Rev Lett"},{"key":"5542_CR16","doi-asserted-by":"crossref","first-page":"098901","DOI":"10.1103\/PhysRevLett.102.098901","volume":"102","author":"Y G Tan","year":"2009","unstructured":"Tan Y G, Lu H, Cai Q Y. Comment on \u201cQuantum key distribution with classical Bob\u201d. Phys Rev Lett, 2009, 102: 098901","journal-title":"Phys Rev Lett"},{"key":"5542_CR17","doi-asserted-by":"crossref","first-page":"098902","DOI":"10.1103\/PhysRevLett.102.098902","volume":"102","author":"M Boyer","year":"2009","unstructured":"Boyer M, Kenigsberg D, Mor T. Boyer, Kenigsberg, and Mor Reply. Phys Rev Lett, 2009, 102: 098902","journal-title":"Phys Rev Lett"},{"key":"5542_CR18","doi-asserted-by":"crossref","first-page":"032341","DOI":"10.1103\/PhysRevA.79.032341","volume":"79","author":"M Boyer","year":"2009","unstructured":"Boyer M, Gelles R, Kenigsberg D, et al. Semiquantum key distribution. Phys Rev A, 2009, 79: 032341","journal-title":"Phys Rev A"},{"key":"5542_CR19","doi-asserted-by":"crossref","first-page":"1195","DOI":"10.1142\/S0219749908004353","volume":"6","author":"H Lu","year":"2008","unstructured":"Lu H, Cai Q Y. Quantum key distribution with classical Alice. Int J Quantum Inf, 2008, 6: 1195\u20131202","journal-title":"Int J Quantum Inf"},{"key":"5542_CR20","doi-asserted-by":"crossref","first-page":"052312","DOI":"10.1103\/PhysRevA.79.052312","volume":"79","author":"X Zou","year":"2009","unstructured":"Zou X, Qiu D, Li L, et al. Semiquantum-key distribution using less than four quantum states. Phys Rev A, 2009, 79: 052312","journal-title":"Phys Rev A"},{"key":"5542_CR21","doi-asserted-by":"crossref","first-page":"046301","DOI":"10.1103\/PhysRevA.83.046301","volume":"83","author":"M Boyer","year":"2011","unstructured":"Boyer M, Mor T. Comment on \u201cSemiquantum-key distribution using less than four quantum states\u201d. Phys Rev A, 2011, 83: 046301","journal-title":"Phys Rev A"},{"key":"5542_CR22","doi-asserted-by":"crossref","first-page":"046302","DOI":"10.1103\/PhysRevA.83.046302","volume":"83","author":"X Zou","year":"2011","unstructured":"Zou X, Qiu D. Reply to \u201cComment on \u2018Semiquantum-key distribution using less than four quantum states\u2019\u201d. Phys Rev A, 2011, 83: 046302","journal-title":"Phys Rev A"},{"key":"5542_CR23","volume-title":"Relation between information and disturbance in quantum key distribution protocol with classical Alice","author":"T Miyadera","year":"2011","unstructured":"Miyadera T. Relation between information and disturbance in quantum key distribution protocol with classical Alice. arXiv:1105.2499, 2011"},{"key":"5542_CR24","volume-title":"On the robustness of (photonic) quantum key distribution with classical Alice","author":"M Boyer","year":"2010","unstructured":"Boyer M, Mor T. On the robustness of (photonic) quantum key distribution with classical Alice. arXiv:1012.2418, 2010"},{"key":"5542_CR25","doi-asserted-by":"crossref","first-page":"2143","DOI":"10.1088\/1674-1056\/18\/12\/044","volume":"18","author":"X Z Zhang","year":"2009","unstructured":"Zhang X Z, Gong W G, Tan Y G, et al. Quantum key distribution series network protocol with M-classical Bobs. Chin Phys B, 2009, 18: 2143\u20132148","journal-title":"Chin Phys B"},{"key":"5542_CR26","doi-asserted-by":"crossref","first-page":"100301","DOI":"10.1088\/0256-307X\/28\/10\/100301","volume":"28","author":"J Wang","year":"2011","unstructured":"Wang J, Zhang S, Zhang Q, et al. Semiquantum key distribution using entangled states. Chin Phys Lett, 2011, 28: 100301","journal-title":"Chin Phys Lett"},{"key":"5542_CR27","doi-asserted-by":"crossref","first-page":"022303","DOI":"10.1103\/PhysRevA.82.022303","volume":"82","author":"Q Li","year":"2010","unstructured":"Li Q, Chan W H, Long D Y. Semiquantum secret sharing using entangled states. Phys Rev A, 2010, 82: 022303","journal-title":"Phys Rev A"},{"key":"5542_CR28","doi-asserted-by":"crossref","first-page":"1250050","DOI":"10.1142\/S0219749912500505","volume":"10","author":"J Wang","year":"2012","unstructured":"Wang J, Zhang S, Zhang Q, et al. Semiquantum secret sharing using two-particle entangled state. Int J Quantum Inf, 2012, 10: 1250050","journal-title":"Int J Quantum Inf"},{"key":"5542_CR29","doi-asserted-by":"crossref","first-page":"032302","DOI":"10.1103\/PhysRevA.65.032302","volume":"65","author":"G L Long","year":"2002","unstructured":"Long G L, Liu X S. Theoretically efficient high-capacity quantum-keydistribution scheme. Phys Rev A, 2002, 65: 032302","journal-title":"Phys Rev A"},{"key":"5542_CR30","doi-asserted-by":"crossref","first-page":"187902","DOI":"10.1103\/PhysRevLett.89.187902","volume":"89","author":"K Bostr\u00f6m","year":"2002","unstructured":"Bostr\u00f6m K, Felbinger T. Deterministic secure direct communication using entanglement. Phys Rev Lett, 2002, 89: 187902","journal-title":"Phys Rev Lett"},{"key":"5542_CR31","doi-asserted-by":"crossref","first-page":"157901","DOI":"10.1103\/PhysRevLett.90.157901","volume":"90","author":"A W\u00f3jcik","year":"2003","unstructured":"W\u00f3jcik A. Eavesdropping on the \u201cping-pong\u201d quantum communication protocol. Phys Rev Lett, 2003, 90: 157901","journal-title":"Phys Rev Lett"},{"key":"5542_CR32","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1016\/j.physleta.2004.10.025","volume":"333","author":"Z Zhang","year":"2004","unstructured":"Zhang Z, Man Z, Li Y. Improving W\u00f3jcik\u2019s eavesdropping attack on the ping-pong protocol. Phys Lett A, 2004, 333: 46\u201350","journal-title":"Phys Lett A"},{"key":"5542_CR33","doi-asserted-by":"crossref","first-page":"042317","DOI":"10.1103\/PhysRevA.68.042317","volume":"68","author":"F G Deng","year":"2003","unstructured":"Deng F G, Long G L, Liu X S. Two-step quantum direct communication protocol using the Einstein-Podolsky-Rosen pair block. Phys Rev A, 2003, 68: 042317","journal-title":"Phys Rev A"},{"key":"5542_CR34","first-page":"313","volume":"119","author":"T Gao","year":"2004","unstructured":"Gao T, Yan F L, Wang Z X. Quantum secure direct communication by EPR pairs and entanglement swapping. Nuovo Cimento Della Societa Italiana Di Fisica. B, Relativ Class Statist Phys, 2004, 119: 313\u2013318","journal-title":"B, Relativ Class Statist Phys"},{"key":"5542_CR35","doi-asserted-by":"crossref","first-page":"052319","DOI":"10.1103\/PhysRevA.69.052319","volume":"69","author":"F G Deng","year":"2004","unstructured":"Deng F G, Long G L. Secure direct communication with a quantum one-time pad. Phys Rev A, 2004, 69: 052319","journal-title":"Phys Rev A"},{"key":"5542_CR36","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1088\/0256-307X\/22\/1\/006","volume":"22","author":"Z X Man","year":"2005","unstructured":"Man Z X, Zhang Z J, Li Y. Deterministic secure direct communication by using swapping quantum entanglement and local unitary operations. Chin Phys Lett, 2005, 22: 18","journal-title":"Chin Phys Lett"},{"key":"5542_CR37","doi-asserted-by":"crossref","first-page":"1293","DOI":"10.1142\/S0129183105007881","volume":"16","author":"T Gao","year":"2005","unstructured":"Gao T, Yan F, Wang Z. Quantum secure conditional direct communication via EPR pairs. Int J Mod Phys C, 2005, 16: 1293\u20131301","journal-title":"Int J Mod Phys C"},{"key":"5542_CR38","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1016\/j.optcom.2005.04.048","volume":"253","author":"C Wang","year":"2005","unstructured":"Wang C, Deng F G, Long G L. Multi-step quantum secure direct communication using multi-particle Green-Horne-Zeilinger state. Opt Commun, 2005, 253: 15\u201320","journal-title":"Opt Commun"},{"key":"5542_CR39","doi-asserted-by":"crossref","first-page":"44305","DOI":"10.1103\/PhysRevA.71.044305","volume":"71","author":"C Wang","year":"2005","unstructured":"Wang C, Deng F G, Li Y S, et al. Quantum secure direct communication with high-dimension quantum superdense coding. Phys Rev A, 2005, 71: 44305","journal-title":"Phys Rev A"},{"key":"5542_CR40","doi-asserted-by":"crossref","first-page":"443","DOI":"10.1142\/S0219749910006071","volume":"8","author":"C Wang","year":"2010","unstructured":"Wang C, Hao L, Song S Y, et al. Quantum direct communication based on quantum search algorithm. Int J Quantum Inf, 2010, 8: 443\u2013450","journal-title":"Int J Quantum Inf"},{"key":"5542_CR41","doi-asserted-by":"crossref","first-page":"67","DOI":"10.1016\/j.physleta.2006.01.035","volume":"354","author":"X R Jin","year":"2006","unstructured":"Jin X R, Ji X, Zhang Y Q, et al. Three-party quantum secure direct communication based on GHZ states. Phys Lett A, 2006, 354: 67\u201370","journal-title":"Phys Lett A"},{"key":"5542_CR42","doi-asserted-by":"crossref","first-page":"359","DOI":"10.1016\/j.physleta.2006.06.054","volume":"359","author":"F G Deng","year":"2006","unstructured":"Deng F G, Li X H, Li C Y, et al. Quantum secure direct communication network with Einstein-Podolsky-Rosen pairs. Phys Lett A, 2006, 359: 359\u2013365","journal-title":"Phys Lett A"},{"key":"5542_CR43","doi-asserted-by":"crossref","first-page":"2149","DOI":"10.1088\/1009-1963\/16\/8\/001","volume":"16","author":"X H Li","year":"2007","unstructured":"Li X H, Li C Y, Deng F G, et al. Quantum secure direct communication with quantum encryption based on pure entangled states. Chin Phys, 2007, 16: 2149","journal-title":"Chin Phys"},{"key":"5542_CR44","doi-asserted-by":"crossref","first-page":"040305","DOI":"10.1088\/0256-307X\/28\/4\/040305","volume":"28","author":"T J Wang","year":"2011","unstructured":"Wang T J, Li T, Du F F, et al. High-capacity quantum secure direct communication based on quantum hyperdense coding with hyperentanglement. Chin Phys Lett, 2011, 28: 040305","journal-title":"Chin Phys Lett"},{"key":"5542_CR45","doi-asserted-by":"crossref","first-page":"100309","DOI":"10.1088\/1674-1056\/20\/10\/100309","volume":"20","author":"B Gu","year":"2011","unstructured":"Gu B, Huang Y G, Fang X, et al. A two-step quantum secure direct communication protocol with hyperentanglement. Chin Phys B, 2011, 20: 100309","journal-title":"Chin Phys B"},{"key":"5542_CR46","doi-asserted-by":"crossref","first-page":"659","DOI":"10.1088\/0253-6102\/56\/4\/11","volume":"56","author":"B Gu","year":"2011","unstructured":"Gu B, Huang Y G, Fang X, et al. Bidirectional quantum secure direct communication network protocol with hyperentanglement. Commun Theor Phys, 2011, 56: 659","journal-title":"Commun Theor Phys"},{"key":"5542_CR47","first-page":"942","volume":"54","author":"B Gu","year":"2011","unstructured":"Gu B, Zhang C Y, Cheng G S, et al. Robust quantum secure direct communication with a quantum one-time pad over a collective-noise channel. Sci China Ser A, 2011, 54: 942\u2013947","journal-title":"Sci China Ser A"},{"key":"5542_CR48","doi-asserted-by":"crossref","first-page":"831","DOI":"10.1088\/0253-6102\/56\/5\/08","volume":"56","author":"J Shi","year":"2011","unstructured":"Shi J, Gong Y X, Xu P, et al. Quantum secure direct communication by using three-dimensional hyperentanglement. Commun Theor Phys, 2011, 56: 831","journal-title":"Commun Theor Phys"},{"key":"5542_CR49","doi-asserted-by":"crossref","first-page":"882","DOI":"10.1007\/s10773-010-0629-2","volume":"50","author":"G Gao","year":"2011","unstructured":"Gao G, Fang M, Yang R M. Quantum secure direct communication by swapping entanglements of 3 \u00d7 3-dimensional Bell states. Int J Theor Phys, 2011, 50: 882\u2013887","journal-title":"Int J Theor Phys"},{"key":"5542_CR50","doi-asserted-by":"crossref","first-page":"2923","DOI":"10.1007\/s10773-012-1171-1","volume":"51","author":"D Liu","year":"2012","unstructured":"Liu D, Chen J L, Jiang W. High-capacity quantum secure direct communication with single photons in both polarization and spatial-mode degrees of freedom. Int J Theor Phys, 2012, 51: 2923\u20132929","journal-title":"Int J Theor Phys"},{"key":"5542_CR51","doi-asserted-by":"crossref","first-page":"1946","DOI":"10.1007\/s10773-011-1072-8","volume":"51","author":"Z W Sun","year":"2012","unstructured":"Sun Z W, Du R G, Long D Y. Quantum secure direct communication with two-photon four-qubit cluster states. Int J Theor Phys, 2012, 51: 1946\u20131952","journal-title":"Int J Theor Phys"},{"key":"5542_CR52","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1140\/epjd\/e2012-30692-0","volume":"67","author":"B C Ren","year":"2013","unstructured":"Ren B C, Wei H R, Hua M, et al. Photonic spatial Bell-state analysis for robust quantum secure direct communication using quantum dot-cavity systems. Eur Phys J D, 2013, 67: 1\u20138","journal-title":"Eur Phys J D"},{"key":"5542_CR53","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1016\/j.physleta.2005.10.050","volume":"351","author":"Q Y Cai","year":"2006","unstructured":"Cai Q Y. Eavesdropping on the two-way quantum communication protocols with invisible photons. Phys Lett A, 2006, 351: 23\u201325","journal-title":"Phys Lett A"},{"key":"5542_CR54","doi-asserted-by":"crossref","first-page":"044302","DOI":"10.1103\/PhysRevA.72.044302","volume":"72","author":"F G Deng","year":"2005","unstructured":"Deng F G, Li X H, Zhou H Y, et al. Improving the security of multiparty quantum secret sharing against Trojan horse attack. Phys Rev A, 2005, 72: 044302","journal-title":"Phys Rev A"},{"key":"5542_CR55","doi-asserted-by":"crossref","first-page":"054302","DOI":"10.1103\/PhysRevA.74.054302","volume":"74","author":"X H Li","year":"2006","unstructured":"Li X H, Deng F G, Zhou H Y. Improving the security of secure direct communication based on the secret transmitting order of particles. Phys Rev A, 2006, 74: 054302","journal-title":"Phys Rev A"},{"key":"5542_CR56","doi-asserted-by":"crossref","first-page":"022338","DOI":"10.1103\/PhysRevA.73.022338","volume":"73","author":"A D Zhu","year":"2006","unstructured":"Zhu A D, Xia Y, Fan Q B, et al. Secure direct communication based on secret transmitting order of particles. Phys Rev A, 2006, 73: 022338","journal-title":"Phys Rev A"},{"key":"5542_CR57","doi-asserted-by":"crossref","first-page":"251","DOI":"10.1007\/s11467-007-0050-3","volume":"2","author":"G Long","year":"2007","unstructured":"Long G, Deng F, Wang C, et al. Quantum secure direct communication and deterministic secure quantum communication. Front Phys China, 2007, 2: 251\u2013272","journal-title":"Front Phys China"},{"key":"5542_CR58","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1140\/epjb\/e2004-00296-4","volume":"41","author":"F Yan","year":"2004","unstructured":"Yan F, Zhang X. A scheme for secure direct communication using EPR pairs and teleportation. Eur Phys J B, 2004, 41: 75\u201378","journal-title":"Eur Phys J B"},{"key":"5542_CR59","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1088\/0256-307X\/22\/1\/007","volume":"22","author":"Z X Man","year":"2005","unstructured":"Man Z X, Zhang Z J, Li Y. Quantum dialogue revisited. Chin Phys Lett, 2005, 22: 22","journal-title":"Chin Phys Lett"},{"key":"5542_CR60","doi-asserted-by":"crossref","first-page":"5761","DOI":"10.1088\/0305-4470\/38\/25\/011","volume":"38","author":"T Gao","year":"2005","unstructured":"Gao T, Yan F L, Wang Z X. Deterministic secure direct communication using GHZ swapping quantum entanglement. J Phys-A-Math Gen, 2005, 38: 5761","journal-title":"J Phys-A-Math Gen"},{"key":"5542_CR61","doi-asserted-by":"crossref","first-page":"685","DOI":"10.1142\/S0129183106009011","volume":"17","author":"J Wang","year":"2006","unstructured":"Wang J, Zhang Q, Tang C. Quantum secure direct communication without using perfect quantum channel. Int J Mod Phys C, 2006, 17: 685\u2013692","journal-title":"Int J Mod Phys C"},{"key":"5542_CR62","doi-asserted-by":"crossref","first-page":"925","DOI":"10.1142\/S0219749906002304","volume":"4","author":"J Wang","year":"2006","unstructured":"Wang J, Zhang Q, Tang C. Quantum secure direct communication without a pre-established secure quantum channel. Int J Quantum Inf, 2006, 4: 925\u2013934","journal-title":"Int J Quantum Inf"},{"key":"5542_CR63","first-page":"1354","volume":"49","author":"X H Li","year":"2006","unstructured":"Li X H, Deng F G, Li C Y, et al. Deterministic secure quantum communication without maximally entangled states. J Korean Phys Soc, 2006, 49: 1354\u20131359","journal-title":"J Korean Phys Soc"},{"key":"5542_CR64","first-page":"459","volume":"49","author":"H F Wang","year":"2006","unstructured":"Wang H F, Zhang S, Yeon K H, et al. Quantum secure direct communication by using a GHZ state. J Korean Phys Soc, 2006, 49: 459\u2013463","journal-title":"J Korean Phys Soc"},{"key":"5542_CR65","volume-title":"Applied Cryptography: Protocols, Algorithms, and Source Code in C","author":"B Schneier","year":"1996","unstructured":"Schneier B. Applied Cryptography: Protocols, Algorithms, and Source Code in C. Manhattan: John Wiley & Sons, 1996"},{"key":"5542_CR66","doi-asserted-by":"crossref","first-page":"2722","DOI":"10.1103\/PhysRevLett.83.2722","volume":"83","author":"C Brunel","year":"1999","unstructured":"Brunel C, Lounis B, Tamarat P, et al. Triggered source of single photons based on controlled single molecule fluorescence. Phys Rev Lett, 1999, 83: 2722\u20132725","journal-title":"Phys Rev Lett"},{"key":"5542_CR67","doi-asserted-by":"crossref","first-page":"2282","DOI":"10.1126\/science.290.5500.2282","volume":"290","author":"P Michler","year":"2000","unstructured":"Michler P, Kiraz A, Becher C, et al. A quantum dot single-photon turnstile device. Science, 2000, 290: 2282\u20132285","journal-title":"Science"},{"key":"5542_CR68","doi-asserted-by":"crossref","first-page":"490","DOI":"10.1038\/35054017","volume":"409","author":"C Liu","year":"2001","unstructured":"Liu C, Dutton Z, Behroozi C H, et al. Observation of coherent optical information storage in an atomic medium using halted light pulses. Nature, 2001, 409: 490\u2013493","journal-title":"Nature"},{"key":"5542_CR69","doi-asserted-by":"crossref","first-page":"783","DOI":"10.1103\/PhysRevLett.86.783","volume":"86","author":"D F Phillips","year":"2001","unstructured":"Phillips D F, Fleischhauer A, Mair A, et al. Storage of light in atomic vapor. Phys Rev Lett, 2001, 86: 783\u2013786","journal-title":"Phys Rev Lett"},{"key":"5542_CR70","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1007\/3540127321_27","volume":"190","author":"K Kraus","year":"1983","unstructured":"Kraus K, B\u00f6hm A, Dollard J D, et al. States, effects, and operations fundamental notions of quantum theory. Lect Note Phys, 1983, 190: 103\u2013149","journal-title":"Lect Note Phys"},{"key":"5542_CR71","doi-asserted-by":"crossref","first-page":"4741","DOI":"10.1103\/PhysRevA.54.4741","volume":"54","author":"A M Steane","year":"1996","unstructured":"Steane A M. Simple quantum error-correcting codes. Phys Rev A, 1996, 54: 4741","journal-title":"Phys Rev A"},{"key":"5542_CR72","doi-asserted-by":"crossref","first-page":"793","DOI":"10.1103\/PhysRevLett.77.793","volume":"77","author":"A M Steane","year":"1996","unstructured":"Steane A M. Error correcting codes in quantum theory. Phys Rev Lett, 1996, 77: 793\u2013797","journal-title":"Phys Rev Lett"},{"key":"5542_CR73","doi-asserted-by":"crossref","first-page":"1098","DOI":"10.1103\/PhysRevA.54.1098","volume":"54","author":"A R Calderbank","year":"1996","unstructured":"Calderbank A R, Shor P W. Good quantum error-correcting codes exist. Phys Rev A, 1996, 54: 1098","journal-title":"Phys Rev A"}],"container-title":["Science China Physics, Mechanics &amp; Astronomy"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11433-014-5542-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11433-014-5542-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11433-014-5542-x","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,3]],"date-time":"2019-06-03T14:35:59Z","timestamp":1559572559000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11433-014-5542-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,6,27]]},"references-count":73,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2014,9]]}},"alternative-id":["5542"],"URL":"https:\/\/doi.org\/10.1007\/s11433-014-5542-x","relation":{},"ISSN":["1674-7348","1869-1927"],"issn-type":[{"value":"1674-7348","type":"print"},{"value":"1869-1927","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,6,27]]}}}