{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,27]],"date-time":"2025-07-27T07:27:18Z","timestamp":1753601238095,"version":"3.37.3"},"reference-count":22,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"7","license":[{"start":{"date-parts":[[2017,7,1]],"date-time":"2017-07-01T00:00:00Z","timestamp":1498867200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61202451","61672157"],"award-info":[{"award-number":["61202451","61672157"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002858","name":"China Postdoctoral Science Foundation Funded Project","doi-asserted-by":"publisher","award":["2016M600494"],"award-info":[{"award-number":["2016M600494"]}],"id":[{"id":"10.13039\/501100002858","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003392","name":"Natural Science Foundation of Fujian Province","doi-asserted-by":"publisher","award":["2016J01288"],"award-info":[{"award-number":["2016J01288"]}],"id":[{"id":"10.13039\/501100003392","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Commun. Lett."],"published-print":{"date-parts":[[2017,7]]},"DOI":"10.1109\/lcomm.2017.2691006","type":"journal-article","created":{"date-parts":[[2017,4,5]],"date-time":"2017-04-05T18:23:38Z","timestamp":1491416618000},"page":"1561-1564","source":"Crossref","is-referenced-by-count":5,"title":["Cryptanalysis of Controlled Bidirectional Quantum Secure Direct Communication Network Using Classical XOR Operation and Quantum Entanglement"],"prefix":"10.1109","volume":"21","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0907-4594","authenticated-orcid":false,"given":"Song","family":"Lin","sequence":"first","affiliation":[]},{"given":"Wenjie","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Gongde","family":"Guo","sequence":"additional","affiliation":[]},{"given":"Binbin","family":"Cai","sequence":"additional","affiliation":[]},{"given":"Xiaofen","family":"Liu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.69.052319"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.94.140501"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.73.022338"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.73.042305"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.78.064304"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2016.2589263"},{"key":"ref16","first-page":"329","article-title":"A simple participant attack on the Br&#x00E1;dler-Du&#x0161;ek protocol","volume":"7","author":"gao","year":"2007","journal-title":"Quantum Inf Comput"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.76.036301"},{"key":"ref18","first-page":"748","article-title":"Comment on &#x2018;Quantum exam&#x2019;","volume":"360","author":"gao","year":"2007","journal-title":"Phys Rev A Gen Phys"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.76.062324"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.65.032302"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1103\/RevModPhys.81.1301"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.89.187902"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.12693\/APhysPolA.101.357"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.90.157901"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.91.109801"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1103\/RevModPhys.74.145"},{"key":"ref1","first-page":"175","article-title":"Quantum cryptography: Public-key distribution and coin tossing","author":"bennett","year":"1984","journal-title":"Proc IEEE Int Conf Comput Syst Signal Process"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.68.042317"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1140\/epjd\/e2009-00306-3"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.93.062343"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.84.016301"}],"container-title":["IEEE Communications Letters"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/4234\/7972692\/07892895.pdf?arnumber=7892895","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:05:18Z","timestamp":1642003518000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7892895\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,7]]},"references-count":22,"journal-issue":{"issue":"7"},"URL":"https:\/\/doi.org\/10.1109\/lcomm.2017.2691006","relation":{},"ISSN":["1089-7798"],"issn-type":[{"type":"print","value":"1089-7798"}],"subject":[],"published":{"date-parts":[[2017,7]]}}}