{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T04:25:21Z","timestamp":1760243121921,"version":"build-2065373602"},"reference-count":26,"publisher":"MDPI AG","issue":"10","license":[{"start":{"date-parts":[[2015,9,30]],"date-time":"2015-09-30T00:00:00Z","timestamp":1443571200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"the National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61472048","61402058","61472046","61202082","61370194"],"award-info":[{"award-number":["61472048","61402058","61472046","61202082","61370194"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"the Beijing Natural Science Foundation","award":["4152038"],"award-info":[{"award-number":["4152038"]}]},{"name":"the China Postdoctoral Science Foundation funded project","award":["2014M561826"],"award-info":[{"award-number":["2014M561826"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Entropy"],"abstract":"<jats:p>A novel quantum secure direct communication protocol based on four-particle genuine entangled state and quantum dense coding is proposed. In this protocol, the four-particle genuine entangled state is used to detect eavesdroppers, and quantum dense coding is used to encode the message. Finally, the security of the proposed protocol is discussed. During the security analysis, the method of entropy theory is introduced, and two detection strategies are compared quantitatively by comparing the relationship between the maximal information that the eavesdroppers (Eve) can obtain, and the probability of being detected. Through the analysis we can state that our scheme is feasible and secure.<\/jats:p>","DOI":"10.3390\/e17106743","type":"journal-article","created":{"date-parts":[[2015,10,1]],"date-time":"2015-10-01T02:15:03Z","timestamp":1443665703000},"page":"6743-6752","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["Quantum Secure Direct Communication Based on Dense Coding and Detecting Eavesdropping with Four-Particle Genuine Entangled State"],"prefix":"10.3390","volume":"17","author":[{"given":"Jian","family":"Li","sequence":"first","affiliation":[{"name":"School of Computer, Beijing University of Posts and Telecommunications, Beijing 100876, China"},{"name":"Hefei National Laboratory for Physical Sciences at the Microscale, University of Science and Technology of China, Hefei 230026, China"},{"name":"Science and Technology on Communication Security Laboratory, Sichuan 610041, China"}]},{"given":"Zeshi","family":"Pan","sequence":"additional","affiliation":[{"name":"School of Computer, Beijing University of Posts and Telecommunications, Beijing 100876, China"}]},{"given":"Fengqi","family":"Sun","sequence":"additional","affiliation":[{"name":"School of Computer, Beijing University of Posts and Telecommunications, Beijing 100876, China"}]},{"given":"Yanhua","family":"Chen","sequence":"additional","affiliation":[{"name":"School of Computer, Beijing University of Posts and Telecommunications, Beijing 100876, China"}]},{"given":"Zheng","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Computer, Beijing University of Posts and Telecommunications, Beijing 100876, China"}]},{"given":"Zuozhi","family":"Shi","sequence":"additional","affiliation":[{"name":"School of Computer, Beijing University of Posts and Telecommunications, Beijing 100876, China"}]}],"member":"1968","published-online":{"date-parts":[[2015,9,30]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1016\/j.tcs.2014.05.025","article-title":"Quantum cryptography: Public key distribution and coin tossing","volume":"560","author":"Bennett","year":"2014","journal-title":"Theor. Computer Sci."},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Deng, F.G., Li, X.H., Zhou, H.Y., and Zhang, Z.-J. (2005). Improving the security of multiparty quantum secret sharing against Trojan horse attack. Phys. Rev. A, 72.","DOI":"10.1103\/PhysRevA.72.044302"},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"293","DOI":"10.1007\/s10773-012-1332-2","article-title":"Participant attack and improvement to multiparty quantum secret sharing based on GHZ states","volume":"52","author":"Song","year":"2013","journal-title":"Int. J. Theor. Phys."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"2071","DOI":"10.1007\/s11128-014-0791-1","article-title":"Controlled secret sharing protocol using a quantum cloning circuit","volume":"13","author":"Adhikari","year":"2014","journal-title":"Quantum Inf. Process."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"1907","DOI":"10.1007\/s11128-014-0779-x","article-title":"Dynamic quantum secret sharing protocol based on GHZ state","volume":"13","author":"Liao","year":"2014","journal-title":"Quantum Inf. Process."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"1085","DOI":"10.1007\/s11128-013-0713-7","article-title":"Quantum secret sharing with continuous variable graph state","volume":"13","author":"Wu","year":"2014","journal-title":"Quantum Inf. Process."},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Wang, C., Liu, J.-W., Liu, X., and Shang, T. (2013). A Novel Deterministic Secure Quantum Communication Scheme with Einstein\u2014Podolsky\u2014Rosen Pairs and Single Photons. Commun. Theor. Phys., 60.","DOI":"10.1088\/0253-6102\/60\/4\/03"},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"3868","DOI":"10.1007\/s10773-012-1273-9","article-title":"Comment on: Supervisory Asymmetric Deterministic Secure Quantum Communication","volume":"51","author":"Kao","year":"2012","journal-title":"Int. J. Theor. Phys."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"2787","DOI":"10.1007\/s10773-012-1154-2","article-title":"Deterministic secure quantum communication with collective detection using single photons","volume":"51","author":"Huang","year":"2012","journal-title":"Int. J. Theor. Phys."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"2558","DOI":"10.1007\/s10773-014-2053-5","article-title":"Scheme for Deterministic Secure Quantum Communication with Three-qubit GHZ State","volume":"53","author":"Yuan","year":"2014","journal-title":"Int. J. Theor. Phys."},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Deng, F.G., Long, G.L., and Liu, X.S. (2003). Two-step quantum direct communication protocol using the Einstein-Podolsky-Rosen pair block. Phys. Rev. A, 68.","DOI":"10.1103\/PhysRevA.68.042317"},{"key":"ref_12","unstructured":"Stefano, L.M.M. (2005). Secure Deterministic Communication without Entanglement. Phys. Rev. Lett."},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Lucamarini, M., and Mancini, S. (2005). Secure deterministic communication without entanglement. Phys. Rev. Lett., 94.","DOI":"10.1103\/PhysRevLett.94.140501"},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"100","DOI":"10.1007\/s10773-014-2205-7","article-title":"Quantum Secure Direct Communication Achieved by Using Multi-Entanglement","volume":"54","author":"Li","year":"2014","journal-title":"Int. J. Theor. Phys."},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Yan, C., Zhang, S.-B., Yan, L.-L., and Sheng, Z.-W. (2013). A multiparty controlled bidirectional quantum secure direct communication and authentication protocol based on EPR pairs. Chin. Phys. Lett., 30.","DOI":"10.1088\/0256-307X\/30\/6\/060301"},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"4434","DOI":"10.1007\/s11434-012-5516-1","article-title":"Improved eavesdropping detection strategy based on four-particle cluster state in quantum direct communication protocol","volume":"57","author":"Li","year":"2012","journal-title":"Chin. Sci. Bull."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"359","DOI":"10.1016\/j.physleta.2006.06.054","article-title":"Quantum secure direct communication network with Einstein\u2013Podolsky\u2013Rosen pairs","volume":"359","author":"Deng","year":"2006","journal-title":"Phys. Lett. A"},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"625","DOI":"10.1142\/S0129183108012364","article-title":"Secure direct communication using deterministic BB84 protocol","volume":"19","author":"Hwang","year":"2008","journal-title":"Int. J. Mod. Phys. C"},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Bin, G., Yu-Gai, H., Xia, F., and Yi, Z.C. (2011). A two-step quantum secure direct communication protocol with hyperentanglement. Chin. Phys. B, 20.","DOI":"10.1088\/1674-1056\/20\/10\/100309"},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"2541","DOI":"10.1007\/s11434-014-0339-x","article-title":"Controlled quantum secure direct communication and authentication protocol based on five-particle cluster state and quantum one-time pad","volume":"59","author":"Chang","year":"2014","journal-title":"Chin. Sci. Bull."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"2727","DOI":"10.1007\/s10773-012-1147-1","article-title":"Quantum secret sharing of secure direct communication using one-time pad","volume":"51","author":"Du","year":"2012","journal-title":"Int. J. Theor. Phys."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"942","DOI":"10.1007\/s11433-011-4265-5","article-title":"Robust quantum secure direct communication with a quantum one-time pad over a collective-noise channel","volume":"54","author":"Gu","year":"2011","journal-title":"Sci. China Phys. Mech. Astron."},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Bostr\u00f6m, K., and Felbinger, T. (2002). Deterministic secure direct communication using entanglement. Phys. Rev. Lett., 89.","DOI":"10.1103\/PhysRevLett.89.187902"},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"3559","DOI":"10.1007\/s10773-012-1242-3","article-title":"High-capacity three-party quantum secret sharing with hyperentanglement","volume":"51","author":"Gu","year":"2012","journal-title":"Int. J. Theor. Phys."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"1907","DOI":"10.1007\/s11433-014-5434-0","article-title":"Robust EPR-pairs-based quantum secure communication with authentication resisting collective noise","volume":"57","author":"Chang","year":"2014","journal-title":"Sci. China Phys. Mech. Astron."},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Wang, T.Y., and Cai, X.Q. (2012). An Efficient Quantum Secret Sharing Scheme with Decoy States. Int. J. Mod. Phys. B, 26.","DOI":"10.1142\/S0217979212501226"}],"container-title":["Entropy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1099-4300\/17\/10\/6743\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T20:49:36Z","timestamp":1760215776000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1099-4300\/17\/10\/6743"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,9,30]]},"references-count":26,"journal-issue":{"issue":"10","published-online":{"date-parts":[[2015,10]]}},"alternative-id":["e17106743"],"URL":"https:\/\/doi.org\/10.3390\/e17106743","relation":{},"ISSN":["1099-4300"],"issn-type":[{"type":"electronic","value":"1099-4300"}],"subject":[],"published":{"date-parts":[[2015,9,30]]}}}