{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,12,29]],"date-time":"2023-12-29T20:39:02Z","timestamp":1703882342786},"reference-count":24,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2020,3,11]],"date-time":"2020-03-11T00:00:00Z","timestamp":1583884800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,3,11]],"date-time":"2020-03-11T00:00:00Z","timestamp":1583884800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"published-print":{"date-parts":[[2020,4]]},"DOI":"10.1007\/s11128-020-02628-2","type":"journal-article","created":{"date-parts":[[2020,3,11]],"date-time":"2020-03-11T09:04:33Z","timestamp":1583917473000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Controller-independent quantum bidirectional communication using non-maximally entangled states"],"prefix":"10.1007","volume":"19","author":[{"given":"Akaash","family":"Srikanth","sequence":"first","affiliation":[]},{"given":"S.","family":"Balakrishnan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,3,11]]},"reference":[{"key":"2628_CR1","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1016\/j.tcs.2014.05.025","volume":"560","author":"CH Bennet","year":"2014","unstructured":"Bennet, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. Theoret. Comput. Sci. 560, 7\u201311 (2014)","journal-title":"Theoret. Comput. Sci."},{"key":"2628_CR2","doi-asserted-by":"publisher","first-page":"357","DOI":"10.12693\/APhysPolA.101.357","volume":"101","author":"A Beige","year":"2002","unstructured":"Beige, A., Englert, B.G., Kurtsiefer, C., Weinfurter, H.: Secure communication with a publicly known key. Acta Phys. Pol. A 101, 357 (2002)","journal-title":"Acta Phys. Pol. A"},{"key":"2628_CR3","doi-asserted-by":"publisher","first-page":"187902","DOI":"10.1103\/PhysRevLett.89.187902","volume":"89","author":"K Bostr\u00f6m","year":"2002","unstructured":"Bostr\u00f6m, K., Felbinger, T.: Deterministic secure direct communication using entanglement. Phys. Rev. Lett. 89, 187902 (2002)","journal-title":"Phys. Rev. Lett."},{"key":"2628_CR4","doi-asserted-by":"publisher","first-page":"042317","DOI":"10.1103\/PhysRevA.68.042317","volume":"68","author":"FG Deng","year":"2003","unstructured":"Deng, F.G., Long, G.L., Xiao, S.L.: A two-step quantum direct communication protocol using Einstein\u2013Podolsky\u2013Rosen pair block. Phys. Rev. A 68, 042317 (2003)","journal-title":"Phys. Rev. A"},{"key":"2628_CR5","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1140\/epjb\/e2004-00296-4","volume":"41","author":"FL Yan","year":"2004","unstructured":"Yan, F.L., Zhang, X.Q.: A scheme for secure direct communication using EPR pairs and teleportation. Eur. Phys. J. B 41, 75\u201378 (2004)","journal-title":"Eur. Phys. J. B"},{"key":"2628_CR6","doi-asserted-by":"publisher","first-page":"052319","DOI":"10.1103\/PhysRevA.69.052319","volume":"69","author":"FG Deng","year":"2004","unstructured":"Deng, F.G., Long, G.L.: Secure direct communication with a quantum one-time pad. Phys. Rev. A 69, 052319 (2004)","journal-title":"Phys. Rev. A"},{"key":"2628_CR7","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1016\/j.optcom.2005.04.048","volume":"253","author":"C Wang","year":"2005","unstructured":"Wang, C., Deng, F.G., Long, G.L.: Multi-step quantum secure direct communication using multi-particle Green\u2013Horne\u2013Zeilinger state. Opt. Commun. 253, 15\u201320 (2005)","journal-title":"Opt. Commun."},{"key":"2628_CR8","first-page":"60","volume":"342","author":"ZJ Zhang","year":"2005","unstructured":"Zhang, Z.J.: Multiparty quantum secret sharing of secure direct communication. Phys. Rev. A 342, 60\u201366 (2005)","journal-title":"Phys. Rev. A"},{"key":"2628_CR9","doi-asserted-by":"publisher","first-page":"Article Number","DOI":"10.1038\/s41377-019-0132-3","volume":"8","author":"Q Ruoyang","year":"2019","unstructured":"Ruoyang, Q., Zhen, S., Lin, Z., Penghao, N., Wentao, H., Liyuan, S., Qin, H., Jiancun, G., Liuguo, Y., Gui, L.: Implementation and security analysis of practical quantum secure direct communication. Light Sci. Appl. 8, Article Number 22 (2019)","journal-title":"Light Sci. Appl."},{"key":"2628_CR10","doi-asserted-by":"publisher","first-page":"220501","DOI":"10.1103\/PhysRevLett.118.220501","volume":"118","author":"W Zhang","year":"2017","unstructured":"Zhang, W., et al.: Quantum secure direct communication with quantum memory. Phys. Rev. Lett. 118, 220501 (2017)","journal-title":"Phys. Rev. Lett."},{"key":"2628_CR11","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1007\/s11128-012-0487-3","volume":"13","author":"N Srinatha","year":"2014","unstructured":"Srinatha, N., et al.: The quantum cryptographic switch. Quantum Inf. Process. 13, 59\u201370 (2014)","journal-title":"Quantum Inf. Process."},{"key":"2628_CR12","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1016\/j.physleta.2004.06.009","volume":"328","author":"BA Nguyen","year":"2004","unstructured":"Nguyen, B.A.: Quantum dialogue. Phys. Lett. A 328, 6\u201310 (2004)","journal-title":"Phys. Lett. A"},{"key":"2628_CR13","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1088\/0256-307X\/22\/1\/007","volume":"22","author":"M Zhong-Xiao","year":"2005","unstructured":"Zhong-Xiao, M., Zhan-Jun, Z., Li, Y.: Quantum dialogue revisited. Chin. Phys. Lett. 22, 22\u201324 (2005)","journal-title":"Chin. Phys. Lett."},{"key":"2628_CR14","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1088\/0256-307X\/24\/1\/006","volume":"24","author":"Y Chen","year":"2007","unstructured":"Chen, Y., Zhong-Xiao, M., Yun-Jie, X.: Quantum bidirectional secure direct communication via entanglement swapping. Chin. Phys. Lett. 24, 19\u201322 (2007)","journal-title":"Chin. Phys. Lett."},{"key":"2628_CR15","unstructured":"Zhang, Z.J.: Deterministic secure direct bidirectional communication protocol. arxiv:quant-ph\/0403186 (2004)"},{"key":"2628_CR16","doi-asserted-by":"publisher","first-page":"558","DOI":"10.1007\/s11433-007-0057-3","volume":"50","author":"Y Yang","year":"2007","unstructured":"Yang, Y., Wen, Q.: Quasi-secure quantum dialogue using single photons. Sci. China Ser. G 50, 558\u2013562 (2007)","journal-title":"Sci. China Ser. G"},{"key":"2628_CR17","doi-asserted-by":"publisher","first-page":"1680","DOI":"10.1088\/0256-307X\/23\/7\/007","volume":"23","author":"M Zhong-Xiao","year":"2006","unstructured":"Zhong-Xiao, M., Yun-Jie, X.: Controlled bidirectional quantum direct communication by using a GHZ state. Chin. Phys. Lett. 23, 1680\u20131682 (2006)","journal-title":"Chin. Phys. Lett."},{"key":"2628_CR18","doi-asserted-by":"publisher","first-page":"040305","DOI":"10.1088\/0256-307X\/30\/4\/040305","volume":"30","author":"Y Tian-Yu","year":"2013","unstructured":"Tian-Yu, Y., Li-Zhen, J.: Improvement of controlled bidirectional quantum direct communication using a GHZ state. Chin. Phys. Lett. 30, 040305 (2013)","journal-title":"Chin. Phys. Lett."},{"key":"2628_CR19","doi-asserted-by":"publisher","first-page":"079901","DOI":"10.1088\/0256-307X\/30\/7\/079901","volume":"30","author":"L Zhi-Hao","year":"2013","unstructured":"Zhi-Hao, L., Han-Wu, C.: Comment on improvement of controlled bidirectional quantum direct communication using a GHZ state. Chin. Phys. Lett. 30, 079901 (2013)","journal-title":"Chin. Phys. Lett."},{"key":"2628_CR20","doi-asserted-by":"publisher","first-page":"079901","DOI":"10.1088\/0256-307X\/30\/7\/079901","volume":"30","author":"Y Tian-Yu","year":"2013","unstructured":"Tian-Yu, Y., Li-Zhen, J.: Reply to the comment on improvement of controlled bidirectional quantum direct communication using a GHZ state. Chin. Phys. Lett. 30, 079901 (2013)","journal-title":"Chin. Phys. Lett."},{"key":"2628_CR21","doi-asserted-by":"publisher","first-page":"3515","DOI":"10.1007\/s11128-015-1050-9","volume":"14","author":"CH Chang","year":"2015","unstructured":"Chang, C.H., Luo, Y.P., Yang, C.W., Tzonelih, H.: Intercept-and-resend attack on controlled bidirectional quantum direct communication and its improvement. Quantum Inf. Process. 14, 3515\u20133522 (2015)","journal-title":"Quantum Inf. Process."},{"key":"2628_CR22","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1007\/s11128-017-1598-7","volume":"16","author":"AK Mohapatra","year":"2017","unstructured":"Mohapatra, A.K., Balakrishnan, S.: Controller-independent bidirectional quantum direct communication. Quantum Inf. Process. 16, 147 (2017)","journal-title":"Quantum Inf. Process."},{"key":"2628_CR23","first-page":"079901","volume":"30","author":"MA Nielsen","year":"2011","unstructured":"Nielsen, M.A., Chuang, I.L.: Quantum computation and quantum information: 10th anniversary edition. Chin. Phys. Lett. 30, 079901 (2011)","journal-title":"Chin. Phys. Lett."},{"key":"2628_CR24","doi-asserted-by":"publisher","first-page":"5635","DOI":"10.1103\/PhysRevLett.85.5635","volume":"85","author":"A Cabello","year":"2000","unstructured":"Cabello, A.: Quantum key distribution in the Holevo limit. Phys. Rev. Lett. 85, 5635\u20135638 (2000)","journal-title":"Phys. Rev. Lett."}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-020-02628-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11128-020-02628-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-020-02628-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,3,11]],"date-time":"2021-03-11T00:52:21Z","timestamp":1615423941000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11128-020-02628-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,3,11]]},"references-count":24,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2020,4]]}},"alternative-id":["2628"],"URL":"https:\/\/doi.org\/10.1007\/s11128-020-02628-2","relation":{},"ISSN":["1570-0755","1573-1332"],"issn-type":[{"value":"1570-0755","type":"print"},{"value":"1573-1332","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,3,11]]},"assertion":[{"value":"11 October 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 March 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 March 2020","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"133"}}