{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,4]],"date-time":"2024-07-04T17:37:52Z","timestamp":1720114672244},"reference-count":25,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Information Sciences"],"published-print":{"date-parts":[[2021,1]]},"DOI":"10.1016\/j.ins.2020.06.055","type":"journal-article","created":{"date-parts":[[2020,7,13]],"date-time":"2020-07-13T11:13:52Z","timestamp":1594638832000},"page":"106-111","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":1,"special_numbering":"C","title":["Cryptanalysis and improvement of \u201cGame theoretic security of quantum bit commitment\u201d"],"prefix":"10.1016","volume":"543","author":[{"ORCID":"http:\/\/orcid.org\/0000-0003-3854-0291","authenticated-orcid":false,"given":"Hao","family":"Cao","sequence":"first","affiliation":[]},{"given":"Wenping","family":"Ma","sequence":"additional","affiliation":[]},{"given":"Liangdong","family":"L\u00fc","sequence":"additional","affiliation":[]},{"given":"Ge","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Xiaoxue","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Wenyang","family":"Sun","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"1","key":"10.1016\/j.ins.2020.06.055_b0005","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1145\/1008908.1008911","article-title":"Coin flipping by telephone a protocol for solving impossible problems","volume":"15","author":"Blum","year":"1983","journal-title":"ACM SIGACT News"},{"key":"10.1016\/j.ins.2020.06.055_b0010","doi-asserted-by":"crossref","first-page":"503","DOI":"10.1016\/j.ins.2018.03.046","article-title":"Game theoretic security of quantum bit commitment","volume":"479","author":"Zhou","year":"2019","journal-title":"Information Sciences"},{"key":"10.1016\/j.ins.2020.06.055_b0015","series-title":"Proceedings of IEEE International Conference on Computer System and Signal Processing","first-page":"175","article-title":"Quantum cryptography: public-key distribution and coin tossing","author":"Bennett","year":"1984"},{"key":"10.1016\/j.ins.2020.06.055_b0020","doi-asserted-by":"crossref","first-page":"2050","DOI":"10.1126\/science.283.5410.2050","article-title":"Unconditional security of quantum key distribution over arbitrarily long distances","volume":"283","author":"Lo","year":"1999","journal-title":"Science"},{"key":"10.1016\/j.ins.2020.06.055_b0025","doi-asserted-by":"crossref","DOI":"10.1103\/PhysRevLett.94.230504","article-title":"Decoy state quantum key distribution","volume":"94","author":"Lo","year":"2005","journal-title":"Physical Review Letters"},{"key":"10.1016\/j.ins.2020.06.055_b0030","doi-asserted-by":"crossref","first-page":"1829","DOI":"10.1103\/PhysRevA.59.1829","article-title":"Quantum secret sharing","volume":"59","author":"Hillery","year":"1999","journal-title":"Physical Review A"},{"issue":"12","key":"10.1016\/j.ins.2020.06.055_b0035","doi-asserted-by":"crossref","first-page":"304","DOI":"10.1007\/s11128-017-1739-z","article-title":"Quantum secret sharing using orthogonal multiqudit entangled states","volume":"16","author":"Bai","year":"2017","journal-title":"Quantum Information Processing"},{"issue":"1","key":"10.1016\/j.ins.2020.06.055_b0040","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/JPHOT.2017.2653621","article-title":"(t, n) Threshold quantum state sharing scheme based on linear equations and unitary operation","volume":"9","author":"Cao","year":"2017","journal-title":"IEEE Photonics Journal"},{"issue":"22","key":"10.1016\/j.ins.2020.06.055_b0045","doi-asserted-by":"crossref","DOI":"10.1103\/PhysRevLett.118.220501","article-title":"Quantum secure direct communication with quantum memory","volume":"118","author":"Zhang","year":"2017","journal-title":"Physical Review Letters"},{"key":"10.1016\/j.ins.2020.06.055_b0050","doi-asserted-by":"crossref","first-page":"45046","DOI":"10.1038\/srep45046","article-title":"Multiparty quantum key agreement based on quantum search algorithm","volume":"7","author":"Cao","year":"2017","journal-title":"Scientific Reports"},{"issue":"17","key":"10.1016\/j.ins.2020.06.055_b0055","doi-asserted-by":"crossref","first-page":"3414","DOI":"10.1103\/PhysRevLett.78.3414","article-title":"Unconditionally secure quantum bit commitment is impossible","volume":"78","author":"Mayers","year":"1997","journal-title":"Physical Review Letters"},{"issue":"17","key":"10.1016\/j.ins.2020.06.055_b0060","doi-asserted-by":"crossref","first-page":"3410","DOI":"10.1103\/PhysRevLett.78.3410","article-title":"Is quantum bit commitment really possible?","volume":"78","author":"Lo","year":"1997","journal-title":"Physical Review Letters"},{"key":"10.1016\/j.ins.2020.06.055_b0065","unstructured":"G. Brassard, C. Cr\u00e9peau, D. Mayers, et al., A brief review on the impossibility of quantum bit commitment, arXiv preprint quant-ph\/9712023, 1997."},{"issue":"1\u20132","key":"10.1016\/j.ins.2020.06.055_b0070","doi-asserted-by":"crossref","first-page":"177","DOI":"10.1016\/S0167-2789(98)00053-0","article-title":"Why quantum bit commitment and ideal quantum coin tossing are impossible","volume":"120","author":"Lo","year":"1998","journal-title":"Physica D: Nonlinear Phenomena"},{"issue":"7","key":"10.1016\/j.ins.2020.06.055_b0075","doi-asserted-by":"crossref","first-page":"1447","DOI":"10.1103\/PhysRevLett.83.1447","article-title":"Unconditionally secure bit commitment","volume":"83","author":"Kent","year":"1999","journal-title":"Physical Review Letters"},{"issue":"23","key":"10.1016\/j.ins.2020.06.055_b0080","doi-asserted-by":"crossref","DOI":"10.1103\/PhysRevLett.90.237901","article-title":"Quantum bit string commitment","volume":"90","author":"Kent","year":"2003","journal-title":"Physical Review Letters"},{"issue":"15","key":"10.1016\/j.ins.2020.06.055_b0085","doi-asserted-by":"crossref","DOI":"10.1103\/PhysRevLett.92.157901","article-title":"Cheat sensitive quantum bit commitment","volume":"92","author":"Hardy","year":"2004","journal-title":"Physical Review Letters"},{"issue":"11","key":"10.1016\/j.ins.2020.06.055_b0090","doi-asserted-by":"crossref","DOI":"10.1088\/1367-2630\/13\/11\/113015","article-title":"Unconditionally secure bit commitment with flying qudits","volume":"13","author":"Kent","year":"2011","journal-title":"New Journal of Physics"},{"issue":"13","key":"10.1016\/j.ins.2020.06.055_b0095","doi-asserted-by":"crossref","DOI":"10.1103\/PhysRevLett.109.130501","article-title":"Unconditionally secure bit commitment by transmitting measurement outcomes","volume":"109","author":"Kent","year":"2012","journal-title":"Physical Review Letters"},{"issue":"1","key":"10.1016\/j.ins.2020.06.055_b0100","doi-asserted-by":"crossref","DOI":"10.1103\/PhysRevLett.112.010504","article-title":"Experimental unconditionally secure bit commitment","volume":"112","author":"Liu","year":"2014","journal-title":"Physical Review Letters"},{"issue":"25","key":"10.1016\/j.ins.2020.06.055_b0105","doi-asserted-by":"crossref","DOI":"10.1103\/PhysRevLett.115.250501","article-title":"Arbitrarily long relativistic bit commitment","volume":"115","author":"Chakraborty","year":"2015","journal-title":"Physical Review Letters"},{"issue":"2","key":"10.1016\/j.ins.2020.06.055_b0110","doi-asserted-by":"crossref","DOI":"10.1103\/PhysRevA.92.022315","article-title":"Device-independent relativistic quantum bit commitment","volume":"92","author":"Adlam","year":"2015","journal-title":"Physical Review A"},{"issue":"14","key":"10.1016\/j.ins.2020.06.055_b0115","doi-asserted-by":"crossref","DOI":"10.1103\/PhysRevLett.117.140506","article-title":"24-hour relativistic bit commitment","volume":"117","author":"Verbanis","year":"2016","journal-title":"Physical Review Letters"},{"issue":"2","key":"10.1016\/j.ins.2020.06.055_b0120","doi-asserted-by":"crossref","first-page":"14","DOI":"10.3390\/cryptography1020014","article-title":"Recursive cheating strategies for the relativistic FQ bit commitment protocol","volume":"1","author":"Bricout","year":"2017","journal-title":"Cryptography"},{"issue":"10","key":"10.1016\/j.ins.2020.06.055_b0125","doi-asserted-by":"crossref","first-page":"1990","DOI":"10.3390\/app8101990","article-title":"Practical quantum bit commitment protocol based on quantum oblivious transfer","volume":"8","author":"Song","year":"2018","journal-title":"Applied Sciences"}],"container-title":["Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0020025520306472?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0020025520306472?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2020,11,5]],"date-time":"2020-11-05T15:05:59Z","timestamp":1604588759000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0020025520306472"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1]]},"references-count":25,"alternative-id":["S0020025520306472"],"URL":"https:\/\/doi.org\/10.1016\/j.ins.2020.06.055","relation":{},"ISSN":["0020-0255"],"issn-type":[{"value":"0020-0255","type":"print"}],"subject":[],"published":{"date-parts":[[2021,1]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Cryptanalysis and improvement of \u201cGame theoretic security of quantum bit commitment\u201d","name":"articletitle","label":"Article Title"},{"value":"Information Sciences","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.ins.2020.06.055","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2020 Elsevier Inc. All rights reserved.","name":"copyright","label":"Copyright"}]}}