{"id":"https://openalex.org/W2293774915","doi":"https://doi.org/10.1109/3pgcic.2015.73","title":"Quantum Secure Direct Communication Protocol Based on Cluster Entangled State","display_name":"Quantum Secure Direct Communication Protocol Based on Cluster Entangled State","publication_year":2015,"publication_date":"2015-11-01","ids":{"openalex":"https://openalex.org/W2293774915","doi":"https://doi.org/10.1109/3pgcic.2015.73","mag":"2293774915"},"language":"en","primary_location":{"id":"doi:10.1109/3pgcic.2015.73","is_oa":false,"landing_page_url":"https://doi.org/10.1109/3pgcic.2015.73","pdf_url":null,"source":{"id":"https://openalex.org/S4306497907","display_name":"2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Huang Hong-Mei","orcid":null},"institutions":[{"id":"https://openalex.org/I149594827","display_name":"Xidian University","ror":"https://ror.org/05s92vm98","country_code":"CN","type":"education","lineage":["https://openalex.org/I149594827"]},{"id":"https://openalex.org/I4210134428","display_name":"Chinese People's Armed Police Force Engineering University","ror":"https://ror.org/031jzbb03","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210134428"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Huang Hong-Mei","raw_affiliation_strings":["Department of Information Engineering, University of Armed Police Force Engineering, Xian, China","School of Electronic Engineering, Xidian University, Xian, China"],"affiliations":[{"raw_affiliation_string":"Department of Information Engineering, University of Armed Police Force Engineering, Xian, China","institution_ids":["https://openalex.org/I4210134428"]},{"raw_affiliation_string":"School of Electronic Engineering, Xidian University, Xian, China","institution_ids":["https://openalex.org/I149594827"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I149594827","https://openalex.org/I4210134428"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.07477769,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"43","issue":null,"first_page":"440","last_page":"443"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10020","display_name":"Quantum Information and Cryptography","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10020","display_name":"Quantum Information and Cryptography","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10622","display_name":"Quantum Mechanics and Applications","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/3107","display_name":"Atomic and Molecular Physics, and Optics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10682","display_name":"Quantum Computing Algorithms and Architecture","score":0.9958999752998352,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/eavesdropping","display_name":"Eavesdropping","score":0.7715660929679871},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6667152643203735},{"id":"https://openalex.org/keywords/communication-source","display_name":"Communication source","score":0.6586338877677917},{"id":"https://openalex.org/keywords/cluster-state","display_name":"Cluster state","score":0.5824768543243408},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5654768347740173},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.525038480758667},{"id":"https://openalex.org/keywords/greenberger\u2013horne\u2013zeilinger-state","display_name":"Greenberger\u2013Horne\u2013Zeilinger state","score":0.5024888515472412},{"id":"https://openalex.org/keywords/quantum-cryptography","display_name":"Quantum cryptography","score":0.49758532643318176},{"id":"https://openalex.org/keywords/one-way-quantum-computer","display_name":"One-way quantum computer","score":0.45645520091056824},{"id":"https://openalex.org/keywords/quantum-channel","display_name":"Quantum channel","score":0.45055508613586426},{"id":"https://openalex.org/keywords/state","display_name":"State (computer science)","score":0.4445395767688751},{"id":"https://openalex.org/keywords/quantum-information-science","display_name":"Quantum information science","score":0.41004347801208496},{"id":"https://openalex.org/keywords/quantum-entanglement","display_name":"Quantum entanglement","score":0.40693724155426025},{"id":"https://openalex.org/keywords/quantum","display_name":"Quantum","score":0.2967890202999115},{"id":"https://openalex.org/keywords/quantum-information","display_name":"Quantum information","score":0.24079617857933044},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.17270490527153015},{"id":"https://openalex.org/keywords/quantum-mechanics","display_name":"Quantum mechanics","score":0.12304800748825073},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.11715346574783325}],"concepts":[{"id":"https://openalex.org/C2776788033","wikidata":"https://www.wikidata.org/wiki/Q320769","display_name":"Eavesdropping","level":2,"score":0.7715660929679871},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6667152643203735},{"id":"https://openalex.org/C198104137","wikidata":"https://www.wikidata.org/wiki/Q974688","display_name":"Communication source","level":2,"score":0.6586338877677917},{"id":"https://openalex.org/C158456648","wikidata":"https://www.wikidata.org/wiki/Q5136706","display_name":"Cluster state","level":4,"score":0.5824768543243408},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5654768347740173},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.525038480758667},{"id":"https://openalex.org/C72933692","wikidata":"https://www.wikidata.org/wiki/Q11300563","display_name":"Greenberger\u2013Horne\u2013Zeilinger state","level":5,"score":0.5024888515472412},{"id":"https://openalex.org/C144901912","wikidata":"https://www.wikidata.org/wiki/Q471906","display_name":"Quantum cryptography","level":4,"score":0.49758532643318176},{"id":"https://openalex.org/C19271316","wikidata":"https://www.wikidata.org/wiki/Q7092353","display_name":"One-way quantum computer","level":5,"score":0.45645520091056824},{"id":"https://openalex.org/C187486625","wikidata":"https://www.wikidata.org/wiki/Q2122176","display_name":"Quantum channel","level":4,"score":0.45055508613586426},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.4445395767688751},{"id":"https://openalex.org/C5320026","wikidata":"https://www.wikidata.org/wiki/Q2122216","display_name":"Quantum information science","level":4,"score":0.41004347801208496},{"id":"https://openalex.org/C121040770","wikidata":"https://www.wikidata.org/wiki/Q215675","display_name":"Quantum entanglement","level":3,"score":0.40693724155426025},{"id":"https://openalex.org/C84114770","wikidata":"https://www.wikidata.org/wiki/Q46344","display_name":"Quantum","level":2,"score":0.2967890202999115},{"id":"https://openalex.org/C169699857","wikidata":"https://www.wikidata.org/wiki/Q2122243","display_name":"Quantum information","level":3,"score":0.24079617857933044},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.17270490527153015},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.12304800748825073},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.11715346574783325},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/3pgcic.2015.73","is_oa":false,"landing_page_url":"https://doi.org/10.1109/3pgcic.2015.73","pdf_url":null,"source":{"id":"https://openalex.org/S4306497907","display_name":"2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.4399999976158142,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":8,"referenced_works":["https://openalex.org/W1783090615","https://openalex.org/W1972907022","https://openalex.org/W1982321774","https://openalex.org/W2000244457","https://openalex.org/W2099037324","https://openalex.org/W2145099691","https://openalex.org/W2369952852","https://openalex.org/W2379573133"],"related_works":["https://openalex.org/W2048020554","https://openalex.org/W3148971731","https://openalex.org/W2140309408","https://openalex.org/W2035064038","https://openalex.org/W1974094588","https://openalex.org/W2596052803","https://openalex.org/W4290740036","https://openalex.org/W2005315265","https://openalex.org/W2277473309","https://openalex.org/W2041221279"],"abstract_inverted_index":{"We":[0],"present":[1],"a":[2,92],"new":[3],"quantum":[4,94],"secure":[5,90],"direct":[6],"communication":[7,14],"protocol":[8,44,78,84],"with":[9,28,37],"three-particle":[10,71],"entangled":[11,50,72],"state.":[12],"The":[13,22,43,83],"parties":[15],"utilize":[16],"decoy":[17],"photons":[18],"to":[19,54,81,88],"check":[20],"eavesdropping.":[21],"sender":[23],"encodes":[24],"the":[25,56,68,77],"secret":[26,35,57],"message":[27,36,58,62],"unitary":[29],"transformation,":[30],"we":[31],"can":[32,63],"directly":[33],"transmit":[34,55],"Bell-basis":[38],"measurement":[39],"and":[40,59],"Z-basis":[41],"measurement.":[42],"is":[45,74,79,85],"efficient":[46],"in":[47],"that":[48],"all":[49],"states":[51],"are":[52],"used":[53],"two":[60],"bits":[61],"be":[64,89],"transmitted":[65],"one":[66],"time,":[67],"preparation":[69],"of":[70],"state":[73],"realized":[75],"technique,":[76],"feasible":[80],"operate.":[82],"also":[86],"verified":[87],"for":[91],"noise":[93],"channel.":[95]},"counts_by_year":[{"year":2021,"cited_by_count":1}],"updated_date":"2026-04-16T08:26:57.006410","created_date":"2025-10-10T00:00:00"}
