Publications-Theses

Article View/Open

Publication Export

Google ScholarTM

NCCU Library

Citation Infomation

Related Publications in TAIR

題名 輕量化中介半量子安全直接通訊協定
Lightweight Mediated Semi-quantum Secure Direct Communication Protocol
作者 曾基臺
Tseng, Chi-Tai
貢獻者 左瑞麟
Tso, Ray-lin
曾基臺
Tseng, Chi-Tai
關鍵詞 量子安全直接通訊
量子圖態
一次性分發
不受信任的第三方
Quantum Secure Direct Communication
Graph State
One-way Distribution
Untrusted Third-party
日期 2024
上傳時間 5-Aug-2024 13:55:36 (UTC+8)
摘要 Rong 等人於 2021 年 Quantum Information Processing 發表了一 篇 Mediated Semi-Quantum Secure Direct Communication,此篇協定提 出了兩方皆為傳統使用者的中介半量子安全直接通訊協定,透過第三 方量子使用者的協助,優化 Quantum Secure Direct Communication 兩 方皆為量子使用者的設計,並且也優化 Semi-quantum Secure Direct Communication,一方為量子使用者另一方為傳統使用者的設計,在研 究此篇協定時,發現傳統使用者須具備產生量子位元的能力以及透過 量子通道回傳產出的量子給第三方量子使用者,與想像中的傳統使用 者來的高出許多能力,於是進行了此篇協定的研究。在本次研究中, 本研究提出了 Lightweight Mediated Semi-Quantum Secure Direct Communication (LMSQSDC) 的協定,利用圖態所擁有的特性,設計出 第三方使用者僅需進行一次性的分發及量測,改善 MSQSDC 安全性 問題,並且降低傳統使用者所需具備的能力,並且進行量子效能分析, 透過本研究所提出的協定,可以大幅提升 MSQSDC 的量子效率。
Rong et al. published a paper titled "Mediated Semi-Quantum Secure Direct Communication" in Quantum Information Processing in 2021. This protocol proposes a mediated semi-quantum secure direct communication scheme where both parties are classical users, optimized with the assistance of a third-party quantum user, enhancing the design of Quantum Secure Direct Communication (QSDC) for two quantum users and also optimizing Semi-quantum Secure Direct Communication (SQSDC) for one quantum user and one classical user. During the research for this protocol, it was found that classical users need to possess the ability to generate quantum bits and transmit the produced quantum bits back to the third-party quantum user via a quantum channel, requiring much more capability than initially anticipated for classical users. Consequently, the study of this protocol was initiated. This research proposes the Lightweight Mediated Semi-Quantum Secure Direct Communication (LMSQSDC) protocol. By leveraging the properties inherent in graph states and designing a scheme where the third- party user only needs to perform one-way distribution and measurement, this protocol addresses security issues in MSQSDC and reduces the capabilities required for classical users. Additionally, quantum efficiency analysis is conducted. The protocol proposed in this study significantly enhances the quantum efficiency of MSQSDC.
參考文獻 [1] "Bennett, C., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. In: Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, pp. 175–179. IEEE (1984)." [2] H.-K. Lo and H. F. Chau, "Unconditional Security of Quantum Key Distribution Over Arbitrarily Long Distances," Science (American Association for the Advancement of Science), vol. 283, no. 5410, pp. 2050-2056, 1999, doi: 10.1126/science.283.5410.2050. [3] P. W. Shor and J. Preskill, "Simple proof of security of the BB84 quantum key distribution protocol," Physical review letters, vol. 85, no. 2, pp. 441-444, 2000, doi: 10.1103/PhysRevLett.85.441. [4] D. Mayers, "Unconditional security in quantum cryptography," Journal of the ACM, vol. 48, no. 3, pp. 351-406, 2001, doi: 10.1145/382780.382781. [5] E. Biham, M. Boyer, P. O. Boykin, T. Mor, and V. Roychowdhury, "A proof of the security of quantum key distribution," Journal of cryptology, vol. 19, no. 4, pp. 381-439, 2006, doi: 10.1007/s00145-005-0011-3. [6] G. Long and X. Liu, "Theoretically efficient high-capacity quantum-key- distribution scheme," Phys. Rev. A, vol. 65, 2002// 2002, doi: 10.1103/PhysRevA.65.032302. [7] F. Deng, G. Long, and X. Liu, "Two-step quantum direct communication protocol using the Einstein–Podolsky–Rosen pair block," Phys. Rev. A, vol. 68, 2003// 2003, doi: 10.1103/PhysRevA.68.042317. [8] F. Deng and G. Long, "Secure direct communication with a quantum one-time pad," Phys. Rev. A, vol. 69, 2004// 2004, doi: 10.1103/PhysRevA.69.052319. [9] X. Jin, X. Ji, and Y. Zhang, "Three-party quantum secure direct communication based on GHZ states," Phys. Lett. A, vol. 354, 2006// 2006, doi: 10.1016/j.physleta.2006.01.035. [10] M. Wang and F. Yan, "Three-party simultaneous quantum secure direct communication scheme with EPR pairs," Chin. Phys. Lett., vol. 24, 2007// 2007, doi: 10.1088/0256-307X/24/9/007. [11] Y. Xia and Z. Man, "Controlled quantum N-party simultaneous direct communication," Commun. Theor. Phys., vol. 48, 2007// 2007, doi: 10.1088/0253-6102/48/1/017. [12] S. Chong and T. Hwang, "The enhancement of three-party simultaneous quantum secure direct communication scheme with EPR pairs," Opt. Commun., vol. 284, 2011// 2011, doi: 10.1016/j.optcom.2010.08.037. [13] Y. He and W. Ma, "Three-party quantum secure direct communication against collective noise," Quantum Inf. Process., vol. 16, 2017// 2017, doi: 10.1007/s11128-017-1703-y. [14] S. S. Chen, L. Zhou, W. Zhong, and Y. B. Sheng, "Three-step three-party quantum secure direct communication," Sci. China Phys. Mech. Astron., vol. 61, 2018// 2018, doi: 10.1007/s11433-018-9224-5. [15] M. Boyer, R. Gelles, and D. Kenigsberg, "Semiquantum key distribution," Phys. Rev. A, vol. 79, 2009// 2009, doi: 10.1103/PhysRevA.79.032341. [16] W. e. i. Zhang, D. a. o. w. e. n. Qiu, and P. a. u. l. o. Mateus, "Security of a single-state semi-quantum key distribution protocol," Quantum Inf. Process., vol. 17, 2018// 2018, doi: 10.1007/s11128-018-1904-z. [17] X. Zou and D. Qiu, "Three-step semiquantum secure direct communication protocol," Sci. China Phys. Mech. Astron., vol. 57, 2014// 2014, doi: 10.1007/s11433-014-5542-x. [18] C. Xie, L. Li, and H. Situ, "Semi-quantum secure direct communication scheme based on bell states," Int. J. Theor. Phys., vol. 57, 2018// 2018, doi: 10.1007/s10773-018-3713-7. [19] C. Yang and C. Tsai, "Advanced semi-quantum secure direct communication protocol based on bell states against flip attack," Quantum Inf. Process., vol. 19, 2020// 2020, doi: 10.1007/s11128-020-02623-7. [20] M. Zhang, H. Li, and Z. Xia, "Semiquantum secure direct communication using EPR pairs," Quantum Inf. Process., vol. 16, 2017// 2017, doi: 10.1007/s11128-017-1573-3. [21] W. Krawec, "Mediated semiquantum key distribution," Phys. Rev. A, vol. 91, 2015// 2015, doi: 10.1103/PhysRevA.91.032323. [22] Z. Rong, D. Qiu, P. Mateus, and X. Zou, "Mediated semi-quantum secure direct communication," Quantum information processing, vol. 20, no. 2, 2021, doi: 10.1007/s11128-020-02965-2. [23] M. Hein, J. Eisert, and H. J. Briegel, "Multiparty entanglement in graph states," Physical review. A, Atomic, molecular, and optical physics, vol. 69, no. 6, pp. 1-62311, 2004, doi: 10.1103/PhysRevA.69.062311. [24] M. Nielsen and I. Chuang, Quantum Computation and Quantum Information. Cambridge University Press: Cambridge, 2000. [25] N. Ananth and M. Senthilvelan, "Identifying non-k-separability of a class of N-qubit complete graph states using correlation tensors," The European physical journal. D, Atomic, molecular, and optical physics, vol. 70, no. 7, 2016, doi: 10.1140/epjd/e2016-70056-2. [26] D. Pan et al., "The Evolution of Quantum Secure Direct Communication: On the Road to the Qinternet," IEEE Communications Surveys & Tutorials, pp. 1- 1, 2024, doi: 10.1109/COMST.2024.3367535. [27] A. Farouk, M. Zakaria, A. Megahed, and F. A. Omara, "A generalized architecture of quantum secure direct communication for N disjointed users with authentication," Sci. Rep., vol. 5, 2015// 2015, doi: 10.1038/srep16080. [28] C. h. e. n. Xie, L. v. z. h. o. u. Li, H. a. o. z. h. e. n. Situ, and J. i. a. n. h. a. o. He, "Semi-quantum secure direct communication scheme based on Bell states," Int. J. Theor. Phys., vol. 57, 2018// 2018, doi: 10.1007/s10773-018- 3713-7. [29] Z. Rong, D. Qiu, and X. Zou, "Semi-quantum secure direct communication with entanglement," Int. J. Theor. Phys., vol. 59, 2020// 2020, doi: 10.1007/s10773-020-04447-8. [30] M. Boyer, D. Kenigsberg, and T. Mor, "Quantum key distribution with classical bob," Phys. Rev. Lett., vol. 99, 2007// 2007, doi: 10.1103/PhysRevLett.99.140501. [31] M. Z. A. Bhuiyan and J. Wu, "Collusion Attack Detection in Networked Systems," in 2016 IEEE 14th Intl Conf on Dependable, Autonomic and Secure Computing, 14th Intl Conf on Pervasive Intelligence and Computing, 2nd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech), 8-12 Aug. 2016 2016, pp. 286-293, doi: 10.1109/DASC-PICom-DataCom- CyberSciTec.2016.67. [32] Q. Y. Cai, "Eavesdropping on the two-way quantum communication protocols with invisible photons," Phys. Lett. A, vol. 351, 2006// 2006, doi: 10.1016/j.physleta.2005.10.050. [33] F. G. Deng, X. H. Li, H. Y. Zhou, and Z. J. Zhang, "Improving the security of multiparty quantum secret sharing against Trojan horse attack," Physical review. A, Atomic, molecular, and optical physics, vol. 72, no. 4, 2005, doi: 10.1103/PhysRevA.72.044302. [34] A. Cabello, "Quantum key distribution in the Holevo limit," Phys. Rev. Lett., vol. 85, 2000// 2000, doi: 10.1103/PhysRevLett.85.5635. [35] C. W. Yang and T. Hwang, "Efficient key construction on semi-quantum secret sharing protocols," Int. J. Quantum Info., vol. 11, 2013// 2013, doi: 10.1142/S0219749913500524. [36] C. W. Yang and T. Hwang, "Trojan horse attack free fault-tolerant quantum key distribution protocols," Quantum Inf. Process., vol. 13, 2014// 2014, doi: 10.1007/s11128-013-0689-3. [37] Y. F. Yang, L. Z. Duan, T. R. Qiu, X. M. Xie, and W. Y. Duan, "Multi-party semi-quantum secure direct communication using Greenberger–Horne– Zeilinger states," Quant. Inform. Process., vol. 21, 2022// 2022, doi: 10.1007/s11128-022-03671-x. [38] L.-C. Xu, H.-Y. Chen, N.-R. Zhou, and L.-H. Gong, "Multi-party semi- quantum secure direct communication protocol with cluster states," International journal of theoretical physics, vol. 59, no. 7, pp. 2175-2186, 2020, doi: 10.1007/s10773-020-04491-4.
描述 碩士
國立政治大學
資訊科學系碩士在職專班
109971027
資料來源 http://thesis.lib.nccu.edu.tw/record/#G0109971027
資料類型 thesis
dc.contributor.advisor 左瑞麟zh_TW
dc.contributor.advisor Tso, Ray-linen_US
dc.contributor.author (Authors) 曾基臺zh_TW
dc.contributor.author (Authors) Tseng, Chi-Taien_US
dc.creator (作者) 曾基臺zh_TW
dc.creator (作者) Tseng, Chi-Taien_US
dc.date (日期) 2024en_US
dc.date.accessioned 5-Aug-2024 13:55:36 (UTC+8)-
dc.date.available 5-Aug-2024 13:55:36 (UTC+8)-
dc.date.issued (上傳時間) 5-Aug-2024 13:55:36 (UTC+8)-
dc.identifier (Other Identifiers) G0109971027en_US
dc.identifier.uri (URI) https://nccur.lib.nccu.edu.tw/handle/140.119/152766-
dc.description (描述) 碩士zh_TW
dc.description (描述) 國立政治大學zh_TW
dc.description (描述) 資訊科學系碩士在職專班zh_TW
dc.description (描述) 109971027zh_TW
dc.description.abstract (摘要) Rong 等人於 2021 年 Quantum Information Processing 發表了一 篇 Mediated Semi-Quantum Secure Direct Communication,此篇協定提 出了兩方皆為傳統使用者的中介半量子安全直接通訊協定,透過第三 方量子使用者的協助,優化 Quantum Secure Direct Communication 兩 方皆為量子使用者的設計,並且也優化 Semi-quantum Secure Direct Communication,一方為量子使用者另一方為傳統使用者的設計,在研 究此篇協定時,發現傳統使用者須具備產生量子位元的能力以及透過 量子通道回傳產出的量子給第三方量子使用者,與想像中的傳統使用 者來的高出許多能力,於是進行了此篇協定的研究。在本次研究中, 本研究提出了 Lightweight Mediated Semi-Quantum Secure Direct Communication (LMSQSDC) 的協定,利用圖態所擁有的特性,設計出 第三方使用者僅需進行一次性的分發及量測,改善 MSQSDC 安全性 問題,並且降低傳統使用者所需具備的能力,並且進行量子效能分析, 透過本研究所提出的協定,可以大幅提升 MSQSDC 的量子效率。zh_TW
dc.description.abstract (摘要) Rong et al. published a paper titled "Mediated Semi-Quantum Secure Direct Communication" in Quantum Information Processing in 2021. This protocol proposes a mediated semi-quantum secure direct communication scheme where both parties are classical users, optimized with the assistance of a third-party quantum user, enhancing the design of Quantum Secure Direct Communication (QSDC) for two quantum users and also optimizing Semi-quantum Secure Direct Communication (SQSDC) for one quantum user and one classical user. During the research for this protocol, it was found that classical users need to possess the ability to generate quantum bits and transmit the produced quantum bits back to the third-party quantum user via a quantum channel, requiring much more capability than initially anticipated for classical users. Consequently, the study of this protocol was initiated. This research proposes the Lightweight Mediated Semi-Quantum Secure Direct Communication (LMSQSDC) protocol. By leveraging the properties inherent in graph states and designing a scheme where the third- party user only needs to perform one-way distribution and measurement, this protocol addresses security issues in MSQSDC and reduces the capabilities required for classical users. Additionally, quantum efficiency analysis is conducted. The protocol proposed in this study significantly enhances the quantum efficiency of MSQSDC.en_US
dc.description.tableofcontents 第一章 緒論 1 1.1 研究動機 1 1.2 研究方法及目標 3 1.3 論文架構 3 第二章 背景知識 4 2.1 量子單光子 4 2.2 量子糾結態 6 2.2.1 貝爾態(Bell State) 6 2.2.2 量子圖態(Quantum Graph State) 7 2.3 量子安全直接通訊 9 2.3.1 量子安全直接通訊沿革 9 2.3.2 中介半量子安全直接通訊(MSQSDC) 12 第三章 輕量化中介半量子安全直接通訊 15 3.1 四顆量子圖態量測特性 15 3.2 輕量化中介半量子安全直接通訊流程描述 20 3.3 輕量化中介半量子安全直接通訊實際範例 26 第四章 安全性分析 32 4.1 集體攻擊(Collective Attack) 32 4.2 共謀攻擊(Collusion Attack) 39 4.3 量子木馬攻擊(Quantum Trojan Horse Attack) 40 4.4 量子效益分析 41 第五章 結論與展望 44 參考文獻 46zh_TW
dc.format.extent 2039578 bytes-
dc.format.mimetype application/pdf-
dc.source.uri (資料來源) http://thesis.lib.nccu.edu.tw/record/#G0109971027en_US
dc.subject (關鍵詞) 量子安全直接通訊zh_TW
dc.subject (關鍵詞) 量子圖態zh_TW
dc.subject (關鍵詞) 一次性分發zh_TW
dc.subject (關鍵詞) 不受信任的第三方zh_TW
dc.subject (關鍵詞) Quantum Secure Direct Communicationen_US
dc.subject (關鍵詞) Graph Stateen_US
dc.subject (關鍵詞) One-way Distributionen_US
dc.subject (關鍵詞) Untrusted Third-partyen_US
dc.title (題名) 輕量化中介半量子安全直接通訊協定zh_TW
dc.title (題名) Lightweight Mediated Semi-quantum Secure Direct Communication Protocolen_US
dc.type (資料類型) thesisen_US
dc.relation.reference (參考文獻) [1] "Bennett, C., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. In: Proceedings of IEEE International Conference on Computers, Systems and Signal Processing, pp. 175–179. IEEE (1984)." [2] H.-K. Lo and H. F. Chau, "Unconditional Security of Quantum Key Distribution Over Arbitrarily Long Distances," Science (American Association for the Advancement of Science), vol. 283, no. 5410, pp. 2050-2056, 1999, doi: 10.1126/science.283.5410.2050. [3] P. W. Shor and J. Preskill, "Simple proof of security of the BB84 quantum key distribution protocol," Physical review letters, vol. 85, no. 2, pp. 441-444, 2000, doi: 10.1103/PhysRevLett.85.441. [4] D. Mayers, "Unconditional security in quantum cryptography," Journal of the ACM, vol. 48, no. 3, pp. 351-406, 2001, doi: 10.1145/382780.382781. [5] E. Biham, M. Boyer, P. O. Boykin, T. Mor, and V. Roychowdhury, "A proof of the security of quantum key distribution," Journal of cryptology, vol. 19, no. 4, pp. 381-439, 2006, doi: 10.1007/s00145-005-0011-3. [6] G. Long and X. Liu, "Theoretically efficient high-capacity quantum-key- distribution scheme," Phys. Rev. A, vol. 65, 2002// 2002, doi: 10.1103/PhysRevA.65.032302. [7] F. Deng, G. Long, and X. Liu, "Two-step quantum direct communication protocol using the Einstein–Podolsky–Rosen pair block," Phys. Rev. A, vol. 68, 2003// 2003, doi: 10.1103/PhysRevA.68.042317. [8] F. Deng and G. Long, "Secure direct communication with a quantum one-time pad," Phys. Rev. A, vol. 69, 2004// 2004, doi: 10.1103/PhysRevA.69.052319. [9] X. Jin, X. Ji, and Y. Zhang, "Three-party quantum secure direct communication based on GHZ states," Phys. Lett. A, vol. 354, 2006// 2006, doi: 10.1016/j.physleta.2006.01.035. [10] M. Wang and F. Yan, "Three-party simultaneous quantum secure direct communication scheme with EPR pairs," Chin. Phys. Lett., vol. 24, 2007// 2007, doi: 10.1088/0256-307X/24/9/007. [11] Y. Xia and Z. Man, "Controlled quantum N-party simultaneous direct communication," Commun. Theor. Phys., vol. 48, 2007// 2007, doi: 10.1088/0253-6102/48/1/017. [12] S. Chong and T. Hwang, "The enhancement of three-party simultaneous quantum secure direct communication scheme with EPR pairs," Opt. Commun., vol. 284, 2011// 2011, doi: 10.1016/j.optcom.2010.08.037. [13] Y. He and W. Ma, "Three-party quantum secure direct communication against collective noise," Quantum Inf. Process., vol. 16, 2017// 2017, doi: 10.1007/s11128-017-1703-y. [14] S. S. Chen, L. Zhou, W. Zhong, and Y. B. Sheng, "Three-step three-party quantum secure direct communication," Sci. China Phys. Mech. Astron., vol. 61, 2018// 2018, doi: 10.1007/s11433-018-9224-5. [15] M. Boyer, R. Gelles, and D. Kenigsberg, "Semiquantum key distribution," Phys. Rev. A, vol. 79, 2009// 2009, doi: 10.1103/PhysRevA.79.032341. [16] W. e. i. Zhang, D. a. o. w. e. n. Qiu, and P. a. u. l. o. Mateus, "Security of a single-state semi-quantum key distribution protocol," Quantum Inf. Process., vol. 17, 2018// 2018, doi: 10.1007/s11128-018-1904-z. [17] X. Zou and D. Qiu, "Three-step semiquantum secure direct communication protocol," Sci. China Phys. Mech. Astron., vol. 57, 2014// 2014, doi: 10.1007/s11433-014-5542-x. [18] C. Xie, L. Li, and H. Situ, "Semi-quantum secure direct communication scheme based on bell states," Int. J. Theor. Phys., vol. 57, 2018// 2018, doi: 10.1007/s10773-018-3713-7. [19] C. Yang and C. Tsai, "Advanced semi-quantum secure direct communication protocol based on bell states against flip attack," Quantum Inf. Process., vol. 19, 2020// 2020, doi: 10.1007/s11128-020-02623-7. [20] M. Zhang, H. Li, and Z. Xia, "Semiquantum secure direct communication using EPR pairs," Quantum Inf. Process., vol. 16, 2017// 2017, doi: 10.1007/s11128-017-1573-3. [21] W. Krawec, "Mediated semiquantum key distribution," Phys. Rev. A, vol. 91, 2015// 2015, doi: 10.1103/PhysRevA.91.032323. [22] Z. Rong, D. Qiu, P. Mateus, and X. Zou, "Mediated semi-quantum secure direct communication," Quantum information processing, vol. 20, no. 2, 2021, doi: 10.1007/s11128-020-02965-2. [23] M. Hein, J. Eisert, and H. J. Briegel, "Multiparty entanglement in graph states," Physical review. A, Atomic, molecular, and optical physics, vol. 69, no. 6, pp. 1-62311, 2004, doi: 10.1103/PhysRevA.69.062311. [24] M. Nielsen and I. Chuang, Quantum Computation and Quantum Information. Cambridge University Press: Cambridge, 2000. [25] N. Ananth and M. Senthilvelan, "Identifying non-k-separability of a class of N-qubit complete graph states using correlation tensors," The European physical journal. D, Atomic, molecular, and optical physics, vol. 70, no. 7, 2016, doi: 10.1140/epjd/e2016-70056-2. [26] D. Pan et al., "The Evolution of Quantum Secure Direct Communication: On the Road to the Qinternet," IEEE Communications Surveys & Tutorials, pp. 1- 1, 2024, doi: 10.1109/COMST.2024.3367535. [27] A. Farouk, M. Zakaria, A. Megahed, and F. A. Omara, "A generalized architecture of quantum secure direct communication for N disjointed users with authentication," Sci. Rep., vol. 5, 2015// 2015, doi: 10.1038/srep16080. [28] C. h. e. n. Xie, L. v. z. h. o. u. Li, H. a. o. z. h. e. n. Situ, and J. i. a. n. h. a. o. He, "Semi-quantum secure direct communication scheme based on Bell states," Int. J. Theor. Phys., vol. 57, 2018// 2018, doi: 10.1007/s10773-018- 3713-7. [29] Z. Rong, D. Qiu, and X. Zou, "Semi-quantum secure direct communication with entanglement," Int. J. Theor. Phys., vol. 59, 2020// 2020, doi: 10.1007/s10773-020-04447-8. [30] M. Boyer, D. Kenigsberg, and T. Mor, "Quantum key distribution with classical bob," Phys. Rev. Lett., vol. 99, 2007// 2007, doi: 10.1103/PhysRevLett.99.140501. [31] M. Z. A. Bhuiyan and J. Wu, "Collusion Attack Detection in Networked Systems," in 2016 IEEE 14th Intl Conf on Dependable, Autonomic and Secure Computing, 14th Intl Conf on Pervasive Intelligence and Computing, 2nd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress(DASC/PiCom/DataCom/CyberSciTech), 8-12 Aug. 2016 2016, pp. 286-293, doi: 10.1109/DASC-PICom-DataCom- CyberSciTec.2016.67. [32] Q. Y. Cai, "Eavesdropping on the two-way quantum communication protocols with invisible photons," Phys. Lett. A, vol. 351, 2006// 2006, doi: 10.1016/j.physleta.2005.10.050. [33] F. G. Deng, X. H. Li, H. Y. Zhou, and Z. J. Zhang, "Improving the security of multiparty quantum secret sharing against Trojan horse attack," Physical review. A, Atomic, molecular, and optical physics, vol. 72, no. 4, 2005, doi: 10.1103/PhysRevA.72.044302. [34] A. Cabello, "Quantum key distribution in the Holevo limit," Phys. Rev. Lett., vol. 85, 2000// 2000, doi: 10.1103/PhysRevLett.85.5635. [35] C. W. Yang and T. Hwang, "Efficient key construction on semi-quantum secret sharing protocols," Int. J. Quantum Info., vol. 11, 2013// 2013, doi: 10.1142/S0219749913500524. [36] C. W. Yang and T. Hwang, "Trojan horse attack free fault-tolerant quantum key distribution protocols," Quantum Inf. Process., vol. 13, 2014// 2014, doi: 10.1007/s11128-013-0689-3. [37] Y. F. Yang, L. Z. Duan, T. R. Qiu, X. M. Xie, and W. Y. Duan, "Multi-party semi-quantum secure direct communication using Greenberger–Horne– Zeilinger states," Quant. Inform. Process., vol. 21, 2022// 2022, doi: 10.1007/s11128-022-03671-x. [38] L.-C. Xu, H.-Y. Chen, N.-R. Zhou, and L.-H. Gong, "Multi-party semi- quantum secure direct communication protocol with cluster states," International journal of theoretical physics, vol. 59, no. 7, pp. 2175-2186, 2020, doi: 10.1007/s10773-020-04491-4.zh_TW