{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,24]],"date-time":"2025-03-24T08:47:11Z","timestamp":1742806031954,"version":"3.37.3"},"reference-count":71,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2022,1,20]],"date-time":"2022-01-20T00:00:00Z","timestamp":1642636800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,20]],"date-time":"2022-01-20T00:00:00Z","timestamp":1642636800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"published-print":{"date-parts":[[2022,2]]},"DOI":"10.1007\/s11128-021-03402-8","type":"journal-article","created":{"date-parts":[[2022,1,20]],"date-time":"2022-01-20T11:05:36Z","timestamp":1642676736000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":24,"title":["Multiparty mediated quantum secret sharing protocol"],"prefix":"10.1007","volume":"21","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8075-6558","authenticated-orcid":false,"given":"Chia-Wei","family":"Tsai","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6300-1703","authenticated-orcid":false,"given":"Chun-Wei","family":"Yang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8013-9923","authenticated-orcid":false,"given":"Jason","family":"Lin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,1,20]]},"reference":[{"key":"3402_CR1","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A Shamir","year":"1979","unstructured":"Shamir, A.: How to share a secret. Commun. ACM 22, 612 (1979)","journal-title":"Commun. ACM"},{"key":"3402_CR2","doi-asserted-by":"crossref","unstructured":"Blakley, G.R.: Safeguarding cryptographic keys. In: International Workshop on IEEE Computer Society, pp. 313\u2013313 (1979)","DOI":"10.1109\/MARK.1979.8817296"},{"key":"3402_CR3","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1016\/j.entcs.2007.01.065","volume":"186","author":"S Iftene","year":"2007","unstructured":"Iftene, S.: General secret sharing based on the Chinese remainder theorem with applications in e-voting. Electron. Notes Theor. Comput. Sci. 186, 67\u201384 (2007)","journal-title":"Electron. Notes Theor. Comput. Sci."},{"key":"3402_CR4","doi-asserted-by":"publisher","first-page":"1829","DOI":"10.1103\/PhysRevA.59.1829","volume":"59","author":"M Hillery","year":"1999","unstructured":"Hillery, M., Buzk, V., Berthiaume, A.: Quantum secret sharing. Phys. Rev. A 59, 1829 (1999)","journal-title":"Phys. Rev. A"},{"key":"3402_CR5","doi-asserted-by":"publisher","first-page":"162","DOI":"10.1103\/PhysRevA.59.162","volume":"59","author":"A Karlsson","year":"1999","unstructured":"Karlsson, A., Koashi, M., Imoto, N.: Quantum entanglement for secret sharing and secret splitting. Phys. Rev. A 59, 162 (1999)","journal-title":"Phys. Rev. A"},{"key":"3402_CR6","doi-asserted-by":"publisher","first-page":"042320","DOI":"10.1103\/PhysRevA.65.042320","volume":"65","author":"V Karimipour","year":"2002","unstructured":"Karimipour, V., Bahraminasab, A., Bagherinezhad, S.: \u201cEntanglement swapping of generalized cat states and secret sharing. Phys. Rev. A 65, 042320 (2002)","journal-title":"Phys. Rev. A"},{"key":"3402_CR7","doi-asserted-by":"publisher","first-page":"042301","DOI":"10.1103\/PhysRevA.63.042301","volume":"63","author":"W Tittel","year":"2001","unstructured":"Tittel, W., Zbinden, H., Gisin, N.: Experimental demonstration of quantum secret sharing. Phys. Rev. A 63, 042301 (2001)","journal-title":"Phys. Rev. A"},{"key":"3402_CR8","doi-asserted-by":"publisher","first-page":"060302","DOI":"10.1103\/PhysRevA.66.060302","volume":"66","author":"HF Chau","year":"2002","unstructured":"Chau, H.F.: Practical scheme to share a secret key through a quantum channel with a 27.6% bit error rate. Phys. Rev. A 66, 060302 (2002)","journal-title":"Phys. Rev. A"},{"key":"3402_CR9","doi-asserted-by":"publisher","first-page":"044302","DOI":"10.1103\/PhysRevA.67.044302","volume":"67","author":"S Bagherinezhad","year":"2003","unstructured":"Bagherinezhad, S., Karimipour, V.: Quantum secret sharing based on reusable Greenberger\u2013Horne\u2013Zeilinger states as secure carriers. Phys. Rev. A 67, 044302 (2003)","journal-title":"Phys. Rev. A"},{"key":"3402_CR10","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1016\/S0375-9601(03)00074-4","volume":"310","author":"GP Guo","year":"2003","unstructured":"Guo, G.P., Guo, G.C.: Quantum secret sharing without entanglement. Phys. Lett. A 310, 247 (2003)","journal-title":"Phys. Lett. A"},{"key":"3402_CR11","doi-asserted-by":"publisher","first-page":"420","DOI":"10.1016\/j.physleta.2004.03.034","volume":"324","author":"YM Li","year":"2004","unstructured":"Li, Y.M., Zhang, K.S., Peng, K.C.: Multiparty secret sharing of quantum information based on entanglement swapping. Phys. Lett. A 324, 420 (2004)","journal-title":"Phys. Lett. A"},{"key":"3402_CR12","doi-asserted-by":"publisher","first-page":"177903","DOI":"10.1103\/PhysRevLett.92.177903","volume":"92","author":"AM Lance","year":"2004","unstructured":"Lance, A.M., Symul, T., Bowen, W.P., Sanders, B.C., Lam, P.K.: Tripartite quantum state sharing. Phys. Rev. Lett. 92, 177903 (2004)","journal-title":"Phys. Rev. Lett."},{"key":"3402_CR13","doi-asserted-by":"publisher","first-page":"052307","DOI":"10.1103\/PhysRevA.69.052307","volume":"69","author":"L Xiao","year":"2004","unstructured":"Xiao, L., Long, G.L., Deng, F.G., Pan, J.W.: Efficient multiparty quantum-secret-sharing schemes. Phys. Rev. A 69, 052307 (2004)","journal-title":"Phys. Rev. A"},{"key":"3402_CR14","doi-asserted-by":"publisher","first-page":"230505","DOI":"10.1103\/PhysRevLett.95.230505","volume":"95","author":"C Schmid","year":"2005","unstructured":"Schmid, C., Trojek, P., Bourennane, M., Kurtsiefer, C., \u017bukowski, M., Weinfurter, H.: Experimental single qubit quantum secret sharing. Phys. Rev. Lett. 95, 230505 (2005)","journal-title":"Phys. Rev. Lett."},{"key":"3402_CR15","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1016\/j.physleta.2005.04.007","volume":"340","author":"FG Deng","year":"2005","unstructured":"Deng, F.G., Long, G.L., Zhou, H.Y.: An efficient quantum secret sharing scheme with Einstein\u2013Podolsky\u2013Rosen pairs. Phys. Lett. A 340, 43 (2005)","journal-title":"Phys. Lett. A"},{"key":"3402_CR16","doi-asserted-by":"publisher","first-page":"380","DOI":"10.1016\/j.physleta.2005.05.020","volume":"341","author":"YQ Zhang","year":"2005","unstructured":"Zhang, Y.Q., Jin, X.R., Zhang, S.: Secret sharing of quantum information via entanglement swapping in cavity QED. Phys. Lett. A 341, 380 (2005)","journal-title":"Phys. Lett. A"},{"key":"3402_CR17","doi-asserted-by":"publisher","first-page":"012304","DOI":"10.1103\/PhysRevA.72.012304","volume":"72","author":"FL Yan","year":"2005","unstructured":"Yan, F.L., Gao, T.: Quantum secret sharing between multiparty and multiparty without entanglement. Phys. Rev. A 72, 012304 (2005)","journal-title":"Phys. Rev. A"},{"key":"3402_CR18","doi-asserted-by":"publisher","first-page":"012328","DOI":"10.1103\/PhysRevA.71.012328","volume":"71","author":"SK Singh","year":"2005","unstructured":"Singh, S.K., Srikanth, R.: Generalized quantum secret sharing. Phys. Rev. A 71, 012328 (2005)","journal-title":"Phys. Rev. A"},{"key":"3402_CR19","doi-asserted-by":"publisher","first-page":"044302","DOI":"10.1103\/PhysRevA.72.044302","volume":"72","author":"FG Deng","year":"2005","unstructured":"Deng, F.G., Li, X.H., Zhou, H.Y., Zhang, Z.J.: Improving the security of multiparty quantum secret sharing against Trojan horse attack. Phys. Rev. A 72, 044302 (2005)","journal-title":"Phys. Rev. A"},{"key":"3402_CR20","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1016\/j.physleta.2006.04.110","volume":"358","author":"HF Wang","year":"2006","unstructured":"Wang, H.F., Ji, X., Zhang, S.: Improving the security of multiparty quantum secret splitting and quantum state sharing. Phys. Lett. A 358, 11 (2006)","journal-title":"Phys. Lett. A"},{"key":"3402_CR21","doi-asserted-by":"publisher","first-page":"016301","DOI":"10.1103\/PhysRevA.73.016301","volume":"73","author":"CM Li","year":"2006","unstructured":"Li, C.M., Chang, C.C., Hwang, T.: Comment on quantum secret sharing between multiparty and multiparty without entanglement. Phys. Rev. A 73, 016301 (2006)","journal-title":"Phys. Rev. A"},{"key":"3402_CR22","doi-asserted-by":"publisher","first-page":"190","DOI":"10.1016\/j.physleta.2006.01.054","volume":"354","author":"FG Deng","year":"2006","unstructured":"Deng, F.G., Li, X.H., Li, C.Y., Zhou, P., Zhou, H.Y.: Multiparty quantum secret splitting and quantum state sharing. Phys. Lett. A 354, 190 (2006)","journal-title":"Phys. Lett. A"},{"key":"3402_CR23","doi-asserted-by":"publisher","first-page":"14089","DOI":"10.1088\/0305-4470\/39\/45\/018","volume":"39","author":"FG Deng","year":"2006","unstructured":"Deng, F.G., Zhou, H.Y., Long, G.L.: Circular quantum secret sharing. J. Phys. A: Math. Theor. 39, 14089 (2006)","journal-title":"J. Phys. A: Math. Theor."},{"key":"3402_CR24","doi-asserted-by":"publisher","first-page":"012315","DOI":"10.1103\/PhysRevA.74.012315","volume":"74","author":"H Takesue","year":"2006","unstructured":"Takesue, H., Inoue, K.: Quantum secret sharing based on modulated high-dimensional time-bin entanglement. Phys. Rev. A 74, 012315 (2006)","journal-title":"Phys. Rev. A"},{"key":"3402_CR25","doi-asserted-by":"publisher","first-page":"01421","DOI":"10.1088\/1009-1963\/15\/7\/006","volume":"15","author":"ZY Xue","year":"2006","unstructured":"Xue, Z.Y., Yi, Y.M., Cao, Z.L.: Scheme for sharing classical information via tripartite entangled states. Chin. Phys. B 15, 01421 (2006)","journal-title":"Chin. Phys. B"},{"key":"3402_CR26","doi-asserted-by":"publisher","first-page":"2181","DOI":"10.1088\/0256-307X\/24\/8\/008","volume":"24","author":"P Zhou","year":"2007","unstructured":"Zhou, P., Li, X.-H., Deng, F.-G., Zhou, H.-Y.: Efficient three-party quantum secret sharing with single photons. Chin. Phys. Lett. 24, 2181 (2007)","journal-title":"Chin. Phys. Lett."},{"key":"3402_CR27","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1016\/j.physa.2006.06.024","volume":"374","author":"ZY Xue","year":"2007","unstructured":"Xue, Z.Y., Yi, Y.M., Cao, Z.L.: Scheme for implementing quantum information sharing via tripartite entangled state in cavity QED. Physica A 374, 119 (2007)","journal-title":"Physica A"},{"key":"3402_CR28","doi-asserted-by":"publisher","first-page":"028901","DOI":"10.1103\/PhysRevLett.98.028901","volume":"98","author":"GP He","year":"2007","unstructured":"He, G.P.: Comment on experimental single qubit quantum secret sharing. Phys. Rev. Lett. 98, 028901 (2007)","journal-title":"Phys. Rev. Lett."},{"key":"3402_CR29","doi-asserted-by":"publisher","first-page":"4553","DOI":"10.1016\/j.optcom.2008.05.026","volume":"281","author":"S Lin","year":"2008","unstructured":"Lin, S., Wen, Q.Y., Gao, F., Zhu, F.C.: Improving the security of multiparty quantum secret sharing based on the improved Bostr\u00f6m-Felbinger protocol. Opt. Commun. 281, 4553 (2008)","journal-title":"Opt. Commun."},{"key":"3402_CR30","doi-asserted-by":"publisher","first-page":"062307","DOI":"10.1103\/PhysRevA.78.062307","volume":"78","author":"J Bogdanski","year":"2008","unstructured":"Bogdanski, J., Rafiei, N., Bourennane, M.: Experimental quantum secret sharing using telecommunication fiber. Phys. Rev. A 78, 062307 (2008)","journal-title":"Phys. Rev. A"},{"key":"3402_CR31","doi-asserted-by":"publisher","first-page":"4946","DOI":"10.1016\/j.optcom.2008.06.028","volume":"281","author":"Y Xia","year":"2008","unstructured":"Xia, Y., Song, J., Song, H.S.: Quantum state sharing using linear optical elements. Opt. Commun. 281, 4946 (2008)","journal-title":"Opt. Commun."},{"key":"3402_CR32","doi-asserted-by":"publisher","first-page":"012344","DOI":"10.1103\/PhysRevA.78.012344","volume":"78","author":"IC Yu","year":"2008","unstructured":"Yu, I.C., Lin, F.L., Huang, C.Y.: Quantum secret sharing with multilevel mutually (un)biased bases. Phys. Rev. A 78, 012344 (2008)","journal-title":"Phys. Rev. A"},{"key":"3402_CR33","doi-asserted-by":"publisher","first-page":"042309","DOI":"10.1103\/PhysRevA.78.042309","volume":"78","author":"D Markham","year":"2008","unstructured":"Markham, D., Sanders, B.C.: Graph states for quantum secret sharing. Phys. Rev. A 78, 042309 (2008)","journal-title":"Phys. Rev. A"},{"key":"3402_CR34","doi-asserted-by":"publisher","first-page":"1957","DOI":"10.1016\/j.physleta.2007.10.066","volume":"372","author":"FG Deng","year":"2008","unstructured":"Deng, F.G., Li, X.H., Zhou, H.Y.: Efficient high-capacity quantum secret sharing with two-photon entanglement. Phys. Lett. A 372, 1957 (2008)","journal-title":"Phys. Lett. A"},{"key":"3402_CR35","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1007\/s11128-011-0351-x","volume":"12","author":"G Gao","year":"2013","unstructured":"Gao, G.: Secure multiparty quantum secret sharing with the collective eavesdropping-check character. Quantum Inf. Process. 12, 55 (2013)","journal-title":"Quantum Inf. Process."},{"key":"3402_CR36","doi-asserted-by":"publisher","first-page":"022321","DOI":"10.1103\/PhysRevA.80.022321","volume":"80","author":"PK Sarvepalli","year":"2009","unstructured":"Sarvepalli, P.K., Klappenecker, A.: Sharing classical secrets with Calderbank\u2013Shor\u2013Steane codes. Phys. Rev. A 80, 022321 (2009)","journal-title":"Phys. Rev. A"},{"key":"3402_CR37","doi-asserted-by":"publisher","first-page":"4464","DOI":"10.1016\/j.optcom.2009.08.018","volume":"282","author":"G Gao","year":"2009","unstructured":"Gao, G.: Reexamining the security of the improved quantum secret sharing scheme. Opt. Commun. 282, 4464 (2009)","journal-title":"Opt. Commun."},{"key":"3402_CR38","doi-asserted-by":"publisher","first-page":"421","DOI":"10.1088\/0253-6102\/52\/3\/08","volume":"52","author":"G Gao","year":"2009","unstructured":"Gao, G.: Multiparty quantum secret sharing using two-photon three-dimensional Bell states. Commun. Theor. Phys. 52, 421 (2009)","journal-title":"Commun. Theor. Phys."},{"key":"3402_CR39","doi-asserted-by":"publisher","first-page":"2852","DOI":"10.1007\/s10773-010-0478-z","volume":"49","author":"G Gao","year":"2010","unstructured":"Gao, G., Wang, L.P.: An efficient multiparty quantum secret sharing protocol based on Bell states in the high dimension Hilbert space. Int. J. Theor. Phys. 49, 2852 (2010)","journal-title":"Int. J. Theor. Phys."},{"key":"3402_CR40","doi-asserted-by":"publisher","first-page":"2997","DOI":"10.1016\/j.optcom.2010.03.030","volume":"283","author":"G Gao","year":"2010","unstructured":"Gao, G.: Cryptanalysis of multiparty quantum secret sharing with collective eavesdropping-check. Opt. Commun. 283, 2997 (2010)","journal-title":"Opt. Commun."},{"key":"3402_CR41","doi-asserted-by":"publisher","first-page":"062315","DOI":"10.1103\/PhysRevA.82.062315","volume":"82","author":"A Keet","year":"2010","unstructured":"Keet, A., Fortescue, B., Markham, D., Sanders, B.C.: Quantum secret sharing with qudit graph states. Phys. Rev. A 82, 062315 (2010)","journal-title":"Phys. Rev. A"},{"key":"3402_CR42","doi-asserted-by":"publisher","first-page":"491","DOI":"10.1007\/s11433-010-0145-7","volume":"53","author":"L Hao","year":"2010","unstructured":"Hao, L., Li, J.L., Long, G.L.: Eavesdropping in a quantum secret sharing protocol based on Grover algorithm and its solution. Sci. China-Phys. Mech. 53, 491 (2010)","journal-title":"Sci. China-Phys. Mech."},{"key":"3402_CR43","doi-asserted-by":"publisher","first-page":"3639","DOI":"10.1016\/j.optcom.2011.03.039","volume":"284","author":"L Hao","year":"2011","unstructured":"Hao, L., Wang, C., Long, G.L.: Quantum secret sharing protocol with four state Grover algorithm and its proof-of-principle experimental demonstration. Opt. Commun. 284, 3639 (2011)","journal-title":"Opt. Commun."},{"key":"3402_CR44","doi-asserted-by":"publisher","first-page":"022330","DOI":"10.1103\/PhysRevA.91.022330","volume":"91","author":"R Rahaman","year":"2015","unstructured":"Rahaman, R., Parker, M.G.: Quantum scheme for secret sharing based on local distinguishability. Phys. Rev. A 91, 022330 (2015)","journal-title":"Phys. Rev. A"},{"key":"3402_CR45","doi-asserted-by":"publisher","first-page":"030302","DOI":"10.1103\/PhysRevA.92.030302","volume":"92","author":"A Tavakoli","year":"2015","unstructured":"Tavakoli, A., Herbauts, I., Zukowski, M., Bourennane, M.: Secret sharing with a single d-level quantum system. Phys. Rev. A 92, 030302 (2015)","journal-title":"Phys. Rev. A"},{"key":"3402_CR46","doi-asserted-by":"publisher","first-page":"1750150","DOI":"10.1142\/S0217984917501500","volume":"31","author":"A Yin","year":"2017","unstructured":"Yin, A., Wang, Z., Fu, F.: A novel semi-quantum secret sharing scheme based on Bell states. Mod. Phys. Lett. B 31, 1750150 (2017)","journal-title":"Mod. Phys. Lett. B"},{"key":"3402_CR47","doi-asserted-by":"publisher","first-page":"140501","DOI":"10.1103\/PhysRevLett.99.140501","volume":"99","author":"M Boyer","year":"2007","unstructured":"Boyer, M., Kenigsberg, D., Mor, T.: Quantum key distribution with classical Bob. Phys. Rev. Lett. 99, 140501 (2007)","journal-title":"Phys. Rev. Lett."},{"key":"3402_CR48","doi-asserted-by":"publisher","first-page":"022303","DOI":"10.1103\/PhysRevA.82.022303","volume":"82","author":"Q Li","year":"2010","unstructured":"Li, Q., Chan, W.H., Long, D.Y.: Semiquantum secret sharing using entangled states. Phys. Rev. A 82, 022303 (2010)","journal-title":"Phys. Rev. A"},{"key":"3402_CR49","doi-asserted-by":"publisher","first-page":"100301","DOI":"10.1088\/0256-307X\/28\/10\/100301","volume":"28","author":"J Wang","year":"2011","unstructured":"Wang, J., Zhang, S., Zhang, Q., Tang, C.J.: Semiquantum key distribution using entangled states. Chinese Phys. Lett. 28, 100301 (2011)","journal-title":"Chinese Phys. Lett."},{"key":"3402_CR50","doi-asserted-by":"publisher","first-page":"045304","DOI":"10.1088\/1751-8113\/46\/4\/045304","volume":"26","author":"LZ Li","year":"2013","unstructured":"Li, L.Z., Qiu, D.W., Mateus, P.: Quantum secret sharing with classical Bobs. J. Phys. A: Math. Theor. 26, 045304 (2013)","journal-title":"J. Phys. A: Math. Theor."},{"issue":"5","key":"3402_CR51","doi-asserted-by":"publisher","first-page":"1350052","DOI":"10.1142\/S0219749913500524","volume":"11","author":"CW Yang","year":"2013","unstructured":"Yang, C.W., Hwang, T.: Efficient key construction on semi-quantum secret sharing protocols. Int. J. Quantum Info. 11(5), 1350052 (2013)","journal-title":"Int. J. Quantum Info."},{"key":"3402_CR52","doi-asserted-by":"publisher","first-page":"3819","DOI":"10.1007\/s10773-015-2622-2","volume":"54","author":"C Xie","year":"2015","unstructured":"Xie, C., Li, L., Qiu, D.: A novel semi-quantum secret sharing scheme of specific bits. Int. J. Theor. Phys. 54, 3819\u20133824 (2015)","journal-title":"Int. J. Theor. Phys."},{"issue":"9","key":"3402_CR53","doi-asserted-by":"publisher","first-page":"2883","DOI":"10.1007\/s10773-019-04171-y","volume":"58","author":"Y Xiang","year":"2019","unstructured":"Xiang, Y., Liu, J., Bai, M.-Q., Yang, X., Mo, Z.-W.: Limited resource semi-quantum secret sharing based on multi-level systems. Int. J. Theor. Phys. 58(9), 2883\u20132892 (2019)","journal-title":"Int. J. Theor. Phys."},{"issue":"6","key":"3402_CR54","doi-asserted-by":"publisher","first-page":"661","DOI":"10.1088\/0253-6102\/70\/6\/661","volume":"70","author":"C-Q Ye","year":"2018","unstructured":"Ye, C.-Q., Ye, T.-Y.: Circular semi-quantum secret sharing using single particles. Commun. Theor. Phys. 70(6), 661 (2018)","journal-title":"Commun. Theor. Phys."},{"issue":"10","key":"3402_CR55","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1007\/s11128-018-2058-8","volume":"17","author":"Z Li","year":"2018","unstructured":"Li, Z., Li, Q., Liu, C., Peng, Y., Chan, W.H., Li, L.: Limited resource semiquantum secret sharing. Quantum Inf. Process. 17(10), 285 (2018)","journal-title":"Quantum Inf. Process."},{"key":"3402_CR56","unstructured":"Ye, C.-Q., Ye, T.-Y., He, D., Gan, Z.-G.: Multiparty semi-quantum secret sharing with d-level single-particle states. Int. J. Theor. Phys., pp. 1\u201318 (2019)"},{"issue":"8","key":"3402_CR57","doi-asserted-by":"publisher","first-page":"194","DOI":"10.1007\/s11128-017-1631-x","volume":"16","author":"K-F Yu","year":"2017","unstructured":"Yu, K.-F., Gu, J., Hwang, T., Gope, P.: Multi-party semi-quantum key distribution-convertible multi-party semi-quantum secret sharing. Quantum Inf. Process. 16(8), 194 (2017)","journal-title":"Quantum Inf. Process."},{"issue":"13","key":"3402_CR58","doi-asserted-by":"publisher","first-page":"1750150","DOI":"10.1142\/S0217984917501500","volume":"31","author":"A Yin","year":"2017","unstructured":"Yin, A., Wang, Z., Fu, F.: A novel semi-quantum secret sharing scheme based on Bell states. Mod. Phys. Lett. B 31(13), 1750150 (2017)","journal-title":"Mod. Phys. Lett. B"},{"key":"3402_CR59","doi-asserted-by":"publisher","first-page":"1650130","DOI":"10.1142\/S021798491650130X","volume":"30","author":"G Gao","year":"2016","unstructured":"Gao, G., Wang, Y., Wang, D.: Multiparty semiquantum secret sharing based on rearranging orders of qubits. Mod. Phys. Lett. B 30, 1650130 (2016)","journal-title":"Mod. Phys. Lett. B"},{"key":"3402_CR60","doi-asserted-by":"crossref","unstructured":"Yin, A.H., Tong, Y.: A novel semi-quantum secret sharing scheme using entangled states. Mod. Phys. Lett. B 1850256 (2018)","DOI":"10.1142\/S0217984918502561"},{"key":"3402_CR61","doi-asserted-by":"crossref","unstructured":"Cao, G., Chen, C., Jiang, M.: A scalable and flexible multi-user semi-quantum secret sharing. In: Proceedings of the 2nd International Conference on Telecommunications and Communication Engineering, pp. 28\u201332. ACM (2018)","DOI":"10.1145\/3291842.3291857"},{"issue":"27","key":"3402_CR62","doi-asserted-by":"publisher","first-page":"1950213","DOI":"10.1142\/S0217732319502134","volume":"34","author":"C-W Tsai","year":"2019","unstructured":"Tsai, C.-W., Yang, C.-W., Lee, N.-Y.: Semi-quantum secret sharing protocol using W-state. Mod. Phys. Lett. A 34(27), 1950213 (2019)","journal-title":"Mod. Phys. Lett. A"},{"issue":"8","key":"3402_CR63","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11128-020-02690-w","volume":"19","author":"C-W Tsai","year":"2020","unstructured":"Tsai, C.-W., Chang, Y.-C., Lai, Y.-H., Yang, C.-W.: Cryptanalysis of limited resource semi-quantum secret sharing. Quantum Inf. Process. 19(8), 1\u20138 (2020)","journal-title":"Quantum Inf. Process."},{"key":"3402_CR64","doi-asserted-by":"publisher","first-page":"032323","DOI":"10.1103\/PhysRevA.91.032323","volume":"91","author":"WO Krawec","year":"2015","unstructured":"Krawec, W.O.: Mediated semiquantum key distribution. Phys. Rev. A 91, 032323 (2015)","journal-title":"Phys. Rev. A"},{"issue":"4","key":"3402_CR65","doi-asserted-by":"publisher","first-page":"372","DOI":"10.1007\/s00453-002-0973-6","volume":"34","author":"E Biham","year":"2002","unstructured":"Biham, E., Boyer, M., Brassard, G., Van De Graaf, J., Mor, T.: Security of quantum key distribution against all collective attacks. Algorithmica 34(4), 372\u2013388 (2002)","journal-title":"Algorithmica"},{"issue":"3","key":"3402_CR66","doi-asserted-by":"publisher","first-page":"1301","DOI":"10.1103\/RevModPhys.81.1301","volume":"81","author":"V Scarani","year":"2009","unstructured":"Scarani, V., Bechmann-Pasquinucci, H., Cerf, N.J., Du\u0161ek, M., L\u00fctkenhaus, N., Peev, M.: The security of practical quantum key distribution. Rev Mod Phys 81(3), 1301\u20131350 (2009)","journal-title":"Rev Mod Phys"},{"issue":"11","key":"3402_CR67","doi-asserted-by":"publisher","first-page":"288","DOI":"10.1007\/s11128-018-2055-y","volume":"17","author":"C Vlachou","year":"2018","unstructured":"Vlachou, C., Krawec, W., Mateus, P., Paunkovc, N., Souto, A.: Quantum key distribution with quantum walks. Quantum Inf. Process. 17(11), 288 (2018)","journal-title":"Quantum Inf. Process."},{"issue":"01","key":"3402_CR68","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1142\/S0219749908003256","volume":"6","author":"R Renner","year":"2008","unstructured":"Renner, R.: Security of quantum key distribution. Int. J. Quantum Inf. 6(01), 1\u2013127 (2008)","journal-title":"Int. J. Quantum Inf."},{"key":"3402_CR69","doi-asserted-by":"publisher","first-page":"012332","DOI":"10.1103\/PhysRevA.72.012332","volume":"72","author":"R Renner","year":"2005","unstructured":"Renner, R., Gisin, N., Kraus, B.: Information-theoretic security proof for quantum-key-distribution protocols. Phys. Rev. A 72, 012332 (2005)","journal-title":"Phys. Rev. A"},{"issue":"4","key":"3402_CR70","doi-asserted-by":"publisher","first-page":"044302","DOI":"10.1103\/PhysRevA.72.044302","volume":"72","author":"FG Deng","year":"2005","unstructured":"Deng, F.G., Li, X.H., Zhou, H.Y., Zhang, Z.J.: Improving the security of multiparty quantum secret sharing against Trojan horse attack. Phys. Rev. A 72(4), 044302 (2005)","journal-title":"Phys. Rev. A"},{"issue":"1\u20132","key":"3402_CR71","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1016\/j.physleta.2005.10.050","volume":"351","author":"QY Cai","year":"2006","unstructured":"Cai, Q.Y.: Eavesdropping on the two-way quantum communication protocols with invisible photons. Phys. Lett. A 351(1\u20132), 23\u201325 (2006)","journal-title":"Phys. Lett. A"}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-021-03402-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11128-021-03402-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-021-03402-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,10,24]],"date-time":"2022-10-24T21:18:43Z","timestamp":1666646323000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11128-021-03402-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,1,20]]},"references-count":71,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2022,2]]}},"alternative-id":["3402"],"URL":"https:\/\/doi.org\/10.1007\/s11128-021-03402-8","relation":{},"ISSN":["1570-0755","1573-1332"],"issn-type":[{"type":"print","value":"1570-0755"},{"type":"electronic","value":"1573-1332"}],"subject":[],"published":{"date-parts":[[2022,1,20]]},"assertion":[{"value":"17 February 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 December 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 January 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"63"}}