{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T06:55:46Z","timestamp":1726037746176},"publisher-location":"Cham","reference-count":50,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030242671"},{"type":"electronic","value":"9783030242688"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-24268-8_48","type":"book-chapter","created":{"date-parts":[[2019,7,17]],"date-time":"2019-07-17T19:03:34Z","timestamp":1563390214000},"page":"520-528","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A New Quantum Private Query Protocol with Better Performance in Resisting Joint-Measurement Attack"],"prefix":"10.1007","author":[{"given":"Xi","family":"Chen","sequence":"first","affiliation":[]},{"given":"Shangjun","family":"He","sequence":"additional","affiliation":[]},{"given":"Gonghua","family":"Hou","sequence":"additional","affiliation":[]},{"given":"Lifan","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Lin","family":"Lin","sequence":"additional","affiliation":[]},{"given":"Ruyi","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Ningcheng","family":"Yuan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,7,11]]},"reference":[{"key":"48_CR1","doi-asserted-by":"publisher","first-page":"592","DOI":"10.1006\/jcss.1999.1689","volume":"60","author":"Y Gentner","year":"2000","unstructured":"Gentner, Y., Ishai, Y., Kushilevitz, E., Malkin, T.: Protecting data privacy in private information retrieval schemes. J. Comput. Syst. Sci. 60, 592 (2000)","journal-title":"J. Comput. Syst. Sci."},{"key":"48_CR2","doi-asserted-by":"publisher","first-page":"042318","DOI":"10.1103\/PhysRevA.93.042318","volume":"93","author":"CY Wei","year":"2016","unstructured":"Wei, C.Y., Wang, T.Y., Gao, F.: Practical quantum private query with better performance in resisting joint-measurement attack. Phys. Rev. A 93, 042318 (2016)","journal-title":"Phys. Rev. A"},{"unstructured":"Shor, P.W.: Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. In: Proceedings of the 35th Annual Symposium on the Foundations of Computer Science, Santa Fe, New Mexico, p. 124. IEEE, Piscataway (1994)","key":"48_CR3"},{"doi-asserted-by":"crossref","unstructured":"Grover, L.K.: A fast quantum mechanical algorithm for database search. In: Proceedings of the 28th Annual ACM Symposium on Theory of Computing, p. 212. ACM, New York (1996)","key":"48_CR4","DOI":"10.1145\/237814.237866"},{"key":"48_CR5","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1103\/RevModPhys.74.145","volume":"74","author":"N Gisin","year":"2002","unstructured":"Gisin, N., Ribordy, G., Tittel, W., Zbinden, H.: Quantum cryptography. Rev. Mod. Phys. 74, 145 (2002)","journal-title":"Rev. Mod. Phys."},{"key":"48_CR6","doi-asserted-by":"publisher","first-page":"230502","DOI":"10.1103\/PhysRevLett.100.230502","volume":"100","author":"V Giovannetti","year":"2008","unstructured":"Giovannetti, V., Lloyd, S., Maccone, L.: Quantum private queries. Phys. Rev. Lett. 100, 230502 (2008)","journal-title":"Phys. Rev. Lett."},{"key":"48_CR7","doi-asserted-by":"publisher","first-page":"3465","DOI":"10.1109\/TIT.2010.2048446","volume":"56","author":"V Giovannetti","year":"2010","unstructured":"Giovannetti, V., Lloyd, S., Maccone, L.: Quantum private queries: security analysis. IEEE Trans. Inf. Theory 56, 3465 (2010)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"48_CR8","doi-asserted-by":"publisher","first-page":"022313","DOI":"10.1103\/PhysRevA.84.022313","volume":"84","author":"L Olejnik","year":"2011","unstructured":"Olejnik, L.: Secure quantum private information retrieval using phase-encoded queries. Phys. Rev. A 84, 022313 (2011)","journal-title":"Phys. Rev. A"},{"key":"48_CR9","doi-asserted-by":"publisher","first-page":"17411","DOI":"10.1364\/OE.20.017411","volume":"20","author":"F Gao","year":"2012","unstructured":"Gao, F., Liu, B., Wen, Q.Y., Chen, H.: Flexible quantum private queries based on quantum key distribution. Opt. Express 20, 17411 (2012)","journal-title":"Opt. Express"},{"key":"48_CR10","doi-asserted-by":"publisher","first-page":"012331","DOI":"10.1103\/PhysRevA.87.012331","volume":"87","author":"MV Panduranga Rao","year":"2013","unstructured":"Panduranga Rao, M.V., Jakobi, M.: Towards communication-efficient quantum oblivious key distribution. Phys. Rev. A 87, 012331 (2013)","journal-title":"Phys. Rev. A"},{"key":"48_CR11","doi-asserted-by":"publisher","first-page":"022334","DOI":"10.1103\/PhysRevA.88.022334","volume":"88","author":"JL Zhang","year":"2013","unstructured":"Zhang, J.L., Guo, F.Z., Gao, F., Liu, B., Wen, Q.Y.: Private database queries based on counterfactual quantum key distribution. Phys. Rev. A 88, 022334 (2013)","journal-title":"Phys. Rev. A"},{"key":"48_CR12","doi-asserted-by":"publisher","first-page":"7537","DOI":"10.1038\/srep07537","volume":"4","author":"CY Wei","year":"2014","unstructured":"Wei, C.Y., Gao, F., Wen, Q.Y., Wang, T.Y.: Practical quantum private query of blocks based on unbalanced-state Bennett-Brassard-1984 quantum-key-distribution protocol. Sci. Rep. 4, 7537 (2014)","journal-title":"Sci. Rep."},{"key":"48_CR13","doi-asserted-by":"publisher","first-page":"5233","DOI":"10.1038\/srep05233","volume":"4","author":"P Chan","year":"2014","unstructured":"Chan, P., Lucio-Martinez, I., Mo, X., Simon, C., Tittel, W.: Performing private database queries in a real-world environment using a quantum protocol. Sci. Rep. 4, 5233 (2014)","journal-title":"Sci. Rep."},{"key":"48_CR14","first-page":"6600111","volume":"21","author":"F Gao","year":"2015","unstructured":"Gao, F., Liu, B., Huang, W., Wen, Q.Y.: Postprocessing of the oblivious key in quantum private query. IEEE. J. Sel. Top. Quant. 21, 6600111 (2015)","journal-title":"IEEE. J. Sel. Top. Quant."},{"key":"48_CR15","doi-asserted-by":"publisher","first-page":"100301","DOI":"10.1007\/s11433-015-5714-3","volume":"58","author":"B Liu","year":"2015","unstructured":"Liu, B., Gao, F., Huang, W.: QKD-based quantum private query without a failure probability. Sci. China-Phys. Mech. Astron. 58, 100301 (2015)","journal-title":"Sci. China-Phys. Mech. Astron."},{"key":"48_CR16","doi-asserted-by":"publisher","first-page":"022301","DOI":"10.1103\/PhysRevA.83.022301","volume":"83","author":"M Jakobi","year":"2011","unstructured":"Jakobi, M., et al.: Practical private database queries based on a quantum-key-distribution protocol. Phys. Rev. A 83, 022301 (2011)","journal-title":"Phys. Rev. A"},{"key":"48_CR17","doi-asserted-by":"publisher","first-page":"057901","DOI":"10.1103\/PhysRevLett.92.057901","volume":"92","author":"V Scarani","year":"2004","unstructured":"Scarani, V., Acin, A., Ribordy, G., Gisin, N.: Quantum cryptography protocols robust against photon number splitting attacks for weak laser pulse implementations. Phys. Rev. Lett. 92, 057901 (2004)","journal-title":"Phys. Rev. Lett."},{"unstructured":"Bennett, C.H., Brassard, G.: Quantum cryptography: public-key distribution and coin tossing. In: Proceedings of the IEEE International Conference on Computers, Systems and Signal Processing, p. 175. IEEE, New York (1984)","key":"48_CR18"},{"key":"48_CR19","doi-asserted-by":"publisher","first-page":"1154","DOI":"10.1103\/PhysRevA.56.1154","volume":"56","author":"HK Lo","year":"1997","unstructured":"Lo, H.K.: Insecurity of quantum secure computations. Phys. Rev. A 56, 1154 (1997)","journal-title":"Phys. Rev. A"},{"key":"48_CR20","doi-asserted-by":"publisher","first-page":"012311","DOI":"10.1103\/PhysRevA.70.012311","volume":"70","author":"FG Deng","year":"2004","unstructured":"Deng, F.G., Long, G.L.: Bidirectional quantum key distribution protocol with practical faint laser pulses. Phys. Rev. A 70, 012311 (2004)","journal-title":"Phys. Rev. A"},{"key":"48_CR21","doi-asserted-by":"publisher","first-page":"172","DOI":"10.1016\/j.physleta.2006.02.027","volume":"355","author":"F Gao","year":"2006","unstructured":"Gao, F., Guo, F.Z., Wen, Q.Y., Zhu, F.C.: On the information-splitting essence of two types of quantum key distribution protocols. Phys. Lett. A 355, 172\u2013175 (2006)","journal-title":"Phys. Lett. A"},{"issue":"1","key":"48_CR22","doi-asserted-by":"publisher","first-page":"536","DOI":"10.1016\/j.optcom.2010.08.073","volume":"284","author":"W Huang","year":"2011","unstructured":"Huang, W., Guo, F.Z., Huang, Z., Wen, Q.Y., Zhu, F.C.: Three-particle QKD protocol against a collective noise. Opt. Commun. 284(1), 536\u2013540 (2011)","journal-title":"Opt. Commun."},{"issue":"9\u201310","key":"48_CR23","first-page":"861","volume":"13","author":"PJ Salas","year":"2013","unstructured":"Salas, P.J.: Security of plug-and-play QKD arrangements with finite resources. Quantum Inf. Comput. 13(9\u201310), 861\u2013879 (2013)","journal-title":"Quantum Inf. Comput."},{"issue":"4","key":"48_CR24","first-page":"042318-1","volume":"89","author":"B Liu","year":"2014","unstructured":"Liu, B., et al.: Choice of measurement as the secret. Phys. Rev. A 89(4), 042318-1\u2013042318-7 (2014)","journal-title":"Phys. Rev. A"},{"key":"48_CR25","doi-asserted-by":"publisher","first-page":"230504","DOI":"10.1103\/PhysRevLett.94.230504","volume":"94","author":"HK Lo","year":"2005","unstructured":"Lo, H.K., Ma, X.F., Chen, K.: Decoy state quantum key distribution. Phys. Rev. Lett. 94, 230504 (2005)","journal-title":"Phys. Rev. Lett."},{"key":"48_CR26","doi-asserted-by":"publisher","first-page":"057901","DOI":"10.1103\/PhysRevLett.91.057901","volume":"91","author":"WY Hwang","year":"2003","unstructured":"Hwang, W.Y.: Quantum key distribution with high loss: toward global secure communication. Phys. Rev. Lett. 91, 057901 (2003)","journal-title":"Phys. Rev. Lett."},{"issue":"3","key":"48_CR27","doi-asserted-by":"publisher","first-page":"648","DOI":"10.1103\/PhysRevLett.83.648","volume":"83","author":"R Cleve","year":"1999","unstructured":"Cleve, R., Gottesman, D., Lo, H.K.: How to share a quantum secret. Phys. Rev. Lett. 83(3), 648\u2013651 (1999)","journal-title":"Phys. Rev. Lett."},{"issue":"3","key":"48_CR28","doi-asserted-by":"publisher","first-page":"1829","DOI":"10.1103\/PhysRevA.59.1829","volume":"59","author":"M Hillery","year":"1999","unstructured":"Hillery, M., Buzek, V., Berthiaume, A.: Quantum secret sharing. Phys. Rev. A 59(3), 1829\u20131834 (1999)","journal-title":"Phys. Rev. A"},{"issue":"1","key":"48_CR29","doi-asserted-by":"publisher","first-page":"162","DOI":"10.1103\/PhysRevA.59.162","volume":"59","author":"A Karlsson","year":"1999","unstructured":"Karlsson, A., Koashi, M., Imoto, N.: Quantum entanglement for secret sharing and secret splitting. Phys. Rev. A 59(1), 162\u2013168 (1999)","journal-title":"Phys. Rev. A"},{"issue":"5","key":"48_CR30","doi-asserted-by":"publisher","first-page":"052307-1","DOI":"10.1103\/PhysRevA.69.052307","volume":"69","author":"L Xiao","year":"2004","unstructured":"Xiao, L., Long, G.L., Deng, F.G., Pan, J.W.: Efficient multiparty quantum secret sharing schemes. Phys. Rev. A 69(5), 052307-1\u2013052307-5 (2004)","journal-title":"Phys. Rev. A"},{"issue":"3","key":"48_CR31","doi-asserted-by":"publisher","first-page":"030501-1","DOI":"10.1103\/PhysRevLett.117.030501","volume":"117","author":"H Lu","year":"2016","unstructured":"Lu, H., et al.: Secret sharing of a quantum state. Phys. Rev. Lett. 117(3), 030501-1\u2013030501-5 (2016)","journal-title":"Phys. Rev. Lett."},{"key":"48_CR32","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1103\/PhysRevA.95.010101","volume":"95","author":"Y Xiang","year":"2017","unstructured":"Xiang, Y., et al.: Multipartite Gaussian steering: monogamy constraints and quantum cryptography applications. Phys. Rev. A 95, 1\u20136 (2017)","journal-title":"Phys. Rev. A"},{"key":"48_CR33","doi-asserted-by":"publisher","first-page":"012315-1","DOI":"10.1103\/PhysRevA.95.012315","volume":"95","author":"I Kogias","year":"2017","unstructured":"Kogias, I., et al.: Unconditional security of entanglement-based continuous-variable quantum secret sharing. Phys. Rev. A 95, 012315-1\u2013012315-6 (2017)","journal-title":"Phys. Rev. A"},{"key":"48_CR34","doi-asserted-by":"publisher","first-page":"1828","DOI":"10.1007\/s11433-012-4767-9","volume":"55","author":"HD Massoud","year":"2012","unstructured":"Massoud, H.D., Elham, F.: A novel and efficient multiparty quantum secret sharing scheme using entangled states. Sci. China Phys. Mech. Astron. 55, 1828\u20131831 (2012)","journal-title":"Sci. China Phys. Mech. Astron."},{"issue":"18","key":"48_CR35","doi-asserted-by":"publisher","first-page":"187902-1","DOI":"10.1103\/PhysRevLett.89.187902","volume":"89","author":"K Bostr\u00f6m","year":"2002","unstructured":"Bostr\u00f6m, K., Felbinger, T.: Deterministic secure direct communication using entanglement. Phys. Rev. Lett. 89(18), 187902-1\u2013187902-4 (2002)","journal-title":"Phys. Rev. Lett."},{"issue":"1","key":"48_CR36","doi-asserted-by":"publisher","first-page":"192","DOI":"10.1016\/j.optcom.2009.09.047","volume":"283","author":"F Gao","year":"2010","unstructured":"Gao, F., Qin, S.J., Wen, Q.Y., Zhu, F.C.: Cryptanalysis of multiparty controlled quantum secure direct communication using Greeberger-Horne-Zeilinger state. Opt. Commun. 283(1), 192\u2013195 (2010)","journal-title":"Opt. Commun."},{"issue":"10","key":"48_CR37","first-page":"100308-1","volume":"21","author":"W Huang","year":"2012","unstructured":"Huang, W., et al.: Fault tolerant quantum secure direct communication with quantum encryption against collective noise. Chin. Phys. B 21(10), 100308-1\u2013100308-9 (2012)","journal-title":"Chin. Phys. B"},{"key":"48_CR38","doi-asserted-by":"publisher","first-page":"044305","DOI":"10.1103\/PhysRevA.71.044305","volume":"71","author":"C Wang","year":"2005","unstructured":"Wang, C., Deng, F.G., Li, Y.S., Liu, X.S., Long, G.L.: Quantum secure direct communication with high-dimension quantum superdense coding. Phys. Rev. A 71, 044305 (2005)","journal-title":"Phys. Rev. A"},{"key":"48_CR39","doi-asserted-by":"publisher","first-page":"052319","DOI":"10.1103\/PhysRevA.69.052319","volume":"69","author":"FG Deng","year":"2004","unstructured":"Deng, F.G., Long, G.L.: Secure direct communication with a quantum one-time pad. Phys. Rev. A 69, 052319 (2004)","journal-title":"Phys. Rev. A"},{"issue":"4","key":"48_CR40","doi-asserted-by":"publisher","first-page":"256","DOI":"10.1016\/j.physleta.2006.05.035","volume":"358","author":"J Wang","year":"2006","unstructured":"Wang, J., Zhang, Q., Tang, C.J.: Quantum secure direct communication based on order rearrangement of single photons. Phys. Rev. Lett. 358(4), 256\u2013258 (2006)","journal-title":"Phys. Rev. Lett."},{"issue":"1\u20133","key":"48_CR41","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1016\/j.optcom.2005.04.048","volume":"253","author":"C Wang","year":"2005","unstructured":"Wang, C., Deng, F.G., Long, G.L.: Multi-step quantum secure direct communication using multi-particle Green\u2013Horne\u2013Zeilinger state. Opt. Commun. 253(1\u20133), 15\u201320 (2005)","journal-title":"Opt. Commun."},{"key":"48_CR42","doi-asserted-by":"publisher","first-page":"042312","DOI":"10.1103\/PhysRevA.65.042312","volume":"65","author":"GH Zeng","year":"2002","unstructured":"Zeng, G.H., Keitel, C.H.: Arbitrated quantum-signature scheme. Phys. Rev. A 65, 042312 (2002)","journal-title":"Phys. Rev. A"},{"key":"48_CR43","doi-asserted-by":"publisher","first-page":"054307","DOI":"10.1103\/PhysRevA.79.054307","volume":"79","author":"Q Li","year":"2009","unstructured":"Li, Q., Chan, W.H., Long, D.Y.: Arbitrated quantum signature scheme using Bell states. Phys. Rev. A 79, 054307 (2009)","journal-title":"Phys. Rev. A"},{"key":"48_CR44","doi-asserted-by":"publisher","first-page":"022344","DOI":"10.1103\/PhysRevA.84.022344","volume":"84","author":"F Gao","year":"2011","unstructured":"Gao, F., Qin, S.J., Guo, F.Z., Wen, Q.Y.: Cryptanalysis of the arbitrated quantum signature protocols. Phys. Rev. A 84, 022344 (2011)","journal-title":"Phys. Rev. A"},{"key":"48_CR45","doi-asserted-by":"publisher","first-page":"040502","DOI":"10.1103\/PhysRevLett.112.040502","volume":"112","author":"V Dunjko","year":"2014","unstructured":"Dunjko, V., Wallden, P., Andersson, E.: Quantum digital signatures without quantum memory. Phys. Rev. Lett. 112, 040502 (2014)","journal-title":"Phys. Rev. Lett."},{"issue":"5\u20136","key":"48_CR46","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1016\/j.physleta.2003.12.036","volume":"321","author":"HY Lee","year":"2004","unstructured":"Lee, H.Y., Hong, C.H., Kim, H.S., Lim, J.G., Yang, H.Y.: Arbitrated quantum signature scheme with message recovery. Phys. Rev. Lett. 321(5\u20136), 295\u2013300 (2004)","journal-title":"Phys. Rev. Lett."},{"key":"48_CR47","doi-asserted-by":"publisher","first-page":"042325","DOI":"10.1103\/PhysRevA.82.042325","volume":"82","author":"XF Zou","year":"2010","unstructured":"Zou, X.F., Qiu, D.W.: Security analysis and improvements of arbitrated quantum signature schemes. Phys. Rev. A 82, 042325 (2010)","journal-title":"Phys. Rev. A"},{"key":"48_CR48","doi-asserted-by":"publisher","first-page":"062330","DOI":"10.1103\/PhysRevA.84.062330","volume":"84","author":"JW Choi","year":"2011","unstructured":"Choi, J.W., Chang, K.Y., Hong, D.: Security problem on arbitrated quantum signature schemes. Phys. Rev. A 84, 062330 (2011)","journal-title":"Phys. Rev. A"},{"issue":"2","key":"48_CR49","first-page":"267","volume":"055","author":"X Tang","year":"2018","unstructured":"Tang, X., Chen, Z., Zhang, H., Liu, X., Shi, Y., Shahzadi, A.: An optimized labeling scheme for reachability queries. CMC: Comput. Mater. Continua 055(2), 267\u2013283 (2018)","journal-title":"CMC: Comput. Mater. Continua"},{"issue":"2","key":"48_CR50","first-page":"297","volume":"55","author":"X Zhang","year":"2018","unstructured":"Zhang, X., Wang, P., Sun, W., Badler, N.I.: A novel twist deformation model of soft tissue in surgery simulation. CMC: Comput. Mater. Continua 55(2), 297\u2013319 (2018)","journal-title":"CMC: Comput. Mater. Continua"}],"container-title":["Lecture Notes in Computer Science","Artificial Intelligence and Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-24268-8_48","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,17]],"date-time":"2019-07-17T19:16:32Z","timestamp":1563390992000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-24268-8_48"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030242671","9783030242688"],"references-count":50,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-24268-8_48","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"11 July 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICAIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Artificial Intelligence and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"New York, NY","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 July 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 July 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"incodldos2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icaisconf.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}