{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T06:56:17Z","timestamp":1726037777714},"publisher-location":"Cham","reference-count":30,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030242732"},{"type":"electronic","value":"9783030242749"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-24274-9_49","type":"book-chapter","created":{"date-parts":[[2019,7,17]],"date-time":"2019-07-17T23:03:34Z","timestamp":1563404614000},"page":"537-547","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["An Dynamic Protocol for the Quantum Secure Multi-party Summation Based On Commutative Encryption"],"prefix":"10.1007","author":[{"given":"Wen","family":"Liu","sequence":"first","affiliation":[]},{"given":"Min-Yao","family":"Ma","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,7,11]]},"reference":[{"unstructured":"Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. In: Proceedings of IEEE International Conference on Computers, Systems, and Signal Processing, pp. 175\u2013179 (1984)","key":"49_CR1"},{"key":"49_CR2","doi-asserted-by":"publisher","first-page":"661","DOI":"10.1103\/PhysRevLett.67.661","volume":"67","author":"AK Ekert","year":"1991","unstructured":"Ekert, A.K.: Quantum cryptography based on Bell\u2019s theorem. Phys. Rev. Lett. 67, 661\u2013663 (1991)","journal-title":"Phys. Rev. Lett."},{"key":"49_CR3","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1103\/PhysRevLett.68.557","volume":"67","author":"CH Bennett","year":"1992","unstructured":"Bennett, C.H., Brassard, G., Mermin, N.D.: Quantum cryptography without Bell\u2019s theorem. Phys. Rev. Lett. 67, 557\u2013559 (1992)","journal-title":"Phys. Rev. Lett."},{"key":"49_CR4","doi-asserted-by":"publisher","first-page":"042315","DOI":"10.1103\/PhysRevA.68.042315","volume":"68","author":"FG Deng","year":"2003","unstructured":"Deng, F.G., Long, G.L.: Controlled order rearrangement encryption for quantum key distribution. Phys. Rev. A 68, 042315 (2003)","journal-title":"Phys. Rev. A"},{"key":"49_CR5","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1016\/j.physleta.2005.09.012","volume":"349","author":"F Gao","year":"2006","unstructured":"Gao, F., Guo, F.Z., Wen, Q.Y., Zhu, F.C.: Quantum key distribution without alternative measurements and rotations. Phys. Lett. A 349, 53\u201358 (2006)","journal-title":"Phys. Lett. A"},{"key":"49_CR6","doi-asserted-by":"publisher","first-page":"1013","DOI":"10.1142\/S0219749910006241","volume":"8","author":"FZ Guo","year":"2010","unstructured":"Guo, F.Z., Gao, F., Wen, Q.Y., Zhu, F.C.: A two-step channel-encrypting quantum key distribution protocol. Int. J. Quantum Inf. 8, 1013\u20131022 (2010)","journal-title":"Int. J. Quantum Inf."},{"key":"49_CR7","doi-asserted-by":"publisher","first-page":"4611","DOI":"10.1142\/S021797921005661X","volume":"24","author":"F Gao","year":"2010","unstructured":"Gao, F., Guo, F.Z., Wen, Q.Y., Zhu, F.C.: Quantum key distribution by constructiong nonorthogonal states with Bell states. Int. J. Mod. Phys. B 24, 4611\u20134618 (2010)","journal-title":"Int. J. Mod. Phys. B"},{"key":"49_CR8","doi-asserted-by":"publisher","first-page":"052307","DOI":"10.1103\/PhysRevA.59.162","volume":"59","author":"A Karlsson","year":"1999","unstructured":"Karlsson, A., Koashi, M., Imoto, N.: Quantum entanglement for secret sharing and secret splitting. Phys. Rev. A 59, 052307 (1999)","journal-title":"Phys. Rev. A"},{"key":"49_CR9","doi-asserted-by":"publisher","first-page":"162","DOI":"10.1103\/PhysRevA.69.052307","volume":"69","author":"L Xiao","year":"2004","unstructured":"Xiao, L., Long, G.L., Deng, F.G., Pan, J.W.: Efficient multiparty quantum-secret-sharing schemes. Phys. Rev. A 69, 162\u2013168 (2004)","journal-title":"Phys. Rev. A"},{"key":"49_CR10","doi-asserted-by":"publisher","first-page":"329","DOI":"10.1016\/j.physleta.2005.02.001","volume":"337","author":"FG Deng","year":"2005","unstructured":"Deng, F.G., Zhou, H.Y., Long, G.L.: Bidirectional quantum secret sharing and secret splitting with polarized single photons. Phys. Lett. A 337, 329\u2013334 (2005)","journal-title":"Phys. Lett. A"},{"key":"49_CR11","doi-asserted-by":"publisher","first-page":"3647","DOI":"10.1016\/j.optcom.2009.05.054","volume":"282","author":"Y Sun","year":"2009","unstructured":"Sun, Y., Wen, Q.Y., Gao, F., Chen, X.B., Zhu, F.C.: Multiparty quantum secret sharing based on Bell measurement. Opt. Commun. 282, 3647\u20133651 (2009)","journal-title":"Opt. Commun."},{"issue":"1","key":"49_CR12","first-page":"47","volume":"56","author":"Z Qu","year":"2018","unstructured":"Qu, Z., Zhu, T., Wang, J., Wang, X.: A novel quantum stegonagraphy based on brown states. CMC Comput. Mater. Continua 56(1), 47\u201359 (2018)","journal-title":"CMC Comput. Mater. Continua"},{"issue":"2","key":"49_CR13","first-page":"211","volume":"56","author":"W Liu","year":"2018","unstructured":"Liu, W., Chen, Z., Liu, J., Su, Z., Chi, L.: Full-blind delegating private quantum computation. CMC Comput. Mater. Continua 56(2), 211\u2013223 (2018)","journal-title":"CMC Comput. Mater. Continua"},{"doi-asserted-by":"crossref","unstructured":"Goldreich, O., Micali, S., Wigderson, A.: How to play any mental game. In: Proceedings of the Nineteenth Annual ACM Symposium on Theory of Computing, p. 218. ACM, New York (1987)","key":"49_CR14","DOI":"10.1145\/28395.28420"},{"issue":"1\u20134","key":"49_CR15","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1016\/j.physleta.2005.09.010","volume":"349","author":"M Hillery","year":"2006","unstructured":"Hillery, M., Ziman, M., Buek, V., Bielikov, M.: Phys. Lett. A 349(1\u20134), 75 (2006)","journal-title":"Phys. Lett. A"},{"key":"49_CR16","doi-asserted-by":"crossref","first-page":"6214","DOI":"10.7498\/aps.56.6214","volume":"56","author":"JZ Du","year":"2007","unstructured":"Du, J.Z., Chen, X.B., Wen, Q.X., Zhu, F.C.: Secure multiparty quantum summation. Acta Phys. Sin-Ch. Ed. 56, 6214\u20136219 (2007)","journal-title":"Acta Phys. Sin-Ch. Ed."},{"key":"49_CR17","doi-asserted-by":"publisher","first-page":"2793","DOI":"10.1007\/s10773-010-0472-5","volume":"49","author":"XB Chen","year":"2010","unstructured":"Chen, X.B., Xu, G., Yang, Y.X., Wen, Q.Y.: An efficient protocol for the secure multi-party quantum summation. Int. J. Theor. Phys. 49, 2793\u20132804 (2010)","journal-title":"Int. J. Theor. Phys."},{"issue":"2","key":"49_CR18","doi-asserted-by":"publisher","first-page":"1550011","DOI":"10.1142\/S0219749915500112","volume":"13","author":"C Zhang","year":"2015","unstructured":"Zhang, C., Sun, Z.-W., Huang, X.: Three-party quantum summation without a trusted third party. Int. J. Quantum Inf. 13(2), 1550011 (2015)","journal-title":"Int. J. Quantum Inf."},{"issue":"3","key":"49_CR19","doi-asserted-by":"publisher","first-page":"933","DOI":"10.1007\/s10773-013-1884-9","volume":"53","author":"C Zhang","year":"2014","unstructured":"Zhang, C., Sun, Z., Huang, Y.: High-capacity quantum summation with single photons in both polarization and spatial-mode degrees of freedom. Int. J. Theor. Phys. 53(3), 933\u2013941 (2014)","journal-title":"Int. J. Theor. Phys."},{"key":"49_CR20","doi-asserted-by":"publisher","first-page":"19655","DOI":"10.1038\/srep19655","volume":"6","author":"R Shi","year":"2016","unstructured":"Shi, R., Yi, M., Zhong, H., Cui, J., Zhang, S.: Secure multiparty quantum computation for summation and multiplication. Sci. Rep. 6, 19655 (2016)","journal-title":"Sci. Rep."},{"issue":"2","key":"49_CR21","doi-asserted-by":"publisher","first-page":"022301","DOI":"10.1103\/PhysRevA.83.022301","volume":"83","author":"M Jakobi","year":"2011","unstructured":"Jakobi, M., et al.: Practical private database queries based on a quantum-key-distribution protocol. Phys. Rev. A 83(2), 022301 (2011)","journal-title":"Phys. Rev. A"},{"unstructured":"Kanamori, Y.: Quantum encryption and authentication protocols. Ph.D thesis, University of Alabama in Huntsville (2006)","key":"49_CR22"},{"key":"49_CR23","doi-asserted-by":"publisher","first-page":"2101","DOI":"10.1007\/s11128-016-1253-8","volume":"15","author":"Z Sun","year":"2016","unstructured":"Sun, Z., Huang, J., Wang, P.: Efficient multiparty quantum key agreement protocol based on commutative encryption. Quantum Inf. Process. 15, 2101 (2016)","journal-title":"Quantum Inf. Process."},{"key":"49_CR24","first-page":"329","volume":"7","author":"F Gao","year":"2007","unstructured":"Gao, F., Qin, S.J., Wen, Q.Y., et al.: A simple participant attack on the Bradler-Dusek protocol. Quantum Inf. Comput. 7, 329 (2007)","journal-title":"Quantum Inf. Comput."},{"key":"49_CR25","doi-asserted-by":"publisher","first-page":"062324","DOI":"10.1103\/PhysRevA.76.062324","volume":"76","author":"SJ Qin","year":"2007","unstructured":"Qin, S.J., Gao, F., Wen, Q.Y., et al.: Cryptanalysis of the Hillery-Buzek-Berthiaume quantum secretsharing protocol. Phys. Rev. A 76, 062324 (2007)","journal-title":"Phys. Rev. A"},{"key":"49_CR26","doi-asserted-by":"publisher","first-page":"036301","DOI":"10.1103\/PhysRevA.76.036301","volume":"76","author":"S Lin","year":"2007","unstructured":"Lin, S., Gao, F., Guo, F.Z., et al.: Comment on multiparty quantum secret sharing of classical messages based on entanglement swapping. Phys. Rev. A 76, 036301 (2007)","journal-title":"Phys. Rev. A"},{"key":"49_CR27","doi-asserted-by":"publisher","first-page":"4553","DOI":"10.1016\/j.optcom.2008.05.026","volume":"281","author":"S Lin","year":"2008","unstructured":"Lin, S., Wen, Q.Y., Gao, F., et al.: Improving the security of multiparty quantum secret sharing based on the improved Bostrom-Felbinger protocol. Opt. Commun. 281, 4553 (2008)","journal-title":"Opt. Commun."},{"key":"49_CR28","doi-asserted-by":"publisher","first-page":"208901","DOI":"10.1103\/PhysRevLett.101.208901","volume":"101","author":"F Gao","year":"2008","unstructured":"Gao, F., Guo, F.Z., Wen, Q.Y., et al.: Comment on experimental demonstration of a quantum protocol for Byzantine agreement and liar detection. Phys. Rev. Lett. 101, 208901 (2008)","journal-title":"Phys. Rev. Lett."},{"key":"49_CR29","doi-asserted-by":"publisher","first-page":"1333","DOI":"10.1088\/1674-1056\/18\/4\/007","volume":"18","author":"TT Song","year":"2009","unstructured":"Song, T.T., Zhang, J., Gao, F., et al.: Participant attack on quantum secret sharing based on entanglement swapping. Chin. Phys. B 18, 1333 (2009)","journal-title":"Chin. Phys. B"},{"key":"49_CR30","doi-asserted-by":"publisher","first-page":"445","DOI":"10.1140\/epjd\/e2009-00306-3","volume":"56","author":"FZ Guo","year":"2010","unstructured":"Guo, F.Z., Qin, S.J., Gao, F., et al.: Participant attack on a kind of MQSS schemes based on entanglement swapping. Eur. Phys. J. D 56, 445 (2010)","journal-title":"Eur. Phys. J. D"}],"container-title":["Lecture Notes in Computer Science","Artificial Intelligence and Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-24274-9_49","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,24]],"date-time":"2022-09-24T03:30:36Z","timestamp":1663990236000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-24274-9_49"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030242732","9783030242749"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-24274-9_49","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"11 July 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICAIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Artificial Intelligence and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"New York, NY","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 July 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 July 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"incodldos2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icaisconf.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}