{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T05:04:07Z","timestamp":1743138247332,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":31,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789811984440"},{"type":"electronic","value":"9789811984457"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-981-19-8445-7_25","type":"book-chapter","created":{"date-parts":[[2022,12,2]],"date-time":"2022-12-02T14:10:23Z","timestamp":1669990223000},"page":"395-409","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Quantum Information Splitting Scheme of\u00a0Arbitrary Three-Qubit State by\u00a0Using a\u00a0Four-Qubit Cluster State and\u00a0a\u00a0Bell State"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3892-4546","authenticated-orcid":false,"given":"Dongfen","family":"Li","sequence":"first","affiliation":[]},{"given":"Jie","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Xiaolong","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Yuqaio","family":"Tan","sequence":"additional","affiliation":[]},{"given":"Yundan","family":"Zheng","sequence":"additional","affiliation":[]},{"given":"Xiaofang","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,12,3]]},"reference":[{"issue":"2","key":"25_CR1","doi-asserted-by":"publisher","first-page":"364","DOI":"10.1007\/s10773-018-3937-6","volume":"58","author":"M Aili","year":"2019","unstructured":"Aili, M., Abulizi, A.: Dense coding in a three-qubit Heisenberg XXZ spin chain with three-site interactions. Int. J. Theor. Phys. 58(2), 364\u2013371 (2019)","journal-title":"Int. J. Theor. Phys."},{"issue":"13","key":"25_CR2","doi-asserted-by":"publisher","first-page":"1895","DOI":"10.1103\/PhysRevLett.70.1895","volume":"70","author":"CH Bennett","year":"1993","unstructured":"Bennett, C.H., Brassard, G., Cr\u00e9peau, C., Jozsa, R., Peres, A., Wootters, W.K.: Teleporting an unknown quantum state via dual classical and Einstein-Podolsky-Rosen channels. Phys. Rev. Lett. 70(13), 1895 (1993)","journal-title":"Phys. Rev. Lett."},{"issue":"4","key":"25_CR3","doi-asserted-by":"publisher","first-page":"1202","DOI":"10.1007\/s10773-019-04012-y","volume":"58","author":"WF Cao","year":"2019","unstructured":"Cao, W.F., Yang, Y.G.: Verifiable quantum secret sharing protocols based on four-qubit entangled states. Int. J. Theor. Phys. 58(4), 1202\u20131214 (2019)","journal-title":"Int. J. Theor. Phys."},{"issue":"05","key":"25_CR4","doi-asserted-by":"publisher","first-page":"2150026","DOI":"10.1142\/S0217732321500267","volume":"36","author":"Z Cao","year":"2021","unstructured":"Cao, Z., Zhang, Y., Qi, J.: Quantum teleportation of an arbitrary four-qubit state via three-uniform state of eight qubits. Mod. Phys. Lett. A 36(05), 2150026 (2021)","journal-title":"Mod. Phys. Lett. A"},{"issue":"2","key":"25_CR5","doi-asserted-by":"publisher","first-page":"524","DOI":"10.1007\/s10773-013-1836-4","volume":"53","author":"Y Chen","year":"2014","unstructured":"Chen, Y.: Quantum information splitting of an arbitrary three-qubit state using a seven-qubit entangled state. Int. J. Theor. Phys. 53(2), 524\u2013532 (2014)","journal-title":"Int. J. Theor. Phys."},{"issue":"12","key":"25_CR6","doi-asserted-by":"publisher","first-page":"2126","DOI":"10.1109\/LWC.2020.3014633","volume":"9","author":"Y Fu","year":"2020","unstructured":"Fu, Y., Hong, Y., Quek, T.Q., Wang, H., Shi, Z.: Scheduling policies for quantum key distribution enabled communication networks. IEEE Wirel. Commun. Lett. 9(12), 2126\u20132129 (2020)","journal-title":"IEEE Wirel. Commun. Lett."},{"issue":"1","key":"25_CR7","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1109\/TSUSC.2019.2913948","volume":"6","author":"M Geihs","year":"2019","unstructured":"Geihs, M., et al.: The status of quantum-key-distribution-based long-term secure internet communication. IEEE Trans. Sustain. Comput. 6(1), 19\u201329 (2019)","journal-title":"IEEE Trans. Sustain. Comput."},{"issue":"2","key":"25_CR8","first-page":"1","volume":"13","author":"Y Guo","year":"2021","unstructured":"Guo, Y., Peng, Q., Liao, Q., Wang, Y.: Trans-media continuous-variable quantum key distribution via untrusted entanglement source. IEEE Photonics J. 13(2), 1\u201312 (2021)","journal-title":"IEEE Photonics J."},{"issue":"4","key":"25_CR9","doi-asserted-by":"publisher","first-page":"1249","DOI":"10.1007\/s10773-019-04016-8","volume":"58","author":"N Hao","year":"2019","unstructured":"Hao, N., Li, Z.H., Bai, H.Y., Bai, C.M.: A new quantum secret sharing scheme based on mutually unbiased bases. Int. J. Theor. Phys. 58(4), 1249\u20131261 (2019)","journal-title":"Int. J. Theor. Phys."},{"issue":"1","key":"25_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1038\/s41598-017-14515-5","volume":"7","author":"J Heo","year":"2017","unstructured":"Heo, J., et al.: Implementation of controlled quantum teleportation with an arbitrator for secure quantum channels via quantum dots inside optical cavities. Sci. Rep. 7(1), 1\u201312 (2017)","journal-title":"Sci. Rep."},{"issue":"4","key":"25_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11128-019-2218-5","volume":"18","author":"K Hou","year":"2019","unstructured":"Hou, K., Bao, D., Zhu, C., Yang, Y.: Controlled teleportation of an arbitrary two-qubit entanglement in noises environment. Quantum Inf. Process. 18(4), 1\u201319 (2019)","journal-title":"Quantum Inf. Process."},{"key":"25_CR12","doi-asserted-by":"crossref","unstructured":"Hu, X.M., Guo, Y., Liu, B.H., Huang, Y.F., Li, C.F., Guo, G.C.: Beating the channel capacity limit for superdense coding with entangled ququarts. Sci. Adv. 4(7), eaat9304 (2018)","DOI":"10.1126\/sciadv.aat9304"},{"issue":"3","key":"25_CR13","first-page":"565","volume":"18","author":"CC Huang","year":"2016","unstructured":"Huang, C.C., Farn, K.J.: A study on e-Taiwan promotion information security governance programs with e-government implementation of information security management standardization. Int. J. Netw. Secur. 18(3), 565\u2013578 (2016)","journal-title":"Int. J. Netw. Secur."},{"issue":"4","key":"25_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11128-018-1872-3","volume":"17","author":"Z Huang","year":"2018","unstructured":"Huang, Z., Ye, Y., Luo, D.: Simultaneous dense coding affected by fluctuating massless scalar field. Quantum Inf. Process. 17(4), 1\u201311 (2018)","journal-title":"Quantum Inf. Process."},{"issue":"5","key":"25_CR15","doi-asserted-by":"publisher","first-page":"3831","DOI":"10.1007\/s11831-021-09561-2","volume":"28","author":"A Kumar","year":"2021","unstructured":"Kumar, A., Garhwal, S.: State-of-the-art survey of quantum cryptography. Arch. Comput. Methods Eng. 28(5), 3831\u20133868 (2021)","journal-title":"Arch. Comput. Methods Eng."},{"issue":"2","key":"25_CR16","first-page":"141","volume":"19","author":"M Li","year":"2013","unstructured":"Li, M., Liu, J., Hong, W.: Quantum information splitting of a single-qubit via genuine four-qubit entangled states. Acta Sinica Quantum Optica 19(2), 141\u2013145 (2013)","journal-title":"Acta Sinica Quantum Optica"},{"issue":"3","key":"25_CR17","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1007\/s11128-010-0196-8","volume":"10","author":"Y Nie","year":"2011","unstructured":"Nie, Y., Li, Y., Liu, J., Sang, M.: Quantum information splitting of an arbitrary three-qubit state by using two four-qubit cluster states. Quantum Inf. Process. 10(3), 297\u2013305 (2011)","journal-title":"Quantum Inf. Process."},{"issue":"10","key":"25_CR18","doi-asserted-by":"publisher","first-page":"641","DOI":"10.1038\/nphoton.2015.154","volume":"9","author":"S Pirandola","year":"2015","unstructured":"Pirandola, S., Eisert, J., Weedbrook, C., Furusawa, A., Braunstein, S.L.: Advances in quantum teleportation. Nat. Photonics 9(10), 641\u2013652 (2015)","journal-title":"Nat. Photonics"},{"issue":"2","key":"25_CR19","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1080\/02533839.2018.1553634","volume":"42","author":"H Qin","year":"2019","unstructured":"Qin, H., Tso, R.: Efficient quantum secret sharing based on polarization and orbital angular momentum. J. Chin. Inst. Eng. 42(2), 143\u2013148 (2019)","journal-title":"J. Chin. Inst. Eng."},{"issue":"5","key":"25_CR20","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11467-017-0684-8","volume":"12","author":"MDG Ram\u00edrez","year":"2017","unstructured":"Ram\u00edrez, M.D.G., Falaye, B.J., Sun, G.H., Cruz-Irisson, M., Dong, S.H.: Quantum teleportation and information splitting via four-qubit cluster state and a bell state. Front. Phys. 12(5), 1\u20139 (2017)","journal-title":"Front. Phys."},{"key":"25_CR21","unstructured":"Shor, P.W.: Algorithms for quantum computation: discrete logarithms and factoring. In: Proceedings 35th Annual Symposium on Foundations of Computer Science, pp. 124\u2013134. IEEE (1994)"},{"issue":"2","key":"25_CR22","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1137\/S0036144598347011","volume":"41","author":"PW Shor","year":"1999","unstructured":"Shor, P.W.: Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM Rev. 41(2), 303\u2013332 (1999)","journal-title":"SIAM Rev."},{"issue":"3","key":"25_CR23","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1049\/qtc2.12011","volume":"2","author":"R Sk","year":"2021","unstructured":"Sk, R., Dash, T., Panigrahi, P.K.: Quantum information splitting of an arbitrary three-qubit state by using three sets of GHz states. IET Quantum Commun. 2(3), 122\u2013135 (2021)","journal-title":"IET Quantum Commun."},{"issue":"10","key":"25_CR24","doi-asserted-by":"publisher","first-page":"3104","DOI":"10.1007\/s10773-018-3828-x","volume":"57","author":"J Wei","year":"2018","unstructured":"Wei, J., Dai, H.Y., Shi, L., Zhao, S., Zhang, M.: Deterministic quantum controlled teleportation of arbitrary multi-qubit states via partially entangled states. Int. J. Theor. Phys. 57(10), 3104\u20133111 (2018)","journal-title":"Int. J. Theor. Phys."},{"issue":"1","key":"25_CR25","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1088\/0253-6102\/53\/1\/11","volume":"53","author":"Y Xiao-Feng","year":"2010","unstructured":"Xiao-Feng, Y., Yi-Min, L., Wen, Z., Zhan-Jun, Z.: Simplified four-qubit cluster state for splitting arbitrary single-qubit information. Commun. Theor. Phys. 53(1), 49 (2010)","journal-title":"Commun. Theor. Phys."},{"issue":"5","key":"25_CR26","first-page":"577","volume":"29","author":"T Xiu-li","year":"2012","unstructured":"Xiu-li, T., Ting, Z., Xian-ming, W., Jing, X.: Splitting quantum information via six-qubit maximally entangled state. Chin. J. Quantum Electron. 29(5), 577 (2012)","journal-title":"Chin. J. Quantum Electron."},{"issue":"3","key":"25_CR27","doi-asserted-by":"publisher","first-page":"381","DOI":"10.3390\/e24030381","volume":"24","author":"G Xu","year":"2022","unstructured":"Xu, G., Zhou, T., Chen, X.B., Wang, X.: Splitting an arbitrary three-qubit state via a five-qubit cluster state and a bell state. Entropy 24(3), 381 (2022)","journal-title":"Entropy"},{"issue":"1","key":"25_CR28","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1007\/s10773-019-04310-5","volume":"59","author":"Y Yang","year":"2020","unstructured":"Yang, Y., Li, D., Liu, M., Chen, J.: Quantum information splitting of arbitrary two-qubit state via a five-qubit cluster state and a bell-state. Int. J. Theor. Phys. 59(1), 187\u2013199 (2020)","journal-title":"Int. J. Theor. Phys."},{"issue":"1","key":"25_CR29","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1007\/s10773-017-3551-z","volume":"57","author":"MSS Zadeh","year":"2018","unstructured":"Zadeh, M.S.S., Houshmand, M., Aghababa, H.: Bidirectional quantum teleportation of a class of n-qubit states by using (2n+ 2)-qubit entangled states as quantum channel. Int. J. Theor. Phys. 57(1), 175\u2013183 (2018)","journal-title":"Int. J. Theor. Phys."},{"issue":"10","key":"25_CR30","doi-asserted-by":"publisher","first-page":"3835","DOI":"10.1007\/s11128-015-1067-0","volume":"14","author":"D Zhang","year":"2015","unstructured":"Zhang, D., Zha, X.W., Li, W., Yu, Y.: Bidirectional and asymmetric quantum controlled teleportation via maximally eight-qubit entangled state. Quantum Inf. Process. 14(10), 3835\u20133844 (2015)","journal-title":"Quantum Inf. Process."},{"issue":"7","key":"25_CR31","doi-asserted-by":"publisher","first-page":"1935","DOI":"10.1007\/s10773-018-3718-2","volume":"57","author":"YS Zhou","year":"2018","unstructured":"Zhou, Y.S., Wang, F., Luo, M.X.: Efficient superdense coding with W states. Int. J. Theor. Phys. 57(7), 1935\u20131941 (2018)","journal-title":"Int. J. Theor. Phys."}],"container-title":["Communications in Computer and Information Science","Frontiers in Cyber Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-19-8445-7_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,2]],"date-time":"2022-12-02T14:18:22Z","timestamp":1669990702000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-19-8445-7_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9789811984440","9789811984457"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-981-19-8445-7_25","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"3 December 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"FCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Frontiers in Cyber Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Kumasi","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Ghana","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 December 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 December 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"fcs2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/fcs.knust.edu.gh\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"65","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"26","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"40% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}