{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,5]],"date-time":"2026-04-05T10:16:36Z","timestamp":1775384196132,"version":"3.50.1"},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2022,1,8]],"date-time":"2022-01-08T00:00:00Z","timestamp":1641600000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,8]],"date-time":"2022-01-08T00:00:00Z","timestamp":1641600000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/100009377","name":"education department of hunan province","doi-asserted-by":"publisher","award":["20A471"],"award-info":[{"award-number":["20A471"]}],"id":[{"id":"10.13039\/100009377","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004735","name":"natural science foundation of hunan province","doi-asserted-by":"publisher","award":["2018JJ2403"],"award-info":[{"award-number":["2018JJ2403"]}],"id":[{"id":"10.13039\/501100004735","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"national natural science foundation of china","doi-asserted-by":"publisher","award":["U1736113"],"award-info":[{"award-number":["U1736113"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004735","name":"natural science foundation of hunan province","doi-asserted-by":"publisher","award":["2020JJ4750"],"award-info":[{"award-number":["2020JJ4750"]}],"id":[{"id":"10.13039\/501100004735","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"national natural science foundation of china","doi-asserted-by":"publisher","award":["61972418"],"award-info":[{"award-number":["61972418"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100021171","name":"guangdong basic and applied basic research foundation","doi-asserted-by":"crossref","award":["2020A1515011204"],"award-info":[{"award-number":["2020A1515011204"]}],"id":[{"id":"10.13039\/501100021171","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2022,3]]},"DOI":"10.1007\/s10623-021-00993-2","type":"journal-article","created":{"date-parts":[[2022,1,8]],"date-time":"2022-01-08T15:02:27Z","timestamp":1641654147000},"page":"577-591","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":24,"title":["Efficient quantum homomorphic encryption scheme with flexible evaluators and its simulation"],"prefix":"10.1007","volume":"90","author":[{"given":"Jiang","family":"Liu","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6393-3236","authenticated-orcid":false,"given":"Qin","family":"Li","sequence":"additional","affiliation":[]},{"given":"Junyu","family":"Quan","sequence":"additional","affiliation":[]},{"given":"Can","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Jinjing","family":"Shi","sequence":"additional","affiliation":[]},{"given":"Haozhen","family":"Situ","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,1,8]]},"reference":[{"key":"993_CR1","first-page":"438","volume":"2017","author":"G Alagic","year":"2017","unstructured":"Alagic G., Dulek Y., Schaffner C., Speelman F.: Quantum fully homomorphic encryption with verification. Adv. Cryptol. 2017, 438\u2013467 (2017).","journal-title":"Adv. Cryptol."},{"key":"993_CR2","doi-asserted-by":"crossref","unstructured":"Broadbent A., Jeffery S.: Quantum homomorphic encryption for circuits of low T-gate complexity. Adv. Cryptol. 2015, 609\u2013629 (2015).","DOI":"10.1007\/978-3-662-48000-7_30"},{"key":"993_CR3","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1007\/s10623-015-0157-4","volume":"78","author":"A Broadbent","year":"2016","unstructured":"Broadbent A., Schaffner C.: Quantum cryptography beyond quantum key distribution. Des. Codes Cryptogr. 78, 351\u2013382 (2016).","journal-title":"Des. Codes Cryptogr."},{"key":"993_CR4","doi-asserted-by":"publisher","first-page":"172","DOI":"10.1016\/j.ins.2019.06.009","volume":"501","author":"XB Chen","year":"2019","unstructured":"Chen X.B., Sun Y.R., Xu G., Yang Y.X.: Quantum homomorphic encryption scheme with flexible number of evaluator based on ($$k$$, $$n$$)-threshold quantum state sharing. Inf. Sci. 501, 172\u2013181 (2019).","journal-title":"Inf. Sci."},{"key":"993_CR5","doi-asserted-by":"publisher","first-page":"126265","DOI":"10.1016\/j.physa.2021.126265","volume":"582","author":"L Chen","year":"2021","unstructured":"Chen L., Li Q., Liu C., Peng Y., Yu F.: Efficient mediated semi-quantum key distribution. Physica A 582, 126265 (2021).","journal-title":"Physica A"},{"key":"993_CR6","first-page":"3","volume":"2016","author":"Y Dulek","year":"2016","unstructured":"Dulek Y., Schaffner C., Speelman F.: Quantum homomorphic encryption for polynomial-sized circuits. Adv. Cryptol. 2016, 3\u201332 (2016).","journal-title":"Adv. Cryptol."},{"key":"993_CR7","doi-asserted-by":"publisher","first-page":"3074","DOI":"10.1038\/ncomms4074","volume":"5","author":"KAG Fisher","year":"2014","unstructured":"Fisher K.A.G., Broadbent A., Shalm L.K., Yan Z., Lavoie J., Prevedel R., Jennewein T., Resch K.J.: Quantum computing on encrypted data. Nat. Commun. 5, 3074 (2014).","journal-title":"Nat. Commun."},{"key":"993_CR8","doi-asserted-by":"publisher","first-page":"12303","DOI":"10.1103\/PhysRevA.96.012303","volume":"96","author":"JF Fitzsimons","year":"2017","unstructured":"Fitzsimons J.F., Kashefi E.: Unconditionally verifiable blind quantum computation. Phys. Rev. A 96, 12303 (2017).","journal-title":"Phys. Rev. A"},{"key":"993_CR9","doi-asserted-by":"publisher","first-page":"1023","DOI":"10.1038\/nature07127","volume":"453","author":"HJ Kimble","year":"2008","unstructured":"Kimble H.J.: The quantum internet. Nature 453, 1023\u20131030 (2008).","journal-title":"Nature"},{"key":"993_CR10","doi-asserted-by":"publisher","first-page":"3001","DOI":"10.1007\/s10773-016-2932-z","volume":"55","author":"XQ Kong","year":"2016","unstructured":"Kong X.Q., Li Q., Wu C.H., Yu F., He J.J., Sun Z.Y.: Multiple-server flexible blind quantum computation in networks. Int. J .Theor. Phys. 55, 3001\u20133007 (2016).","journal-title":"Int. J .Theor. Phys."},{"key":"993_CR11","first-page":"785","volume":"18","author":"CY Lai","year":"2017","unstructured":"Lai C.Y., Chung K.M.: On statistically-secure quantum homomorphic encryption. Quantum Inf. Comput. 18, 785\u2013794 (2017).","journal-title":"Quantum Inf. Comput."},{"key":"993_CR12","doi-asserted-by":"publisher","first-page":"1961","DOI":"10.1007\/s10623-018-00597-3","volume":"87","author":"CY Lai","year":"2019","unstructured":"Lai C.Y., Chung K.M.: Quantum encryption and generalized Shannon impossibility. Des. Codes Cryptogr. 87, 1961\u20131972 (2019).","journal-title":"Des. Codes Cryptogr."},{"key":"993_CR13","doi-asserted-by":"publisher","first-page":"040302","DOI":"10.1103\/PhysRevA.89.040302","volume":"89","author":"Q Li","year":"2014","unstructured":"Li Q., Chan W.H., Wu C.H., Wen Z.H.: Triple-server blind quantum computation using entanglement swapping. Phys. Rev. A 89, 040302 (2014).","journal-title":"Phys. Rev. A"},{"key":"993_CR14","doi-asserted-by":"publisher","first-page":"3675","DOI":"10.1007\/s11128-013-0626-5","volume":"12","author":"M Liang","year":"2013","unstructured":"Liang M.: Symmetric quantum fully homomorphic encryption with perfect security. Quantum Inf. Process. 12, 3675\u20133687 (2013).","journal-title":"Quantum Inf. Process."},{"key":"993_CR15","doi-asserted-by":"publisher","first-page":"2749","DOI":"10.1007\/s11128-015-1034-9","volume":"14","author":"M Liang","year":"2015","unstructured":"Liang M.: Quantum fully homomorphic encryption scheme based on universal quantum circuit. Quantum Inf. Process. 14, 2749\u20132759 (2015).","journal-title":"Quantum Inf. Process."},{"key":"993_CR16","doi-asserted-by":"crossref","unstructured":"Mahadev U.: Classical homomorphic encryption for quantum circuits. In IEEE 59th Annual Symposium on Foundations of Computer Science (FOCS), pp. 332\u2013338 (2018).","DOI":"10.1109\/FOCS.2018.00039"},{"key":"993_CR17","doi-asserted-by":"publisher","first-page":"13795","DOI":"10.1038\/ncomms13795","volume":"7","author":"K Marshall","year":"2016","unstructured":"Marshall K., Jacobsen C.S., Sch\u00e4fermeier C., Gehring T., Weedbrook C., Andersen U.L.: Continuous-variable quantum computing on encrypted data. Nat. Commun. 7, 13795 (2016).","journal-title":"Nat. Commun."},{"key":"993_CR18","doi-asserted-by":"publisher","first-page":"52339","DOI":"10.1103\/PhysRevA.101.052339","volume":"101","author":"MGM Moreno","year":"2020","unstructured":"Moreno M.G.M., Brito S., Nery R.V., Chaves R.: Device-independent secret sharing and a stronger form of Bell nonlocality. Phys. Rev. A 101, 52339 (2020).","journal-title":"Phys. Rev. A"},{"key":"993_CR19","volume-title":"Quantum Computation and Quantum Information","author":"M Nielsen","year":"2011","unstructured":"Nielsen M., Chuang I.: Quantum Computation and Quantum Information. Cambridge University Press, Cambridge (2011)."},{"key":"993_CR20","doi-asserted-by":"publisher","first-page":"42303","DOI":"10.1103\/PhysRevA.101.042303","volume":"101","author":"M Oliveira","year":"2020","unstructured":"Oliveira M., Nape I., Pinnell J., TabeBordbar N., Forbes A.: Experimental high-dimensional quantum secret sharing with spin-orbit-structured photons. Phys. Rev. A 101, 42303 (2020).","journal-title":"Phys. Rev. A"},{"key":"993_CR21","doi-asserted-by":"publisher","first-page":"052333","DOI":"10.1103\/PhysRevA.96.052333","volume":"96","author":"Y Ouyang","year":"2017","unstructured":"Ouyang Y., Tan S.H., Zhao L., Fitzsimons J.F.: Computing on quantum shared secrets. Phys. Rev. A 96, 052333 (2017).","journal-title":"Phys. Rev. A"},{"key":"993_CR22","doi-asserted-by":"publisher","first-page":"42334","DOI":"10.1103\/PhysRevA.98.042334","volume":"98","author":"Y Ouyang","year":"2018","unstructured":"Ouyang Y., Tan S.H., Fitzsimons J.F.: Quantum homomorphic encryption from quantum codes. Phys. Rev. A 98, 42334 (2018).","journal-title":"Phys. Rev. A"},{"key":"993_CR23","doi-asserted-by":"publisher","first-page":"637","DOI":"10.1007\/s11128-012-0390-y","volume":"11","author":"AK Pati","year":"2012","unstructured":"Pati A.K., Agrawal P.: Special issue on quantum information theory. Quantum Inf. Process. 11, 637\u2013638 (2012).","journal-title":"Quantum Inf. Process."},{"key":"993_CR24","doi-asserted-by":"publisher","first-page":"52313","DOI":"10.1103\/PhysRevA.100.052313","volume":"100","author":"K Senthoor","year":"2019","unstructured":"Senthoor K., Sarvepalli P.K.: Communication efficient quantum secret sharing. Phys. Rev. A 100, 52313 (2019).","journal-title":"Phys. Rev. A"},{"key":"993_CR25","doi-asserted-by":"publisher","first-page":"33467","DOI":"10.1038\/srep33467","volume":"6","author":"SH Tan","year":"2016","unstructured":"Tan S.H., Kettlewell J.A., Ouyang Y., Chen L., Fitzsimons J.F.: A quantum approach to homomorphic encryption. Sci. Rep. 6, 33467 (2016).","journal-title":"Sci. Rep."},{"key":"993_CR26","doi-asserted-by":"crossref","unstructured":"Wang Y., She K., Luo Q., Yang F., Zhao C.: Symmetric ternary quantum homomorphic encryption schemes based on the ternary quantum one-time pad. ArXiv preprint arXiv:1505.02854 (2015).","DOI":"10.1142\/S0217984916500767"},{"key":"993_CR27","unstructured":"Wojciech, K., Stephanie, W.: Towards large-scale quantum networks. In Proceedings of the Sixth Annual ACM International Conference on Nanoscale Computing and Communication, pp. 1\u20137 (2019)."},{"key":"993_CR28","doi-asserted-by":"publisher","first-page":"809","DOI":"10.32604\/cmc.2019.04400","volume":"58","author":"G Xu","year":"2019","unstructured":"Xu G., Xiao K., Li Z.P., Niu X.X., Ryan M.: Controlled secure direct communication protocol via the three-qubit partially entangled set of states. CMC-Comput. Mater. Contin. 58, 809\u2013827 (2019).","journal-title":"CMC-Comput. Mater. Contin."},{"key":"993_CR29","doi-asserted-by":"publisher","first-page":"050303","DOI":"10.1103\/PhysRevA.90.050303","volume":"90","author":"L Yu","year":"2014","unstructured":"Yu L., P\u00e9rez-Delgado C.A., Fitzsimons J.F.: Limitations on information-theoretically-secure quantum homomorphic encryption. Phys. Rev. A 90, 050303 (2014).","journal-title":"Phys. Rev. A"},{"key":"993_CR30","doi-asserted-by":"publisher","first-page":"70309","DOI":"10.1088\/1674-1056\/ac003b","volume":"30","author":"JW Zhang","year":"2021","unstructured":"Zhang J.W., Chen X.B., Xu G., Yang Y.X.: Universal quantum circuit evaluation on encrypted data using probabilistic quantum homomorphic encryption scheme. Chin. Phys. B 30, 70309\u2013070309 (2021).","journal-title":"Chin. Phys. B"}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-021-00993-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10623-021-00993-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-021-00993-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,3,7]],"date-time":"2022-03-07T10:08:13Z","timestamp":1646647693000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10623-021-00993-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,1,8]]},"references-count":30,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2022,3]]}},"alternative-id":["993"],"URL":"https:\/\/doi.org\/10.1007\/s10623-021-00993-2","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,1,8]]},"assertion":[{"value":"19 July 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 December 2021","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 December 2021","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 January 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}