{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,18]],"date-time":"2026-01-18T09:22:27Z","timestamp":1768728147398,"version":"3.49.0"},"reference-count":32,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2012,3,8]],"date-time":"2012-03-08T00:00:00Z","timestamp":1331164800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"published-print":{"date-parts":[[2013,1]]},"DOI":"10.1007\/s11128-012-0379-6","type":"journal-article","created":{"date-parts":[[2012,3,7]],"date-time":"2012-03-07T12:13:51Z","timestamp":1331122431000},"page":"365-380","source":"Crossref","is-referenced-by-count":65,"title":["Multi-party quantum secret sharing with the single-particle quantum state to encode the information"],"prefix":"10.1007","volume":"12","author":[{"given":"Xiu-Bo","family":"Chen","sequence":"first","affiliation":[]},{"given":"Xin-Xin","family":"Niu","sequence":"additional","affiliation":[]},{"given":"Xin-Jie","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Yi-Xian","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,3,8]]},"reference":[{"key":"379_CR1","unstructured":"Bennett, C.H., Brassard, G.: Quantum cryptography: public-key distribution and coin tossing. In: IEEE International Conference on Computers, Systems and Signal Processing, pp. 175\u2013179 (1984)"},{"key":"379_CR2","doi-asserted-by":"crossref","first-page":"543","DOI":"10.1142\/S0219749908003566","volume":"6","author":"X.B. Chen","year":"2008","unstructured":"Chen X.B., Wang T.Y., Du J.Z., Wen Q.Y., Zhu F.C.: Controlled quantum secure direct communication with quantum encryption. Int. J. Quant. Inform. 6, 543\u2013551 (2008)","journal-title":"Int. J. Quant. Inform."},{"key":"379_CR3","doi-asserted-by":"crossref","first-page":"899","DOI":"10.1142\/S0219749908004195","volume":"6","author":"X.B. Chen","year":"2008","unstructured":"Chen X.B., Wen Q.Y., Guo F.Z., Sun Y., Xu G., Zhu F.C.: Controlled quantum secure direct communication with w state. Int. J. Quant. Inform. 6, 899\u2013906 (2008)","journal-title":"Int. J. Quant. Inform."},{"key":"379_CR4","doi-asserted-by":"crossref","first-page":"515","DOI":"10.1016\/j.optcom.2010.08.037","volume":"284","author":"S.K. Chong","year":"2011","unstructured":"Chong S.K., Hwang T.: The enhancement of three-party simultaneous quantum secure direct communication scheme with epr pairs. Opt. Commun. 284, 515\u2013518 (2011)","journal-title":"Opt. Commun."},{"key":"379_CR5","doi-asserted-by":"crossref","first-page":"1895","DOI":"10.1103\/PhysRevLett.70.1895","volume":"70","author":"C.H. Bennett","year":"1993","unstructured":"Bennett C.H., Brassard G., Crepeau C., Jozsa R., Peres A., Wootters W.K.: Teleporting an unknown quantum state via dual classical and einstein-podolsky-rosen channels. Phys. Rev. Lett. 70, 1895\u20131899 (1993)","journal-title":"Phys. Rev. Lett."},{"key":"379_CR6","doi-asserted-by":"crossref","first-page":"2240","DOI":"10.1088\/1009-1963\/15\/10\/009","volume":"15","author":"X.B. Chen","year":"2006","unstructured":"Chen X.B., Wen Q.Y., Zhu F.C.: Probabilistic teleportation of a non-symmetric three-particle state. Chin. Phys. 15, 2240\u20132245 (2006)","journal-title":"Chin. Phys."},{"key":"379_CR7","doi-asserted-by":"crossref","first-page":"2331","DOI":"10.1016\/j.optcom.2007.12.002","volume":"281","author":"X.B. Chen","year":"2008","unstructured":"Chen X.B., Zhang N., Lin S., Wen Q.Y., Zhu F.C.: Quantum circuits for controlled teleportation of two-particle entanglement via a w state. Opt. Commun. 281, 2331\u20132335 (2008)","journal-title":"Opt. Commun."},{"key":"379_CR8","doi-asserted-by":"crossref","first-page":"036301","DOI":"10.1103\/PhysRevA.79.036301","volume":"79","author":"X.B. Chen","year":"2009","unstructured":"Chen X.B., Wen Q.Y., Xu G., Yang Y.X., Zhu F.C.: Comment on \u201cGeneral relation between the transformation operator and an invariant under stochastic local operations and classical communication in quantum teleportation\u201d. Phys. Rev. A 79, 036301 (2009)","journal-title":"Phys. Rev. A"},{"key":"379_CR9","unstructured":"Chen, X.B., Ma, S.Y., Su, Y., Zhang, R., Yang, Y.X.: Controlled remote state preparation of an arbitrary two and three qubit states via the brown state. Quantum Inf. Process (Online). doi: 10.1007\/s11128-11011-10326-y (2012)"},{"key":"379_CR10","doi-asserted-by":"crossref","first-page":"1829","DOI":"10.1103\/PhysRevA.59.1829","volume":"59","author":"M. Hillery","year":"1999","unstructured":"Hillery M., Buzek V., Berthiaume A.: Quantum secret sharing. Phys. Rev. A 59, 1829\u20131834 (1999)","journal-title":"Phys. Rev. A"},{"key":"379_CR11","doi-asserted-by":"crossref","first-page":"648","DOI":"10.1103\/PhysRevLett.83.648","volume":"83","author":"R. Cleve","year":"1999","unstructured":"Cleve R., Gottesman D., Lo H.K.: How to share a quantum secret. Phys. Rev. Lett. 83, 648\u2013651 (1999)","journal-title":"Phys. Rev. Lett."},{"key":"379_CR12","doi-asserted-by":"crossref","first-page":"042320","DOI":"10.1103\/PhysRevA.65.042320","volume":"65","author":"V. Karimipour","year":"2002","unstructured":"Karimipour V., Bahraminasab A., Bagherinezhad S.: Entanglement swapping of generalized cat states and secret sharing. Phys. Rev. A 65, 042320 (2002)","journal-title":"Phys. Rev. A"},{"key":"379_CR13","doi-asserted-by":"crossref","first-page":"022303","DOI":"10.1103\/PhysRevA.72.022303","volume":"72","author":"Z.J. Zhang","year":"2005","unstructured":"Zhang Z.J., Man Z.X.: Multiparty quantum secret sharing of classical messages based on entanglement swapping. Phys. Rev. A 72, 022303 (2005)","journal-title":"Phys. Rev. A"},{"key":"379_CR14","doi-asserted-by":"crossref","first-page":"042309","DOI":"10.1103\/PhysRevA.78.042309","volume":"78","author":"D. Markham","year":"2008","unstructured":"Markham D., Sanders B.C.: Graph states for quantum secret sharing. Phys. Rev. A 78, 042309 (2008)","journal-title":"Phys. Rev. A"},{"key":"379_CR15","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1007\/s11128-010-0180-3","volume":"10","author":"Q. Li","year":"2011","unstructured":"Li Q., Long D.Y., Chan W.H., Qiu D.W.: Sharing a quantum secret without a trusted party. Quantum Inf. Process. 10, 97\u2013106 (2011)","journal-title":"Quantum Inf. Process."},{"key":"379_CR16","doi-asserted-by":"crossref","first-page":"020503","DOI":"10.1103\/PhysRevLett.98.020503","volume":"98","author":"S. Gaertner","year":"2007","unstructured":"Gaertner S., Kurtsiefer C., Bourennane M., Weinfurter H.: Experimental demonstration of four-party quantum secret sharing. Phys. Rev. Lett. 98, 020503 (2007)","journal-title":"Phys. Rev. Lett."},{"key":"379_CR17","doi-asserted-by":"crossref","first-page":"062307","DOI":"10.1103\/PhysRevA.78.062307","volume":"78","author":"J. Bogdanski","year":"2008","unstructured":"Bogdanski J., Rafiei N., Bourennane M.: Experimental quantum secret sharing using telecommunication fiber. Phys. Rev. A 78, 062307 (2008)","journal-title":"Phys. Rev. A"},{"key":"379_CR18","doi-asserted-by":"crossref","first-page":"231","DOI":"10.1007\/s11128-010-0191-0","volume":"10","author":"R.H. Shi","year":"2011","unstructured":"Shi R.H., Huang L.S., Yang W., Zhong H.: Multi-party quantum state sharing of an arbitrary two-qubit state with bell states. Quantum Inf. Process. 10, 231\u2013239 (2011)","journal-title":"Quantum Inf. Process."},{"key":"379_CR19","doi-asserted-by":"crossref","first-page":"044301","DOI":"10.1103\/PhysRevA.71.044301","volume":"71","author":"Z.J. Zhang","year":"2005","unstructured":"Zhang Z.J., Li Y., Man Z.X.: Multiparty quantum secret sharing. Phys. Rev. A 71, 044301 (2005)","journal-title":"Phys. Rev. A"},{"key":"379_CR20","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1016\/j.physleta.2006.04.030","volume":"357","author":"S.J. Qin","year":"2006","unstructured":"Qin S.J., Gao F., Wen Q.Y., Zhu F.C.: Improving the security of multiparty quantum secret sharing against an attack with a fake signal. Phys. Lett. A 357, 101\u2013103 (2006)","journal-title":"Phys. Lett. A"},{"key":"379_CR21","doi-asserted-by":"crossref","first-page":"3647","DOI":"10.1016\/j.optcom.2009.05.054","volume":"282","author":"Y. Sun","year":"2009","unstructured":"Sun Y., Wen Q.Y., Gao F., Chen X.B., Zhu F.C.: Multiparty quantum secret sharing based on bell measurement. Opt. Commun. 282, 3647\u20133651 (2009)","journal-title":"Opt. Commun."},{"key":"379_CR22","doi-asserted-by":"crossref","first-page":"2476","DOI":"10.1016\/j.optcom.2010.02.015","volume":"283","author":"R. Shi","year":"2010","unstructured":"Shi R., Huang L.S., Yang W., Zhong H.: Multiparty quantum secret sharing with bell states and bell measurements. Opt. Commun. 283, 2476\u20132480 (2010)","journal-title":"Opt. Commun."},{"key":"379_CR23","doi-asserted-by":"crossref","first-page":"4455","DOI":"10.1016\/j.optcom.2009.07.053","volume":"282","author":"S. Lin","year":"2009","unstructured":"Lin S., Wen Q.Y., Qin S.J., Zhu F.C.: Multiparty quantum secret sharing with collective eavesdropping-check. Opt. Commun. 282, 4455\u20134459 (2009)","journal-title":"Opt. Commun."},{"key":"379_CR24","doi-asserted-by":"crossref","first-page":"2997","DOI":"10.1016\/j.optcom.2010.03.030","volume":"283","author":"G. Gao","year":"2010","unstructured":"Gao G.: Cryptanalysis of multiparty quantum secret sharing with collective eavesdropping-check. Opt. Commun. 283, 2997\u20133000 (2010)","journal-title":"Opt. Commun."},{"key":"379_CR25","doi-asserted-by":"crossref","first-page":"233","DOI":"10.1016\/j.physa.2005.07.005","volume":"361","author":"Z. Zhang","year":"2006","unstructured":"Zhang Z.: Robust multiparty quantum secret key sharing over two collective-noise channels. Phys. A: Stat. Mech. Appl. 361, 233\u2013238 (2006)","journal-title":"Phys. A: Stat. Mech. Appl."},{"key":"379_CR26","doi-asserted-by":"crossref","first-page":"1561","DOI":"10.1016\/j.optcom.2009.11.085","volume":"283","author":"X.B. Chen","year":"2010","unstructured":"Chen X.B., Xu G., Niu X.X., Wen Q.Y., Yang Y.X.: An efficient protocol for the private comparison of equal information based on the triplet entangled state and single-particle measurement. Opt. Commun. 283, 1561\u20131565 (2010)","journal-title":"Opt. Commun."},{"key":"379_CR27","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1016\/j.optcom.2009.08.063","volume":"283","author":"Y. Sun","year":"2010","unstructured":"Sun Y., Wen Q.y., Zhu F.C.: Improving the multiparty quantum secret sharing over two collective-noise channels against insider attack. Opt. Commun. 283, 181\u2013183 (2010)","journal-title":"Opt. Commun."},{"key":"379_CR28","doi-asserted-by":"crossref","first-page":"421","DOI":"10.1088\/0253-6102\/52\/3\/08","volume":"52","author":"G. Gan","year":"2009","unstructured":"Gan G.: Multiparty quantum secret sharing using two-photon three-dimensional bell states. Commun. Theor. Phys. 52, 421\u2013424 (2009)","journal-title":"Commun. Theor. Phys."},{"key":"379_CR29","doi-asserted-by":"crossref","first-page":"2818","DOI":"10.1103\/PhysRevLett.77.2818","volume":"77","author":"D. Deutsch","year":"1996","unstructured":"Deutsch D., Ekert A., Jozsa R., Macchiavello C., Popescu S., Sanpera A.: Quantum privacy amplification and the security of quantum cryptography over noisy channels. Phys. Rev. Lett. 77, 2818\u20132821 (1996)","journal-title":"Phys. Rev. Lett."},{"key":"379_CR30","doi-asserted-by":"crossref","first-page":"441","DOI":"10.1103\/PhysRevLett.85.441","volume":"85","author":"P.W. Shor","year":"2000","unstructured":"Shor P.W., Preskill J.: Simple proof of security of the bb84 quantum key distribution protocol. Phys. Rev. Lett. 85, 441\u2013444 (2000)","journal-title":"Phys. Rev. Lett."},{"key":"379_CR31","doi-asserted-by":"crossref","first-page":"6130","DOI":"10.1016\/j.optcom.2008.09.026","volume":"281","author":"T.Y. Wang","year":"2008","unstructured":"Wang T.Y., Wen Q.Y., Chen X.B., Guo F.Z., Zhu F.C.: An efficient and secure multiparty quantum secret sharing scheme based on single photons. Opt. Commun. 281, 6130\u20136134 (2008)","journal-title":"Opt. Commun."},{"key":"379_CR32","doi-asserted-by":"crossref","first-page":"656","DOI":"10.1002\/j.1538-7305.1949.tb00928.x","volume":"28","author":"C.E. Shannon","year":"1949","unstructured":"Shannon C.E.: Communication theory of secret systems. Bell Syst. Tech. J. 28, 656\u2013715 (1949)","journal-title":"Bell Syst. Tech. J."}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-012-0379-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11128-012-0379-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-012-0379-6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T03:39:08Z","timestamp":1559360348000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11128-012-0379-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,3,8]]},"references-count":32,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2013,1]]}},"alternative-id":["379"],"URL":"https:\/\/doi.org\/10.1007\/s11128-012-0379-6","relation":{},"ISSN":["1570-0755","1573-1332"],"issn-type":[{"value":"1570-0755","type":"print"},{"value":"1573-1332","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,3,8]]}}}