{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,12,23]],"date-time":"2022-12-23T15:15:12Z","timestamp":1671808512612},"reference-count":15,"publisher":"Springer Science and Business Media LLC","issue":"11","license":[{"start":{"date-parts":[[2015,8,29]],"date-time":"2015-08-29T00:00:00Z","timestamp":1440806400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"NSF of China","doi-asserted-by":"crossref","award":["61103201"],"award-info":[{"award-number":["61103201"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"published-print":{"date-parts":[[2015,11]]},"DOI":"10.1007\/s11128-015-1106-x","type":"journal-article","created":{"date-parts":[[2015,8,28]],"date-time":"2015-08-28T06:43:14Z","timestamp":1440744194000},"page":"4237-4244","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":22,"title":["Proactive quantum secret sharing"],"prefix":"10.1007","volume":"14","author":[{"given":"Huawang","family":"Qin","sequence":"first","affiliation":[]},{"given":"Yuewei","family":"Dai","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,8,29]]},"reference":[{"key":"1106_CR1","doi-asserted-by":"crossref","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A Shamir","year":"1979","unstructured":"Shamir, A.: How to share a secret. Commun. ACM 22, 612\u2013613 (1979)","journal-title":"Commun. ACM"},{"key":"1106_CR2","doi-asserted-by":"crossref","first-page":"1829","DOI":"10.1103\/PhysRevA.59.1829","volume":"A59","author":"M Hillery","year":"1999","unstructured":"Hillery, M., Buzek, V., Berthiaume, A.: Quantum secret sharing. Phys. Rev. A59, 1829\u20131834 (1999)","journal-title":"Phys. Rev."},{"key":"1106_CR3","doi-asserted-by":"crossref","first-page":"022321","DOI":"10.1103\/PhysRevA.80.022321","volume":"A80","author":"PK Sarvepalli","year":"2009","unstructured":"Sarvepalli, P.K., Klappenecker, A.: Sharing classical secrets with Calderbank\u2013Shor\u2013Steane codes. Phys. Rev. A80, 022321 (2009)","journal-title":"Phys. Rev."},{"key":"1106_CR4","doi-asserted-by":"crossref","first-page":"042303","DOI":"10.1103\/PhysRevA.86.042303","volume":"A86","author":"P Sarvepalli","year":"2012","unstructured":"Sarvepalli, P.: Nonthreshold quantum secret-sharing schemes in the graph-state formalism. Phys. Rev. A86, 042303 (2012)","journal-title":"Phys. Rev."},{"key":"1106_CR5","doi-asserted-by":"crossref","first-page":"2877","DOI":"10.1007\/s11128-013-0570-4","volume":"12","author":"Y Sun","year":"2013","unstructured":"Sun, Y., Xu, S.W., Chen, X.B., Niu, X.X., Yang, Y.X.: Expansible quantum secret sharing network. Quantum Inf. Process. 12, 2877\u20132888 (2013)","journal-title":"Quantum Inf. Process."},{"key":"1106_CR6","doi-asserted-by":"crossref","first-page":"3101","DOI":"10.1007\/s10773-012-1191-x","volume":"51","author":"HY Tseng","year":"2012","unstructured":"Tseng, H.Y., Tsai, C.W., Hwang, T., Li, C.M.: Quantum secret sharing based on quantum search algorithm. Int. J. Theor. Phys. 51, 3101\u20133108 (2012)","journal-title":"Int. J. Theor. Phys."},{"key":"1106_CR7","doi-asserted-by":"crossref","first-page":"539","DOI":"10.1007\/s10773-012-1358-5","volume":"52","author":"RH Shi","year":"2013","unstructured":"Shi, R.H., Lv, G.L., Wang, Y., Huang, D.Z., Guo, Y.: On quantum secret sharing via Chinese remainder theorem with the non-maximally entanglement state analysis. Int. J. Theor. Phys. 52, 539\u2013548 (2013)","journal-title":"Int. J. Theor. Phys."},{"key":"1106_CR8","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1007\/s11128-010-0180-3","volume":"10","author":"Q Li","year":"2011","unstructured":"Li, Q., Long, D.Y., Chan, W.H., Qiu, D.W.: Sharing a quantum secret without a trusted party. Quantum Inf. Process. 10, 97\u2013106 (2011)","journal-title":"Quantum Inf. Process."},{"key":"1106_CR9","doi-asserted-by":"crossref","first-page":"1043","DOI":"10.1007\/s10773-012-1418-x","volume":"52","author":"HB Wang","year":"2013","unstructured":"Wang, H.B., Huang, Y.G., Fang, X., Gu, B., Fu, D.S.: High-capacity three-party quantum secret sharing with single photons in both the polarization and the spatial-mode degrees of freedom. Int. J. Theor. Phys. 52, 1043\u20131051 (2013)","journal-title":"Int. J. Theor. Phys."},{"key":"1106_CR10","doi-asserted-by":"crossref","first-page":"792","DOI":"10.1007\/s10773-010-0616-7","volume":"50","author":"YG Yang","year":"2011","unstructured":"Yang, Y.G., Teng, Y.W., Chai, H.P., Wen, Q.Y.: Verifiable quantum (k, n)-threshold secret key sharing. Int. J. Theor. Phys. 50, 792\u2013798 (2011)","journal-title":"Int. J. Theor. Phys."},{"key":"1106_CR11","doi-asserted-by":"crossref","first-page":"1619","DOI":"10.1007\/s11128-011-0323-1","volume":"11","author":"YG Yang","year":"2012","unstructured":"Yang, Y.G., Jia, X., Wang, H.Y., Zhang, H.: Verifiable quantum (k, n)-threshold secret sharing. Quantum Inf. Process. 11, 1619\u20131625 (2012)","journal-title":"Quantum Inf. Process."},{"key":"1106_CR12","doi-asserted-by":"crossref","unstructured":"Herzberg, A., Jarecki, S., Krawczyk, H., Yung, M.: Proactive secret sharing or how to cope with perpetual leakage. In: Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology, pp. 339\u2013352. Springer, London (1995)","DOI":"10.1007\/3-540-44750-4_27"},{"key":"1106_CR13","doi-asserted-by":"crossref","unstructured":"Cachin, C., Kursawe, K., Lysyanskaya, A., Strobl, R.: Asynchronous verifiable secret sharing and proactive cryptosystems. In: Proceedings of the 9th (ACM) Conference on Computer and Communications Security, pp. 88\u201397. ACM Press, New York (2002)","DOI":"10.1145\/586110.586124"},{"key":"1106_CR14","doi-asserted-by":"crossref","first-page":"259","DOI":"10.1145\/1085126.1085127","volume":"8","author":"L Zhou","year":"2005","unstructured":"Zhou, L., Schneider, F., Robbert, R.: APSS: proactive secret sharing in asynchronous systems. ACM Trans. Inf. Syst. Secur. 8, 259\u2013286 (2005)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"1106_CR15","doi-asserted-by":"crossref","unstructured":"Schultz, D.A.: Mobile proactive secret sharing. In: Proceedings of the 27th ACM Symposium on Principles of Distributed Computing, pp. 1\u2013157. ACM Press, Toronto (2008)","DOI":"10.1145\/1400751.1400856"}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-015-1106-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11128-015-1106-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-015-1106-x","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,15]],"date-time":"2020-05-15T19:31:38Z","timestamp":1589571098000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11128-015-1106-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,8,29]]},"references-count":15,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2015,11]]}},"alternative-id":["1106"],"URL":"https:\/\/doi.org\/10.1007\/s11128-015-1106-x","relation":{},"ISSN":["1570-0755","1573-1332"],"issn-type":[{"value":"1570-0755","type":"print"},{"value":"1573-1332","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,8,29]]}}}