{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T00:40:28Z","timestamp":1777423228198,"version":"3.51.4"},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2015,12,12]],"date-time":"2015-12-12T00:00:00Z","timestamp":1449878400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100013084","name":"Program for Innovation Team Building at Institutions of Higher Education in Chongqing","doi-asserted-by":"crossref","award":["KJTD201310"],"award-info":[{"award-number":["KJTD201310"]}],"id":[{"id":"10.13039\/501100013084","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["National Natural Science Foundation of China"],"award-info":[{"award-number":["National Natural Science Foundation of China"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Natural Science Foundation of Chongqing Science & Technology Commission of China","award":["cstc2014jcyjA40028"],"award-info":[{"award-number":["cstc2014jcyjA40028"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"published-print":{"date-parts":[[2016,2]]},"DOI":"10.1007\/s11128-015-1199-2","type":"journal-article","created":{"date-parts":[[2015,12,12]],"date-time":"2015-12-12T08:53:45Z","timestamp":1449910425000},"page":"851-868","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":21,"title":["Cryptanalysis and improvement of verifiable quantum (k,\u00a0n) secret sharing"],"prefix":"10.1007","volume":"15","author":[{"given":"Xiuli","family":"Song","sequence":"first","affiliation":[]},{"given":"Yanbing","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,12,12]]},"reference":[{"issue":"11","key":"1199_CR1","doi-asserted-by":"crossref","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A Shamir","year":"1979","unstructured":"Shamir, A.: How to share a secret. Commun. ACM 22(11), 612\u2013613 (1979)","journal-title":"Commun. ACM"},{"key":"1199_CR2","doi-asserted-by":"crossref","first-page":"1829","DOI":"10.1103\/PhysRevA.59.1829","volume":"59","author":"M Hillery","year":"1999","unstructured":"Hillery, M., Buzek, V., Berthiaume, A.: Quantum secret sharing. Phys. Rev. A 59, 1829 (1999)","journal-title":"Phys. Rev. A"},{"key":"1199_CR3","doi-asserted-by":"crossref","first-page":"054303","DOI":"10.1103\/PhysRevA.74.054303","volume":"74","author":"SB Zheng","year":"2006","unstructured":"Zheng, S.B.: Splitting quantum information via W states. Phys. Rev. A 74, 054303 (2006)","journal-title":"Phys. Rev. A"},{"issue":"5","key":"1199_CR4","doi-asserted-by":"crossref","first-page":"1367","DOI":"10.1007\/s10773-010-0645-2","volume":"50","author":"YY Nie","year":"2011","unstructured":"Nie, Y.Y., Sang, M.H., Li, Y.H., Liu, J.C.: Three-party quantum information splitting of an arbitrary two-qubit state by using six-qubit cluster state. Int. J. Theor. Phys. 50(5), 1367\u20131371 (2011)","journal-title":"Int. J. Theor. Phys."},{"key":"1199_CR5","doi-asserted-by":"crossref","first-page":"619","DOI":"10.1007\/s11128-010-0217-7","volume":"10","author":"N Paul","year":"2011","unstructured":"Paul, N., Menon, J.V., Karumanchi, S., Muralidharan, S., Panigrahi, P.K.: Quantum tasks using six qubit cluster states. Quantum Inf. Process. 10, 619\u2013632 (2011)","journal-title":"Quantum Inf. Process."},{"issue":"2","key":"1199_CR6","doi-asserted-by":"crossref","first-page":"022306","DOI":"10.1103\/PhysRevA.68.022306","volume":"68","author":"L-Y Hsu","year":"2003","unstructured":"Hsu, L.-Y.: Quantum secret-sharing protocol based on Grover\u2019s algorithm. Phys. Rev. A 68(2), 022306 (2003)","journal-title":"Phys. Rev. A"},{"issue":"3","key":"1199_CR7","doi-asserted-by":"crossref","first-page":"491","DOI":"10.1007\/s11433-010-0145-7","volume":"53","author":"L Hao","year":"2010","unstructured":"Hao, L., Li, J.-L., Long, G.-L.: Eavesdropping in a quantum secret sharing protocol based on Grover algorithm and its solution. Sci. China Phys. Mech. Astron. 53(3), 491\u2013495 (2010)","journal-title":"Sci. China Phys. Mech. Astron."},{"key":"1199_CR8","doi-asserted-by":"crossref","first-page":"648","DOI":"10.1103\/PhysRevLett.83.648","volume":"83","author":"R Cleve","year":"1999","unstructured":"Cleve, R., Gottesman, D., Lo, H.K.: How to share a quantum secret. Phys. Rev. Lett. 83, 648 (1999)","journal-title":"Phys. Rev. Lett."},{"issue":"4","key":"1199_CR9","doi-asserted-by":"crossref","first-page":"459","DOI":"10.1088\/0253-6102\/63\/4\/459","volume":"63","author":"H Lai","year":"2015","unstructured":"Lai, H., Orgun, A.M., Xiao, J.H., Pieprzyk, J.: Dynamic (2, 3) threshold quantum secret sharing of secure direct communication. Commun. Theor. Phys. 63(4), 459\u2013465 (2015)","journal-title":"Commun. Theor. Phys."},{"key":"1199_CR10","doi-asserted-by":"crossref","first-page":"42309","DOI":"10.1103\/PhysRevA.78.042309","volume":"78","author":"D Markham","year":"2008","unstructured":"Markham, D., Sanders, B.C.: Graph states for quantum secret sharing. Phys. Rev. A 78, 42309 (2008)","journal-title":"Phys. Rev. A"},{"key":"1199_CR11","doi-asserted-by":"crossref","first-page":"62315","DOI":"10.1103\/PhysRevA.82.062315","volume":"82","author":"A Keet","year":"2010","unstructured":"Keet, A., Fortescue, B., Markham, D., Sanders, B.C.: Quantum secret sharing with qudit graph states. Phys. Rev. A 82, 62315 (2010)","journal-title":"Phys. Rev. A"},{"key":"1199_CR12","doi-asserted-by":"crossref","unstructured":"Chor, B., Goldwasser, S., Micali, S., Awerbuch, B.: Verifiable secret sharing and achieving simultaneity in the presence of faults. In: The 26th IEEE Symposium on Foundations of computer science, pp. 383\u2013395 (1985)","DOI":"10.1109\/SFCS.1985.64"},{"issue":"3","key":"1199_CR13","doi-asserted-by":"crossref","first-page":"792","DOI":"10.1007\/s10773-010-0616-7","volume":"50","author":"YG Yang","year":"2011","unstructured":"Yang, Y.G., Teng, Y.W., Chai, H.P., Wen, Q.Y.: Verifiable quantum $$(k, n)$$ ( k , n ) -threshold secret key sharing. Int. J. Theor. Phys. 50(3), 792\u2013798 (2011)","journal-title":"Int. J. Theor. Phys."},{"key":"1199_CR14","unstructured":"Gottesman, D., Chuang, I.: Quantum Digital Signatures. Technical Report. http:\/\/arxiv.org\/abs\/quant-ph\/0105032 (2001)"},{"key":"1199_CR15","unstructured":"Wikipedia, the free encyclopedia: Quantum Digital Signature. http:\/\/en.wikipedia.org\/wiki\/Quantum_digital_signature#Quantum_Digital_Signature"},{"key":"1199_CR16","doi-asserted-by":"crossref","unstructured":"Boneh, D., and Zhandry, M.: Secure signatures and chosen ciphertext security in a post-quantum world. In: The 33rd Annual Cryptology Conference, pp. 361\u2013379 (2013)","DOI":"10.1007\/978-3-642-40084-1_21"},{"key":"1199_CR17","doi-asserted-by":"crossref","unstructured":"L\u00fc, X., Feng, D.G.: Quantum digital signature based on quantum one-way functions. In: The 7th IEEE International Conference on Advanced Communication Technology, pp. 514\u2013517 (2005)","DOI":"10.1109\/ICACT.2005.245918"},{"issue":"16","key":"1199_CR18","doi-asserted-by":"crossref","first-page":"175","DOI":"10.1103\/PhysRevLett.87.167902","volume":"87","author":"H Buhrman","year":"2001","unstructured":"Buhrman, H., Cleve, R., Watrous, J., Wolf, R.D.: Quantum fingerprinting. Phys. Rev. Lett. 87(16), 175\u2013196 (2001)","journal-title":"Phys. Rev. Lett."},{"key":"1199_CR19","first-page":"197","volume":"14","author":"C Gentry","year":"2008","unstructured":"Gentry, C., Peikert, C., Vaikuntanathan, V.: Trapdoors for hard lattices and new cryptographic constructions. Electron. Colloq. Comput. Complex. 14, 197\u2013206 (2008)","journal-title":"Electron. Colloq. Comput. Complex."},{"key":"1199_CR20","doi-asserted-by":"crossref","unstructured":"Agrawal, S., Dan, B., Boyen, X.: Efficient lattice (H)IBE in the standard model. In: Advances in Cryptology - EUROCRYPT 2010, pp. 553\u2013572 (2010)","DOI":"10.1007\/978-3-642-13190-5_28"},{"key":"1199_CR21","first-page":"758","volume":"7417","author":"M Zhandry","year":"2015","unstructured":"Zhandry, M.: Secure identity-based encryption in the quantum random oracle model. Int. J. Quantum Inf. 7417, 758\u2013775 (2015)","journal-title":"Int. J. Quantum Inf."},{"issue":"1","key":"1199_CR22","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1007\/s11128-010-0180-3","volume":"10","author":"Q Li","year":"2011","unstructured":"Li, Q., Long, D.Y., Chan, W.H., Qiu, D.W.: Sharing a quantum secret without a trusted party. Quantum Inf. Process. 10(1), 97\u2013106 (2011)","journal-title":"Quantum Inf. Process."},{"issue":"5","key":"1199_CR23","doi-asserted-by":"crossref","first-page":"508","DOI":"10.1103\/PhysRevLett.91.057901","volume":"91","author":"WY Hwang","year":"2003","unstructured":"Hwang, W.Y.: Quantum key distribution with high loss: toward global secure communication. Phys. Rev. Lett. 91(5), 508\u2013508 (2003)","journal-title":"Phys. Rev. Lett."},{"issue":"6","key":"1199_CR24","doi-asserted-by":"crossref","first-page":"1993","DOI":"10.1103\/PhysRevA.87.062330","volume":"87","author":"RD Somma","year":"2013","unstructured":"Somma, R.D., Hughes, R.J.: Security of decoy-state protocols for general photon-number-splitting attacks. Phys. Rev. A. 87(6), 1993\u20132001 (2013)","journal-title":"Phys. Rev. A."},{"issue":"6","key":"1199_CR25","doi-asserted-by":"crossref","first-page":"2071","DOI":"10.1007\/s11128-012-0509-1","volume":"12","author":"X Zou","year":"2013","unstructured":"Zou, X., Qiu, D.: Attack and improvements of fair quantum blind signature schemes. Quantum Inf. Process. 12(6), 2071\u20132085 (2013)","journal-title":"Quantum Inf. Process."},{"issue":"11","key":"1199_CR26","doi-asserted-by":"crossref","first-page":"2407","DOI":"10.1007\/s11128-014-0840-9","volume":"13","author":"S Lin","year":"2014","unstructured":"Lin, S., Yu, C.H., Guo, G.D.: Reexamining the security of fair quantum blind signature schemes. Quantum Inf. Process. 13(11), 2407\u20132415 (2014)","journal-title":"Quantum Inf. Process."},{"issue":"2","key":"1199_CR27","doi-asserted-by":"crossref","first-page":"715","DOI":"10.1007\/s11128-014-0863-2","volume":"14","author":"P Zhang","year":"2014","unstructured":"Zhang, P., Matsumoto, R.: Quantum strongly secure ramp secret sharing. Quantum Inf. Process. 14(2), 715\u2013729 (2014)","journal-title":"Quantum Inf. Process."},{"key":"1199_CR28","doi-asserted-by":"crossref","unstructured":"Zeng, G.H. (2008) Reply to \u201ccomment on \u2018arbitrated quantum-signature scheme\u2019 \u201d. Phys. Rev. A. doi: 10.1103\/PhysRevA.78.016301","DOI":"10.1103\/PhysRevA.78.016301"},{"issue":"2","key":"1199_CR29","doi-asserted-by":"crossref","first-page":"022344","DOI":"10.1103\/PhysRevA.84.022344","volume":"84","author":"F Gao","year":"2011","unstructured":"Gao, F., Qin, S.J., Guo, F.Z., Wen, Q.Y.: Cryptanalysis of the arbitrated quantum signature protocols. Phys. Rev. A 84(2), 022344 (2011)","journal-title":"Phys. Rev. A"},{"key":"1199_CR30","doi-asserted-by":"crossref","unstructured":"Damgard, I., Funder, J., Nielsen, J.B., et al.: Superposition attacks on cryptographic protocols. In: The 7th International Conference on Information Theoretic Security, pp. 142\u2013161 (2013)","DOI":"10.1007\/978-3-319-04268-8_9"},{"issue":"3","key":"1199_CR31","doi-asserted-by":"crossref","first-page":"032318","DOI":"10.1103\/PhysRevA.72.032318","volume":"72","author":"T Ogawa","year":"2005","unstructured":"Ogawa, T., Sasaki, A., Iwamoto, M., Yamamoto, H.: Quantum secret sharing schemes and reversibility of quantum operations. Phys. Rev. A 72(3), 032318 (2005)","journal-title":"Phys. Rev. A"}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-015-1199-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11128-015-1199-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-015-1199-2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,31]],"date-time":"2025-05-31T19:22:03Z","timestamp":1748719323000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11128-015-1199-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,12,12]]},"references-count":31,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2016,2]]}},"alternative-id":["1199"],"URL":"https:\/\/doi.org\/10.1007\/s11128-015-1199-2","relation":{},"ISSN":["1570-0755","1573-1332"],"issn-type":[{"value":"1570-0755","type":"print"},{"value":"1573-1332","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,12,12]]}}}