{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,24]],"date-time":"2026-02-24T15:55:25Z","timestamp":1771948525022,"version":"3.50.1"},"reference-count":37,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2018,1,24]],"date-time":"2018-01-24T00:00:00Z","timestamp":1516752000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"NSF of China","doi-asserted-by":"crossref","award":["Grant no. 61170250"],"award-info":[{"award-number":["Grant no. 61170250"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"published-print":{"date-parts":[[2018,3]]},"DOI":"10.1007\/s11128-018-1827-8","type":"journal-article","created":{"date-parts":[[2018,1,24]],"date-time":"2018-01-24T11:47:08Z","timestamp":1516794428000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":41,"title":["Multi-dimensional quantum state sharing based on quantum Fourier transform"],"prefix":"10.1007","volume":"17","author":[{"given":"Huawang","family":"Qin","sequence":"first","affiliation":[]},{"given":"Raylin","family":"Tso","sequence":"additional","affiliation":[]},{"given":"Yuewei","family":"Dai","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,1,24]]},"reference":[{"key":"1827_CR1","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A Shamir","year":"1979","unstructured":"Shamir, A.: How to share a secret. Commun. ACM 22, 612\u2013613 (1979)","journal-title":"Commun. ACM"},{"key":"1827_CR2","doi-asserted-by":"publisher","first-page":"1829","DOI":"10.1103\/PhysRevA.59.1829","volume":"59","author":"M Hillery","year":"1999","unstructured":"Hillery, M., Buzek, V., Berthiaume, A.: Quantum secret sharing. Phys. Rev. A 59, 1829\u20131834 (1999)","journal-title":"Phys. Rev. A"},{"key":"1827_CR3","doi-asserted-by":"publisher","first-page":"420","DOI":"10.1016\/j.physleta.2004.03.034","volume":"324","author":"YM Li","year":"2004","unstructured":"Li, Y.M., Zhang, K.S., Peng, K.C.: Multiparty secret sharing of quantum information based on entanglement swapping. Phys. Lett. A 324, 420\u2013424 (2004)","journal-title":"Phys. Lett. A"},{"key":"1827_CR4","doi-asserted-by":"publisher","first-page":"044301","DOI":"10.1103\/PhysRevA.72.044301","volume":"72","author":"FG Deng","year":"2005","unstructured":"Deng, F.G., Li, X.H., Li, C.Y., Zhou, P., Zhou, H.Y.: Multiparty quantum-state sharing of an arbitrary two-particle state with Einstein\u2013Podolsky\u2013Rosen pairs. Phys. Rev. A 72, 044301 (2005)","journal-title":"Phys. Rev. A"},{"key":"1827_CR5","doi-asserted-by":"publisher","first-page":"2353","DOI":"10.1007\/s10773-008-9669-2","volume":"47","author":"J Liu","year":"2008","unstructured":"Liu, J., Liu, Y.M., Zhang, Z.J.: Generalized multiparty quantum single-qutrit state sharing. Int. J. Theor. Phys. 47, 2353\u20132362 (2008)","journal-title":"Int. J. Theor. Phys."},{"key":"1827_CR6","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1140\/epjd\/e2005-00029-5","volume":"33","author":"ZJ Zhang","year":"2005","unstructured":"Zhang, Z.J., Yang, J., Man, Z.X., Li, Y.: Multiparty secret sharing of quantum information using and identifying Bell state. Eur. Phys. J. D 33, 133\u2013136 (2005)","journal-title":"Eur. Phys. J. D"},{"key":"1827_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11128-017-1525-y","volume":"16","author":"HW Qin","year":"2017","unstructured":"Qin, H.W., Dai, Y.W.: Dynamic quantum secret sharing by using $$d$$ d -dimensional GHZ state. Quantum Inf. Process. 16, 1\u201313 (2017)","journal-title":"Quantum Inf. Process."},{"key":"1827_CR8","doi-asserted-by":"publisher","first-page":"648","DOI":"10.1103\/PhysRevLett.83.648","volume":"83","author":"R Cleve","year":"1999","unstructured":"Cleve, R., Gottesman, D., Lo, H.K.: How to share a quantum secret. Phys. Rev. Lett. 83, 648\u2013651 (1999)","journal-title":"Phys. Rev. Lett."},{"key":"1827_CR9","doi-asserted-by":"publisher","first-page":"042310","DOI":"10.1103\/PhysRevA.65.042310","volume":"65","author":"T Tyc","year":"2002","unstructured":"Tyc, T., Sanders, B.C.: How to share a continuous-variable quantum secret by optical interferometry. Phys. Rev. A 65, 042310 (2002)","journal-title":"Phys. Rev. A"},{"key":"1827_CR10","doi-asserted-by":"publisher","first-page":"2690","DOI":"10.1016\/j.optcom.2007.12.045","volume":"281","author":"LF Han","year":"2008","unstructured":"Han, L.F., Liu, Y.M., Liu, J., Zhang, Z.J.: Multiparty quantum secret sharing of secure direct communication using single photons. Opt. Commun. 281, 2690\u20132694 (2008)","journal-title":"Opt. Commun."},{"key":"1827_CR11","doi-asserted-by":"publisher","first-page":"022321","DOI":"10.1103\/PhysRevA.80.022321","volume":"80","author":"PK Sarvepalli","year":"2009","unstructured":"Sarvepalli, P.K., Klappenecker, A.: Sharing classical secrets with Calderbank\u2013Shor\u2013Steane codes. Phys. Rev. A 80, 022321 (2009)","journal-title":"Phys. Rev. A"},{"key":"1827_CR12","doi-asserted-by":"publisher","first-page":"1333","DOI":"10.1088\/1674-1056\/18\/4\/007","volume":"18","author":"TT Song","year":"2009","unstructured":"Song, T.T., Zhang, J., Gao, F., Wen, Q.Y., Zhu, F.C.: Participant attack on quantum secret sharing based on entanglement swapping. Chin. Phys. B 18, 1333\u20131337 (2009)","journal-title":"Chin. Phys. B"},{"key":"1827_CR13","doi-asserted-by":"publisher","first-page":"192","DOI":"10.1016\/j.optcom.2009.09.047","volume":"382","author":"F Gao","year":"2010","unstructured":"Gao, F., Qin, S.J., Wen, Q.Y., Zhu, F.C.: Cryptanalysis of multiparty controlled quantum secure direct communication using Greenberger\u2013Horne\u2013Zeilinger state. Opt. Commun. 382, 192\u2013195 (2010)","journal-title":"Opt. Commun."},{"key":"1827_CR14","doi-asserted-by":"publisher","first-page":"445","DOI":"10.1140\/epjd\/e2009-00306-3","volume":"56","author":"TF Guo","year":"2010","unstructured":"Guo, T.F., Qin, S.J., Gao, F., Wen, Q.Y., Zhu, F.C.: Participant attack on a kind of MQSS schemes based on entanglement swapping. Eur. Phys. J. D 56, 445\u2013448 (2010)","journal-title":"Eur. Phys. J. D"},{"key":"1827_CR15","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1007\/s11128-010-0180-3","volume":"10","author":"Q Li","year":"2011","unstructured":"Li, Q., Long, D.Y., Chan, W.H., Qiu, D.W.: Sharing a quantum secret without a trusted party. Quantum Inf. Process. 10, 97\u2013106 (2011)","journal-title":"Quantum Inf. Process."},{"key":"1827_CR16","doi-asserted-by":"publisher","first-page":"1619","DOI":"10.1007\/s11128-011-0323-1","volume":"11","author":"YG Yang","year":"2012","unstructured":"Yang, Y.G., Jia, X., Wang, H.Y., Zhang, H.: Verifiable quantum $$(k, n)$$ ( k , n ) -threshold secret sharing. Quantum Inf. Process. 11, 1619\u20131625 (2012)","journal-title":"Quantum Inf. Process."},{"key":"1827_CR17","doi-asserted-by":"publisher","first-page":"2291","DOI":"10.1007\/s10773-012-1109-7","volume":"51","author":"LL Liu","year":"2012","unstructured":"Liu, L.L., Tsai, C.W., Hwang, T.: Quantum secret sharing using symmetric W state. Int. J. Theor. Phys. 51, 2291\u20132306 (2012)","journal-title":"Int. J. Theor. Phys."},{"key":"1827_CR18","doi-asserted-by":"publisher","first-page":"539","DOI":"10.1007\/s10773-012-1358-5","volume":"52","author":"RH Shi","year":"2013","unstructured":"Shi, R.H., Lv, G.L., Wang, Y., Huang, D.Z., Guo, Y.: On quantum secret sharing via Chinese remainder theorem with the non-maximally entanglement state analysis. Int. J. Theor. Phys. 52, 539\u2013548 (2013)","journal-title":"Int. J. Theor. Phys."},{"key":"1827_CR19","doi-asserted-by":"publisher","first-page":"042313","DOI":"10.1103\/PhysRevA.88.042313","volume":"88","author":"HK Lau","year":"2013","unstructured":"Lau, H.K., Weedbrook, C.: Quantum secret sharing with continuous-variable cluster states. Phys. Rev. A 88, 042313 (2013)","journal-title":"Phys. Rev. A"},{"key":"1827_CR20","doi-asserted-by":"publisher","first-page":"331","DOI":"10.1007\/s11128-012-0380-0","volume":"12","author":"JL Hsu","year":"2013","unstructured":"Hsu, J.L., Chong, S.K., Hwang, T., Tsai, C.W.: Dynamic quantum secret sharing. Quantum Inf. Process. 12, 331\u2013344 (2013)","journal-title":"Quantum Inf. Process."},{"key":"1827_CR21","doi-asserted-by":"publisher","first-page":"1299","DOI":"10.1007\/s11128-012-0471-y","volume":"12","author":"MH Dehkordi","year":"2013","unstructured":"Dehkordi, M.H., Fattahi, E.: Threshold quantum secret sharing between multiparty and multiparty using Greenberger\u2013Horne\u2013Zeilinger state. Quantum Inf. Process. 12, 1299\u20131306 (2013)","journal-title":"Quantum Inf. Process."},{"key":"1827_CR22","doi-asserted-by":"publisher","first-page":"1043","DOI":"10.1007\/s10773-012-1418-x","volume":"52","author":"HB Wang","year":"2013","unstructured":"Wang, H.B., Huang, Y.G., Fang, X., Gu, B., Fu, D.S.: High-capacity three-party quantum secret sharing with single photons in both the polarization and the spatial-mode degrees of freedom. Int. J. Theor. Phys. 52, 1043\u20131051 (2013)","journal-title":"Int. J. Theor. Phys."},{"key":"1827_CR23","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1007\/s11128-011-0351-x","volume":"12","author":"G Gao","year":"2013","unstructured":"Gao, G.: Secure multiparty quantum secret sharing with the collective eavesdropping-check character. Quantum Inf. Process. 12, 55\u201368 (2013)","journal-title":"Quantum Inf. Process."},{"key":"1827_CR24","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1007\/s11128-013-0716-4","volume":"13","author":"RK Chen","year":"2014","unstructured":"Chen, R.K., Zhang, Y.Y., Shi, J.H., Li, F.G.: A multiparty error-correcting method for quantum secret sharing. Quantum Inf. Process. 13, 21\u201331 (2014)","journal-title":"Quantum Inf. Process."},{"key":"1827_CR25","doi-asserted-by":"publisher","first-page":"075104","DOI":"10.1088\/0031-8949\/89\/7\/075104","volume":"89","author":"F Liu","year":"2014","unstructured":"Liu, F., Qin, S.J., Wen, Q.Y.: A quantum secret-sharing protocol with fairness. Phys. Scr. 89, 075104 (2014)","journal-title":"Phys. Scr."},{"key":"1827_CR26","doi-asserted-by":"publisher","first-page":"39845","DOI":"10.1038\/srep39845","volume":"7","author":"XB Chen","year":"2017","unstructured":"Chen, X.B., Dou, Z., Xu, G., He, X.Y., Yang, Y.X.: A kind of university quantum secret sharing protocol. Sci. Rep. 7, 39845 (2017)","journal-title":"Sci. Rep."},{"key":"1827_CR27","first-page":"7600207","volume":"9","author":"H Cao","year":"2017","unstructured":"Cao, H., Ma, W.P.: $$(t, n)$$ ( t , n ) threshold quantum state sharing scheme based on linear equations and unitary operation. IEEE Photonics J. 9, 7600207 (2017)","journal-title":"IEEE Photonics J."},{"key":"1827_CR28","doi-asserted-by":"publisher","first-page":"998","DOI":"10.1016\/j.physleta.2017.01.053","volume":"381","author":"JT Wang","year":"2017","unstructured":"Wang, J.T., Xu, G., Chen, X.B., Sun, X.M., Jia, H.Y.: Local distinguishability of Dicke states in quantum secret sharing. Phys. Lett. A 381, 998\u20131002 (2017)","journal-title":"Phys. Lett. A"},{"key":"1827_CR29","doi-asserted-by":"publisher","first-page":"726","DOI":"10.1587\/transfun.E100.A.726","volume":"100","author":"R Matsumoto","year":"2017","unstructured":"Matsumoto, R.: Quantum optimal multiple assignment scheme for realizing general access structure of secret sharing. IEICE Trans. Fundam. Electron. 100, 726\u2013728 (2017)","journal-title":"IEICE Trans. Fundam. Electron."},{"key":"1827_CR30","doi-asserted-by":"publisher","first-page":"012315","DOI":"10.1103\/PhysRevA.95.012315","volume":"95","author":"I Kogias","year":"2017","unstructured":"Kogias, I., Xiang, Y., He, Q.Y., Adesso, G.: Unconditional security of entanglement-based continuous-variable quantum secret sharing. Phys. Rev. A 95, 012315 (2017)","journal-title":"Phys. Rev. A"},{"key":"1827_CR31","doi-asserted-by":"publisher","first-page":"2465","DOI":"10.1007\/s11128-013-0534-8","volume":"12","author":"W Yang","year":"2013","unstructured":"Yang, W., Huang, L.S., Shi, R.H., He, L.B.: Secret sharing based on quantum Fourier transform. Quantum Inf. Process. 12, 2465\u20132474 (2013)","journal-title":"Quantum Inf. Process."},{"key":"1827_CR32","doi-asserted-by":"publisher","first-page":"2075","DOI":"10.1007\/s10773-012-1481-3","volume":"52","author":"HL Xiao","year":"2013","unstructured":"Xiao, H.L., Gao, J.L.: Multi-party $$d$$ d -level quantum secret sharing scheme. Int. J. Theor. Phys. 52, 2075\u20132082 (2013)","journal-title":"Int. J. Theor. Phys."},{"key":"1827_CR33","doi-asserted-by":"crossref","unstructured":"Crepeau, C., Gottesman, D., Smith, A.: Secure multiparty quantum computation. In: Proceedings of the Thirty-fourth Annual ACM Symposium on Theory of Computing, Canada, pp. 643\u2013652 (2002)","DOI":"10.1145\/509907.510000"},{"key":"1827_CR34","doi-asserted-by":"crossref","unstructured":"Ben-Or, M., Crepeau, C., Gottesman, D., Hassidim, A., Smith, A.: Secure multiparty quantum computation with (only) a strict honest majority. In: Proceedings of the 47th Annual IEEE Symposium on Foundations of Computer Science, USA, pp. 249\u2013260 (2006)","DOI":"10.1109\/FOCS.2006.68"},{"key":"1827_CR35","doi-asserted-by":"publisher","first-page":"1889","DOI":"10.1103\/PhysRevLett.86.1889","volume":"86","author":"YS Weinstein","year":"2001","unstructured":"Weinstein, Y.S., Pravia, M.A., Fortunato, E.M., Lloyd, S., Cory, D.G.: Implementation of the quantum Fourier transform. Phys. Rev. Lett. 86, 1889\u20131891 (2001)","journal-title":"Phys. Rev. Lett."},{"key":"1827_CR36","doi-asserted-by":"publisher","first-page":"1250003","DOI":"10.1142\/S0219749912500037","volume":"10","author":"O Jimenez","year":"2012","unstructured":"Jimenez, O., Munoz, C., Klimov, A.B., Delgado, A.: Sharing of $$d$$ d -dimensional quantum states. Int. J. Quantum Inf. 10, 1250003 (2012)","journal-title":"Int. J. Quantum Inf."},{"key":"1827_CR37","doi-asserted-by":"publisher","first-page":"1689","DOI":"10.1007\/s11128-015-1221-8","volume":"15","author":"HW Qin","year":"2016","unstructured":"Qin, H.W., Dai, Y.W.: $$d$$ d -dimensional quantum state sharing with adversary structure. Quantum Inf. Process. 15, 1689\u20131701 (2016)","journal-title":"Quantum Inf. Process."}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11128-018-1827-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-018-1827-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-018-1827-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,18]],"date-time":"2020-05-18T22:22:22Z","timestamp":1589840542000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11128-018-1827-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,1,24]]},"references-count":37,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2018,3]]}},"alternative-id":["1827"],"URL":"https:\/\/doi.org\/10.1007\/s11128-018-1827-8","relation":{},"ISSN":["1570-0755","1573-1332"],"issn-type":[{"value":"1570-0755","type":"print"},{"value":"1573-1332","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,1,24]]},"assertion":[{"value":"2 June 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 January 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 January 2018","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"48"}}