{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T11:26:59Z","timestamp":1740137219990,"version":"3.37.3"},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"9","license":[{"start":{"date-parts":[[2018,7,16]],"date-time":"2018-07-16T00:00:00Z","timestamp":1531699200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61772098"],"award-info":[{"award-number":["61772098"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Foundation Science and Forefront Technology Research Program of Chongqing Science &Technology Commission of China","award":["cstc2016jcyjA0571"],"award-info":[{"award-number":["cstc2016jcyjA0571"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"published-print":{"date-parts":[[2018,9]]},"DOI":"10.1007\/s11128-018-1969-8","type":"journal-article","created":{"date-parts":[[2018,7,16]],"date-time":"2018-07-16T12:50:46Z","timestamp":1531745446000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["High-dimensional quantum threshold anonymous identity authentication scheme"],"prefix":"10.1007","volume":"17","author":[{"given":"Xiuli","family":"Song","sequence":"first","affiliation":[]},{"given":"Yanbing","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Hongyao","family":"Deng","sequence":"additional","affiliation":[]},{"given":"Yonggang","family":"Xiao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,7,16]]},"reference":[{"key":"1969_CR1","doi-asserted-by":"crossref","unstructured":"Luo, S., Hu, J., Chen, Z.: An identity-based one-time password scheme with anonymous authentication. In: International Conference on Networks Security, Wireless Communications and Trusted Computing. IEEE, pp. 864\u2013867 (2009)","DOI":"10.1109\/NSWCTC.2009.287"},{"issue":"7","key":"1969_CR2","doi-asserted-by":"publisher","first-page":"3508","DOI":"10.1109\/TVT.2009.2012389","volume":"58","author":"X Cao","year":"2009","unstructured":"Cao, X., Zeng, X., Kou, W., Hu, L.: Identity-based anonymous remote authentication for value-added services in mobile networks. IEEE Trans. Veh. Technol. 58(7), 3508\u20133517 (2009)","journal-title":"IEEE Trans. Veh. Technol."},{"key":"1969_CR3","doi-asserted-by":"crossref","unstructured":"Gao, T., Miao, Q., Guo, N.: Anonymous authentication scheme based on proxy group signature for wireless mesh network. In: Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, pp. 533\u2013537 (2014)","DOI":"10.1109\/IMIS.2014.78"},{"issue":"3","key":"1969_CR4","doi-asserted-by":"publisher","first-page":"1711","DOI":"10.1109\/TVT.2015.2405853","volume":"65","author":"J Shao","year":"2016","unstructured":"Shao, J., Lin, X., Lu, R., Zuo, C.: A threshold anonymous authentication protocol for vanets. IEEE Trans. Veh. Technol. 65(3), 1711\u20131720 (2016)","journal-title":"IEEE Trans. Veh. Technol."},{"issue":"14","key":"1969_CR5","doi-asserted-by":"publisher","first-page":"3654","DOI":"10.1016\/j.optcom.2011.03.083","volume":"284","author":"R Xu","year":"2011","unstructured":"Xu, R., Huang, L., Yang, W., He, L.: Quantum group blind signature scheme without entanglement. Opt. Commun. 284(14), 3654\u20133658 (2011)","journal-title":"Opt. Commun."},{"issue":"C","key":"1969_CR6","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1016\/j.ins.2016.07.071","volume":"370","author":"RH Shi","year":"2016","unstructured":"Shi, R.H., Mu, Y., Zhong, H., Zhang, S., Cui, J.: Quantum private set intersection cardinality and its application to anonymous authentication. Inf. Sci. 370(C), 147\u2013158 (2016)","journal-title":"Inf. Sci."},{"issue":"6","key":"1969_CR7","doi-asserted-by":"publisher","first-page":"168","DOI":"10.1103\/PhysRevA.64.062309","volume":"64","author":"M Curty","year":"2001","unstructured":"Curty, M., Santos, D.J.: Quantum authentication of classical messages. Phys. Rev. A 64(6), 168\u2013173 (2001)","journal-title":"Phys. Rev. A"},{"issue":"65","key":"1969_CR8","first-page":"882","volume":"65","author":"T Mihara","year":"2002","unstructured":"Mihara, T.: Quantum identification schemes with entanglements. Phys. Rev. A 65(65), 882\u2013886 (2002)","journal-title":"Phys. Rev. A"},{"issue":"4","key":"1969_CR9","first-page":"543","volume":"73","author":"H Lee","year":"2005","unstructured":"Lee, H., Lim, J., Yang, H.J.: Quantum direct communication with authentication. Phys. Rev. A 73(4), 543\u2013551 (2005)","journal-title":"Phys. Rev. A"},{"key":"1969_CR10","doi-asserted-by":"crossref","unstructured":"Chien, C.H., Lin, T.S., Chang, T.H., Yuan, S.Y.: Quantum authentication protocol using entanglement swapping. In: Nanotechnology. IEEE, pp. 1533\u20131537 (2011)","DOI":"10.1109\/NANO.2011.6144395"},{"issue":"7","key":"1969_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11128-014-0743-9","volume":"13","author":"WM Shi","year":"2014","unstructured":"Shi, W.M., Zhou, Y.H., Yang, Y.G.: Quantum deniable authentication protocol. Quantum Inf. Process. 13(7), 1\u201310 (2014)","journal-title":"Quantum Inf. Process."},{"issue":"11","key":"1969_CR12","doi-asserted-by":"publisher","first-page":"2535","DOI":"10.1007\/s11128-014-0808-9","volume":"13","author":"H Yuan","year":"2014","unstructured":"Yuan, H., Liu, Y.M., Pan, G.Z., Zhang, G., Zhou, J., Zhang, Z.J.: Quantum identity authentication based on ping-pong technique without entanglements. Quantum Inf. Process. 13(11), 2535\u20132549 (2014)","journal-title":"Quantum Inf. Process."},{"issue":"7","key":"1969_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11128-014-0743-9","volume":"13","author":"WM Shi","year":"2014","unstructured":"Shi, W.M., Zhou, Y.H., Yang, Y.G.: Quantum deniable authentication protocol[J]. Quantum Inf. Process. 13(7), 1\u201310 (2014)","journal-title":"Quantum Inf. Process."},{"key":"1969_CR14","doi-asserted-by":"crossref","unstructured":"Portmann, C.: Quantum authentication with key recycling. pp. 339\u2013368 (2017)","DOI":"10.1007\/978-3-319-56617-7_12"},{"issue":"9","key":"1969_CR15","doi-asserted-by":"publisher","first-page":"1750067","DOI":"10.1142\/S0217979217500679","volume":"31","author":"L Liao","year":"2017","unstructured":"Liao, L., Peng, X., Shi, J., Guo, Y.: Graph state-based quantum authentication scheme. Int. J. Mod. Phys. B 31(9), 1750067 (2017)","journal-title":"Int. J. Mod. Phys. B"},{"issue":"10","key":"1969_CR16","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1007\/s11128-017-1681-0","volume":"16","author":"HH Chang","year":"2017","unstructured":"Chang, H.H., Heo, J., Jin, G.J., Kwon, D.: Quantum identity authentication with single photon. Quantum Inf. Process. 16(10), 236 (2017)","journal-title":"Quantum Inf. Process."},{"issue":"9","key":"1969_CR17","doi-asserted-by":"publisher","first-page":"2360","DOI":"10.1088\/0256-307X\/23\/9\/004","volume":"23","author":"J Wang","year":"2006","unstructured":"Wang, J., Zhang, Q., Tang, C.J.: Multiparty simultaneous quantum identity authentication based on entanglement swapping. Chin. Phys. Lett. 23(9), 2360\u20132363 (2006)","journal-title":"Chin. Phys. Lett."},{"issue":"8","key":"1969_CR18","doi-asserted-by":"publisher","first-page":"3233","DOI":"10.1088\/1674-1056\/18\/8\/020","volume":"18","author":"YG Yang","year":"2009","unstructured":"Yang, Y.G., Wen, Q.Y.: Economical multiparty simultaneous quantum identity authentication based on Greenberger-Horne-Zeilinger states. Chin. Phys. B 18(8), 3233\u20133237 (2009)","journal-title":"Chin. Phys. B"},{"issue":"2","key":"1969_CR19","doi-asserted-by":"publisher","first-page":"524","DOI":"10.1007\/s10773-012-1356-7","volume":"52","author":"YG Yang","year":"2013","unstructured":"Yang, Y.G., Wang, H.Y., Jia, X., Zhang, H.: A quantum protocol for (t, n)-threshold identity authentication based on Greenberger-Horne-Zeilinger states. Int. J. Theor. Phys. 52(2), 524\u2013530 (2013)","journal-title":"Int. J. Theor. Phys."},{"key":"1969_CR20","doi-asserted-by":"publisher","first-page":"6366","DOI":"10.1038\/s41598-017-06486-4","volume":"7","author":"XL Song","year":"2017","unstructured":"Song, X.L., Liu, Y.B., Deng, H.Y., Xiao, Y.G.: (t, n) threshold d-level quantum secret sharing. Sci. Rep. 7, 6366 (2017)","journal-title":"Sci. Rep."},{"issue":"4","key":"1969_CR21","doi-asserted-by":"publisher","first-page":"579","DOI":"10.1103\/PhysRevA.65.042320","volume":"65","author":"V Karimipour","year":"2002","unstructured":"Karimipour, V., Bahraminasab, A., Bagherinezhad, S.: Entanglement swapping of generalized cat states and secret sharing. Phys. Rev. A 65(4), 579\u2013589 (2002)","journal-title":"Phys. Rev. A"},{"issue":"86","key":"1969_CR22","doi-asserted-by":"publisher","first-page":"60005","DOI":"10.1209\/0295-5075\/86\/60005","volume":"86","author":"K Thas","year":"2009","unstructured":"Thas, K.: The geometry of generalized pauli operators of n-qudit hilbert space, and an application to mubs. EPL 86(86), 60005 (2009)","journal-title":"EPL"},{"issue":"1","key":"1969_CR23","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1007\/s10440-012-9682-6","volume":"118","author":"ZJ Diao","year":"2012","unstructured":"Diao, Z.J., Huang, C.F., Wang, K.: Quantum counting: algorithm and error distribution. Acta. Appl. Math. 118(1), 147\u2013159 (2012)","journal-title":"Acta. Appl. Math."},{"issue":"11","key":"1969_CR24","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A Shamir","year":"1979","unstructured":"Shamir, A.: How to share a secret. Commun. ACM 22(11), 612\u2013613 (1979)","journal-title":"Commun. ACM"},{"key":"1969_CR25","doi-asserted-by":"publisher","first-page":"044302","DOI":"10.1103\/PhysRevA.72.044302","volume":"72","author":"FG Deng","year":"2005","unstructured":"Deng, F.G., Li, X.H., Zhou, H.Y., Zhang, Z.J.: Improving the security of multiparty quantum secret sharing against Trojan horse attack. Phys. Rev. A 72, 044302 (2005)","journal-title":"Phys. Rev. A"},{"key":"1969_CR26","doi-asserted-by":"publisher","first-page":"022320","DOI":"10.1103\/PhysRevA.73.022320","volume":"73","author":"N Gisin","year":"2006","unstructured":"Gisin, N., Fasel, S., Kraus, B., Zbinden, H., Ribordy, G.: Trojan-horse attacks on quantum key-distribution systems. Phys. Rev. A 73, 022320 (2006)","journal-title":"Phys. Rev. A"}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11128-018-1969-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-018-1969-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-018-1969-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,21]],"date-time":"2019-09-21T21:43:46Z","timestamp":1569102226000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11128-018-1969-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,7,16]]},"references-count":26,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2018,9]]}},"alternative-id":["1969"],"URL":"https:\/\/doi.org\/10.1007\/s11128-018-1969-8","relation":{},"ISSN":["1570-0755","1573-1332"],"issn-type":[{"type":"print","value":"1570-0755"},{"type":"electronic","value":"1573-1332"}],"subject":[],"published":{"date-parts":[[2018,7,16]]},"assertion":[{"value":"13 February 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 June 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 July 2018","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"214"}}