{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,28]],"date-time":"2026-03-28T00:50:30Z","timestamp":1774659030683,"version":"3.50.1"},"reference-count":35,"publisher":"Springer Science and Business Media LLC","issue":"11","license":[{"start":{"date-parts":[[2018,10,5]],"date-time":"2018-10-05T00:00:00Z","timestamp":1538697600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61373150"],"award-info":[{"award-number":["61373150"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61602291"],"award-info":[{"award-number":["61602291"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Industrial Research and Development Project of Science and Technology of Shaanxi Province","award":["2013k0611"],"award-info":[{"award-number":["2013k0611"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"published-print":{"date-parts":[[2018,11]]},"DOI":"10.1007\/s11128-018-2080-x","type":"journal-article","created":{"date-parts":[[2018,10,5]],"date-time":"2018-10-05T04:50:21Z","timestamp":1538715021000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":16,"title":["Restricted (k,\u00a0n)-threshold quantum secret sharing scheme based on local distinguishability of orthogonal multiqudit entangled states"],"prefix":"10.1007","volume":"17","author":[{"given":"Chen-Ming","family":"Bai","sequence":"first","affiliation":[]},{"given":"Zhi-Hui","family":"Li","sequence":"additional","affiliation":[]},{"given":"Jing-Tao","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Cheng-Ji","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Yong-Ming","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,10,5]]},"reference":[{"key":"2080_CR1","unstructured":"Bennet, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. In: Proceedings of the International Conference on Computers, Systems and Signal Processing (1984)"},{"key":"2080_CR2","doi-asserted-by":"publisher","first-page":"032302","DOI":"10.1103\/PhysRevA.65.032302","volume":"65","author":"GL Long","year":"2002","unstructured":"Long, G.L., Liu, X.S.: Theoretically efficient high-capacity quantum-key-distribution scheme. Phys. Rev. A 65, 032302 (2002)","journal-title":"Phys. Rev. A"},{"key":"2080_CR3","doi-asserted-by":"publisher","first-page":"062334","DOI":"10.1103\/PhysRevA.95.062334","volume":"95","author":"R Amiri","year":"2017","unstructured":"Amiri, R., Arrazola, J.M.: Quantum money with nearly optimal error tolerance. Phys. Rev. A 95, 062334 (2017)","journal-title":"Phys. Rev. A"},{"key":"2080_CR4","first-page":"6600111","volume":"21","author":"F Gao","year":"2015","unstructured":"Gao, F.: Postprocessing of the oblivious key in quantum private query. IEEE J. Sel. Top. Quant. 21, 6600111 (2015)","journal-title":"IEEE J. Sel. Top. Quant."},{"key":"2080_CR5","doi-asserted-by":"publisher","first-page":"042318","DOI":"10.1103\/PhysRevA.93.042318","volume":"93","author":"CY Wei","year":"2016","unstructured":"Wei, C.Y., et al.: Practical quantum private query with better performance in resisting joint-measurement attack. Phys. Rev. A 93, 042318 (2016)","journal-title":"Phys. Rev. A"},{"key":"2080_CR6","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1109\/TC.2017.2721404","volume":"67","author":"CY Wei","year":"2018","unstructured":"Wei, C.Y., Cai, X.Q., Liu, B.: A generic construction of quantum-oblivious-key-transfer-based private query with ideal database security and zero failure. IEEE Trans. Comput. 67, 2\u20138 (2018)","journal-title":"IEEE Trans. Comput."},{"key":"2080_CR7","doi-asserted-by":"publisher","first-page":"022309","DOI":"10.1103\/PhysRevA.92.022309","volume":"92","author":"RH Shi","year":"2015","unstructured":"Shi, R.H., et al.: Quantum oblivious set-member decision protocol. Phys. Rev. A 92, 022309 (2015)","journal-title":"Phys. Rev. A"},{"key":"2080_CR8","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1016\/j.ins.2016.07.071","volume":"370","author":"R Shi","year":"2016","unstructured":"Shi, R., Mu, Y., Zhong, H., et al.: Quantum private set intersection cardinality and its application to anonymous authentication. Inf. Sci. 370, 147\u2013158 (2016)","journal-title":"Inf. Sci."},{"issue":"11","key":"2080_CR9","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A Shamir","year":"1979","unstructured":"Shamir, A.: How to share a secret. Commun. ACM 22(11), 612 (1979)","journal-title":"Commun. ACM"},{"key":"2080_CR10","doi-asserted-by":"crossref","unstructured":"Blakley, G.R.: In: Proceedings of the National Computer Conference (AFIPS, 1979), pp. 313\u2013317 (1979)","DOI":"10.1109\/MARK.1979.8817296"},{"key":"2080_CR11","doi-asserted-by":"publisher","first-page":"1829","DOI":"10.1103\/PhysRevA.59.1829","volume":"59","author":"M Hillery","year":"1999","unstructured":"Hillery, M., Buzek, V., Berthiaume, A.: Quantum secret sharing. Phys. Rev. A 59, 1829 (1999)","journal-title":"Phys. Rev. A"},{"key":"2080_CR12","doi-asserted-by":"publisher","first-page":"648","DOI":"10.1103\/PhysRevLett.83.648","volume":"83","author":"R Cleve","year":"1999","unstructured":"Cleve, R., Gottesman, D., Lo, H.-K.: How to share a quantum secret. Phys. Rev. Lett. 83, 648 (1999)","journal-title":"Phys. Rev. Lett."},{"key":"2080_CR13","doi-asserted-by":"publisher","first-page":"042311","DOI":"10.1103\/PhysRevA.61.042311","volume":"61","author":"D Gottesman","year":"2000","unstructured":"Gottesman, D.: Theory of quantum secret sharing. Phys. Rev. A 61, 042311 (2000)","journal-title":"Phys. Rev. A"},{"key":"2080_CR14","doi-asserted-by":"publisher","first-page":"14089","DOI":"10.1088\/0305-4470\/39\/45\/018","volume":"39","author":"FG Deng","year":"2006","unstructured":"Deng, F.G., Zhou, H.Y., Long, G.L.: Circular quantum secret sharing. J. Phys. A Math. Gen. 39, 14089\u201314099 (2006)","journal-title":"J. Phys. A Math. Gen."},{"key":"2080_CR15","doi-asserted-by":"publisher","first-page":"187","DOI":"10.12693\/APhysPolA.93.187","volume":"93","author":"M Zukowski","year":"1998","unstructured":"Zukowski, M., Zeilinger, A., Horne, M.A., et al.: Quest for GHZ states. Acta Phys. Pol. A 93, 187 (1998)","journal-title":"Acta Phys. Pol. A"},{"key":"2080_CR16","doi-asserted-by":"publisher","first-page":"162","DOI":"10.1103\/PhysRevA.59.162","volume":"59","author":"A Karlsson","year":"1999","unstructured":"Karlsson, A., Koashi, M., Imoto, N.: Quantum entanglement for secret sharing and secret splitting. Phys. Rev. A 59, 162 (1999)","journal-title":"Phys. Rev. A"},{"key":"2080_CR17","doi-asserted-by":"publisher","first-page":"052307","DOI":"10.1103\/PhysRevA.69.052307","volume":"69","author":"L Xiao","year":"2004","unstructured":"Xiao, L., Long, G.L., Deng, F.G., Pan, J.W.: Efficient multiparty quantum-secret-sharing schemes. Phys. Rev. A 69, 052307 (2004)","journal-title":"Phys. Rev. A"},{"key":"2080_CR18","doi-asserted-by":"publisher","first-page":"022321","DOI":"10.1103\/PhysRevA.71.022321","volume":"71","author":"LY Hsu","year":"2005","unstructured":"Hsu, L.Y., Li, C.M.: Quantum secret sharing using product states. Phys. Rev. A 71, 022321 (2005)","journal-title":"Phys. Rev. A"},{"issue":"5","key":"2080_CR19","doi-asserted-by":"publisher","first-page":"052319","DOI":"10.1103\/PhysRevA.69.052319","volume":"69","author":"FG Deng","year":"2004","unstructured":"Deng, F.G., Long, G.L.: Secure direct communication with a quantum one-time pad. Phys. Rev. A 69(5), 052319 (2004)","journal-title":"Phys. Rev. A"},{"issue":"14","key":"2080_CR20","doi-asserted-by":"publisher","first-page":"16663","DOI":"10.1364\/OE.21.016663","volume":"21","author":"KJ Wei","year":"2013","unstructured":"Wei, K.J., Ma, H.Q., Yang, J.H.: Experimental circular quantum secret sharing over telecom fiber network. Opt. Express 21(14), 16663\u201316669 (2013)","journal-title":"Opt. Express"},{"key":"2080_CR21","doi-asserted-by":"publisher","first-page":"177903","DOI":"10.1103\/PhysRevLett.92.177903","volume":"92","author":"AM Lance","year":"2004","unstructured":"Lance, A.M., Symul, T., Bowen, W.P., Sanders, B.C., Lam, P.K.: Tripartite quantum state sharing. Phys. Rev. Lett. 92, 177903 (2004)","journal-title":"Phys. Rev. Lett."},{"key":"2080_CR22","doi-asserted-by":"publisher","first-page":"044301","DOI":"10.1103\/PhysRevA.72.044301","volume":"72","author":"FG Deng","year":"2005","unstructured":"Deng, F.G., Li, X.H., Li, C.Y., Zhou, P., Zhou, H.Y.: Multiparty quantum-state sharing of an arbitrary two-particle state with Einstein\u2013Podolsky\u2013Rosen pairs. Phys. Rev. A 72, 044301 (2005)","journal-title":"Phys. Rev. A"},{"key":"2080_CR23","doi-asserted-by":"publisher","first-page":"062316","DOI":"10.1103\/PhysRevA.73.062316","volume":"73","author":"G Gordon","year":"2006","unstructured":"Gordon, G., Rigolin, G.: Generalized quantum-state sharing. Phys. Rev. A 73, 062316 (2006)","journal-title":"Phys. Rev. A"},{"key":"2080_CR24","doi-asserted-by":"publisher","first-page":"4972","DOI":"10.1007\/s10773-016-3121-9","volume":"55","author":"CM Bai","year":"2016","unstructured":"Bai, C.M., Li, Z.H., Xu, T.T., Li, Y.M.: A generalized information theoretical model for quantum secret sharing. Int. J. Theor. Phys. 55, 4972\u20134986 (2016)","journal-title":"Int. J. Theor. Phys."},{"key":"2080_CR25","doi-asserted-by":"publisher","first-page":"030301(R)","DOI":"10.1103\/PhysRevA.92.030301","volume":"92","author":"V Karimipour","year":"2015","unstructured":"Karimipour, V., Asoudeh, M.: Quantum secret sharing and random hopping: using single states instead of entanglement. Phys. Rev. A 92, 030301(R) (2015)","journal-title":"Phys. Rev. A"},{"issue":"2","key":"2080_CR26","doi-asserted-by":"publisher","first-page":"022340","DOI":"10.1103\/PhysRevA.88.022340","volume":"88","author":"V Gheorghiu","year":"2013","unstructured":"Gheorghiu, V., Sanders, B.C.: Accessing quantum secrets via local operations and classical communication. Phys. Rev. A 88(2), 022340 (2013)","journal-title":"Phys. Rev. A"},{"key":"2080_CR27","doi-asserted-by":"publisher","first-page":"030302(R)","DOI":"10.1103\/PhysRevA.92.030302","volume":"92","author":"A Tavakoli","year":"2015","unstructured":"Tavakoli, A., Herbauts, I., Zukowski, M., Bourennane, M.: Secret sharing with a single $$d$$ d -level quantum system. Phys. Rev. A 92, 030302(R) (2015)","journal-title":"Phys. Rev. A"},{"key":"2080_CR28","doi-asserted-by":"publisher","first-page":"022305","DOI":"10.1103\/PhysRevA.92.022305","volume":"92","author":"A Maitra","year":"2015","unstructured":"Maitra, A., De, S.J., Paul, G., Pal, A.K.: Proposal for quantum rational secret sharing. Phys. Rev. A 92, 022305 (2015)","journal-title":"Phys. Rev. A"},{"key":"2080_CR29","doi-asserted-by":"publisher","first-page":"022330","DOI":"10.1103\/PhysRevA.91.022330","volume":"91","author":"R Rahaman","year":"2015","unstructured":"Rahaman, R., Parker, M.G.: Quantum scheme for secret sharing based on local distinguishability. Phys. Rev. A 91, 022330 (2015)","journal-title":"Phys. Rev. A"},{"key":"2080_CR30","doi-asserted-by":"publisher","first-page":"16967","DOI":"10.1038\/srep16967","volume":"5","author":"YH Yang","year":"2015","unstructured":"Yang, Y.H., Gao, F., Wu, X.: Quantum secret sharing via local operations and classical communication. Sci. Rep. 5, 16967\u201316967 (2015)","journal-title":"Sci. Rep."},{"key":"2080_CR31","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1007\/s11128-016-1506-6","volume":"16","author":"CM Bai","year":"2017","unstructured":"Bai, C.M., Li, Z.H., Xu, T.T.: Quantum secret sharing using the $$d$$ d -dimensional GHZ state. Quantum Inf. Process. 16, 59 (2017)","journal-title":"Quantum Inf. Process."},{"issue":"2","key":"2080_CR32","doi-asserted-by":"publisher","first-page":"022320","DOI":"10.1103\/PhysRevA.95.022320","volume":"95","author":"J Wang","year":"2017","unstructured":"Wang, J., Li, L., Peng, H., Yang, Y.: Quantum-secret-sharing scheme based on local distinguishability of orthogonal multiqudit entangled states. Phys. Rev. A 95(2), 022320 (2017)","journal-title":"Phys. Rev. A"},{"key":"2080_CR33","doi-asserted-by":"publisher","first-page":"304","DOI":"10.1007\/s11128-017-1739-z","volume":"16","author":"CM Bai","year":"2017","unstructured":"Bai, C.M., Li, Z.H., Liu, C.J.: Quantum secret sharing using orthogonal multiqudit entangled states. Quantum Inf. Process. 16, 304 (2017)","journal-title":"Quantum Inf. Process."},{"issue":"4","key":"2080_CR34","doi-asserted-by":"publisher","first-page":"1333","DOI":"10.1088\/1674-1056\/18\/4\/007","volume":"18","author":"TT Song","year":"2009","unstructured":"Song, T.T.: Participant attack on quantum secret sharing based on entanglement swapping. Chin. Phys. B 18(4), 1333 (2009)","journal-title":"Chin. Phys. B"},{"issue":"3","key":"2080_CR35","doi-asserted-by":"publisher","first-page":"445","DOI":"10.1140\/epjd\/e2009-00306-3","volume":"56","author":"F-Z Guo","year":"2010","unstructured":"Guo, F.-Z.: Participant attack on a kind of MQSS schemes based on entanglement swapping. Eur. Phys. J. D 56(3), 445\u2013448 (2010)","journal-title":"Eur. Phys. J. D"}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11128-018-2080-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-018-2080-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-018-2080-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,17]],"date-time":"2026-02-17T15:07:52Z","timestamp":1771340872000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11128-018-2080-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10,5]]},"references-count":35,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2018,11]]}},"alternative-id":["2080"],"URL":"https:\/\/doi.org\/10.1007\/s11128-018-2080-x","relation":{},"ISSN":["1570-0755","1573-1332"],"issn-type":[{"value":"1570-0755","type":"print"},{"value":"1573-1332","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,10,5]]},"assertion":[{"value":"13 April 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 September 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 October 2018","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"312"}}