{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,16]],"date-time":"2026-01-16T08:15:25Z","timestamp":1768551325561,"version":"3.49.0"},"reference-count":19,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2019,4,20]],"date-time":"2019-04-20T00:00:00Z","timestamp":1555718400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"name":"State Key Program of National Natural Science of China","award":["61332019"],"award-info":[{"award-number":["61332019"]}]},{"DOI":"10.13039\/501100012336","name":"Major State Basic Research Development Program of China","doi-asserted-by":"crossref","award":["2014CB340601"],"award-info":[{"award-number":["2014CB340601"]}],"id":[{"id":"10.13039\/501100012336","id-type":"DOI","asserted-by":"crossref"}]},{"name":"the National Science Foundation of China","award":["61202386"],"award-info":[{"award-number":["61202386"]}]},{"name":"the National Science Foundation of China","award":["61402339"],"award-info":[{"award-number":["61402339"]}]},{"name":"the National Cryptography Development Fund","award":["MMJJ201701304"],"award-info":[{"award-number":["MMJJ201701304"]}]},{"name":"the Science and Technology Research Project of Hebei higher education","award":["QN2017020"],"award-info":[{"award-number":["QN2017020"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"published-print":{"date-parts":[[2019,6]]},"DOI":"10.1007\/s11128-018-2141-1","type":"journal-article","created":{"date-parts":[[2019,4,20]],"date-time":"2019-04-20T17:02:20Z","timestamp":1555779740000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":56,"title":["Quantum protocols for secure multi-party summation"],"prefix":"10.1007","volume":"18","author":[{"given":"ZhaoXu","family":"Ji","sequence":"first","affiliation":[]},{"given":"HuanGuo","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"HouZhen","family":"Wang","sequence":"additional","affiliation":[]},{"given":"FuSheng","family":"Wu","sequence":"additional","affiliation":[]},{"given":"JianWei","family":"Jia","sequence":"additional","affiliation":[]},{"given":"WanQing","family":"Wu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,4,20]]},"reference":[{"issue":"11","key":"2141_CR1","first-page":"1","volume":"58","author":"HG Zhang","year":"2015","unstructured":"Zhang, H.G., Han, W.B., Lai, X.J., et al.: Survey on cyberspace security. Sci. China Inf. Sci. 58(11), 1\u201343 (2015)","journal-title":"Sci. China Inf. Sci."},{"key":"2141_CR2","unstructured":"Yao, A.C.: Protocols for secure computations. Foundations of Computer Science. In: SFCS\u201908. 23rd Annual Symposium on. IEEE 1982, 160\u2013164 (1982)"},{"issue":"7","key":"2141_CR3","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1007\/s11128-017-1622-y","volume":"16","author":"WQ Wu","year":"2017","unstructured":"Wu, W.Q., Zhang, H.G.: Quantum algorithm to solve function inversion with timespace trade-off. Quantum Inf. Process. 16(7), 171 (2017)","journal-title":"Quantum Inf. Process."},{"issue":"3","key":"2141_CR4","doi-asserted-by":"publisher","first-page":"813","DOI":"10.1007\/s11128-014-0909-5","volume":"14","author":"WQ Wu","year":"2015","unstructured":"Wu, W.Q., Zhang, H.G., Mao, S.W., Wang, H.Z.: Quantum algorithm to find invariant linear structure of MD hash functions. Quantum Inf. Process. 14(3), 813\u2013829 (2015)","journal-title":"Quantum Inf. Process."},{"issue":"4","key":"2141_CR5","doi-asserted-by":"publisher","first-page":"1215","DOI":"10.1007\/s11128-015-0940-1","volume":"14","author":"WQ Wu","year":"2015","unstructured":"Wu, W.Q., Zhang, H.G., Wang, H.Z., Mao, S.W.: Polynomial-time quantum algorithms for finding the linear structures of Boolean function. Quantum Inf. Process. 14(4), 1215\u20131226 (2015)","journal-title":"Quantum Inf. Process."},{"key":"2141_CR6","unstructured":"Bennett, C.H., Brassard, G.: Quantum cryptography: public-key distribution and coin tossing. In: Proceeding of the IEEE International Conference on Computers, Systems and Signal, pp. 175179. Bangalore, India (1984)"},{"issue":"3","key":"2141_CR7","doi-asserted-by":"publisher","first-page":"1829","DOI":"10.1103\/PhysRevA.59.1829","volume":"59","author":"Mark Hillery","year":"1999","unstructured":"Hillery, M., Bu\n                    \n                      \n                    \n                    $$\\check{z}$$\n                    \n                      \n                        \n                          z\n                          \u02c7\n                        \n                      \n                    \n                  ek, V., Berthiaume, A.: Quantum secret sharing. Phys. Rev. 59(3), 1829 (1999)","journal-title":"Physical Review A"},{"key":"2141_CR8","doi-asserted-by":"publisher","first-page":"042320","DOI":"10.1103\/PhysRevA.65.042320","volume":"65","author":"V Karimipour","year":"2002","unstructured":"Karimipour, V., Bahraminasab, A., Bagherinezhad, S.: Entanglement swapping of generalized cat states and secret sharing. Physical Review A 65, 042320 (2002)","journal-title":"Physical Review A"},{"issue":"4","key":"2141_CR9","doi-asserted-by":"publisher","first-page":"044302","DOI":"10.1103\/PhysRevA.67.044302","volume":"67","author":"S Bagherinezhad","year":"2003","unstructured":"Bagherinezhad, S., Karimipour, V.: Quantum secret sharing based on reusable Greenberger\u2013Horne\u2013Zeilinger states as secure carriers. Phys. Rev. A 67(4), 044302 (2003)","journal-title":"Phys. Rev. A"},{"issue":"3","key":"2141_CR10","doi-asserted-by":"publisher","first-page":"032325","DOI":"10.1103\/PhysRevA.89.032325","volume":"89","author":"W Huang","year":"2014","unstructured":"Huang, W., Wen, Q.Y., Liu, B., et al.: Quantum anonymous ranking. Phys. Rev. A 89(3), 032325 (2014)","journal-title":"Phys. Rev. A"},{"issue":"1","key":"2141_CR11","doi-asserted-by":"publisher","first-page":"012318","DOI":"10.1103\/PhysRevA.93.012318","volume":"93","author":"S Lin","year":"2016","unstructured":"Lin, S., Guo, G.D., Huang, F., et al.: Quantum anonymous ranking based on the Chinese remainder theorem. Phys. Rev. A 93(1), 012318 (2016)","journal-title":"Phys. Rev. A"},{"issue":"2","key":"2141_CR12","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1145\/772862.772867","volume":"4","author":"C Clifton","year":"2002","unstructured":"Clifton, C., Kantarcioglu, M., Vaidya, J., et al.: Tools for privacy preserving distributed data mining. ACM Sigkdd Explor. Newsl. 4(2), 28\u201334 (2002)","journal-title":"ACM Sigkdd Explor. Newsl."},{"key":"2141_CR13","doi-asserted-by":"crossref","unstructured":"Du, W., Atallah, M.J.: Secure multi-party computation problems and their applications: a review and open problems. In: Proceedings of the 2001 Workshop on New Security Paradigms. ACM, 13\u201322 (2001)","DOI":"10.1145\/508171.508174"},{"issue":"1","key":"2141_CR14","doi-asserted-by":"publisher","first-page":"012333","DOI":"10.1103\/PhysRevA.75.012333","volume":"75","author":"JA Vaccaro","year":"2007","unstructured":"Vaccaro, J.A., Spring, J., Chefles, A.: Quantum protocols for anonymous voting and surveying. Phys. Rev. A 75(1), 012333 (2007)","journal-title":"Phys. Rev. A"},{"issue":"1","key":"2141_CR15","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1016\/j.physleta.2005.09.010","volume":"349","author":"M Hillery","year":"2006","unstructured":"Hillery, M., Ziman, M., Bu\u017eek, V., et al.: Towards quantum-based privacy and voting. Physics Letters A 349(1), 75\u201381 (2006)","journal-title":"Physics Letters A"},{"issue":"2","key":"2141_CR16","doi-asserted-by":"publisher","first-page":"022331","DOI":"10.1103\/PhysRevA.84.022331","volume":"84","author":"M Bonanome","year":"2011","unstructured":"Bonanome, M., Bu\u017eek, V., Hillery, M., et al.: Toward protocols for quantum-ensured privacy and secure voting. Phys. Rev. A 84(2), 022331 (2011)","journal-title":"Phys. Rev. A"},{"issue":"7","key":"2141_CR17","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1007\/s11128-017-1628-5","volume":"16","author":"ZX Ji","year":"2017","unstructured":"Ji, Z.X., Ye, T.Y.: Multi-party quantum private comparison based on the entanglement swapping of d-level cat states and d-level Bell states. Quantum Inf. Process. 16(7), 177 (2017)","journal-title":"Quantum Inf. Process."},{"key":"2141_CR18","volume-title":"Quantum Computation and Quantum Information","author":"MA Nielsen","year":"2000","unstructured":"Nielsen, M.A., Chuang, I.L.: Quantum Computation and Quantum Information. Cambridge University Press, Cambridge (2000)"},{"issue":"2","key":"2141_CR19","doi-asserted-by":"publisher","first-page":"441","DOI":"10.1103\/PhysRevLett.85.441","volume":"85","author":"PW Shor","year":"2000","unstructured":"Shor, P.W., Preskill, J.: Simple proof of security of the BB84 quantum key distribution protocol. Phys. Rev. Lett. 85(2), 441 (2000)","journal-title":"Phys. Rev. Lett."}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-018-2141-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11128-018-2141-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-018-2141-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,18]],"date-time":"2020-04-18T23:11:23Z","timestamp":1587251483000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11128-018-2141-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,4,20]]},"references-count":19,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2019,6]]}},"alternative-id":["2141"],"URL":"https:\/\/doi.org\/10.1007\/s11128-018-2141-1","relation":{},"ISSN":["1570-0755","1573-1332"],"issn-type":[{"value":"1570-0755","type":"print"},{"value":"1573-1332","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,4,20]]},"assertion":[{"value":"27 March 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 November 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 April 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"168"}}