{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,9]],"date-time":"2026-03-09T10:19:43Z","timestamp":1773051583227,"version":"3.50.1"},"reference-count":52,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2019,2,4]],"date-time":"2019-02-04T00:00:00Z","timestamp":1549238400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61802118"],"award-info":[{"award-number":["61802118"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100005046","name":"Natural Science Foundation of Heilongjiang Province","doi-asserted-by":"crossref","award":["A2016007"],"award-info":[{"award-number":["A2016007"]}],"id":[{"id":"10.13039\/501100005046","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Open Foundation of State key Laboratory of Networking and Switching Technolog","award":["SKLNST-2018-1-07"],"award-info":[{"award-number":["SKLNST-2018-1-07"]}]},{"name":"University Nursing Program for Young Scholars with Creative Talents in Heilongjiang Province"},{"name":"Heilongjiang University Innovation Found for Graduates","award":["YJSCX2018-159HLJU"],"award-info":[{"award-number":["YJSCX2018-159HLJU"]}]},{"DOI":"10.13039\/100012548","name":"Heilongjiang Postdoctoral Science Foundation","doi-asserted-by":"publisher","award":["LBH-Z17048"],"award-info":[{"award-number":["LBH-Z17048"]}],"id":[{"id":"10.13039\/100012548","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"published-print":{"date-parts":[[2019,3]]},"DOI":"10.1007\/s11128-019-2201-1","type":"journal-article","created":{"date-parts":[[2019,2,4]],"date-time":"2019-02-04T12:03:43Z","timestamp":1549281823000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":29,"title":["A new n-party quantum secret sharing model based on multiparty entangled states"],"prefix":"10.1007","volume":"18","author":[{"given":"Ke-jia","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Xue","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Heng-yue","family":"Jia","sequence":"additional","affiliation":[]},{"given":"Long","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,2,4]]},"reference":[{"key":"2201_CR1","unstructured":"Bennett, C., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. In: Proceedings of IEEE International Conference on Computers, Systems, and Signal Processing, pp. 175\u2013179. IEEE Press, New York (1984)"},{"key":"2201_CR2","doi-asserted-by":"publisher","first-page":"661","DOI":"10.1103\/PhysRevLett.67.661","volume":"67","author":"A Ekert","year":"1991","unstructured":"Ekert, A.: Quantum cryptography based on Bell theorem. Phys. Rev. Lett. 67, 661 (1991)","journal-title":"Phys. Rev. Lett."},{"key":"2201_CR3","doi-asserted-by":"publisher","first-page":"3121","DOI":"10.1103\/PhysRevLett.68.3121","volume":"68","author":"C Bennett","year":"1992","unstructured":"Bennett, C.: Quantum cryptography using any two nonorthogonal states. Phys. Rev. Lett. 68, 3121 (1992)","journal-title":"Phys. Rev. Lett."},{"key":"2201_CR4","doi-asserted-by":"publisher","first-page":"1895","DOI":"10.1103\/PhysRevLett.70.1895","volume":"70","author":"C Bennett","year":"1993","unstructured":"Bennett, C., Brassard, G., Crepeau, C., Jozsa, R., Peres, A., Wootters, W.: Teleporting an unknown quantum state via dual classical and Einstein\u2013Podolsky\u2013Rosen channels. Phys. Rev. Lett. 70, 1895 (1993)","journal-title":"Phys. Rev. Lett."},{"key":"2201_CR5","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1016\/j.physleta.2005.09.012","volume":"349","author":"F Gao","year":"2006","unstructured":"Gao, F., Guo, F.-Z., Wen, Q.-Y., Zhu, F.-C.: Quantum key distribution without alternative measurements and rotations. Phys. Lett. A 349, 53 (2006)","journal-title":"Phys. Lett. A"},{"key":"2201_CR6","doi-asserted-by":"publisher","first-page":"187902","DOI":"10.1103\/PhysRevLett.89.187902","volume":"89","author":"K Bostrom","year":"2002","unstructured":"Bostrom, K., Felbinger, T.: Deterministic secure direct communication using entanglement. Phys. Rev. Lett. 89, 187902 (2002)","journal-title":"Phys. Rev. Lett."},{"key":"2201_CR7","doi-asserted-by":"publisher","first-page":"052319","DOI":"10.1103\/PhysRevA.69.052319","volume":"69","author":"F-G Deng","year":"2004","unstructured":"Deng, F.-G., Long, G.-L.: Secure direct communication with a quantum one-time pad. Phys. Rev. A 69, 052319 (2004)","journal-title":"Phys. Rev. A"},{"key":"2201_CR8","doi-asserted-by":"publisher","first-page":"016302","DOI":"10.1103\/PhysRevA.72.016302","volume":"72","author":"F-G Deng","year":"2005","unstructured":"Deng, F.-G., Long, G.-L.: Reply to \u201cComment on \u2018Secure direct communication with a quantum one-time-pad\u201d\u2019. Phys. Rev. A 72, 016302 (2005)","journal-title":"Phys. Rev. A"},{"key":"2201_CR9","doi-asserted-by":"publisher","first-page":"064304","DOI":"10.1103\/PhysRevA.78.064304","volume":"78","author":"S Lin","year":"2008","unstructured":"Lin, S., Wen, Q.-Y., Zhu, F.-C.: Quantum secure direct communication with \n                    \n                      \n                    \n                    $$\\chi $$\n                    \n                      \n                        \u03c7\n                      \n                    \n                  -type entangled states. Phys. Rev. A 78, 064304 (2008)","journal-title":"Phys. Rev. A"},{"key":"2201_CR10","doi-asserted-by":"publisher","first-page":"022301","DOI":"10.1103\/PhysRevA.83.022301","volume":"83","author":"M Jakobi","year":"2011","unstructured":"Jakobi, M., Simon, C., Gisin, N., et al.: Practical private database queries based on a quantum-key-distribution protocol. Phys. Rev. A 83, 022301 (2011)","journal-title":"Phys. Rev. A"},{"key":"2201_CR11","first-page":"6600111","volume":"21","author":"F Gao","year":"2015","unstructured":"Gao, F., Liu, B., Huang, W., Wen, Q.-Y.: Postprocessing of the oblivious key in quantum private query. IEEE. J. Sel. Top. Quant. 21, 6600111 (2015)","journal-title":"IEEE. J. Sel. Top. Quant."},{"key":"2201_CR12","doi-asserted-by":"publisher","first-page":"042318","DOI":"10.1103\/PhysRevA.93.042318","volume":"93","author":"C-Y Wei","year":"2016","unstructured":"Wei, C.-Y., Wang, T.-Y., Gao, F.: Practical quantum private query with better performance in resisting joint-measurement attack. Phys. Rev. A 93, 042318 (2016)","journal-title":"Phys. Rev. A"},{"key":"2201_CR13","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1109\/TC.2017.2721404","volume":"67","author":"C-Y Wei","year":"2018","unstructured":"Wei, C.-Y., Cai, X.-Q., Liu, B., et al.: A generic construction of quantum-oblivious-key-transfer-based private query with ideal database security and zero failure. IEEE Trans. Comput. 67, 2\u20138 (2018)","journal-title":"IEEE Trans. Comput."},{"key":"2201_CR14","doi-asserted-by":"publisher","first-page":"100301","DOI":"10.1007\/s11433-015-5714-3","volume":"58","author":"B Liu","year":"2015","unstructured":"Liu, B., Gao, F., Huang, W.: QKD-based quantum private query without a failure probability. Sci. China Phys. Mech. Astron. 58, 100301 (2015)","journal-title":"Sci. China Phys. Mech. Astron."},{"key":"2201_CR15","doi-asserted-by":"publisher","first-page":"17411","DOI":"10.1364\/OE.20.017411","volume":"20","author":"F Gao","year":"2012","unstructured":"Gao, F., Liu, B., Wen, Q.-Y., Chen, H.: Flexible quantum private queries based on quantum key distribution. Opt. Express 20, 17411 (2012)","journal-title":"Opt. Express"},{"key":"2201_CR16","doi-asserted-by":"publisher","first-page":"7537","DOI":"10.1038\/srep07537","volume":"4","author":"CY Wei","year":"2014","unstructured":"Wei, C.Y., Gao, F., Wen, Q.-Y., Wang, T.-Y.: Practical quantum private query of blocks based on unbalanced-state Bennett-Brassard-1984 quantum-key-distribution protocol. Sci. Rep. 4, 7537 (2014)","journal-title":"Sci. Rep."},{"key":"2201_CR17","doi-asserted-by":"publisher","first-page":"022334","DOI":"10.1103\/PhysRevA.88.022334","volume":"88","author":"J-L Zhang","year":"2013","unstructured":"Zhang, J.-L., Guo, F.-Z., Gao, F., et al.: Private database queries based on counterfactual quantum key distribution. Phys. Rev. A 88, 022334 (2013)","journal-title":"Phys. Rev. A"},{"key":"2201_CR18","doi-asserted-by":"publisher","first-page":"042312","DOI":"10.1103\/PhysRevA.65.042312","volume":"65","author":"G-H Zeng","year":"2002","unstructured":"Zeng, G.-H., Keitel, C.-H.: Arbitrated quantum-signature scheme. Phys. Rev. A 65, 042312 (2002)","journal-title":"Phys. Rev. A"},{"key":"2201_CR19","doi-asserted-by":"publisher","first-page":"054307","DOI":"10.1103\/PhysRevA.79.054307","volume":"79","author":"Q Li","year":"2009","unstructured":"Li, Q., Chan, W.-H., Long, D.-Y.: Arbitrated quantum signature scheme using Bell states. Phys. Rev. A 79, 054307 (2009)","journal-title":"Phys. Rev. A"},{"key":"2201_CR20","doi-asserted-by":"publisher","first-page":"042325","DOI":"10.1103\/PhysRevA.82.042325","volume":"82","author":"X-F Zou","year":"2010","unstructured":"Zou, X.-F., Qiu, D.-W.: Security analysis and improvements of arbitrated quantum signature schemes. Phys. Rev. A 82, 042325 (2010)","journal-title":"Phys. Rev. A"},{"key":"2201_CR21","doi-asserted-by":"publisher","first-page":"022344","DOI":"10.1103\/PhysRevA.84.022344","volume":"84","author":"F Gao","year":"2011","unstructured":"Gao, F., Qin, S.-J., Guo, F.-Z., Wen, Q.-Y.: Cryptanalysis of the arbitrated quantum signature protocols. Phys. Rev. A 84, 022344 (2011)","journal-title":"Phys. Rev. A"},{"key":"2201_CR22","doi-asserted-by":"publisher","first-page":"2655","DOI":"10.1007\/s11128-013-0554-4","volume":"12","author":"K-J Zhang","year":"2013","unstructured":"Zhang, K.-J., Zhang, W.-W., Li, D.: Improving the security of arbitrated quantum signatureagainst the forgery attack. Quant. Inf. Proc. 12, 2655\u20132669 (2013)","journal-title":"Quant. Inf. Proc."},{"key":"2201_CR23","doi-asserted-by":"publisher","first-page":"3127","DOI":"10.1007\/s11128-013-0589-6","volume":"12","author":"K-J Zhang","year":"2013","unstructured":"Zhang, K.-J., Qin, S.-J., Sun, Y., Song, T.-T., Su, Q.: Reexamination of arbitrated quantum signature: the impossible and the possible. Quant. Inf. Proc. 12, 3127\u20133141 (2013)","journal-title":"Quant. Inf. Proc."},{"key":"2201_CR24","doi-asserted-by":"publisher","first-page":"1829","DOI":"10.1103\/PhysRevA.59.1829","volume":"59","author":"M Hillery","year":"1999","unstructured":"Hillery, M., Buzek, V., Berthiaume, A.: Quantum secret sharing. Phys. Rev. A 59, 1829 (1999)","journal-title":"Phys. Rev. A"},{"key":"2201_CR25","doi-asserted-by":"publisher","first-page":"648","DOI":"10.1103\/PhysRevLett.83.648","volume":"83","author":"R Cleve","year":"1999","unstructured":"Cleve, R., Gottesman, D., Lo, H.-K.: How to share a quantum secret. Phys. Rev. Lett. 83, 648 (1999)","journal-title":"Phys. Rev. Lett."},{"key":"2201_CR26","doi-asserted-by":"publisher","first-page":"052307","DOI":"10.1103\/PhysRevA.69.052307","volume":"69","author":"L Xiao","year":"2004","unstructured":"Xiao, L., Long, G.-L., Deng, F.-G., Pan, J.-W.: Efficient multiparty quantum-secret-sharing schemes. Phys. Rev. A 69, 052307 (2004)","journal-title":"Phys. Rev. A"},{"key":"2201_CR27","doi-asserted-by":"publisher","first-page":"012328","DOI":"10.1103\/PhysRevA.71.012328","volume":"71","author":"S Kunar Singh","year":"2005","unstructured":"Kunar Singh, S., Srikanth, R.: Generalized quantum secret sharing. Phys. Rev. A 71, 012328 (2005)","journal-title":"Phys. Rev. A"},{"issue":"5\u20136","key":"2201_CR28","doi-asserted-by":"publisher","first-page":"420","DOI":"10.1016\/j.physleta.2004.03.034","volume":"324","author":"Y Li","year":"2004","unstructured":"Li, Y., Zhang, K., Peng, K.: Multiparty secret sharing of quantum information based on entanglement swapping. Phys. Lett. A 324(5\u20136), 420\u2013424 (2004)","journal-title":"Phys. Lett. A"},{"key":"2201_CR29","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1016\/j.physleta.2008.11.004","volume":"373","author":"T-Y Wang","year":"2008","unstructured":"Wang, T.-Y., Wen, Q.-Y., Gao, F., Lin, S., Zhu, F.-C.: Cryptanalysis and improvement of multiparty quantum secret sharing schemes. Phys. Lett. A 373, 65 (2008)","journal-title":"Phys. Lett. A"},{"issue":"4","key":"2201_CR30","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1016\/S0375-9601(03)00074-4","volume":"310","author":"G-P Guo","year":"2003","unstructured":"Guo, G.-P., Guo, G.-C.: Quantum secret sharing without entanglement. Phys. Lett. A 310(4), 247\u2013251 (2003)","journal-title":"Phys. Lett. A"},{"key":"2201_CR31","first-page":"044301","volume":"71","author":"Z-J Zhang","year":"2005","unstructured":"Zhang, Z.-J., Li, Y., Man, Z.-X.: Multiparty quantum secret sharing. Phys. Lett. A 71, 044301 (2005)","journal-title":"Phys. Lett. A"},{"key":"2201_CR32","first-page":"044302","volume":"72","author":"F-G Deng","year":"2005","unstructured":"Deng, F.-G., Li, X.-H., Zhou, H.-Y., Zhang, Z.-J.: Improving the security of multiparty quantum secret sharing against Trojan horse attack. Phys. Lett. A 72, 044302 (2005)","journal-title":"Phys. Lett. A"},{"key":"2201_CR33","first-page":"049901","volume":"73","author":"F-G Deng","year":"2006","unstructured":"Deng, F.-G., Li, X.-H., Zhou, H.-Y., Zhang, Z.-J.: Erratum: Improving the security of multiparty quantum secret sharing against Trojan horse attack. Phys. Lett. A 73, 049901 (2006)","journal-title":"Phys. Lett. A"},{"key":"2201_CR34","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1016\/j.physleta.2006.04.030","volume":"357","author":"S-J Qin","year":"2006","unstructured":"Qin, S.-J., Gao, F., Wen, Q.-Y., Zhu, F.-C.: Improving the security of multiparty quantum secret sharing against an attack with a fake signal. Phys. Lett. A 357, 101 (2006)","journal-title":"Phys. Lett. A"},{"key":"2201_CR35","doi-asserted-by":"publisher","first-page":"2690","DOI":"10.1016\/j.optcom.2007.12.045","volume":"281","author":"L-F Han","year":"2008","unstructured":"Han, L.-F., Liu, Y.-M., Liu, J., Zhang, Z.J.: Multiparty quantum secret sharing of secure direct communication using single photons. Opt. Commun. 281, 2690 (2008)","journal-title":"Opt. Commun."},{"key":"2201_CR36","first-page":"434","volume":"11","author":"T-Y Wang","year":"2011","unstructured":"Wang, T.-Y., Wen, Q.-Y.: Security of a kind of quantum secret sharing with single photons. Quantum Inf. Comput. 11, 434 (2011)","journal-title":"Quantum Inf. Comput."},{"key":"2201_CR37","doi-asserted-by":"publisher","first-page":"1019","DOI":"10.1088\/0253-6102\/54\/6\/13","volume":"54","author":"CR Hsieh","year":"2010","unstructured":"Hsieh, C.R., Tasi, C.W., Hwang, T.: Quantum secret sharing using GHZ-like state. Commun. Theor. Phys. 54, 1019\u20131022 (2010)","journal-title":"Commun. Theor. Phys."},{"key":"2201_CR38","doi-asserted-by":"publisher","first-page":"1828","DOI":"10.1007\/s11433-012-4767-9","volume":"55","author":"MH Dehkordi","year":"2012","unstructured":"Dehkordi, M.H., Fattahi, E.: A novel and efficient multiparty quantum secret sharing scheme using entangled states. Sci. China phy. Mech. Astron. 55, 1828\u20131831 (2012)","journal-title":"Sci. China phy. Mech. Astron."},{"key":"2201_CR39","doi-asserted-by":"publisher","first-page":"022330","DOI":"10.1103\/PhysRevA.91.022330","volume":"91","author":"R Rahaman","year":"2015","unstructured":"Rahaman, R., Parker, M.G.: Quantum scheme for secret sharing based on local distinguishabality. Phys. Rev. A 91, 022330 (2015)","journal-title":"Phys. Rev. A"},{"key":"2201_CR40","doi-asserted-by":"publisher","first-page":"16967","DOI":"10.1038\/srep16967","volume":"5","author":"YH Yang","year":"2015","unstructured":"Yang, Y.H., et al.: Quantum secret sharing via local operations and classical communication. Sci. Rep. 5, 16967 (2015)","journal-title":"Sci. Rep."},{"key":"2201_CR41","doi-asserted-by":"publisher","first-page":"022330","DOI":"10.1103\/PhysRevA.95.022330","volume":"95","author":"J-T Wang","year":"2017","unstructured":"Wang, J.-T., Li, L.-X., Peng, H.-P., Yang, Y.-X.: Quantum-secret-sharing based on local distinguishability of orthogonal multiqudit entangled states. Phys. Rev. A 95, 022330 (2017)","journal-title":"Phys. Rev. A"},{"key":"2201_CR42","doi-asserted-by":"publisher","first-page":"39845","DOI":"10.1038\/srep39845","volume":"7","author":"X-B Chen","year":"2017","unstructured":"Chen, X.-B., Dou, Z., Xu, G., He, X.-Y., Yang, Y.-X.: A kind of universal quantum secret sharing protocol. Sci. Rep. 7, 39845 (2017)","journal-title":"Sci. Rep."},{"key":"2201_CR43","doi-asserted-by":"publisher","first-page":"022333","DOI":"10.1103\/PhysRevA.94.022333","volume":"94","author":"Q-L Wang","year":"2016","unstructured":"Wang, Q.-L., Yu, C.-H., Gao, F., Qi, H.-Y., Wen, Q.-Y.: Self-tallying quantum anonymous voting. Phys. Rev. A 94, 022333 (2016)","journal-title":"Phys. Rev. A"},{"key":"2201_CR44","doi-asserted-by":"publisher","first-page":"1517","DOI":"10.1007\/s10773-017-3291-0","volume":"56","author":"T-Y Ye","year":"2017","unstructured":"Ye, T.-Y., Ji, Z.-X.: Two-party quantum private comparison with five-qubit enyangled states. Int. J. Theor. Phys. 56, 1517\u20131529 (2017)","journal-title":"Int. J. Theor. Phys."},{"key":"2201_CR45","doi-asserted-by":"publisher","first-page":"208901","DOI":"10.1103\/PhysRevLett.101.208901","volume":"101","author":"F Gao","year":"2008","unstructured":"Gao, F., Guo, F.-Z., Wen, Q.-Y., Zhu, F.-C.: Comment on \u201cExperimental demonstration of a quantum protocol for byzantine agreement and liar detection\u201d. Phys. Rev. Lett. 101, 208901 (2008)","journal-title":"Phys. Rev. Lett."},{"key":"2201_CR46","doi-asserted-by":"publisher","first-page":"036301","DOI":"10.1103\/PhysRevA.63.036301","volume":"63","author":"Y-S Zhang","year":"2001","unstructured":"Zhang, Y.-S., Li, C.-F., Guo, G.-C.: Comment on \u201cQuantum key distribution without alternative measurements\u201d. Phys. Rev. A 63, 036301 (2001)","journal-title":"Phys. Rev. A"},{"key":"2201_CR47","doi-asserted-by":"publisher","first-page":"157901","DOI":"10.1103\/PhysRevLett.90.157901","volume":"90","author":"A W\u2019ojcik","year":"2003","unstructured":"W\u2019ojcik, A.: Eavesdropping on the ping-pong quantum communication protocol. Phys. Rev. Lett. 90, 157901 (2003)","journal-title":"Phys. Rev. Lett."},{"key":"2201_CR48","doi-asserted-by":"publisher","first-page":"032325","DOI":"10.1103\/PhysRevA.89.032325","volume":"89","author":"W Huang","year":"2014","unstructured":"Huang, W., Wen, Q.-Y., Liu, B., Su, Q., Qin, S.-J., Gao, F.: Quantum anonymous ranking. Phys. Rev. A 89, 032325 (2014)","journal-title":"Phys. Rev. A"},{"key":"2201_CR49","doi-asserted-by":"publisher","first-page":"100402","DOI":"10.1103\/PhysRevLett.89.100402","volume":"89","author":"A Cabello","year":"2002","unstructured":"Cabello, A.: N-particle N-level singlet states: some properties and applications. Phys. Rev. Lett. 89, 100402 (2002)","journal-title":"Phys. Rev. Lett."},{"key":"2201_CR50","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1007\/s11082-018-1435-y","volume":"50","author":"H Qin","year":"2018","unstructured":"Qin, H., Tso, R.: Efficient quantum secret sharing based on special multi-dimensional GHZ state. Opt. Quant. Electron. 50, 167 (2018)","journal-title":"Opt. Quant. Electron."},{"key":"2201_CR51","doi-asserted-by":"publisher","first-page":"194","DOI":"10.1007\/s11128-017-1631-x","volume":"16","author":"K-F Yu","year":"2017","unstructured":"Yu, K.-F., Gu, J., Hwang, T., Gope, P.: Multi-party semi-quantum key distribution-convertible multi-party semi-quantum secret sharing. Quant. Inf. Proc. 16, 194 (2017)","journal-title":"Quant. Inf. Proc."},{"key":"2201_CR52","doi-asserted-by":"publisher","first-page":"2465","DOI":"10.1007\/s11128-013-0534-8","volume":"12","author":"W Yang","year":"2013","unstructured":"Yang, W., Huang, L., Shi, R., et al.: Secret sharing based on quantum Fourier transform. Quant. Inf. Proc. 12, 2465\u20132474 (2013)","journal-title":"Quant. Inf. Proc."}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11128-019-2201-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-019-2201-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-019-2201-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,2,3]],"date-time":"2020-02-03T19:13:45Z","timestamp":1580757225000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11128-019-2201-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,2,4]]},"references-count":52,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2019,3]]}},"alternative-id":["2201"],"URL":"https:\/\/doi.org\/10.1007\/s11128-019-2201-1","relation":{},"ISSN":["1570-0755","1573-1332"],"issn-type":[{"value":"1570-0755","type":"print"},{"value":"1573-1332","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,2,4]]},"assertion":[{"value":"12 September 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 January 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 February 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"81"}}