{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,2]],"date-time":"2025-12-02T15:03:16Z","timestamp":1764687796292,"version":"3.37.3"},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2019,3,1]],"date-time":"2019-03-01T00:00:00Z","timestamp":1551398400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100002398","name":"Sharif University of Technology","doi-asserted-by":"publisher","award":["G951418"],"award-info":[{"award-number":["G951418"]}],"id":[{"id":"10.13039\/501100002398","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003968","name":"Iran National Science Foundation","doi-asserted-by":"publisher","award":["INSF-96011347"],"award-info":[{"award-number":["INSF-96011347"]}],"id":[{"id":"10.13039\/501100003968","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"published-print":{"date-parts":[[2019,4]]},"DOI":"10.1007\/s11128-019-2224-7","type":"journal-article","created":{"date-parts":[[2019,3,1]],"date-time":"2019-03-01T10:06:05Z","timestamp":1551434765000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Computing on quantum shared secrets for general quantum access structures"],"prefix":"10.1007","volume":"18","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1792-0017","authenticated-orcid":false,"given":"Roozbeh","family":"Bassirian","sequence":"first","affiliation":[]},{"given":"Sadra","family":"Boreiri","sequence":"additional","affiliation":[]},{"given":"Vahid","family":"Karimipour","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,3,1]]},"reference":[{"issue":"11","key":"2224_CR1","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A Shamir","year":"1979","unstructured":"Shamir, A.: How to share a secret. Commun. ACM 22(11), 612\u2013613 (1979)","journal-title":"Commun. ACM"},{"key":"2224_CR2","first-page":"313","volume":"48","author":"GR Blakley","year":"1979","unstructured":"Blakley, G.R., et al.: Safeguarding cryptographic keys. Proc. Natl. Comput. Conf. 48, 313\u2013317 (1979)","journal-title":"Proc. Natl. Comput. Conf."},{"issue":"3","key":"2224_CR3","doi-asserted-by":"publisher","first-page":"1829","DOI":"10.1103\/PhysRevA.59.1829","volume":"59","author":"M Hillery","year":"1999","unstructured":"Hillery, M., Bu\u017eek, V., Berthiaume, A.: Quantum secret sharing. Phys. Rev. A 59(3), 1829 (1999)","journal-title":"Phys. Rev. A"},{"issue":"1","key":"2224_CR4","doi-asserted-by":"publisher","first-page":"162","DOI":"10.1103\/PhysRevA.59.162","volume":"59","author":"A Karlsson","year":"1999","unstructured":"Karlsson, A., Koashi, M., Imoto, N.: Quantum entanglement for secret sharing and secret splitting. Phys. Rev. A 59(1), 162 (1999)","journal-title":"Phys. Rev. A"},{"key":"2224_CR5","unstructured":"Smith, A.D.: Quantum secret sharing for general access structures. arXiv preprint \n                    arXiv:quant-ph\/0001087\n                    \n                   (2000)"},{"key":"2224_CR6","doi-asserted-by":"publisher","first-page":"648","DOI":"10.1103\/PhysRevLett.83.648","volume":"83","author":"R Cleve","year":"1999","unstructured":"Cleve, R., Gottesman, D., Lo, H.-K.: How to share a quantum secret. Phys. Rev. Lett. 83, 648\u2013651 (1999)","journal-title":"Phys. Rev. Lett."},{"key":"2224_CR7","doi-asserted-by":"publisher","first-page":"042311","DOI":"10.1103\/PhysRevA.61.042311","volume":"61","author":"D Gottesman","year":"2000","unstructured":"Gottesman, D.: Theory of quantum secret sharing. Phys. Rev. A 61, 042311 (2000)","journal-title":"Phys. Rev. A"},{"key":"2224_CR8","unstructured":"Imai, H., M\u00fcller-Quade, J., Nascimento, A.C., Tuyls, P., Winter, A.: A quantum information theoretical model for quantum secret sharing schemes. arXiv preprint \n                    arXiv:quant-ph\/0311136\n                    \n                   (2003)"},{"issue":"11","key":"2224_CR9","doi-asserted-by":"publisher","first-page":"4972","DOI":"10.1007\/s10773-016-3121-9","volume":"55","author":"C-M Bai","year":"2016","unstructured":"Bai, C.-M., Li, Z.-H., Xu, T.-T., Li, Y.-M.: A generalized information theoretical model for quantum secret sharing. Int. J. Theor. Phys. 55(11), 4972\u20134986 (2016)","journal-title":"Int. J. Theor. Phys."},{"issue":"1","key":"2224_CR10","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/BF00191318","volume":"5","author":"CH Bennett","year":"1992","unstructured":"Bennett, C.H., Bessette, F., Brassard, G., Salvail, L., Smolin, J.: Experimental quantum cryptography. J. Cryptol. 5(1), 3\u201328 (1992)","journal-title":"J. Cryptol."},{"issue":"5","key":"2224_CR11","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1088\/1367-2630\/8\/5\/075","volume":"8","author":"S Gr\u00f6blacher","year":"2006","unstructured":"Gr\u00f6blacher, S., Jennewein, T., Vaziri, A., Weihs, G., Zeilinger, A.: Experimental quantum cryptography with qutrits. New J. Phys. 8(5), 75 (2006)","journal-title":"New J. Phys."},{"key":"2224_CR12","doi-asserted-by":"publisher","first-page":"012319","DOI":"10.1103\/PhysRevA.92.012319","volume":"92","author":"W-Y Liang","year":"2015","unstructured":"Liang, W.-Y., Li, M., Yin, Z.-Q., Chen, W., Wang, S., An, X.-B., Guo, G.-C., Han, Z.-F.: Simple implementation of quantum key distribution based on single-photon bell-state measurement. Phys. Rev. A 92, 012319 (2015)","journal-title":"Phys. Rev. A"},{"key":"2224_CR13","unstructured":"Broadbent, A., Fitzsimons, J., Kashefi, E.: Proceedings of the 50th Annual IEEE Symposium on Foundations of Computer Science (2009)"},{"issue":"6066","key":"2224_CR14","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1126\/science.1214707","volume":"335","author":"S Barz","year":"2012","unstructured":"Barz, S., Kashefi, E., Broadbent, A., Fitzsimons, J.F., Zeilinger, A., Walther, P.: Demonstration of blind quantum computing. Science 335(6066), 303\u2013308 (2012)","journal-title":"Science"},{"key":"2224_CR15","doi-asserted-by":"publisher","first-page":"042334","DOI":"10.1103\/PhysRevA.98.042334","volume":"98","author":"Y Ouyang","year":"2018","unstructured":"Ouyang, Y., Tan, S.-H., Fitzsimons, J.F.: Quantum homomorphic encryption from quantum codes. Phys. Rev. A 98, 042334 (2018)","journal-title":"Phys. Rev. A"},{"key":"2224_CR16","doi-asserted-by":"publisher","first-page":"030301","DOI":"10.1103\/PhysRevA.92.030301","volume":"92","author":"V Karimipour","year":"2015","unstructured":"Karimipour, V., Asoudeh, M.: Quantum secret sharing and random hopping: using single states instead of entanglement. Phys. Rev. A 92, 030301 (2015)","journal-title":"Phys. Rev. A"},{"key":"2224_CR17","doi-asserted-by":"publisher","first-page":"044302","DOI":"10.1103\/PhysRevA.67.044302","volume":"67","author":"S Bagherinezhad","year":"2003","unstructured":"Bagherinezhad, S., Karimipour, V.: Quantum secret sharing based on reusable Greenberger\u2013Horne\u2013Zeilinger states as secure carriers. Phys. Rev. A 67, 044302 (2003)","journal-title":"Phys. Rev. A"},{"issue":"1","key":"2224_CR18","doi-asserted-by":"publisher","first-page":"6366","DOI":"10.1038\/s41598-017-06486-4","volume":"7","author":"X-L Song","year":"2017","unstructured":"Song, X.-L., Liu, Y.-B., Deng, H.-Y., Xiao, Y.-G.: (t, n) threshold d-level quantum secret sharing. Sci. Rep. 7(1), 6366 (2017)","journal-title":"Sci. Rep."},{"issue":"6","key":"2224_CR19","doi-asserted-by":"publisher","first-page":"062316","DOI":"10.1103\/PhysRevA.73.062316","volume":"73","author":"G Gordon","year":"2006","unstructured":"Gordon, G., Rigolin, G.: Generalized quantum-state sharing. Phys. Rev. A 73(6), 062316 (2006)","journal-title":"Phys. Rev. A"},{"issue":"11","key":"2224_CR20","doi-asserted-by":"publisher","first-page":"4237","DOI":"10.1007\/s11128-015-1106-x","volume":"14","author":"H Qin","year":"2015","unstructured":"Qin, H., Dai, Y.: Proactive quantum secret sharing. Quantum Inf. Process. 14(11), 4237\u20134244 (2015)","journal-title":"Quantum Inf. Process."},{"issue":"5","key":"2224_CR21","doi-asserted-by":"publisher","first-page":"052333","DOI":"10.1103\/PhysRevA.96.052333","volume":"96","author":"Y Ouyang","year":"2017","unstructured":"Ouyang, Y., Tan, S.-H., Zhao, L., Fitzsimons, J.F.: Computing on quantum shared secrets. Phys. Rev. A 96(5), 052333 (2017)","journal-title":"Phys. Rev. A"},{"issue":"10","key":"2224_CR22","doi-asserted-by":"publisher","first-page":"6659","DOI":"10.1109\/TIT.2012.2205895","volume":"58","author":"B Fortescue","year":"2012","unstructured":"Fortescue, B., Gour, G.: Reducing the quantum communication cost of quantum secret sharing. IEEE Trans. Inf. Theory 58(10), 6659\u20136666 (2012)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"10","key":"2224_CR23","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1140\/epjd\/e2017-80286-3","volume":"71","author":"C-M Bai","year":"2017","unstructured":"Bai, C.-M., Li, Z.-H., Si, M.-M., Li, Y.-M.: Quantum secret sharing for a general quantum access structure. Eur. Phys. J. D 71(10), 255 (2017)","journal-title":"Eur. Phys. J. D"},{"key":"2224_CR24","doi-asserted-by":"publisher","first-page":"2525","DOI":"10.1103\/PhysRevLett.84.2525","volume":"84","author":"E Knill","year":"2000","unstructured":"Knill, E., Laflamme, R., Viola, L.: Theory of quantum error correction for general noise. Phys. Rev. Lett. 84, 2525\u20132528 (2000)","journal-title":"Phys. Rev. Lett."},{"key":"2224_CR25","unstructured":"Gottesman, D.: Stabilizer codes and quantum error correction. arXiv preprint \n                    arXiv:quant-ph\/9705052\n                    \n                   (1997)"},{"issue":"5886","key":"2224_CR26","doi-asserted-by":"publisher","first-page":"802","DOI":"10.1038\/299802a0","volume":"299","author":"WK Wootters","year":"1982","unstructured":"Wootters, W.K., Zurek, W.H.: A single quantum cannot be cloned. Nature 299(5886), 802\u2013803 (1982)","journal-title":"Nature"},{"key":"2224_CR27","doi-asserted-by":"publisher","first-page":"1098","DOI":"10.1103\/PhysRevA.54.1098","volume":"54","author":"AR Calderbank","year":"1996","unstructured":"Calderbank, A.R., Shor, P.W.: Good quantum error-correcting codes exist. Phys. Rev. A 54, 1098\u20131105 (1996)","journal-title":"Phys. Rev. A"},{"issue":"6760","key":"2224_CR28","doi-asserted-by":"publisher","first-page":"390","DOI":"10.1038\/46503","volume":"402","author":"D Gottesman","year":"1999","unstructured":"Gottesman, D., Chuang, I.L.: Demonstrating the viability of universal quantum computation using teleportation and single-qubit operations. Nature 402(6760), 390 (1999)","journal-title":"Nature"},{"key":"2224_CR29","doi-asserted-by":"publisher","first-page":"052316","DOI":"10.1103\/PhysRevA.62.052316","volume":"62","author":"X Zhou","year":"2000","unstructured":"Zhou, X., Leung, D.W., Chuang, I.L.: Methodology for quantum logic gate construction. Phys. Rev. A 62, 052316 (2000)","journal-title":"Phys. Rev. A"},{"key":"2224_CR30","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1103\/PhysRevLett.68.557","volume":"68","author":"CH Bennett","year":"1992","unstructured":"Bennett, C.H., Brassard, G., Mermin, N.D.: Quantum cryptography without Bell\u2019s theorem. Phys. Rev. Lett. 68, 557\u2013559 (1992)","journal-title":"Phys. Rev. Lett."},{"key":"2224_CR31","doi-asserted-by":"crossref","unstructured":"Dunjko, V., Fitzsimons, J.F., Portmann, C., Renner, R.: Composable security of delegated quantum computation. In: International Conference on the Theory and Application of Cryptology and Information Security, pp. 406\u2013425. Springer, Berlin (2014)","DOI":"10.1007\/978-3-662-45608-8_22"}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-019-2224-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11128-019-2224-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-019-2224-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,2,28]],"date-time":"2020-02-28T19:05:29Z","timestamp":1582916729000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11128-019-2224-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,3,1]]},"references-count":31,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2019,4]]}},"alternative-id":["2224"],"URL":"https:\/\/doi.org\/10.1007\/s11128-019-2224-7","relation":{},"ISSN":["1570-0755","1573-1332"],"issn-type":[{"type":"print","value":"1570-0755"},{"type":"electronic","value":"1573-1332"}],"subject":[],"published":{"date-parts":[[2019,3,1]]},"assertion":[{"value":"26 July 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 February 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 March 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"109"}}