{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,6]],"date-time":"2026-04-06T17:21:59Z","timestamp":1775496119777,"version":"3.50.1"},"reference-count":49,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2019,5,21]],"date-time":"2019-05-21T00:00:00Z","timestamp":1558396800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,5,21]],"date-time":"2019-05-21T00:00:00Z","timestamp":1558396800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"published-print":{"date-parts":[[2019,7]]},"DOI":"10.1007\/s11128-019-2319-1","type":"journal-article","created":{"date-parts":[[2019,5,22]],"date-time":"2019-05-22T11:59:50Z","timestamp":1558526390000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":34,"title":["Three-party quantum secret sharing against collective noise"],"prefix":"10.1007","volume":"18","author":[{"given":"Yu-Guang","family":"Yang","sequence":"first","affiliation":[]},{"given":"Shang","family":"Gao","sequence":"additional","affiliation":[]},{"given":"Dan","family":"Li","sequence":"additional","affiliation":[]},{"given":"Yi-Hua","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Wei-Min","family":"Shi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,5,21]]},"reference":[{"key":"2319_CR1","unstructured":"Bennett, C. H., Brassard, G.: Quantum cryptography: public-key distribution and coin tossing. In: Proceedings of the IEEE International Conference on Computers, Systems and Signal Processing. New York: IEEE, pp. 175\u2013179 (1984)"},{"key":"2319_CR2","doi-asserted-by":"publisher","first-page":"661","DOI":"10.1103\/PhysRevLett.67.661","volume":"67","author":"A Ekert","year":"1991","unstructured":"Ekert, A.: Quantum cryptography based on Bell\u2019s theorem. Phys. Rev. Lett. 67, 661\u2013664 (1991)","journal-title":"Phys. Rev. Lett."},{"key":"2319_CR3","doi-asserted-by":"publisher","first-page":"3121","DOI":"10.1103\/PhysRevLett.68.3121","volume":"68","author":"CH Bennett","year":"1992","unstructured":"Bennett, C.H.: Quantum cryptography using any two nonorthogonal states. Phys. Rev. Lett. 68, 3121\u20133124 (1992)","journal-title":"Phys. Rev. Lett."},{"key":"2319_CR4","doi-asserted-by":"publisher","first-page":"187902","DOI":"10.1103\/PhysRevLett.89.187902","volume":"89","author":"K Bostr\u00f6m","year":"2002","unstructured":"Bostr\u00f6m, K., Felbinger, T.: Deterministic secure direct communication using entanglement. Phys. Rev. Lett. 89, 187902 (2002)","journal-title":"Phys. Rev. Lett."},{"key":"2319_CR5","doi-asserted-by":"publisher","first-page":"042317","DOI":"10.1103\/PhysRevA.68.042317","volume":"68","author":"FG Deng","year":"2003","unstructured":"Deng, F.G., Long, G.L., Liu, X.S.: Two-step quantum direct communication protocol using the Einstein-Podolsky-Rosen pair block. Phys. Rev. A 68, 042317 (2003)","journal-title":"Phys. Rev. A"},{"key":"2319_CR6","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1103\/PhysRevA.60.149","volume":"60","author":"M Du\u0161ek","year":"1999","unstructured":"Du\u0161ek, M., Haderka, O., Hendrych, M., Myska, R.: Quantum identification system. Phys. Rev. A 60, 149\u2013156 (1999)","journal-title":"Phys. Rev. A"},{"issue":"5","key":"2319_CR7","doi-asserted-by":"publisher","first-page":"055305","DOI":"10.1088\/1751-8113\/42\/5\/055305","volume":"42","author":"YG Yang","year":"2009","unstructured":"Yang, Y.G., Wen, Q.Y.: An efficient two-party quantum private comparison protocol with decoy photons and two-photon entanglement. J. Phys. A: Math. Theor. 42(5), 055305 (2009)","journal-title":"J. Phys. A: Math. Theor."},{"issue":"6","key":"2319_CR8","doi-asserted-by":"publisher","first-page":"065002","DOI":"10.1088\/0031-8949\/80\/06\/065002","volume":"80","author":"YG Yang","year":"2009","unstructured":"Yang, Y.G., Cao, W.F., Wen, Q.Y.: Secure quantum private comparison. Phys. Scr. 80(6), 065002 (2009)","journal-title":"Phys. Scr."},{"issue":"7","key":"2319_CR9","doi-asserted-by":"publisher","first-page":"1561","DOI":"10.1016\/j.optcom.2009.11.085","volume":"283","author":"XB Chen","year":"2010","unstructured":"Chen, X.B., Xu, G., Niu, X.X., Wen, Q.Y., Yang, Y.X.: An efficient protocol for the private comparison of equal information based on the triplet entangled state and single particle measurement. Opt. Commun. 283(7), 1561\u20131565 (2010)","journal-title":"Opt. Commun."},{"issue":"1","key":"2319_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11128-016-1481-y","volume":"16","author":"Y-G Yang","year":"2017","unstructured":"Yang, Y.-G., Liu, Z.-C., Li, J., Chen, X.-B., Zuo, H.-J., Zhou, Y.-H., Shi, W.-M.: Theoretically extensible quantum digital signature with starlike cluster states. Quantum Inf. Process. 16(1), 1\u201315 (2017)","journal-title":"Quantum Inf. Process."},{"issue":"6","key":"2319_CR11","doi-asserted-by":"publisher","first-page":"2487","DOI":"10.1007\/s11128-016-1293-0","volume":"15","author":"Y-G Yang","year":"2016","unstructured":"Yang, Y.-G., Lei, H., Liu, Z.-C., Zhou, Y.-H., Shi, W.-M.: Arbitrated quantum signature scheme based on cluster states. Quantum Inf. Process. 15(6), 2487\u20132497 (2016)","journal-title":"Quantum Inf. Process."},{"key":"2319_CR12","doi-asserted-by":"publisher","first-page":"6600111","DOI":"10.1109\/JSTQE.2014.2358192","volume":"21","author":"F Gao","year":"2015","unstructured":"Gao, F., Liu, B., Huang, W., Wen, Q.Y.: Postprocessing of the oblivious key in quantum private query. IEEE. J. Sel. Top. Quant. 21, 6600111 (2015)","journal-title":"IEEE. J. Sel. Top. Quant."},{"key":"2319_CR13","doi-asserted-by":"publisher","first-page":"042318","DOI":"10.1103\/PhysRevA.93.042318","volume":"93","author":"CY Wei","year":"2016","unstructured":"Wei, C.Y., Wang, T.Y., Gao, F.: Practical quantum private query with better performance in resisting joint-measurement attack. Phys. Rev. A 93, 042318 (2016)","journal-title":"Phys. Rev. A"},{"issue":"12","key":"2319_CR14","doi-asserted-by":"publisher","first-page":"120311","DOI":"10.1007\/s11433-017-9085-0","volume":"60","author":"Y-G Yang","year":"2017","unstructured":"Yang, Y.-G., Liu, Z.-C., Chen, X.-B., Zhou, Y.-H., Shi, W.-M.: Robust QKD-based private database queries based on alternative sequences of single-qubit measurements. Sci. Chin. Phys. Mech. Astron. 60(12), 120311 (2017)","journal-title":"Sci. Chin. Phys. Mech. Astron."},{"issue":"48","key":"2319_CR15","doi-asserted-by":"publisher","first-page":"4033","DOI":"10.1016\/j.physleta.2016.10.017","volume":"380","author":"Y-G Yang","year":"2016","unstructured":"Yang, Y.-G., Liu, Z.-C., Li, J., Chen, X.-B., Zuo, H.-J., Zhou, Y.-H., Shi, W.-M.: Quantum private query with perfect user privacy against a joint-measurement attack. Phys. Lett. A 380(48), 4033\u20134038 (2016)","journal-title":"Phys. Lett. A"},{"key":"2319_CR16","doi-asserted-by":"publisher","first-page":"3833","DOI":"10.1007\/s11128-016-1367-z","volume":"15","author":"Y-G Yang","year":"2016","unstructured":"Yang, Y.-G., Liu, Z.C., Chen, X.B., Cao, W.F., Zhou, Y.H., Shi, W.M.: Novel classical post-processing for quantum key distribution-based quantum private query. Quantum Inf. Process. 15, 3833\u20133840 (2016)","journal-title":"Quantum Inf. Process."},{"key":"2319_CR17","doi-asserted-by":"publisher","first-page":"17411","DOI":"10.1364\/OE.20.017411","volume":"20","author":"F Gao","year":"2012","unstructured":"Gao, F., Liu, B., Wen, Q.-Y.: Flexible quantum private queries based on quantum key distribution. Opt. Exp. 20, 17411\u201317420 (2012)","journal-title":"Opt. Exp."},{"key":"2319_CR18","doi-asserted-by":"publisher","first-page":"805","DOI":"10.1007\/s11128-013-0692-8","volume":"13","author":"Y-G Yang","year":"2014","unstructured":"Yang, Y.-G., Sun, S.-J., Xu, P., Tian, J.: Flexible protocol for quantum private query based on B92 protocol. Quantum Inf. Process. 13, 805\u2013813 (2014)","journal-title":"Quantum Inf. Process."},{"key":"2319_CR19","doi-asserted-by":"publisher","first-page":"070301","DOI":"10.1007\/s11433-018-9324-6","volume":"62","author":"F Gao","year":"2019","unstructured":"Gao, F., Qin, S.J., Huang, W., Wen, Q.Y.: Quantum private query: a new kind of practical quantum cryptographic protocols. Sci. China-Phys. Mech. Astron. 62, 070301 (2019)","journal-title":"Sci. China-Phys. Mech. Astron."},{"key":"2319_CR20","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1016\/j.cose.2018.08.012","volume":"81","author":"Y-G Yang","year":"2019","unstructured":"Yang, Y.-G., Guo, X.-P., Xu, G., Chen, X.-B., Li, J., Zhou, Y.-H., Shi, W.-M.: Reducing the communication complexity of quantum private database queries by subtle classical post-processing with relaxed quantum ability. Computers & Security 81, 15\u201324 (2019)","journal-title":"Computers & Security"},{"key":"2319_CR21","doi-asserted-by":"publisher","first-page":"1829","DOI":"10.1103\/PhysRevA.59.1829","volume":"59","author":"M Hillery","year":"1999","unstructured":"Hillery, M., Bu\u017eek, V., Berthiaume, A.: Quantum secret sharing. Phys. Rev. A 59, 1829\u20131834 (1999)","journal-title":"Phys. Rev. A"},{"key":"2319_CR22","doi-asserted-by":"publisher","first-page":"162","DOI":"10.1103\/PhysRevA.59.162","volume":"59","author":"A Karlsson","year":"1999","unstructured":"Karlsson, A., Koashi, M., Imoto, N.: Quantum entanglement for secret sharing and secret splitting. Phys. Rev. A 59, 162\u2013168 (1999)","journal-title":"Phys. Rev. A"},{"key":"2319_CR23","first-page":"247","volume":"310","author":"GP Guo","year":"2003","unstructured":"Guo, G.P., Guo, G.C.: Quantum secret sharing without entanglement. Phys. Rev. A 310, 247\u2013251 (2003)","journal-title":"Phys. Rev. A"},{"key":"2319_CR24","doi-asserted-by":"publisher","first-page":"052307","DOI":"10.1103\/PhysRevA.69.052307","volume":"69","author":"L Xiao","year":"2004","unstructured":"Xiao, L., Long, G.L., Deng, F.G., Pan, J.W.: Efficient multiparty quantum-secret-sharing schemes. Phys. Rev. A 69, 052307 (2004)","journal-title":"Phys. Rev. A"},{"issue":"5","key":"2319_CR25","doi-asserted-by":"publisher","first-page":"050309","DOI":"10.1088\/1674-1056\/20\/5\/050309","volume":"20","author":"Z Zhang","year":"2011","unstructured":"Zhang, Z., Liu, W., Li, C.: Quantum secret sharing based on quantum error-correcting codes. Chin. Phys. B 20(5), 050309 (2011)","journal-title":"Chin. Phys. B"},{"key":"2319_CR26","doi-asserted-by":"publisher","first-page":"1035","DOI":"10.1016\/j.physleta.2012.02.004","volume":"376","author":"HY Jia","year":"2012","unstructured":"Jia, H.Y., Wen, Q.Y., Gao, F., Qin, S.J., Guo, F.Z.: Dynamic quantum secret sharing. Phys. Lett. A 376, 1035\u20131041 (2012)","journal-title":"Phys. Lett. A"},{"key":"2319_CR27","doi-asserted-by":"publisher","first-page":"648","DOI":"10.1103\/PhysRevLett.83.648","volume":"83","author":"R Cleve","year":"1999","unstructured":"Cleve, R., Gottesman, D., Lo, H.-K.: How to share a quantum secret. Phys. Rev. Lett. 83, 648 (1999)","journal-title":"Phys. Rev. Lett."},{"key":"2319_CR28","doi-asserted-by":"publisher","first-page":"042311","DOI":"10.1103\/PhysRevA.61.042311","volume":"61","author":"D Gottesman","year":"2000","unstructured":"Gottesman, D.: Theory of quantum secret sharing. Phys. Rev. A 61, 042311 (2000)","journal-title":"Phys. Rev. A"},{"key":"2319_CR29","doi-asserted-by":"publisher","first-page":"177903","DOI":"10.1103\/PhysRevLett.92.177903","volume":"92","author":"AM Lance","year":"2004","unstructured":"Lance, A.M., Symul, T., Bowen, W.P., Sanders, B.C., Lam, P.K.: Tripartite quantum state sharing. Phys. Rev. Lett. 92, 177903 (2004)","journal-title":"Phys. Rev. Lett."},{"key":"2319_CR30","doi-asserted-by":"publisher","first-page":"022329","DOI":"10.1103\/PhysRevA.70.022329","volume":"70","author":"CP Yang","year":"2004","unstructured":"Yang, C.P., Chu, S.I., Han, S.: Efficient many-party controlled teleportation of multiqubit quantum information via entanglement. Phys. Rev. A 70, 022329 (2004)","journal-title":"Phys. Rev. A"},{"key":"2319_CR31","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1140\/epjd\/e2016-60683-x","volume":"70","author":"M Ray","year":"2016","unstructured":"Ray, M., Chatterjee, S., Chakrabarty, I.: Sequential quantum secret sharing in a noisy environment aided with weak measurements. Eur. Phys. J. D 70, 1\u201311 (2016)","journal-title":"Eur. Phys. J. D"},{"issue":"3","key":"2319_CR32","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1140\/epjd\/e2013-20440-5","volume":"67","author":"Y-G Yang","year":"2013","unstructured":"Yang, Y.-G., Xia, J., Jia, X., Shi, L., Zhang, H.: Economical five-party quantum state sharing of an arbitrary m-atom with five-atom cluster state in cavity QED. Eur. Phys. J. D 67(3), 59\u201361 (2013)","journal-title":"Eur. Phys. J. D"},{"key":"2319_CR33","doi-asserted-by":"publisher","first-page":"062316","DOI":"10.1103\/PhysRevA.73.062316","volume":"73","author":"G Gordon","year":"2006","unstructured":"Gordon, G., Rigolin, G.: Generalized quantum-state sharing. Phys. Rev. A 73, 062316 (2006)","journal-title":"Phys. Rev. A"},{"key":"2319_CR34","doi-asserted-by":"publisher","first-page":"4972","DOI":"10.1007\/s10773-016-3121-9","volume":"55","author":"CM Bai","year":"2016","unstructured":"Bai, C.M., Li, Z.H., Xu, T.T., Li, Y.M.: A generalized information theoretical model for quantum secret sharing. Int. J. Theor. Phys. 55, 4972\u20134986 (2016)","journal-title":"Int. J. Theor. Phys."},{"key":"2319_CR35","doi-asserted-by":"publisher","first-page":"030301(R)","DOI":"10.1103\/PhysRevA.92.030301","volume":"92","author":"V Karimipour","year":"2015","unstructured":"Karimipour, V., Asoudeh, M.: Quantum secret sharing and random hopping: using single states instead of entanglement. Phys. Rev. A 92, 030301(R) (2015)","journal-title":"Phys. Rev. A"},{"issue":"2","key":"2319_CR36","doi-asserted-by":"publisher","first-page":"022340","DOI":"10.1103\/PhysRevA.88.022340","volume":"88","author":"V Gheorghiu","year":"2013","unstructured":"Gheorghiu, V., Sanders, B.C.: Accessing quantum secrets via local operations and classical communication. Phys. Rev. A 88(2), 022340 (2013)","journal-title":"Phys. Rev. A"},{"key":"2319_CR37","doi-asserted-by":"publisher","first-page":"030302(R)","DOI":"10.1103\/PhysRevA.92.030302","volume":"92","author":"A Tavakoli","year":"2015","unstructured":"Tavakoli, A., Herbauts, I., Zukowski, M., Bourennane, M.: Secret sharing with a single d-level quantum system. Phys. Rev. A 92, 030302(R) (2015)","journal-title":"Phys. Rev. A"},{"key":"2319_CR38","doi-asserted-by":"publisher","first-page":"022305","DOI":"10.1103\/PhysRevA.92.022305","volume":"92","author":"A Maitra","year":"2015","unstructured":"Maitra, A., De, S.J., Paul, G., Pal, A.K.: Proposal for quantum rational secret sharing. Phys. Rev. A 92, 022305 (2015)","journal-title":"Phys. Rev. A"},{"key":"2319_CR39","doi-asserted-by":"publisher","first-page":"022330","DOI":"10.1103\/PhysRevA.91.022330","volume":"91","author":"R Rahaman","year":"2015","unstructured":"Rahaman, R., Parker, M.G.: Quantum scheme for secret sharing based on local distinguishability. Phys. Rev. A 91, 022330 (2015)","journal-title":"Phys. Rev. A"},{"issue":"2","key":"2319_CR40","doi-asserted-by":"publisher","first-page":"022320","DOI":"10.1103\/PhysRevA.95.022320","volume":"95","author":"J Wang","year":"2017","unstructured":"Wang, J., Li, L., Peng, H., Yang, Y.: Quantum-secret-sharing scheme based on local distinguishability of orthogonal multiqudit entangled states. Phys. Rev. A 95(2), 022320 (2017)","journal-title":"Phys. Rev. A"},{"issue":"17","key":"2319_CR41","doi-asserted-by":"publisher","first-page":"3306","DOI":"10.1103\/PhysRevLett.79.3306","volume":"79","author":"P Zanardi","year":"1997","unstructured":"Zanardi, P., Rasetti, M.: Noiseless quantum codes. Phys. Rev. Lett. 79(17), 3306 (1997)","journal-title":"Phys. Rev. Lett."},{"issue":"5491","key":"2319_CR42","doi-asserted-by":"publisher","first-page":"498","DOI":"10.1126\/science.290.5491.498","volume":"290","author":"P. G. Kwiat","year":"2000","unstructured":"Kwiat, P.G., Berglund, A.J., Altepeter, J.B., White, A.G.: Experimental verification of decoherence-free subspaces. Science (New York, N.Y.) 290(5491), pp. 498\u2013501 (2000)","journal-title":"Science"},{"issue":"15","key":"2319_CR43","doi-asserted-by":"publisher","first-page":"3099","DOI":"10.1016\/j.optcom.2010.04.015","volume":"283","author":"B Gu","year":"2010","unstructured":"Gu, B., Mu, L., Ding, L., et al.: Fault tolerant three-party quantum secret sharing against collective noise. Opt. Commun. 283(15), 3099\u20133103 (2010)","journal-title":"Opt. Commun."},{"key":"2319_CR44","doi-asserted-by":"publisher","first-page":"020304","DOI":"10.1088\/0256-307X\/28\/2\/020304","volume":"28","author":"C-Y Li","year":"2011","unstructured":"Li, C.-Y., Li, Y.-S.: Fault-tolerate three-party quantum secret sharing over a collective-noise channel. Chin. Phys. Lett. 28, 020304 (2011)","journal-title":"Chin. Phys. Lett."},{"key":"2319_CR45","doi-asserted-by":"publisher","first-page":"025003","DOI":"10.1088\/0031-8949\/83\/02\/025003","volume":"83","author":"YG Yang","year":"2011","unstructured":"Yang, Y.G., Teng, Y.W., Chai, H.P., Wen, Q.Y.: Fault-tolerant quantum secret sharing against collective noise. Phys. Scr. 83, 025003 (2011)","journal-title":"Phys. Scr."},{"key":"2319_CR46","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1016\/j.physleta.2005.10.050","volume":"351","author":"QY Cai","year":"2006","unstructured":"Cai, Q.Y.: Eavesdropping on the two-way quantum communication protocols with invisible photons. Phys. Lett. A 351, 23\u201325 (2006)","journal-title":"Phys. Lett. A"},{"key":"2319_CR47","doi-asserted-by":"publisher","first-page":"044302","DOI":"10.1103\/PhysRevA.72.044302","volume":"72","author":"FG Deng","year":"2005","unstructured":"Deng, F.G., Li, X.H., Zhou, H.Y., Zhang, Z.J.: Improving the security of multiparty quantum secret sharing against Trojan horse attack. Phys. Rev. A 72, 044302 (2005)","journal-title":"Phys. Rev. A"},{"key":"2319_CR48","doi-asserted-by":"publisher","first-page":"054302","DOI":"10.1103\/PhysRevA.74.054302","volume":"74","author":"XH Li","year":"2006","unstructured":"Li, X.H., Deng, F.G., Zhou, H.Y.: Improving the security of secure direct communication based on the secret transmitting order of particles. Phys. Rev. A 74, 054302 (2006)","journal-title":"Phys. Rev. A"},{"key":"2319_CR49","doi-asserted-by":"publisher","first-page":"5635","DOI":"10.1103\/PhysRevLett.85.5635","volume":"85","author":"A Cabello","year":"2000","unstructured":"Cabello, A.: Quantum key distribution in the Holevo limit. Phys. Rev. Lett. 85, 5635\u20135638 (2000)","journal-title":"Phys. Rev. Lett."}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-019-2319-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11128-019-2319-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-019-2319-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,19]],"date-time":"2020-05-19T23:42:02Z","timestamp":1589931722000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11128-019-2319-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,5,21]]},"references-count":49,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2019,7]]}},"alternative-id":["2319"],"URL":"https:\/\/doi.org\/10.1007\/s11128-019-2319-1","relation":{},"ISSN":["1570-0755","1573-1332"],"issn-type":[{"value":"1570-0755","type":"print"},{"value":"1573-1332","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,5,21]]},"assertion":[{"value":"21 November 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 May 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 May 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"215"}}