{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,19]],"date-time":"2025-09-19T07:12:40Z","timestamp":1758265960328,"version":"3.37.3"},"reference-count":12,"publisher":"Springer Science and Business Media LLC","issue":"10","license":[{"start":{"date-parts":[[2019,8,20]],"date-time":"2019-08-20T00:00:00Z","timestamp":1566259200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,8,20]],"date-time":"2019-08-20T00:00:00Z","timestamp":1566259200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"published-print":{"date-parts":[[2019,10]]},"DOI":"10.1007\/s11128-019-2419-y","type":"journal-article","created":{"date-parts":[[2019,8,20]],"date-time":"2019-08-20T08:03:08Z","timestamp":1566288188000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Practical quantum Byzantine protocol via nearly optimal entanglement resources"],"prefix":"10.1007","volume":"18","author":[{"given":"Lide","family":"Xue","sequence":"first","affiliation":[]},{"given":"Bingren","family":"Chen","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8297-5108","authenticated-orcid":false,"given":"Wei","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Liusheng","family":"Huang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,8,20]]},"reference":[{"issue":"21","key":"2419_CR1","doi-asserted-by":"publisher","first-page":"217901","DOI":"10.1103\/PhysRevLett.87.217901","volume":"87","author":"M Fitzi","year":"2001","unstructured":"Fitzi, M., Gisin, N., Maurer, U.: A quantum solution to the byzantine agreement problem. Phys. Rev. Lett. 87(21), 217901 (2001)","journal-title":"Phys. Rev. Lett."},{"issue":"7","key":"2419_CR2","doi-asserted-by":"publisher","first-page":"070504","DOI":"10.1103\/PhysRevLett.100.070504","volume":"100","author":"S Gaertner","year":"2008","unstructured":"Gaertner, S., Bourennane, M., Kurtsiefer, C., Cabello, A., Weinfurter, H.: Experimental demonstration of a quantum protocol for byzantine agreement and liar detection. Phys. Rev. Lett. 100(7), 070504 (2008)","journal-title":"Phys. Rev. Lett."},{"key":"2419_CR3","doi-asserted-by":"publisher","DOI":"10.1145\/322186.322188","volume-title":"Reaching Agreement in the Presence of Faults","author":"M Pease","year":"1980","unstructured":"Pease, M.: Reaching Agreement in the Presence of Faults. ACM, New York (1980)"},{"issue":"3","key":"2419_CR4","doi-asserted-by":"publisher","first-page":"382","DOI":"10.1145\/357172.357176","volume":"4","author":"L Lamport","year":"1982","unstructured":"Lamport, L., Shostak, R., Pease, M.: The byzantine generals problem. ACM Trans. Program. Lang. Syst. 4(3), 382\u2013401 (1982)","journal-title":"ACM Trans. Program. Lang. Syst."},{"key":"2419_CR5","doi-asserted-by":"crossref","unstructured":"Fitzi, M., Gottesman, D., Hirt, M., Holenstein, T.: Detectable byzantine agreement secure against faulty majorities. In: Symposium on Principles of Distributed Computing, pp. 118\u2013126 (2002)","DOI":"10.1145\/571825.571841"},{"issue":"4","key":"2419_CR6","doi-asserted-by":"publisher","first-page":"656","DOI":"10.1137\/0212045","volume":"12","author":"D Dolev","year":"1983","unstructured":"Dolev, D., Strong, H.R.: Authenticated algorithms for byzantine agreement. Siam J. Comput. 12(4), 656\u2013666 (1983)","journal-title":"Siam J. Comput."},{"key":"2419_CR7","doi-asserted-by":"publisher","first-page":"08","DOI":"10.1016\/j.physa.2018.07.044","volume":"512","author":"W Deng","year":"2018","unstructured":"Deng, W., Deng, Y.: Entropic methodology for entanglement measures. Phys. A: Stat. Mech. Appl. 512, 08 (2018)","journal-title":"Phys. A: Stat. Mech. Appl."},{"key":"2419_CR8","unstructured":"Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system. Working Paper (2008)"},{"key":"2419_CR9","unstructured":"Eyal, I., Gencer, A.E., Renesse, R.V.: Bitcoin-ng: a scalable blockchain protocol. In: Usenix Conference on Networked Systems Design & Implementation (2016)"},{"issue":"8","key":"2419_CR10","first-page":"5723","volume":"37","author":"E Kokoriskogias","year":"2016","unstructured":"Kokoriskogias, E., Jovanovic, P., Gailly, N., Khoffi, I., Gasser, L., Ford, B.: Enhancing bitcoin security and performance with strong consistency via collective signing. Appl. Math. Model. 37(8), 5723\u20135742 (2016)","journal-title":"Appl. Math. Model."},{"key":"2419_CR11","unstructured":"Castro, M., Liskov, B.: Practical byzantine fault tolerance. In: Symposium on Operating Systems Design & Implementation (1999)"},{"key":"2419_CR12","doi-asserted-by":"crossref","unstructured":"Eyal, I., Sirer, E.G.: Majority is not enough: bitcoin mining is vulnerable. In: International Conference on Financial Cryptography & Data Security (2014)","DOI":"10.1007\/978-3-662-45472-5_28"}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-019-2419-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11128-019-2419-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-019-2419-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,18]],"date-time":"2020-08-18T23:58:44Z","timestamp":1597795124000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11128-019-2419-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,8,20]]},"references-count":12,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2019,10]]}},"alternative-id":["2419"],"URL":"https:\/\/doi.org\/10.1007\/s11128-019-2419-y","relation":{},"ISSN":["1570-0755","1573-1332"],"issn-type":[{"type":"print","value":"1570-0755"},{"type":"electronic","value":"1573-1332"}],"subject":[],"published":{"date-parts":[[2019,8,20]]},"assertion":[{"value":"2 February 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 August 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 August 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"301"}}