{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,8]],"date-time":"2026-02-08T08:19:26Z","timestamp":1770538766106,"version":"3.49.0"},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"8","license":[{"start":{"date-parts":[[2020,7,20]],"date-time":"2020-07-20T00:00:00Z","timestamp":1595203200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,7,20]],"date-time":"2020-07-20T00:00:00Z","timestamp":1595203200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"published-print":{"date-parts":[[2020,8]]},"DOI":"10.1007\/s11128-020-02732-3","type":"journal-article","created":{"date-parts":[[2020,7,20]],"date-time":"2020-07-20T07:03:33Z","timestamp":1595228613000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["Multi-user quantum private query"],"prefix":"10.1007","volume":"19","author":[{"given":"Hao","family":"Yang","sequence":"first","affiliation":[]},{"given":"Min","family":"Xiao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,7,20]]},"reference":[{"key":"2732_CR1","unstructured":"Chor, B., Goldreich, O., Kushilevitz, E., Sudan, M.: Private information retrieval. In: Proceedings of Foundations of Computer Science, pp. 41-50 (1995)"},{"issue":"3","key":"2732_CR2","doi-asserted-by":"publisher","first-page":"592","DOI":"10.1006\/jcss.1999.1689","volume":"60","author":"Y Gertner","year":"2000","unstructured":"Gertner, Y., Ishai, Y., Kushilevitz, E., Malkin, T.: Protecting data privacy in private information retrieval schemes. J. Comput. Syst. Sci. 60(3), 592\u2013629 (2000)","journal-title":"J. Comput. Syst. Sci."},{"issue":"2","key":"2732_CR3","doi-asserted-by":"publisher","first-page":"1154","DOI":"10.1103\/PhysRevA.56.1154","volume":"56","author":"HK Lo","year":"1997","unstructured":"Lo, H.K.: Insecurity of quantum secure computations. Phys. Rev. A 56(2), 1154\u20131162 (1997)","journal-title":"Phys. Rev. A"},{"issue":"23","key":"2732_CR4","doi-asserted-by":"publisher","first-page":"230502","DOI":"10.1103\/PhysRevLett.100.230502","volume":"100","author":"V Giovannetti","year":"2008","unstructured":"Giovannetti, V., Lloyd, S., Maccone, L.: Quantum private queries. Phys. Rev. Lett. 100(23), 230502 (2008)","journal-title":"Phys. Rev. Lett."},{"issue":"1","key":"2732_CR5","doi-asserted-by":"publisher","first-page":"010302","DOI":"10.1103\/PhysRevA.80.010302","volume":"80","author":"FD Martini","year":"2009","unstructured":"Martini, F.D., Giovannetti, V., Lloyd, S., Maccone, L., Nagali, E., Sansoni, L., Sciarrino, F.: Experimental quantum private queries with linear optics. Phys. Rev. A. 80(1), 010302 (2009)","journal-title":"Phys. Rev. A."},{"issue":"7","key":"2732_CR6","doi-asserted-by":"publisher","first-page":"3465","DOI":"10.1109\/TIT.2010.2048446","volume":"56","author":"V Giovannetti","year":"2010","unstructured":"Giovannetti, V., Lloyd, S., Maccone, L.: Quantum private queries: security analysis. IEEE Trans. Inf. Theory 56(7), 3465\u20133477 (2010)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"2","key":"2732_CR7","doi-asserted-by":"publisher","first-page":"022313","DOI":"10.1103\/PhysRevA.84.022313","volume":"84","author":"L Olejnik","year":"2011","unstructured":"Olejnik, L.: Secure quantum private information retrieval using phase-encoded queries. Phys. Rev. A. 84(2), 022313 (2011)","journal-title":"Phys. Rev. A."},{"issue":"2","key":"2732_CR8","doi-asserted-by":"publisher","first-page":"773","DOI":"10.1103\/PhysRevA.83.022301","volume":"83","author":"M Jakobi","year":"2011","unstructured":"Jakobi, M., Simon, C., Gisin, N., Bancal, J.D., Branciard, C., Walenta, N., Zbinden, H.: Practical private database queries based on a quantum-key-distribution protocol. Phys. Rev. A. 83(2), 773\u2013781 (2011)","journal-title":"Phys. Rev. A."},{"issue":"5","key":"2732_CR9","doi-asserted-by":"publisher","first-page":"057901","DOI":"10.1103\/PhysRevLett.92.057901","volume":"92","author":"V Scarani","year":"2004","unstructured":"Scarani, V., Acin, A., Ribordy, G., Gisin, N.: Quantum cryptography protocols robust against photon number splitting attacks for weak laser pulse implementations. Phys. Rev. Lett. 92(5), 057901 (2004)","journal-title":"Phys. Rev. Lett."},{"issue":"16","key":"2732_CR10","doi-asserted-by":"publisher","first-page":"17411","DOI":"10.1364\/OE.20.017411","volume":"20","author":"F Gao","year":"2012","unstructured":"Gao, F., Liu, B., Wen, Q.Y.: Flexible quantum private queries based on quantum key distribution. Opt. Express 20(16), 17411\u201317420 (2012)","journal-title":"Opt. Express"},{"issue":"2","key":"2732_CR11","first-page":"195","volume":"88","author":"JL Zhang","year":"2013","unstructured":"Zhang, J.L., Guo, F.Z., Gao, F., Liu, B., Wen, Q.Y.: Private database queries based on counterfactual quantum key distribution. Phys. Rev. A. 88(2), 195\u2013201 (2013)","journal-title":"Phys. Rev. A."},{"issue":"3","key":"2732_CR12","doi-asserted-by":"publisher","first-page":"1017","DOI":"10.1007\/s11128-014-0902-z","volume":"14","author":"YG Yang","year":"2014","unstructured":"Yang, Y.G., Zhang, M.O., Yang, R.: Private database queries using one state. Quant Inf. Process. 14(3), 1017\u20131024 (2014)","journal-title":"Quant Inf. Process."},{"issue":"19","key":"2732_CR13","doi-asserted-by":"publisher","first-page":"5538","DOI":"10.1016\/j.ijleo.2014.06.084","volume":"125","author":"YG Yang","year":"2014","unstructured":"Yang, Y.G., Sun, S.J., Tian, J., Xu, P.: Secure quantum private query with real-time security check. Opt. Int. J. Light Electron Opt. 125(19), 5538\u20135541 (2014)","journal-title":"Opt. Int. J. Light Electron Opt."},{"issue":"10","key":"2732_CR14","doi-asserted-by":"publisher","first-page":"100301","DOI":"10.1007\/s11433-015-5714-3","volume":"58","author":"B Liu","year":"2015","unstructured":"Liu, B., Gao, F., Huang, W., Wen, Q.Y.: QKD-based quantum private query without a failure probability. Sci. China Phys. Mech. Astron. 58(10), 100301 (2015)","journal-title":"Sci. China Phys. Mech. Astron."},{"issue":"4","key":"2732_CR15","doi-asserted-by":"publisher","first-page":"042318","DOI":"10.1103\/PhysRevA.93.042318","volume":"93","author":"CY Wei","year":"2016","unstructured":"Wei, C.Y., Wang, T.Y., Gao, F.: Practical quantum private query with better performance in resisting joint-measurement attack. Phys. Rev. A 93(4), 042318 (2016)","journal-title":"Phys. Rev. A"},{"issue":"48","key":"2732_CR16","doi-asserted-by":"publisher","first-page":"4033","DOI":"10.1016\/j.physleta.2016.10.017","volume":"380","author":"YG Yang","year":"2016","unstructured":"Yang, Y.G., Liu, Z.C., Li, J., Chen, X.B., Zuo, H.J., Zhou, Y.H., Shi, W.M.: Quantum private query with perfect user privacy against a joint-measurement attack. Phys. Lett. A 380(48), 4033\u20134038 (2016)","journal-title":"Phys. Lett. A"},{"issue":"3","key":"2732_CR17","doi-asserted-by":"publisher","first-page":"030301","DOI":"10.1088\/0256-307X\/36\/3\/030301","volume":"36","author":"M Xiao","year":"2019","unstructured":"Xiao, M., Zhang, D.F.: Practical quantum private query with classical participants. Chin. Phys. Lett. 36(3), 030301 (2019)","journal-title":"Chin. Phys. Lett."},{"issue":"7","key":"2732_CR18","doi-asserted-by":"publisher","first-page":"70301","DOI":"10.1007\/s11433-018-9324-6","volume":"62","author":"F Gao","year":"2019","unstructured":"Gao, F., Qin, S.J., Huang, W., Wen, Q.Y.: Quantum private query: a new kind of practical quantum cryptographic protocol. Sci. China Phys. Mech. Astron. 62(7), 70301 (2019)","journal-title":"Sci. China Phys. Mech. Astron."},{"issue":"5","key":"2732_CR19","doi-asserted-by":"publisher","first-page":"052307","DOI":"10.1103\/PhysRevA.69.052307","volume":"69","author":"L Xiao","year":"2004","unstructured":"Xiao, L., Long, G.L., Deng, F.G., Pan, J.W.: Efficient multiparty quantum-secret-sharing schemes. Phys. Rev. A 69(5), 052307 (2004)","journal-title":"Phys. Rev. A"},{"issue":"6","key":"2732_CR20","doi-asserted-by":"publisher","first-page":"062316","DOI":"10.1103\/PhysRevA.76.062316","volume":"76","author":"R Matsumoto","year":"2007","unstructured":"Matsumoto, R.: Multiparty quantum-key-distribution protocol without use of entanglement. Phys. Rev. A 76(6), 062316 (2007)","journal-title":"Phys. Rev. A"},{"issue":"1","key":"2732_CR21","doi-asserted-by":"publisher","first-page":"1326","DOI":"10.1038\/ncomms2268","volume":"3","author":"NHY Ng","year":"2012","unstructured":"Ng, N.H.Y., Joshi, S.K., Chen Ming, C., Kurtsiefer, C., Wehner, S.: Experimental implementation of bit commitment in the noisy-storage model. Nature Commun. 3(1), 1326 (2012)","journal-title":"Nature Commun."},{"issue":"3","key":"2732_CR22","doi-asserted-by":"publisher","first-page":"1962","DOI":"10.1109\/TIT.2011.2177772","volume":"58","author":"R Konig","year":"2012","unstructured":"Konig, R., Wehner, S., Wullschleger, J.: Unconditional security from noisy quantum storage. IEEE Trans. Inf. Theory 58(3), 1962\u20131984 (2012)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"1","key":"2732_CR23","doi-asserted-by":"publisher","first-page":"5233","DOI":"10.1038\/srep05233","volume":"4","author":"P Chan","year":"2014","unstructured":"Chan, P., Lucio-Martinez, I., Mo, X., Simon, C., Tittel, W.: Performing private database queries in a real-world environment using a quantum protocol. Sci. Rep. 4(1), 5233 (2014)","journal-title":"Sci. Rep."},{"key":"2732_CR24","doi-asserted-by":"publisher","first-page":"13251","DOI":"10.1038\/ncomms13251","volume":"7","author":"W McCutcheon","year":"2016","unstructured":"McCutcheon, W., Pappa, A., Bell, B.A., McMillan, A., Chailloux, A., Lawson, T., Tame, M.S.: Experimental verification of multipartite entanglement in quantum networks. Nature Commun. 7, 13251 (2016)","journal-title":"Nature Commun."},{"issue":"1","key":"2732_CR25","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1103\/PhysRevLett.56.58","volume":"56","author":"CK Hong","year":"1986","unstructured":"Hong, C.K., Mandel, L.: Experimental realization of a localized one-photon state. Phys. Rev. Lett. 56(1), 58\u201360 (1986)","journal-title":"Phys. Rev. Lett."},{"issue":"6775","key":"2732_CR26","doi-asserted-by":"publisher","first-page":"256","DOI":"10.1038\/35005011","volume":"404","author":"CA Sackett","year":"2000","unstructured":"Sackett, C.A., Kielpinski, D., King, B.E., Langer, C., Meyer, V., Myatt, C.J., Monroe, C.: Experimental entanglement of four particles. Nature 404(6775), 256\u2013259 (2000)","journal-title":"Nature"}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-020-02732-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11128-020-02732-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-020-02732-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,9,24]],"date-time":"2021-09-24T03:03:26Z","timestamp":1632452606000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11128-020-02732-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,7,20]]},"references-count":26,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2020,8]]}},"alternative-id":["2732"],"URL":"https:\/\/doi.org\/10.1007\/s11128-020-02732-3","relation":{},"ISSN":["1570-0755","1573-1332"],"issn-type":[{"value":"1570-0755","type":"print"},{"value":"1573-1332","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,7,20]]},"assertion":[{"value":"15 August 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 June 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 July 2020","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"253"}}