{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,28]],"date-time":"2026-03-28T00:52:10Z","timestamp":1774659130825,"version":"3.50.1"},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"10","license":[{"start":{"date-parts":[[2020,10,1]],"date-time":"2020-10-01T00:00:00Z","timestamp":1601510400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,10,1]],"date-time":"2020-10-01T00:00:00Z","timestamp":1601510400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"name":"National Key research and development Program of China","award":["2017YFB0802703"],"award-info":[{"award-number":["2017YFB0802703"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61671087"],"award-info":[{"award-number":["61671087"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61272514"],"award-info":[{"award-number":["61272514"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61170272"],"award-info":[{"award-number":["61170272"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61003287"],"award-info":[{"award-number":["61003287"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U1836205"],"award-info":[{"award-number":["U1836205"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004806","name":"Fok Ying Tong Education Foundation","doi-asserted-by":"publisher","award":["131067"],"award-info":[{"award-number":["131067"]}],"id":[{"id":"10.13039\/501100004806","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100018533","name":"Major Scientific and Technological Special Project of Guizhou Province","doi-asserted-by":"crossref","award":["20183001"],"award-info":[{"award-number":["20183001"]}],"id":[{"id":"10.13039\/501100018533","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Foundation of Guizhou Provincial Key Laboratory of Public Big Data","award":["2018BDKFJJ016"],"award-info":[{"award-number":["2018BDKFJJ016"]}]},{"name":"Foundation of Guizhou Provincial Key Laboratory of Public Big Data","award":["2019BDKFJJ014"],"award-info":[{"award-number":["2019BDKFJJ014"]}]},{"name":"Foundation of State Key Laboratory of Public Big Data","award":["2018BDKFJJ018"],"award-info":[{"award-number":["2018BDKFJJ018"]}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["2019XD-A02"],"award-info":[{"award-number":["2019XD-A02"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["2020RC38"],"award-info":[{"award-number":["2020RC38"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]},{"name":"CCF-Tencent Open Fund WeBank Special Funding","award":["CCF-WebankRAGR20180104"],"award-info":[{"award-number":["CCF-WebankRAGR20180104"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"published-print":{"date-parts":[[2020,10]]},"DOI":"10.1007\/s11128-020-02809-z","type":"journal-article","created":{"date-parts":[[2020,10,1]],"date-time":"2020-10-01T08:04:12Z","timestamp":1601539452000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Searching for optimal quantum secret sharing scheme based on local distinguishability"],"prefix":"10.1007","volume":"19","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2995-7186","authenticated-orcid":false,"given":"Zhao","family":"Dou","sequence":"first","affiliation":[]},{"given":"Gang","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Xiu-Bo","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Xin-Xin","family":"Niu","sequence":"additional","affiliation":[]},{"given":"Yi-Xian","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Yu","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,10,1]]},"reference":[{"key":"2809_CR1","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A Shamir","year":"1979","unstructured":"Shamir, A.: How to share a secret. Commun. ACM 22, 612\u2013613 (1979)","journal-title":"Commun. ACM"},{"key":"2809_CR2","doi-asserted-by":"crossref","unstructured":"Blakley, G. R.: Safeguarding cryptographic keys. In: 1979 International Workshop on Managing Requirements Knowledge (MARK), pp. 313\u2013317. IEEE, Montvale (1979)","DOI":"10.1109\/MARK.1979.8817296"},{"key":"2809_CR3","unstructured":"Bennett, C. Brassard, G.: Quantum cryptography: Public key distribution and coin tossing. In: Conf. on Computers, Systems and Signal Processing, pp. 175\u2013179. IEEE, Bangalore (1984)"},{"key":"2809_CR4","doi-asserted-by":"publisher","first-page":"1829","DOI":"10.1103\/PhysRevA.59.1829","volume":"59","author":"M Hillery","year":"1999","unstructured":"Hillery, M., Bu\u017eek, V., Berthiaume, A.: Quantum secret sharing. Phys. Rev. A 59, 1829 (1999)","journal-title":"Phys. Rev. A"},{"key":"2809_CR5","doi-asserted-by":"publisher","first-page":"648","DOI":"10.1103\/PhysRevLett.83.648","volume":"83","author":"R Cleve","year":"1999","unstructured":"Cleve, R., Gottesman, D., Lo, H.K.: How to share a quantum secret. Phys. Rev. Lett. 83, 648 (1999)","journal-title":"Phys. Rev. Lett."},{"key":"2809_CR6","doi-asserted-by":"publisher","first-page":"012328","DOI":"10.1103\/PhysRevA.71.012328","volume":"71","author":"SK Singh","year":"2005","unstructured":"Singh, S.K., Srikanth, R.: Generalized quantum secret sharing. Phys. Rev. A 71, 012328 (2005)","journal-title":"Phys. Rev. A"},{"key":"2809_CR7","doi-asserted-by":"publisher","first-page":"6659","DOI":"10.1109\/TIT.2012.2205895","volume":"58","author":"B Fortescue","year":"2012","unstructured":"Fortescue, B., Gour, G.: Reducing the quantum communication cost of quantum secret sharing. IEEE T. Inform. Theory 58, 6659\u20136666 (2012)","journal-title":"IEEE T. Inform. Theory"},{"key":"2809_CR8","first-page":"2","volume":"14","author":"H Pilaram","year":"2015","unstructured":"Pilaram, H., Eghlidos, T.: An efficient lattice based multi-stage secret sharing scheme. IEEE Trans. Depend Secure 14, 2\u20138 (2015)","journal-title":"IEEE Trans. Depend Secure"},{"key":"2809_CR9","doi-asserted-by":"publisher","first-page":"030302","DOI":"10.1103\/PhysRevA.92.030302","volume":"92","author":"A Tavakoli","year":"2015","unstructured":"Tavakoli, A., Herbauts, I., \u017bukowski, M., Bourennane, M.: Secret sharing with a single d-level quantum system. Phys. Rev. A 92, 030302 (2015)","journal-title":"Phys. Rev. A"},{"key":"2809_CR10","doi-asserted-by":"publisher","first-page":"030301","DOI":"10.1103\/PhysRevA.92.030301","volume":"92","author":"V Karimipour","year":"2015","unstructured":"Karimipour, V., Asoudeh, M.: Quantum secret sharing and random hopping: using single states instead of entanglement. Phys. Rev. A 92, 030301 (2015)","journal-title":"Phys. Rev. A"},{"key":"2809_CR11","doi-asserted-by":"publisher","first-page":"042309","DOI":"10.1103\/PhysRevA.78.042309","volume":"78","author":"D Markham","year":"2008","unstructured":"Markham, D., Sanders, B.C.: Graph states for quantum secret sharing. Phys. Rev. A 78, 042309 (2008)","journal-title":"Phys. Rev. A"},{"key":"2809_CR12","doi-asserted-by":"publisher","first-page":"230505","DOI":"10.1103\/PhysRevLett.95.230505","volume":"95","author":"C Schmid","year":"2005","unstructured":"Schmid, C., Trojek, P., Bourennane, M., Kurtsiefer, C., \u017bukowski, M., Weinfurter, H.: Experimental single qubit quantum secret sharing. Phys. Rev. Lett. 95, 230505 (2005)","journal-title":"Phys. Rev. Lett."},{"key":"2809_CR13","doi-asserted-by":"publisher","first-page":"200502","DOI":"10.1103\/PhysRevLett.95.200502","volume":"95","author":"YA Chen","year":"2005","unstructured":"Chen, Y.A., Zhang, A.N., Zhao, Z., Zhou, X.Q., Lu, C.Y., Peng, C.Z., Yang, T., Pan, J.W.: Experimental quantum secret sharing and third-man quantum cryptography. Phys. Rev. Lett. 95, 200502 (2005)","journal-title":"Phys. Rev. Lett."},{"key":"2809_CR14","doi-asserted-by":"publisher","first-page":"030501","DOI":"10.1103\/PhysRevLett.117.030501","volume":"117","author":"H Lu","year":"2016","unstructured":"Lu, H., Zhang, Z., Chen, L.K., Li, Z.D., Liu, C., Li, L., Liu, L.L., Ma, X.F., Chen, Y.A., Pan, J.W.: Secret sharing of a quantum state. Phys. Rev. Lett. 117, 030501 (2016)","journal-title":"Phys. Rev. Lett."},{"key":"2809_CR15","doi-asserted-by":"publisher","first-page":"042313","DOI":"10.1103\/PhysRevA.88.042313","volume":"88","author":"HK Lau","year":"2013","unstructured":"Lau, H.K., Weedbrook, C.: Quantum secret sharing with continuous-variable cluster states. Phys. Rev. A 88, 042313 (2013)","journal-title":"Phys. Rev. A"},{"key":"2809_CR16","doi-asserted-by":"publisher","first-page":"012315","DOI":"10.1103\/PhysRevA.95.012315","volume":"95","author":"I Kogias","year":"2017","unstructured":"Kogias, I., Xiang, Y., He, Q., Adesso, G.: Unconditional security of entanglement-based continuous-variable quantum secret sharing. Phys. Rev. A 95, 012315 (2017)","journal-title":"Phys. Rev. A"},{"key":"2809_CR17","first-page":"1","volume":"9","author":"H Cao","year":"2017","unstructured":"Cao, H., Ma, W.P.: (t, n) threshold quantum state sharing scheme based on linear equations and unitary operation. IEEE Photonics J. 9, 1\u20137 (2017)","journal-title":"IEEE Photonics J."},{"key":"2809_CR18","doi-asserted-by":"publisher","first-page":"310","DOI":"10.1007\/s11128-018-2059-7","volume":"17","author":"C Lu","year":"2018","unstructured":"Lu, C., Miao, F., Hou, J., Meng, K.: Verifiable threshold quantum secret sharing with sequential communication. Quantum Inf. Process. 17, 310 (2018)","journal-title":"Quantum Inf. Process."},{"key":"2809_CR19","doi-asserted-by":"crossref","unstructured":"Song, X.L., Liu, Y.B., Deng, H.Y., Xiao, Y.G.: (t, n) threshold d-level quantum secret sharing. Sci. Rep.-UK 7, 6366 (2017)","DOI":"10.1038\/s41598-017-06486-4"},{"key":"2809_CR20","doi-asserted-by":"publisher","first-page":"1650138","DOI":"10.1142\/S0217984916501384","volume":"30","author":"H Qin","year":"2016","unstructured":"Qin, H., Dai, Y.: An efficient (t, n) threshold quantum secret sharing without entanglement. Mod. Phys. Lett. B 30, 1650138 (2016)","journal-title":"Mod. Phys. Lett. B"},{"key":"2809_CR21","doi-asserted-by":"crossref","unstructured":"Lai, H., Zhang, J., Luo, M. X., Pan, L., Pieprzyk, J., Xiao, F., Orgun, M. A.: Hybrid threshold adaptable quantum secret sharing scheme with reverse Huffman-Fibonacci-tree coding. Sci. Rep.-UK 6, 31350 (2016)","DOI":"10.1038\/srep31350"},{"key":"2809_CR22","doi-asserted-by":"publisher","first-page":"022330","DOI":"10.1103\/PhysRevA.91.022330","volume":"91","author":"R Rahaman","year":"2015","unstructured":"Rahaman, R., Parker, M.G.: Quantum scheme for secret sharing based on local distinguishability. Phys. Rev. A 91, 022330 (2015)","journal-title":"Phys. Rev. A"},{"key":"2809_CR23","doi-asserted-by":"crossref","unstructured":"Yang, Y.H., Gao, F., Wu, X., Qin, S.J., Zuo, H.J., Wen, Q.Y.: Quantum secret sharing via local operations and classical communication. Sci. Rep.-UK 5, 16967 (2015)","DOI":"10.1038\/srep16967"},{"key":"2809_CR24","doi-asserted-by":"publisher","first-page":"022320","DOI":"10.1103\/PhysRevA.95.022320","volume":"95","author":"J Wang","year":"2017","unstructured":"Wang, J., Li, L., Peng, H., Yang, Y.: Quantum-secret-sharing scheme based on local distinguishability of orthogonal multiqudit entangled states. Phys. Rev. A 95, 022320 (2017)","journal-title":"Phys. Rev. A"},{"key":"2809_CR25","doi-asserted-by":"publisher","first-page":"304","DOI":"10.1007\/s11128-017-1739-z","volume":"16","author":"CM Bai","year":"2017","unstructured":"Bai, C.M., Li, Z.H., Liu, C.J., Li, Y.M.: Quantum secret sharing using orthogonal multiqudit entangled states. Quantum Inf. Process. 16, 304 (2017)","journal-title":"Quantum Inf. Process."},{"key":"2809_CR26","doi-asserted-by":"publisher","first-page":"428","DOI":"10.1007\/s10773-017-3574-5","volume":"57","author":"CJ Liu","year":"2018","unstructured":"Liu, C.J., Li, Z.H., Bai, C.M., Si, M.M.: Quantum-Secret-Sharing Scheme based on local distinguishability of orthogonal Seven-Qudit entangled states. Int. J. Theor. Phys. 57, 428\u2013442 (2018)","journal-title":"Int. J. Theor. Phys."},{"key":"2809_CR27","doi-asserted-by":"publisher","first-page":"083001","DOI":"10.1088\/1751-8113\/48\/8\/083001","volume":"48","author":"J Bae","year":"2015","unstructured":"Bae, J., Kwek, L.C.: Quantum state discrimination and its applications. J. Phys. A-Math. Theor. 48, 083001 (2015)","journal-title":"J. Phys. A-Math. Theor."},{"key":"2809_CR28","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1112\/plms\/s2-17.1.75","volume":"2","author":"GH Hardy","year":"1918","unstructured":"Hardy, G.H., Ramanujan, S.: Asymptotic formula\u00e6 in combinatory analysis. P. Lond. Math. Soc. 2, 75\u2013115 (1918)","journal-title":"P. Lond. Math. Soc."}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-020-02809-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11128-020-02809-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-020-02809-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,1]],"date-time":"2021-10-01T02:04:45Z","timestamp":1633053885000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11128-020-02809-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10]]},"references-count":28,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2020,10]]}},"alternative-id":["2809"],"URL":"https:\/\/doi.org\/10.1007\/s11128-020-02809-z","relation":{},"ISSN":["1570-0755","1573-1332"],"issn-type":[{"value":"1570-0755","type":"print"},{"value":"1573-1332","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,10]]},"assertion":[{"value":"11 April 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 August 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 October 2020","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"368"}}