{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,17]],"date-time":"2026-03-17T08:15:07Z","timestamp":1773735307513,"version":"3.50.1"},"reference-count":32,"publisher":"Springer Science and Business Media LLC","issue":"9","license":[{"start":{"date-parts":[[2020,9,1]],"date-time":"2020-09-01T00:00:00Z","timestamp":1598918400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,9,1]],"date-time":"2020-09-01T00:00:00Z","timestamp":1598918400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61772098"],"award-info":[{"award-number":["61772098"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"published-print":{"date-parts":[[2020,9]]},"DOI":"10.1007\/s11128-020-02846-8","type":"journal-article","created":{"date-parts":[[2020,9,12]],"date-time":"2020-09-12T08:04:21Z","timestamp":1599897861000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["A verifiable (t, n) threshold quantum state sharing scheme on IBM quantum cloud platform"],"prefix":"10.1007","volume":"19","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2387-2074","authenticated-orcid":false,"given":"Xiuli","family":"Song","sequence":"first","affiliation":[]},{"given":"Yanbing","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Min","family":"Xiao","sequence":"additional","affiliation":[]},{"given":"Hongyao","family":"Deng","sequence":"additional","affiliation":[]},{"given":"Shuai","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,9,12]]},"reference":[{"key":"2846_CR1","doi-asserted-by":"crossref","first-page":"1829","DOI":"10.1103\/PhysRevA.59.1829","volume":"59","author":"M Hillery","year":"1999","unstructured":"Hillery, M., Buzek, V., Berthiaume, A.: Quantum secret sharing. Phys. Rev. A 59, 1829\u20131834 (1999)","journal-title":"Phys. Rev. A"},{"key":"2846_CR2","doi-asserted-by":"crossref","first-page":"14089","DOI":"10.1088\/0305-4470\/39\/45\/018","volume":"39","author":"F Deng","year":"2006","unstructured":"Deng, F., Zhou, H., Long, G.: Circular quantum secret sharing. J. Phys. A General Phys. 39, 14089\u201314099 (2006)","journal-title":"J. Phys. A General Phys."},{"issue":"22","key":"2846_CR3","doi-asserted-by":"crossref","first-page":"4455","DOI":"10.1016\/j.optcom.2009.07.053","volume":"282","author":"S Lin","year":"2009","unstructured":"Lin, S., Wen, Q.Y., Qin, S.J., Zhu, F.C.: Multiparty quantum secret sharing with collective eavesdropping-check. Opt. Commun. 282(22), 4455\u20134459 (2009)","journal-title":"Opt. Commun."},{"issue":"1","key":"2846_CR4","doi-asserted-by":"crossref","first-page":"685","DOI":"10.1007\/s11128-012-0413-8","volume":"12","author":"J Lin","year":"2013","unstructured":"Lin, J., Hwang, T.: New circular quantum secret sharing for remote agents. Quantum Inf. Process. 12(1), 685\u2013697 (2013)","journal-title":"Quantum Inf. Process."},{"key":"2846_CR5","doi-asserted-by":"crossref","first-page":"030302","DOI":"10.1103\/PhysRevA.92.030302","volume":"92","author":"A Tavakoli","year":"2015","unstructured":"Tavakoli, A., Herbauts, I., Zukowski, M., Bourennane, M.: Secret sharing with a single d-level quantum system. Phys. Rev. A 92, 030302 (2015)","journal-title":"Phys. Rev. A"},{"issue":"3","key":"2846_CR6","doi-asserted-by":"crossref","first-page":"030301","DOI":"10.1103\/PhysRevA.92.030301","volume":"92","author":"V Karimipour","year":"2015","unstructured":"Karimipour, V., Asoudeh, M.: Quantum secret sharing and random hopping: using single states instead of entanglement. Phys. Rev. A 92(3), 030301 (2015)","journal-title":"Phys. Rev. A"},{"key":"2846_CR7","doi-asserted-by":"crossref","first-page":"159","DOI":"10.1016\/j.optcom.2013.06.014","volume":"308","author":"YT Du","year":"2013","unstructured":"Du, Y.T., Bao, W.S.: Multiparty quantum secret sharing scheme based on the phase shift operations. Opt. Commun. 308, 159\u2013163 (2013)","journal-title":"Opt. Commun."},{"issue":"4","key":"2846_CR8","first-page":"102","volume":"86","author":"P Sarvepalli","year":"2012","unstructured":"Sarvepalli, P.: Non-threshold quantum secret sharing schemes in the graph state formalism. Phys. Rev. A 86(4), 102\u2013110 (2012)","journal-title":"Phys. Rev. A"},{"issue":"5","key":"2846_CR9","doi-asserted-by":"crossref","first-page":"1730","DOI":"10.1007\/s10773-013-1971-y","volume":"53","author":"F Liu","year":"2014","unstructured":"Liu, F., Su, Q., Wen, Q.Y.: Eavesdropping on multiparty quantum secret sharing scheme based on the phase shift operations. Int. J. Theor. Phys. 53(5), 1730\u20131737 (2014)","journal-title":"Int. J. Theor. Phys."},{"issue":"5","key":"2846_CR10","doi-asserted-by":"crossref","first-page":"513","DOI":"10.1088\/0253-6102\/69\/5\/513","volume":"69","author":"CM Bai","year":"2018","unstructured":"Bai, C.M., Li, Z.H., Li, Y.M.: Sequential quantum secret sharing using a single qudit. Commun. Theor. Phys. 69(5), 513 (2018)","journal-title":"Commun. Theor. Phys."},{"issue":"3","key":"2846_CR11","doi-asserted-by":"crossref","first-page":"648","DOI":"10.1103\/PhysRevLett.83.648","volume":"83","author":"R Cleve","year":"1999","unstructured":"Cleve, R., Gottesman, D., Lo, H.: How to share a quantum secret. Phys. Rev. Lett. 83(3), 648\u2013651 (1999)","journal-title":"Phys. Rev. Lett."},{"issue":"4","key":"2846_CR12","first-page":"144","volume":"78","author":"D Markham","year":"2012","unstructured":"Markham, D., Sanders, B.C.: Graph states for quantum secret sharing. Phys. Rev. A 78(4), 144\u2013162 (2012)","journal-title":"Phys. Rev. A"},{"issue":"1","key":"2846_CR13","first-page":"21","volume":"26","author":"B Li","year":"2009","unstructured":"Li, B., Yang, Y., Wen, Q.: Threshold quantum secret sharing of secure direct communication. Chin. Phys. Lett. 26(1), 21\u201324 (2009)","journal-title":"Chin. Phys. Lett."},{"issue":"2","key":"2846_CR14","doi-asserted-by":"crossref","first-page":"022321","DOI":"10.1103\/PhysRevA.80.022321","volume":"80","author":"PK Sarvepalli","year":"2009","unstructured":"Sarvepalli, P.K., Klappenecker, A.: Sharing classical secrets with Calderbank\u2013Shor\u2013Steane codes. Phys. Rev. A 80(2), 022321 (2009)","journal-title":"Phys. Rev. A"},{"issue":"6","key":"2846_CR15","doi-asserted-by":"crossref","first-page":"062315","DOI":"10.1103\/PhysRevA.82.062315","volume":"82","author":"A Keet","year":"2010","unstructured":"Keet, A., Fortescue, B., Markham, D., Sanders, B.C.: Quantum secret sharing with qudit graph states. Phys. Rev. A 82(6), 062315 (2010)","journal-title":"Phys. Rev. A"},{"issue":"11","key":"2846_CR16","doi-asserted-by":"crossref","first-page":"661","DOI":"10.1088\/0253-6102\/58\/5\/09","volume":"58","author":"A Mouzali","year":"2012","unstructured":"Mouzali, A., Merazka, F., Markham, D.: Quantum secret sharing with error correction. Commun. Theor. Phys. 58(11), 661\u2013671 (2012)","journal-title":"Commun. Theor. Phys."},{"issue":"2","key":"2846_CR17","doi-asserted-by":"crossref","first-page":"1299","DOI":"10.1007\/s11128-012-0471-y","volume":"12","author":"MH Dehkordi","year":"2013","unstructured":"Dehkordi, M.H., Fattahi, E.: Threshold quantum secret sharing between multiparty and multiparty using Greenberger\u2013Horne\u2013Zeilinger state. Quantum Inf. Process. 12(2), 1299\u20131306 (2013)","journal-title":"Quantum Inf. Process."},{"issue":"1","key":"2846_CR18","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1007\/s11128-013-0716-4","volume":"13","author":"RK Chen","year":"2014","unstructured":"Chen, R.K., Zhang, Y.Y., Shi, J.H., et al.: A multiparty error-correcting method for quantum secret sharing. Quantum Inf. Process. 13(1), 21\u201331 (2014)","journal-title":"Quantum Inf. Process."},{"key":"2846_CR19","doi-asserted-by":"crossref","first-page":"31350","DOI":"10.1038\/srep31350","volume":"6","author":"L Hong","year":"2016","unstructured":"Hong, L., Zhang, J., Luo, M.X., et al.: Hybrid threshold adaptable quantum secret sharing scheme with reverse Huffman-Fibonacci-tree coding. Sci. Rep. 6, 31350 (2016)","journal-title":"Sci. Rep."},{"issue":"12","key":"2846_CR20","doi-asserted-by":"crossref","first-page":"304","DOI":"10.1007\/s11128-017-1739-z","volume":"16","author":"CM Bai","year":"2017","unstructured":"Bai, C.M., Li, Z.H., Liu, C.J., et al.: Quantum secret sharing using orthogonal multiqudit entangled states. Quantum Inf. Process. 16(12), 304 (2017)","journal-title":"Quantum Inf. Process."},{"issue":"8","key":"2846_CR21","doi-asserted-by":"crossref","first-page":"2997","DOI":"10.1007\/s11128-015-1037-6","volume":"14","author":"H Qin","year":"2015","unstructured":"Qin, H., Zhu, X., Dai, Y.: (t, n) Threshold quantum secret sharing using the phase shift operation. Quantum Inf. Process. 14(8), 2997\u20133004 (2015)","journal-title":"Quantum Inf. Process."},{"issue":"6","key":"2846_CR22","doi-asserted-by":"crossref","first-page":"142","DOI":"10.1007\/s11128-018-1912-z","volume":"17","author":"H Qin","year":"2018","unstructured":"Qin, H., Tso, R.: Threshold quantum state sharing based on entanglement swapping. Quantum Inf. Process. 17(6), 142 (2018)","journal-title":"Quantum Inf. Process."},{"issue":"1","key":"2846_CR23","first-page":"7600207","volume":"9","author":"H Cao","year":"2017","unstructured":"Cao, H., Ma, W.: (t, n) threshold quantum state sharing scheme based on linear equations and unitary operation. IEEE Photonics J. 9(1), 7600207 (2017)","journal-title":"IEEE Photonics J."},{"key":"2846_CR24","doi-asserted-by":"crossref","unstructured":"Benor, M., Crepeau, C., Gottesman, D., et al.: Secure multiparty quantum computation with (only) a strict honest majority. In: Proceedings of IEEE Symposium on Foundations of Computer Science, pp. 249\u2013260. IEEE Computer Society (2006)","DOI":"10.1109\/FOCS.2006.68"},{"key":"2846_CR25","doi-asserted-by":"crossref","first-page":"10453","DOI":"10.1109\/ACCESS.2018.2805724","volume":"6","author":"H Cao","year":"2018","unstructured":"Cao, H., Ma, W.P.: Verifiable threshold quantum state sharing scheme. IEEE Access 6, 10453\u201310457 (2018)","journal-title":"IEEE Access"},{"issue":"11","key":"2846_CR26","doi-asserted-by":"crossref","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A Shamir","year":"1979","unstructured":"Shamir, A.: How to share a secret. Commun. ACM 22(11), 612\u2013613 (1979)","journal-title":"Commun. ACM"},{"key":"2846_CR27","volume-title":"Quantum Computation and Quantum Information: 10th Anniversary Edition","author":"M Nielsen","year":"2011","unstructured":"Nielsen, M., Chuang, I.: Quantum Computation and Quantum Information: 10th Anniversary Edition. Cambridge University Press, Cambridge (2011)"},{"key":"2846_CR28","unstructured":"Aos,V., Baerdemacker, S.: From reversible computation to quantum computation by Lagrange interpolation. Mathematics 1\u201315 (2015)"},{"issue":"4","key":"2846_CR29","doi-asserted-by":"crossref","first-page":"044302","DOI":"10.1103\/PhysRevA.72.044302","volume":"72","author":"FG Deng","year":"2005","unstructured":"Deng, F.G., Li, X.H., Zhou, H.Y., Zhang, Z.J.: Improving the security of multiparty quantum secret sharing against Trojan horse attack. Phys. Rev. A 72(4), 044302 (2005)","journal-title":"Phys. Rev. A"},{"issue":"1\u20132","key":"2846_CR30","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1016\/j.physleta.2005.10.050","volume":"351","author":"QY Cai","year":"2006","unstructured":"Cai, Q.Y.: Eavesdropping on the two-way quantum communication protocols with invisible photons. Phys. Lett. A 351(1\u20132), 23\u201325 (2006)","journal-title":"Phys. Lett. A"},{"issue":"4","key":"2846_CR31","doi-asserted-by":"crossref","first-page":"042317","DOI":"10.1103\/PhysRevA.68.042317","volume":"68","author":"FG Deng","year":"2003","unstructured":"Deng, F.G., Long, G.L., Liu, XSh: Two-step quantum direct communication protocol using the Einstein\u2013Podolsky\u2013Rosen pair block. Phys. Rev. A 68(4), 042317 (2003)","journal-title":"Phys. Rev. A"},{"key":"2846_CR32","unstructured":"Deng, F.G., Long, G. L.: Quantum privacy amplification for quantum secure direct communication. e-print quant-ph\/0408102 (2004)"}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-020-02846-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11128-020-02846-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-020-02846-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,9,12]],"date-time":"2021-09-12T00:08:00Z","timestamp":1631405280000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11128-020-02846-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,9]]},"references-count":32,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2020,9]]}},"alternative-id":["2846"],"URL":"https:\/\/doi.org\/10.1007\/s11128-020-02846-8","relation":{},"ISSN":["1570-0755","1573-1332"],"issn-type":[{"value":"1570-0755","type":"print"},{"value":"1573-1332","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,9]]},"assertion":[{"value":"5 August 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 August 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 September 2020","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"337"}}