{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,27]],"date-time":"2026-04-27T13:43:46Z","timestamp":1777297426016,"version":"3.51.4"},"reference-count":40,"publisher":"Springer Science and Business Media LLC","issue":"10","license":[{"start":{"date-parts":[[2020,9,22]],"date-time":"2020-09-22T00:00:00Z","timestamp":1600732800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,9,22]],"date-time":"2020-09-22T00:00:00Z","timestamp":1600732800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100004541","name":"Ministry of Human Resource Development","doi-asserted-by":"publisher","award":["MHR-01-23-200-428"],"award-info":[{"award-number":["MHR-01-23-200-428"]}],"id":[{"id":"10.13039\/501100004541","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"published-print":{"date-parts":[[2020,10]]},"DOI":"10.1007\/s11128-020-02854-8","type":"journal-article","created":{"date-parts":[[2020,9,22]],"date-time":"2020-09-22T07:02:39Z","timestamp":1600758159000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["A novel three-party quantum secret sharing scheme based on Bell state sequential measurements with application in quantum image sharing"],"prefix":"10.1007","volume":"19","author":[{"given":"Farhan","family":"Musanna","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7728-3668","authenticated-orcid":false,"given":"Sanjeev","family":"Kumar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,9,22]]},"reference":[{"issue":"11","key":"2854_CR1","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A Shamir","year":"1979","unstructured":"Shamir, A.: How to share a secret. Commun. ACM 22(11), 612\u2013613 (1979)","journal-title":"Commun. ACM"},{"key":"2854_CR2","unstructured":"Shor, P.\u00a0W: Algorithms for quantum computation: Discrete logarithms and factoring. In Proceedings 35th Annual Symposium on Foundations of Computer Science, pp. 124\u2013134. IEEE, (1994)"},{"issue":"1907","key":"2854_CR3","first-page":"553","volume":"439","author":"D Deutsch","year":"1992","unstructured":"Deutsch, D., Jozsa, R.: Rapid solution of problems by quantum computation. Proc. Royal Soc. Lond. Ser. A Math. Phys. Sci. 439(1907), 553\u2013558 (1992)","journal-title":"Proc. Royal Soc. Lond. Ser. A Math. Phys. Sci."},{"issue":"2","key":"2854_CR4","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1103\/PhysRevLett.79.325","volume":"79","author":"LK Grover","year":"1997","unstructured":"Grover, L.K.: Quantum mechanics helps in searching for a needle in a haystack. Phys. Rev. Lett. 79(2), 325 (1997)","journal-title":"Phys. Rev. Lett."},{"issue":"3","key":"2854_CR5","doi-asserted-by":"publisher","first-page":"1844","DOI":"10.1103\/PhysRevA.54.1844","volume":"54","author":"V Bu\u017eek","year":"1996","unstructured":"Bu\u017eek, V., Hillery, M.: Quantum copying: beyond the no-cloning theorem. Phys. Rev. A 54(3), 1844 (1996)","journal-title":"Phys. Rev. A"},{"issue":"3","key":"2854_CR6","first-page":"3","volume":"9","author":"Alexander Semenovich Holevo","year":"1973","unstructured":"Alexander Semenovich Holevo: Bounds for the quantity of information transmitted by a quantum communication channel. Problemy Peredachi Informatsii 9(3), 3\u201311 (1973)","journal-title":"Problemy Peredachi Informatsii"},{"issue":"12","key":"2854_CR7","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1016\/j.tcs.2014.05.025","volume":"560","author":"CHP Bennett","year":"2014","unstructured":"Bennett, C.H.P., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. Theor. Comput. Sci. 560(12), 7\u201311 (2014)","journal-title":"Theor. Comput. Sci."},{"issue":"6","key":"2854_CR8","doi-asserted-by":"publisher","first-page":"661","DOI":"10.1103\/PhysRevLett.67.661","volume":"67","author":"AK Ekert","year":"1991","unstructured":"Ekert, A.K.: Quantum cryptography based on bell\u2019s theorem. Phys. Rev. Lett. 67(6), 661 (1991)","journal-title":"Phys. Rev. Lett."},{"issue":"21","key":"2854_CR9","doi-asserted-by":"publisher","first-page":"3121","DOI":"10.1103\/PhysRevLett.68.3121","volume":"68","author":"CH Bennett","year":"1992","unstructured":"Bennett, C.H.: Quantum cryptography using any two nonorthogonal states. Phys. Rev. Lett. 68(21), 3121 (1992)","journal-title":"Phys. Rev. Lett."},{"issue":"1","key":"2854_CR10","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1103\/PhysRevA.60.149","volume":"60","author":"M Du\u0161ek","year":"1999","unstructured":"Du\u0161ek, M., Haderka, O., Hendrych, M., My\u0161ka, R.: Quantum identification system. Phys. Rev. A 60(1), 149 (1999)","journal-title":"Phys. Rev. A"},{"issue":"18","key":"2854_CR11","doi-asserted-by":"publisher","first-page":"187902","DOI":"10.1103\/PhysRevLett.89.187902","volume":"89","author":"K Bostr\u00f6m","year":"2002","unstructured":"Bostr\u00f6m, K., Felbinger, T.: Deterministic secure direct communication using entanglement. Phys. Rev. Lett. 89(18), 187902 (2002)","journal-title":"Phys. Rev. Lett."},{"issue":"4","key":"2854_CR12","doi-asserted-by":"publisher","first-page":"042317","DOI":"10.1103\/PhysRevA.68.042317","volume":"68","author":"F-G Deng","year":"2003","unstructured":"Deng, F.-G., Long, G.L., Liu, X.-S.: Two-step quantum direct communication protocol using the einstein-podolsky-rosen pair block. Phys. Rev. A 68(4), 042317 (2003)","journal-title":"Phys. Rev. A"},{"issue":"4","key":"2854_CR13","doi-asserted-by":"publisher","first-page":"042312","DOI":"10.1103\/PhysRevA.65.042312","volume":"65","author":"G Zeng","year":"2002","unstructured":"Zeng, G., Keitel, C.H.: Arbitrated quantum-signature scheme. Phys. Rev. A 65(4), 042312 (2002)","journal-title":"Phys. Rev. A"},{"issue":"5\u20136","key":"2854_CR14","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1016\/j.physleta.2003.12.036","volume":"321","author":"H Lee","year":"2004","unstructured":"Lee, H., Hong, C., Kim, H., Lim, J., Yang, H.J.: Arbitrated quantum signature scheme with message recovery. Phys. Lett. A 321(5\u20136), 295\u2013300 (2004)","journal-title":"Phys. Lett. A"},{"issue":"5","key":"2854_CR15","doi-asserted-by":"publisher","first-page":"054307","DOI":"10.1103\/PhysRevA.79.054307","volume":"79","author":"Q Li","year":"2009","unstructured":"Li, Q., Chan, W.H., Long, D.-Y.: Arbitrated quantum signature scheme using bell states. Phys. Rev. A 79(5), 054307 (2009)","journal-title":"Phys. Rev. A"},{"issue":"3","key":"2854_CR16","doi-asserted-by":"publisher","first-page":"1829","DOI":"10.1103\/PhysRevA.59.1829","volume":"59","author":"M Hillery","year":"1999","unstructured":"Hillery, M., Bu\u017eek, V., Berthiaume, A.: Quantum secret sharing. Phys. Rev. A 59(3), 1829 (1999)","journal-title":"Phys. Rev. A"},{"key":"2854_CR17","unstructured":"Greenberger, D.M., Horne, M.A., Zeilinger, A.: Bell\u2019s theorem, quantum theory, and conceptions of the universe, (1989)"},{"issue":"1","key":"2854_CR18","doi-asserted-by":"publisher","first-page":"162","DOI":"10.1103\/PhysRevA.59.162","volume":"59","author":"A Karlsson","year":"1999","unstructured":"Karlsson, A., Koashi, M., Imoto, N.: Quantum entanglement for secret sharing and secret splitting. Phys. Rev. A 59(1), 162 (1999)","journal-title":"Phys. Rev. A"},{"issue":"5","key":"2854_CR19","doi-asserted-by":"publisher","first-page":"052307","DOI":"10.1103\/PhysRevA.69.052307","volume":"69","author":"L Xiao","year":"2004","unstructured":"Xiao, L., Long, G.L., Deng, F.-G., Pan, J.-W.: Efficient multiparty quantum-secret-sharing schemes. Phys. Rev. A 69(5), 052307 (2004)","journal-title":"Phys. Rev. A"},{"issue":"4","key":"2854_CR20","doi-asserted-by":"publisher","first-page":"044301","DOI":"10.1103\/PhysRevA.71.044301","volume":"71","author":"Z Zhang","year":"2005","unstructured":"Zhang, Z., Li, Y., Man, Z.: Multiparty quantum secret sharing. Phys. Rev. A 71(4), 044301 (2005)","journal-title":"Phys. Rev. A"},{"issue":"4","key":"2854_CR21","first-page":"247","volume":"310","author":"G-P Guo","year":"2003","unstructured":"Guo, G.-P., Guo, G.-C.: Quantum secret sharing without entanglement. Phys. Rev. A 310(4), 247\u2013251 (2003)","journal-title":"Phys. Rev. A"},{"issue":"4","key":"2854_CR22","doi-asserted-by":"publisher","first-page":"042311","DOI":"10.1103\/PhysRevA.61.042311","volume":"61","author":"D Gottesman","year":"2000","unstructured":"Gottesman, D.: Theory of quantum secret sharing. Phys. Rev. A 61(4), 042311 (2000)","journal-title":"Phys. Rev. A"},{"issue":"4","key":"2854_CR23","doi-asserted-by":"publisher","first-page":"042301","DOI":"10.1103\/PhysRevA.63.042301","volume":"63","author":"W Tittel","year":"2001","unstructured":"Tittel, W., Zbinden, H., Gisin, N.: Experimental demonstration of quantum secret sharing. Phys. Rev. A 63(4), 042301 (2001)","journal-title":"Phys. Rev. A"},{"issue":"4","key":"2854_CR24","doi-asserted-by":"publisher","first-page":"044302","DOI":"10.1103\/PhysRevA.72.044302","volume":"72","author":"F-G Deng","year":"2005","unstructured":"Deng, F.-G., Li, X.-H., Zhou, H.-Y., Zhang, Z.: Improving the security of multiparty quantum secret sharing against trojan horse attack. Phys. Rev. A 72(4), 044302 (2005)","journal-title":"Phys. Rev. A"},{"issue":"23","key":"2854_CR25","doi-asserted-by":"publisher","first-page":"230505","DOI":"10.1103\/PhysRevLett.95.230505","volume":"95","author":"C Schmid","year":"2005","unstructured":"Schmid, C., Trojek, P., Bourennane, M., Kurtsiefer, C., \u017bukowski, M., Weinfurter, H.: Experimental single qubit quantum secret sharing. Phys. Rev. Lett. 95(23), 230505 (2005)","journal-title":"Phys. Rev. Lett."},{"issue":"2","key":"2854_CR26","doi-asserted-by":"publisher","first-page":"022303","DOI":"10.1103\/PhysRevA.72.022303","volume":"72","author":"Z Zhang","year":"2005","unstructured":"Zhang, Z., Man, Z.: Multiparty quantum secret sharing of classical messages based on entanglement swapping. Phys. Rev. A 72(2), 022303 (2005)","journal-title":"Phys. Rev. A"},{"issue":"4","key":"2854_CR27","doi-asserted-by":"publisher","first-page":"042309","DOI":"10.1103\/PhysRevA.78.042309","volume":"78","author":"D Markham","year":"2008","unstructured":"Markham, D., Sanders, B.C.: Graph states for quantum secret sharing. Phys. Rev. A 78(4), 042309 (2008)","journal-title":"Phys. Rev. A"},{"issue":"2","key":"2854_CR28","doi-asserted-by":"publisher","first-page":"022306","DOI":"10.1103\/PhysRevA.68.022306","volume":"68","author":"L-Y Hsu","year":"2003","unstructured":"Hsu, L.-Y.: Quantum secret-sharing protocol based on grover\u2019s algorithm. Phys. Rev. A 68(2), 022306 (2003)","journal-title":"Phys. Rev. A"},{"issue":"10","key":"2854_CR29","doi-asserted-by":"publisher","first-page":"6659","DOI":"10.1109\/TIT.2012.2205895","volume":"58","author":"B Fortescue","year":"2012","unstructured":"Fortescue, B., Gour, G.: Reducing the quantum communication cost of quantum secret sharing. IEEE Trans. Inform. Theory 58(10), 6659\u20136666 (2012)","journal-title":"IEEE Trans. Inform. Theory"},{"issue":"2","key":"2854_CR30","doi-asserted-by":"publisher","first-page":"022305","DOI":"10.1103\/PhysRevA.92.022305","volume":"92","author":"A Maitra","year":"2015","unstructured":"Maitra, A., De, S.J., Paul, G., Pal, A.K.: Proposal for quantum rational secret sharing. Phys. Rev. A 92(2), 022305 (2015)","journal-title":"Phys. Rev. A"},{"issue":"3","key":"2854_CR31","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/JSTQE.2020.2975600","volume":"26","author":"H Qin","year":"2020","unstructured":"Qin, H., Tang, W.K.S., Tso, R.: Hierarchical quantum secret sharing based on special high-dimensional entangled state. IEEE J. Selected Topics Quant. Electron. 26(3), 1\u20136 (2020)","journal-title":"IEEE J. Selected Topics Quant. Electron."},{"issue":"7","key":"2854_CR32","doi-asserted-by":"publisher","first-page":"2465","DOI":"10.1007\/s11128-013-0534-8","volume":"12","author":"W Yang","year":"2013","unstructured":"Yang, W., Huang, L., Shi, R., He, L.: Secret sharing based on quantum fourier transform. Quant. Inform. Process. 12(7), 2465\u20132474 (2013)","journal-title":"Quant. Inform. Process."},{"issue":"3","key":"2854_CR33","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1007\/s11128-018-1827-8","volume":"17","author":"H Qin","year":"2018","unstructured":"Qin, H., Tso, R., Dai, Y.: Multi-dimensional quantum state sharing based on quantum fourier transform. Quant. Inform. Process. 17(3), 48 (2018)","journal-title":"Quant. Inform. Process."},{"issue":"6","key":"2854_CR34","doi-asserted-by":"publisher","first-page":"2075","DOI":"10.1007\/s10773-012-1481-3","volume":"52","author":"H Xiao","year":"2013","unstructured":"Xiao, H., Gao, J.: Multi-party d-level quantum secret sharing scheme. Int. J. Theor. Phys. 52(6), 2075\u20132082 (2013)","journal-title":"Int. J. Theor. Phys."},{"issue":"1","key":"2854_CR35","doi-asserted-by":"publisher","first-page":"6366","DOI":"10.1038\/s41598-017-06486-4","volume":"7","author":"X-L Song","year":"2017","unstructured":"Song, X.-L., Liu, Y.-B., Deng, H.-Y., Xiao, Y.-G.: (t, n) threshold d-level quantum secret sharing. Sci. Rep. 7(1), 6366 (2017)","journal-title":"Sci. Rep."},{"issue":"4","key":"2854_CR36","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1007\/s11128-019-2233-6","volume":"18","author":"S Mashhadi","year":"2019","unstructured":"Mashhadi, S.: General secret sharing based on quantum fourier transform. Quant. Inform. Process. 18(4), 114 (2019)","journal-title":"Quant. Inform. Process."},{"key":"2854_CR37","unstructured":"IBM quantum\u00a0computing platform. https:\/\/www.ibm.com\/quantum-computing\/"},{"issue":"5","key":"2854_CR38","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1016\/j.ipl.2016.01.005","volume":"116","author":"H Qin","year":"2016","unstructured":"Qin, H., Dai, Y.: Verifiable (t, n) threshold quantum secret sharing using d-dimensional bell state. Inform. Process. Lett. 116(5), 351\u2013355 (2016)","journal-title":"Inform. Process. Lett."},{"issue":"4","key":"2854_CR39","doi-asserted-by":"publisher","first-page":"1689","DOI":"10.1007\/s11128-015-1221-8","volume":"15","author":"H Qin","year":"2016","unstructured":"Qin, H., Dai, Y.: d-dimensional quantum state sharing with adversary structure. Quant. Inform. Process. 15(4), 1689\u20131701 (2016)","journal-title":"Quant. Inform. Process."},{"issue":"8","key":"2854_CR40","doi-asserted-by":"publisher","first-page":"2833","DOI":"10.1007\/s11128-013-0567-z","volume":"12","author":"Y Zhang","year":"2013","unstructured":"Zhang, Y., Kai, L., Gao, Y., Wang, M.: Neqr: a novel enhanced quantum representation of digital images. Quant. Inform. Process. 12(8), 2833\u20132860 (2013)","journal-title":"Quant. Inform. Process."}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-020-02854-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11128-020-02854-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-020-02854-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,9,22]],"date-time":"2021-09-22T01:00:07Z","timestamp":1632272407000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11128-020-02854-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,9,22]]},"references-count":40,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2020,10]]}},"alternative-id":["2854"],"URL":"https:\/\/doi.org\/10.1007\/s11128-020-02854-8","relation":{},"ISSN":["1570-0755","1573-1332"],"issn-type":[{"value":"1570-0755","type":"print"},{"value":"1573-1332","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,9,22]]},"assertion":[{"value":"5 June 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 September 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 September 2020","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"348"}}