{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,8]],"date-time":"2025-10-08T16:42:15Z","timestamp":1759941735561,"version":"3.37.3"},"reference-count":30,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61602232","61572246"],"award-info":[{"award-number":["61602232","61572246"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["6190216"],"award-info":[{"award-number":["6190216"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"published-print":{"date-parts":[[2021,1]]},"DOI":"10.1007\/s11128-020-02916-x","type":"journal-article","created":{"date-parts":[[2021,1,6]],"date-time":"2021-01-06T07:03:09Z","timestamp":1609916589000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["Analysis of efficient and secure dynamic quantum secret sharing protocol based on Bell states"],"prefix":"10.1007","volume":"20","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6237-4364","authenticated-orcid":false,"given":"Tian-Yin","family":"Wang","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Xiao-Xuan","family":"Wang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Xiao-Qiu","family":"Cai","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Chun-Yan","family":"Wei","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Rui-Ling","family":"Zhang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2021,1,6]]},"reference":[{"issue":"3","key":"2916_CR1","doi-asserted-by":"publisher","first-page":"1829","DOI":"10.1103\/PhysRevA.59.1829","volume":"59","author":"M Hillery","year":"1999","unstructured":"Hillery, M., Bu\u017eek, V., Berthiaume, A.: Quantum secret sharing. Phys. Rev. A 59(3), 1829\u20131834 (1999)","journal-title":"Phys. Rev. A"},{"issue":"11","key":"2916_CR2","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A Shamir","year":"1979","unstructured":"Shamir, A.: How to shair a secret. Commun. ACM 22(11), 612\u2013613 (1979)","journal-title":"Commun. ACM"},{"issue":"5","key":"2916_CR3","doi-asserted-by":"publisher","first-page":"052307","DOI":"10.1103\/PhysRevA.69.052307","volume":"69","author":"L Xiao","year":"2004","unstructured":"Xiao, L., Long, G.L., Deng, F.G., et al.: Efficient multiparty quantum-secret-sharing schemes. Phys. Rev. A 69(5), 052307 (2004)","journal-title":"Phys. Rev. A"},{"issue":"23","key":"2916_CR4","doi-asserted-by":"publisher","first-page":"230505","DOI":"10.1103\/PhysRevLett.95.230505","volume":"95","author":"C Schmid","year":"2005","unstructured":"Schmid, C., Trojek, P., Bourennane, M., et al.: Experimental single qubit quantum secret sharing. Phys. Rev. Lett. 95(23), 230505 (2005)","journal-title":"Phys. Rev. Lett."},{"issue":"6","key":"2916_CR5","doi-asserted-by":"publisher","first-page":"062324","DOI":"10.1103\/PhysRevA.76.062324","volume":"76","author":"SJ Qin","year":"2007","unstructured":"Qin, S.J., Gao, F., Wen, Q.Y., et al.: Cryptanalysis of the Hillery\u2013Bu\u017eek\u2013Berthiaume quantum secret sharing protocol. Phys. Rev. A 76(6), 062324 (2007)","journal-title":"Phys. Rev. A"},{"issue":"24","key":"2916_CR6","doi-asserted-by":"publisher","first-page":"6130","DOI":"10.1016\/j.optcom.2008.09.026","volume":"281","author":"TY Wang","year":"2008","unstructured":"Wang, T.Y., Wen, Q.Y., Chen, X.B., et al.: An efficient and secure multiparty quantum secret sharing scheme based on single photons. Opt. Commun. 281(24), 6130\u20136134 (2008)","journal-title":"Opt. Commun."},{"issue":"17","key":"2916_CR7","doi-asserted-by":"publisher","first-page":"3647","DOI":"10.1016\/j.optcom.2009.05.054","volume":"282","author":"Y Sun","year":"2009","unstructured":"Sun, Y., Wen, Q.Y., Gao, F., et al.: Multiparty quantum secret sharing based on Bell measurement. Opt. Commun. 282(17), 3647\u20133651 (2009)","journal-title":"Opt. Commun."},{"issue":"11","key":"2916_CR8","doi-asserted-by":"publisher","first-page":"2476","DOI":"10.1016\/j.optcom.2010.02.015","volume":"283","author":"RH Shi","year":"2010","unstructured":"Shi, R.H., Huang, L.S., Yang, W., et al.: Multiparty quantum secret sharing with Bell states and Bell measurements. Opt. Commun. 283(11), 2476\u20132480 (2010)","journal-title":"Opt. Commun."},{"issue":"5","key":"2916_CR9","doi-asserted-by":"publisher","first-page":"653","DOI":"10.1007\/s11128-010-0225-7","volume":"10","author":"JJ Shi","year":"2011","unstructured":"Shi, J.J., Shi, R.H., Tang, Y., et al.: A multiparty quantum proxy group signature scheme for the entangled-state message with quantum Fourier transform. Quantum Inf. Process. 10(5), 653\u2013670 (2011)","journal-title":"Quantum Inf. Process."},{"issue":"1","key":"2916_CR10","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1007\/s11128-010-0180-3","volume":"10","author":"Q Li","year":"2011","unstructured":"Li, Q., Long, D.Y., Chan, W.H., et al.: Sharing a quantum secret without a trusted party. Quantum Inf. Process. 10(1), 97\u2013106 (2011)","journal-title":"Quantum Inf. Process."},{"issue":"4","key":"2916_CR11","doi-asserted-by":"publisher","first-page":"1333","DOI":"10.1088\/1674-1056\/18\/4\/007","volume":"18","author":"TT Song","year":"2009","unstructured":"Song, T.T., Zhang, J., Gao, F.: Participant attack on quantum secret sharing based on entanglement swapping. Chin. Phys. B 18(4), 1333\u20131337 (2009)","journal-title":"Chin. Phys. B"},{"key":"2916_CR12","doi-asserted-by":"publisher","first-page":"2485","DOI":"10.1038\/s41598-017-02543-0","volume":"7","author":"TY Wang","year":"2017","unstructured":"Wang, T.Y., Liu, Y.Z., Wei, C.Y., et al.: Security of a kind of quantum secret sharing with entangled states. Sci. Rep. 7, 2485 (2017)","journal-title":"Sci. Rep."},{"issue":"15","key":"2916_CR13","doi-asserted-by":"publisher","first-page":"150502","DOI":"10.1103\/PhysRevLett.121.150502","volume":"121","author":"Y Zhou","year":"2018","unstructured":"Zhou, Y., Yu, J., Yan, Z., et al.: Quantum secret sharing among four players using multipartite bound entanglement of an optical field. Phys. Rev. Lett. 121(15), 150502 (2018)","journal-title":"Phys. Rev. Lett."},{"key":"2916_CR14","doi-asserted-by":"publisher","first-page":"134854","DOI":"10.1109\/ACCESS.2019.2941971","volume":"7","author":"XQ Cai","year":"2019","unstructured":"Cai, X.Q., Wang, T.Y., Zhang, R.L., et al.: Security of verifiable threshold quantum secret sharing with sequential communication. IEEE Access 7, 134854\u2013134860 (2019)","journal-title":"IEEE Access"},{"key":"2916_CR15","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1016\/j.ins.2019.04.061","volume":"496","author":"JT Yuan","year":"2019","unstructured":"Yuan, J.T., Li, L.X.: A fully dynamic secret sharing scheme. Inf. Sci. 496, 42\u201352 (2019)","journal-title":"Inf. Sci."},{"issue":"13","key":"2916_CR16","doi-asserted-by":"publisher","first-page":"3479","DOI":"10.1016\/j.optcom.2011.03.017","volume":"284","author":"YG Yang","year":"2011","unstructured":"Yang, Y.G., Wang, Y., Chai, H.P., et al.: Member expansion in quantum (t, n) threshold secret sharing schemes. Opt. Commun. 284(13), 3479\u20133482 (2011)","journal-title":"Opt. Commun."},{"issue":"10\u201311","key":"2916_CR17","doi-asserted-by":"publisher","first-page":"1035","DOI":"10.1016\/j.physleta.2012.02.004","volume":"376","author":"HY Jia","year":"2012","unstructured":"Jia, H.Y., Wen, Q.Y., Gao, F., et al.: Dynamic quantum secret sharing. Phys. Lett. A 376(10\u201311), 1035\u20131041 (2012)","journal-title":"Phys. Lett. A"},{"issue":"1","key":"2916_CR18","doi-asserted-by":"publisher","first-page":"331","DOI":"10.1007\/s11128-012-0380-0","volume":"12","author":"JL Hsu","year":"2013","unstructured":"Hsu, J.L., Chong, S.K., Tsai, C.W.: Dynamic quantum secret sharing. Quantum Inf. Process. 12(1), 331\u2013344 (2013)","journal-title":"Quantum Inf. Process."},{"issue":"5","key":"2916_CR19","doi-asserted-by":"publisher","first-page":"1991","DOI":"10.1007\/s11128-012-0508-2","volume":"12","author":"TY Wang","year":"2013","unstructured":"Wang, T.Y., Li, Y.P.: Cryptanalysis of dynamic quantum secret sharing. Quantum Inf. Process. 12(5), 1991\u20131997 (2013)","journal-title":"Quantum Inf. Process."},{"issue":"8","key":"2916_CR20","doi-asserted-by":"publisher","first-page":"1907","DOI":"10.1007\/s11128-014-0779-x","volume":"13","author":"CH Liao","year":"2014","unstructured":"Liao, C.H., Yang, C.W., Hwang, T.: Dynamic quantum secret sharing protocol based on GHZ state. Quantum Inf. Process. 13(8), 1907\u20131916 (2014)","journal-title":"Quantum Inf. Process."},{"issue":"9","key":"2916_CR21","doi-asserted-by":"publisher","first-page":"3143","DOI":"10.1007\/s10773-015-2552-z","volume":"54","author":"S Mishra","year":"2015","unstructured":"Mishra, S., Shukla, C., Pathak, A., et al.: An integrated hierarchical dynamic quantum secret sharing protocol. Int. J. Theor. Phys. 54(9), 3143\u20133154 (2015)","journal-title":"Int. J. Theor. Phys."},{"key":"2916_CR22","doi-asserted-by":"publisher","first-page":"2349","DOI":"10.1016\/j.physleta.2016.05.032","volume":"380","author":"HW Liu","year":"2016","unstructured":"Liu, H.W., Ma, H.Q., Wei, K.J.: Multi-group dynamic quantum secret sharing with single photons. Phys. Lett. A 380, 2349\u20132353 (2016)","journal-title":"Phys. Lett. A"},{"issue":"3","key":"2916_CR23","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1007\/s11128-017-1525-y","volume":"16","author":"H Qin","year":"2017","unstructured":"Qin, H., Dai, Y.: Dynamic quantum secret sharing by using d-dimensional GHZ state. Quantum Inf. Process. 16(3), 64 (2017)","journal-title":"Quantum Inf. Process."},{"issue":"8","key":"2916_CR24","doi-asserted-by":"publisher","first-page":"080304","DOI":"10.1088\/1674-1056\/27\/8\/080304","volume":"27","author":"YT Du","year":"2018","unstructured":"Du, Y.T., Bao, W.S.: Dynamic quantum secret sharing protocol based on two-particle transform of Bell states. Chin. Phys. B 27(8), 080304 (2018)","journal-title":"Chin. Phys. B"},{"issue":"9","key":"2916_CR25","doi-asserted-by":"publisher","first-page":"244","DOI":"10.1007\/s11128-018-1970-2","volume":"17","author":"Y Song","year":"2018","unstructured":"Song, Y., Li, Z.H., Li, Y.M.: A dynamic multiparty quantum direct secret sharing based on generalized GHZ states. Quantum Inf. Process. 17(9), 244 (2018)","journal-title":"Quantum Inf. Process."},{"issue":"6","key":"2916_CR26","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1007\/s11128-019-2301-y","volume":"18","author":"G Gao","year":"2019","unstructured":"Gao, G.: Cryptanalysis and improvement of dynamic quantum secret sharing protocol based on two-particle transform of Bell states. Quantum Inf. Process. 18(6), 186 (2019)","journal-title":"Quantum Inf. Process."},{"issue":"8","key":"2916_CR27","doi-asserted-by":"publisher","first-page":"2050040","DOI":"10.1142\/S0217732320500406","volume":"35","author":"CW Yang","year":"2020","unstructured":"Yang, C.W., Tsai, C.W.: Improved dynamic multiparty quantum direct secret sharing protocol based on generalized GHZ states to prevent collusion attack. Mod. Phys. Lett. A 35(8), 2050040 (2020)","journal-title":"Mod. Phys. Lett. A"},{"issue":"6","key":"2916_CR28","doi-asserted-by":"publisher","first-page":"2050024","DOI":"10.1142\/S0217732320500248","volume":"35","author":"CW Yang","year":"2020","unstructured":"Yang, C.W., Tsai, C.W.: Participant attack and improving dynamic quantum secret sharing using d-dimensional GHZ state. Mod. Phys. Lett. A 35(6), 2050024 (2020)","journal-title":"Mod. Phys. Lett. A"},{"issue":"3","key":"2916_CR29","doi-asserted-by":"publisher","first-page":"2050001","DOI":"10.1142\/S021974992050001X","volume":"18","author":"MM Wang","year":"2020","unstructured":"Wang, M.M., Kong, X.Y.: An asymmetric dynamic multiparty quantum secret sharing against active attacks. Int. J. Quantum Inf. 18(3), 2050001 (2020)","journal-title":"Int. J. Quantum Inf."},{"key":"2916_CR30","doi-asserted-by":"publisher","first-page":"162","DOI":"10.1007\/s11128-020-02662-0","volume":"19","author":"CW Yang","year":"2020","unstructured":"Yang, C.W., Tsai, C.W.: Eficient and secure dynamic quantum secret sharing protocol based on Bell states. Quantumm Inf. Process. 19, 162 (2020)","journal-title":"Quantumm Inf. Process."}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-020-02916-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11128-020-02916-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-020-02916-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,2,10]],"date-time":"2021-02-10T08:34:58Z","timestamp":1612946098000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11128-020-02916-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1]]},"references-count":30,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2021,1]]}},"alternative-id":["2916"],"URL":"https:\/\/doi.org\/10.1007\/s11128-020-02916-x","relation":{},"ISSN":["1570-0755","1573-1332"],"issn-type":[{"type":"print","value":"1570-0755"},{"type":"electronic","value":"1573-1332"}],"subject":[],"published":{"date-parts":[[2021,1]]},"assertion":[{"value":"8 June 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 October 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 January 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"7"}}