{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T13:59:56Z","timestamp":1760623196257,"version":"3.37.3"},"reference-count":20,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100003725","name":"National Research Foundation of Korea","doi-asserted-by":"crossref","award":["NRF-2019R1A2C1006337"],"award-info":[{"award-number":["NRF-2019R1A2C1006337"]}],"id":[{"id":"10.13039\/501100003725","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100010418","name":"Institute for Information and Communications Technology Promotion","doi-asserted-by":"publisher","award":["IITP-2020-2018-0-01402"],"award-info":[{"award-number":["IITP-2020-2018-0-01402"]}],"id":[{"id":"10.13039\/501100010418","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002597","name":"Kyung Hee University","doi-asserted-by":"publisher","award":["Research Leave Program 2018"],"award-info":[{"award-number":["Research Leave Program 2018"]}],"id":[{"id":"10.13039\/501100002597","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"published-print":{"date-parts":[[2021,1]]},"DOI":"10.1007\/s11128-021-02988-3","type":"journal-article","created":{"date-parts":[[2021,1,25]],"date-time":"2021-01-25T08:05:19Z","timestamp":1611561919000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Genuine secret-sharing states"],"prefix":"10.1007","volume":"20","author":[{"given":"Minjin","family":"Choi","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2925-1017","authenticated-orcid":false,"given":"Soojoon","family":"Lee","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,1,25]]},"reference":[{"key":"2988_CR1","first-page":"313","volume":"48","author":"GR Blakley","year":"1979","unstructured":"Blakley, G.R.: Safeguarding cryptographic keys. Proc. Natl. Comput. Conf. 48, 313 (1979)","journal-title":"Proc. Natl. Comput. Conf."},{"key":"2988_CR2","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A Shamir","year":"1979","unstructured":"Shamir, A.: How to share s secret. Commun. ACM 22, 612 (1979)","journal-title":"Commun. ACM"},{"key":"2988_CR3","doi-asserted-by":"publisher","first-page":"1829","DOI":"10.1103\/PhysRevA.59.1829","volume":"59","author":"M Hillery","year":"1999","unstructured":"Hillery, M., Bu\u017eek, V., Berthiaume, A.: Quantum secret sharing. Phys. Rev. A 59, 1829 (1999)","journal-title":"Phys. Rev. A"},{"key":"2988_CR4","doi-asserted-by":"crossref","unstructured":"Greenberger, D.M., Horne, M.A., Zeilinger, A.: Going Beyond Bell\u2019s Theorem, Bell\u2019s Theorem, Quantum Theory, and Conceptions of the Universe. In: Kafatos, M. (eds) p. 69. Kluwer, Dordrecht (1989)","DOI":"10.1007\/978-94-017-0849-4_10"},{"key":"2988_CR5","doi-asserted-by":"publisher","first-page":"661","DOI":"10.1103\/PhysRevLett.67.661","volume":"67","author":"AK Ekert","year":"1991","unstructured":"Ekert, A.K.: Quantum cryptography based on Bell\u2019s theorem. Phys. Rev. Lett. 67, 661 (1991)","journal-title":"Phys. Rev. Lett."},{"key":"2988_CR6","doi-asserted-by":"publisher","first-page":"160502","DOI":"10.1103\/PhysRevLett.94.160502","volume":"94","author":"K Horodecki","year":"2005","unstructured":"Horodecki, K., Horodecki, M., Horodecki, P., Oppenheim, J.: Secure key from bound entanglement. Phys. Rev. Lett. 94, 160502 (2005)","journal-title":"Phys. Rev. Lett."},{"key":"2988_CR7","doi-asserted-by":"publisher","first-page":"1898","DOI":"10.1109\/TIT.2008.2009798","volume":"55","author":"K Horodecki","year":"2009","unstructured":"Horodecki, K., Horodecki, M., Horodecki, P., Oppenheim, J.: General paradigm for distilling classical key from quantum states. IEEE Trans. Inf. Theory 55, 1898 (2009)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"2988_CR8","doi-asserted-by":"publisher","first-page":"012351","DOI":"10.1103\/PhysRevA.78.012351","volume":"78","author":"DP Chi","year":"2008","unstructured":"Chi, D.P., Choi, J.W., Kim, J.S., Kim, T., Lee, S.: Quantum states for perfectly secure secret sharing. Phys. Rev. A 78, 012351 (2008)","journal-title":"Phys. Rev. A"},{"key":"2988_CR9","doi-asserted-by":"publisher","first-page":"2275","DOI":"10.1103\/PhysRevLett.78.2275","volume":"78","author":"V Vedral","year":"1997","unstructured":"Vedral, V., Plenio, M.B., Rippin, M.A., Knight, P.L.: Quantifying entanglement. Phys. Rev. Lett. 78, 2275 (1997)","journal-title":"Phys. Rev. Lett."},{"key":"2988_CR10","doi-asserted-by":"publisher","first-page":"1619","DOI":"10.1103\/PhysRevA.57.1619","volume":"57","author":"V Vedral","year":"1998","unstructured":"Vedral, V., Plenio, M.B.: Entanglement measures and purification procedures. Phys. Rev. A 57, 1619 (1998)","journal-title":"Phys. Rev. A"},{"key":"2988_CR11","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1016\/0375-9601(93)90880-9","volume":"183","author":"LP Hughston","year":"1993","unstructured":"Hughston, L.P., Jozsa, R., Wootters, W.K.: A complete classification of quantum ensembles having a given density matrix. Phys. Lett. A 183, 14 (1993)","journal-title":"Phys. Lett. A"},{"key":"2988_CR12","first-page":"3","volume":"9","author":"AS Holevo","year":"1973","unstructured":"Holevo, A.S.: Bounds for the quantity of information transmitted by a quantum communication channel. Probl. Peredachi Inf. 9, 3 (1973)","journal-title":"Probl. Peredachi Inf."},{"key":"2988_CR13","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1098\/rspa.2004.1372","volume":"461","author":"I Devetak","year":"2005","unstructured":"Devetak, I., Winter, A.: Distillation of secret key and entanglement from quantum states. Proc. R. Soc. A 461, 207 (2005)","journal-title":"Proc. R. Soc. A"},{"key":"2988_CR14","doi-asserted-by":"publisher","first-page":"012315","DOI":"10.1103\/PhysRevA.95.012315","volume":"95","author":"I Kogias","year":"2017","unstructured":"Kogias, I., Xiang, Y., He, Q., Adesso, G.: Unconditional security of entanglement-based continuous-variable quantum secret sharing. Phys. Rev. A 95, 012315 (2017)","journal-title":"Phys. Rev. A"},{"key":"2988_CR15","doi-asserted-by":"publisher","first-page":"4277","DOI":"10.1103\/PhysRevA.40.4277","volume":"40","author":"RF Werner","year":"1989","unstructured":"Werner, R.F.: Quantum states with Einstein\u2013Podolsky\u2013Rosen correlations admitting a hidden-variable model. Phys. Rev. A 40, 4277 (1989)","journal-title":"Phys. Rev. A"},{"key":"2988_CR16","doi-asserted-by":"publisher","first-page":"032314","DOI":"10.1103\/PhysRevA.65.032314","volume":"65","author":"G Vidal","year":"2002","unstructured":"Vidal, G., Werner, R.F.: Computable measure of entanglement. Phys. Rev. A 65, 032314 (2002)","journal-title":"Phys. Rev. A"},{"key":"2988_CR17","doi-asserted-by":"publisher","first-page":"648","DOI":"10.1103\/PhysRevLett.83.648","volume":"83","author":"R Cleve","year":"1999","unstructured":"Cleve, R., Gottesman, D., Lo, H.K.: How to share a quantum secret. Phys. Rev. Lett. 83, 648 (1999)","journal-title":"Phys. Rev. Lett."},{"key":"2988_CR18","doi-asserted-by":"publisher","first-page":"1895","DOI":"10.1103\/PhysRevLett.70.1895","volume":"70","author":"CH Bennett","year":"1993","unstructured":"Bennett, C.H., Brassard, G., Cr\u00e9peau, C., Jozsa, R., Peres, A., Wootters, W.K.: Teleporting an unknown quantum state via dual classical and Einstein\u2013Podolsky\u2013Rosen channels. Phys. Rev. Lett. 70, 1895 (1993)","journal-title":"Phys. Rev. Lett."},{"key":"2988_CR19","doi-asserted-by":"publisher","first-page":"012311","DOI":"10.1103\/PhysRevA.76.012311","volume":"76","author":"S Lee","year":"2007","unstructured":"Lee, S., Joo, J., Kim, J.: Teleportation capability, distillability, and nonlocality on three-qubit states. Phys. Rev. A 76, 012311 (2007)","journal-title":"Phys. Rev. A"},{"key":"2988_CR20","unstructured":"Choi, M., Lee, S.: in preparation"}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-021-02988-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11128-021-02988-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-021-02988-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,2,10]],"date-time":"2021-02-10T08:51:00Z","timestamp":1612947060000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11128-021-02988-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1]]},"references-count":20,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2021,1]]}},"alternative-id":["2988"],"URL":"https:\/\/doi.org\/10.1007\/s11128-021-02988-3","relation":{},"ISSN":["1570-0755","1573-1332"],"issn-type":[{"type":"print","value":"1570-0755"},{"type":"electronic","value":"1573-1332"}],"subject":[],"published":{"date-parts":[[2021,1]]},"assertion":[{"value":"21 August 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 January 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 January 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"47"}}