{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,21]],"date-time":"2025-09-21T18:09:45Z","timestamp":1758478185455,"version":"3.37.3"},"reference-count":35,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2021,3,1]],"date-time":"2021-03-01T00:00:00Z","timestamp":1614556800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,3,1]],"date-time":"2021-03-01T00:00:00Z","timestamp":1614556800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61801126"],"award-info":[{"award-number":["61801126"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Beijing municipal organization department youth backbone talent project","award":["201800002685XG356"],"award-info":[{"award-number":["201800002685XG356"]}]},{"name":"Open project of CAS Key Laboratory of Quantum Information, University of Science and Technology of China","award":["KQI201902"],"award-info":[{"award-number":["KQI201902"]}]},{"name":"the Fundamental Research Funds for the Central Universities","award":["2020MS014"],"award-info":[{"award-number":["2020MS014"]}]},{"name":"Research and Application of Key Technologies for Open Source Software Security Monitoring","award":["SGFJXT00YJJS1800074"],"award-info":[{"award-number":["SGFJXT00YJJS1800074"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"published-print":{"date-parts":[[2021,3]]},"DOI":"10.1007\/s11128-021-03022-2","type":"journal-article","created":{"date-parts":[[2021,3,2]],"date-time":"2021-03-02T07:02:26Z","timestamp":1614668546000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["Quantum-based anonymity and secure veto"],"prefix":"10.1007","volume":"20","author":[{"given":"Qingle","family":"Wang","sequence":"first","affiliation":[]},{"given":"Yuancheng","family":"Li","sequence":"additional","affiliation":[]},{"given":"Chaohang","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Runhua","family":"Shi","sequence":"additional","affiliation":[]},{"given":"Zhichao","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,3,2]]},"reference":[{"key":"3022_CR1","doi-asserted-by":"crossref","unstructured":"Boneh, D., Golle, P.: Almost entirely correct mixing with applications to voting. In: Proceedings of 9th ACM Conference. Computer Communications Security, p. 6877, Washington (2002)","DOI":"10.1145\/586110.586121"},{"key":"3022_CR2","doi-asserted-by":"crossref","unstructured":"Clarkson, M.R., Chong, S., Myers, A.C.: Toward a secure voting system. In: Proceedings of 2008 IEEE Symposium on Security and Privacy, p. 354368, Oakland (2008)","DOI":"10.1109\/SP.2008.32"},{"issue":"1","key":"3022_CR3","doi-asserted-by":"publisher","first-page":"012333","DOI":"10.1103\/PhysRevA.75.012333","volume":"75","author":"JA Vaccaro","year":"2007","unstructured":"Vaccaro, J.A., Spring, J., Chefles, A.: Quantum protocols for anonymous voting and surveying. Phys. Rev. A 75(1), 012333 (2007)","journal-title":"Phys. Rev. A"},{"issue":"8","key":"3022_CR4","doi-asserted-by":"publisher","first-page":"1172","DOI":"10.1016\/j.physleta.2011.01.038","volume":"375","author":"D Horoshko","year":"2011","unstructured":"Horoshko, D., Kilin, S.: Quantum anonymous voting with anonymity check. Phys. Lett. A 375(8), 1172\u20131175 (2011)","journal-title":"Phys. Lett. A"},{"issue":"2","key":"3022_CR5","doi-asserted-by":"publisher","first-page":"022333","DOI":"10.1103\/PhysRevA.94.022333","volume":"94","author":"QL Wang","year":"2016","unstructured":"Wang, Q.L., Yu, C.H., Gao, F., Qi, H.Y., Wen, Q.Y.: Self-tallying quantum anonymous voting. Phys. Rev. A 94(2), 022333 (2016)","journal-title":"Phys. Rev. A"},{"key":"3022_CR6","doi-asserted-by":"publisher","first-page":"298305","DOI":"10.1038\/nature23268","volume":"547","author":"B Bradlyn","year":"2017","unstructured":"Bradlyn, B., Elcoro, L., Cano, J., Vergniory, M.G., Wang, Z.J., Felser, C., Aroyo, M.I., Bernevig, B.A.: Topological quantum chemistry. Nature 547, 298305 (2017)","journal-title":"Nature"},{"key":"3022_CR7","doi-asserted-by":"publisher","first-page":"1018","DOI":"10.1038\/nphys2474","volume":"9","author":"N Lambert","year":"2013","unstructured":"Lambert, N., Chen, Y., Cheng, Y., Li, C.M., Chen, G.Y., Nori, F.: Quantum biology. Nat. Phys. 9, 1018 (2013)","journal-title":"Nat. Phys."},{"issue":"2","key":"3022_CR8","doi-asserted-by":"publisher","first-page":"649","DOI":"10.1016\/j.joei.2019.05.015","volume":"93","author":"J Liu","year":"2020","unstructured":"Liu, J., Zhang, X.L., Hu, B., Lu, Q., Liu, D.J., Dong, C.Q., Yang, Y.P.: Formation mechanism of HCN and NH3 during indole pyrolysis: a theoretical DFT study. J. Energy Inst. 93(2), 649\u2013657 (2020)","journal-title":"J. Energy Inst."},{"issue":"5","key":"3022_CR9","doi-asserted-by":"publisher","first-page":"414","DOI":"10.1016\/j.nantod.2009.07.004","volume":"4","author":"P Zrazhevskiy","year":"2009","unstructured":"Zrazhevskiy, P., Gao, X.: Multifunctional quantum dots for personalized medicine. Nano Today 4(5), 414\u2013428 (2009)","journal-title":"Nano Today"},{"key":"3022_CR10","unstructured":"Bennett, C.H., Brassard, G.: Quantum cryptography: Public key distribution and coin tossing. In: Proceedings of IEEE International Conference on Computer, System Signal Process, p. 175179, Bangalore (1984)"},{"issue":"5410","key":"3022_CR11","doi-asserted-by":"publisher","first-page":"20502056","DOI":"10.1126\/science.283.5410.2050","volume":"283","author":"HK Lo","year":"1999","unstructured":"Lo, H.K., Chau, H.F.: Unconditional security of quantum key distribution over arbitrarily long distances. Science 283(5410), 20502056 (1999)","journal-title":"Science"},{"issue":"2","key":"3022_CR12","doi-asserted-by":"publisher","first-page":"441444","DOI":"10.1103\/PhysRevLett.85.441","volume":"85","author":"PW Shor","year":"2000","unstructured":"Shor, P.W., Preskill, J.: Simple proof of security of the bb84 quantum key distribution protocol. Phys. Rev. Lett. 85(2), 441444 (2000)","journal-title":"Phys. Rev. Lett."},{"issue":"3","key":"3022_CR13","first-page":"6601468","volume":"21","author":"M Lucamarini","year":"2015","unstructured":"Lucamarini, M., Dynes, J.F., Frohlich, B., Yuan, Z.L., Shields, A.J.: Security bounds for efficient decoy-state quantum key distribution. IEEE J. Set. Top. Quant. 21(3), 6601468 (2015)","journal-title":"IEEE J. Set. Top. Quant."},{"issue":"3","key":"3022_CR14","doi-asserted-by":"publisher","first-page":"18241829","DOI":"10.1103\/PhysRevA.59.1829","volume":"59","author":"M Hillery","year":"1999","unstructured":"Hillery, M., Bu\u017eek, V., Berthiaume, A.: Quantum secret sharing. Phys. Rev. A 59(3), 18241829 (1999)","journal-title":"Phys. Rev. A"},{"issue":"3","key":"3022_CR15","first-page":"321327","volume":"51","author":"YG Yang","year":"2008","unstructured":"Yang, Y.G., Wen, Q.Y., Zhang, X.: Multiparty simultaneous quantum identity authentication with secret sharing. Sci. China G Phys. Mech. Astron. 51(3), 321327 (2008)","journal-title":"Sci. China G Phys. Mech. Astron."},{"issue":"10","key":"3022_CR16","doi-asserted-by":"publisher","first-page":"1035","DOI":"10.1016\/j.physleta.2012.02.004","volume":"376","author":"HY Jia","year":"2012","unstructured":"Jia, H.Y., Wen, Q.Y., Gao, F., Qin, S.J., Guo, F.Z.: Dynamic quantum secret sharing. Phys. Lett. A 376(10), 1035\u20131041 (2012)","journal-title":"Phys. Lett. A"},{"key":"3022_CR17","doi-asserted-by":"crossref","unstructured":"Christandl, M., Wehner, S.: Quantum Anonymous Transmissions. In Advances in Cryptology: ASIACRYPT 2005, pp. 217\u2013235, Berlin, Heidelberg (2005)","DOI":"10.1007\/11593447_12"},{"issue":"3","key":"3022_CR18","doi-asserted-by":"publisher","first-page":"032345","DOI":"10.1103\/PhysRevA.97.032345","volume":"97","author":"NC Menicucci","year":"2018","unstructured":"Menicucci, N.C., Baragiola, B.Q., Demarie, T.F., Brennen, G.K.: Anonymous broadcasting of classical information with a continuous-variable topological quantum code. Phys. Rev. A 97(3), 032345 (2018)","journal-title":"Phys. Rev. A"},{"issue":"7","key":"3022_CR19","doi-asserted-by":"publisher","first-page":"070301","DOI":"10.1007\/s11433-018-9324-6","volume":"62","author":"F Gao","year":"2019","unstructured":"Gao, F., Qin, S.J., Huang, W., Wen, Q.Y.: Quantum private query: a new kind of practical quantum cryptographic protocols. Sci. China G Phys. Mech. Astron. 62(7), 070301 (2019)","journal-title":"Sci. China G Phys. Mech. Astron."},{"issue":"1","key":"3022_CR20","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1109\/TC.2017.2721404","volume":"67","author":"CY Wei","year":"2018","unstructured":"Wei, C.Y., Cai, X.Q., Liu, B., Wang, T.Y., Gao, F.: A generic construction of quantum-oblivious-key-transfer-based private query with ideal database security and zero failure. IEEE Trans. Comput. 67(1), 2\u20138 (2018)","journal-title":"IEEE Trans. Comput."},{"key":"3022_CR21","doi-asserted-by":"publisher","first-page":"166","DOI":"10.1007\/s11128-020-02664-y","volume":"19","author":"QL Wang","year":"2020","unstructured":"Wang, Q.L., Li, Y.C., Yu, C.H., He, H., Zhang, K.J.: Quantum anonymous ranking and selection with verifiability. Quantum Inf. Process 19, 166 (2020). https:\/\/doi.org\/10.1007\/s11128-020-02664-y","journal-title":"Quantum Inf. Process"},{"issue":"11","key":"3022_CR22","doi-asserted-by":"publisher","first-page":"23752389","DOI":"10.1007\/s11128-014-0774-2","volume":"13","author":"QL Wang","year":"2014","unstructured":"Wang, Q.L., Sun, H.X., Huang, W.: Multi-party quantum private comparison protocol with $$n$$-level entangled statesg. Quantum Inf. Proc. 13(11), 23752389 (2014)","journal-title":"Quantum Inf. Proc."},{"key":"3022_CR23","doi-asserted-by":"publisher","unstructured":"Wang, Q.L., Yu, C.H., Li, Y.C., Liu, J.S., Shi, R.H., Zhou, Y.Q.: Authenticated Quantum Sortition and Application in \u201cPicking at Random Problems\u201d. In IEEE Communications Letters, https:\/\/doi.org\/10.1109\/LCOMM.2020.3025319","DOI":"10.1109\/LCOMM.2020.3025319"},{"issue":"3","key":"3022_CR24","first-page":"6601111","volume":"21","author":"FH Xu","year":"2015","unstructured":"Xu, F.H., Curty, M., Qi, B., Lo, H.K.: Measurement-device-independent quantum cryptography. IEEE J. Set. Top. Quantum 21(3), 6601111 (2015)","journal-title":"IEEE J. Set. Top. Quantum"},{"issue":"6","key":"3022_CR25","doi-asserted-by":"publisher","first-page":"052326","DOI":"10.1103\/PhysRevA.65.052326","volume":"65","author":"T Mihara","year":"2002","unstructured":"Mihara, T.: Quantum identification schemes with entanglements. Phys. Rev. A 65(6), 052326 (2002)","journal-title":"Phys. Rev. A"},{"issue":"1","key":"3022_CR26","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1016\/j.physleta.2005.09.010","volume":"349","author":"M Hillery","year":"2006","unstructured":"Hillery, M., Ziman, M., Buzek, V., Bielikov\u00e1, M.: Towards quantum-based privacy and voting. Phys. Lett. A 349(1), 75\u201381 (2006)","journal-title":"Phys. Lett. A"},{"issue":"2","key":"3022_CR27","doi-asserted-by":"publisher","first-page":"022331","DOI":"10.1103\/PhysRevA.84.022331","volume":"84","author":"M Bonanome","year":"2011","unstructured":"Bonanome, M., Buzek, V., Hillery, M., Ziman, M.: Toward protocols for quantum-ensured privacy and secure voting. Phys. Rev. A 84(2), 022331 (2011)","journal-title":"Phys. Rev. A"},{"issue":"4","key":"3022_CR28","doi-asserted-by":"publisher","first-page":"042309","DOI":"10.1103\/PhysRevA.85.042309","volume":"85","author":"L Jiang","year":"2012","unstructured":"Jiang, L., He, G.Q., Nie, D., Xiong, J., Zeng, G.H.: Quantum anonymous voting for continuous variables. Phys. Rev. A 85(4), 042309 (2012)","journal-title":"Phys. Rev. A"},{"issue":"1","key":"3022_CR29","doi-asserted-by":"publisher","first-page":"7586","DOI":"10.1038\/s41598-017-07976-1","volume":"7","author":"P Xue","year":"2017","unstructured":"Xue, P., Zhang, X.: A simple quantum voting scheme with multi-qubit entanglement. Sci. Rep. 7(1), 7586 (2017)","journal-title":"Sci. Rep."},{"issue":"3","key":"3022_CR30","doi-asserted-by":"publisher","first-page":"1008","DOI":"10.1007\/s10773-018-3992-z","volume":"58","author":"SL Wang","year":"2019","unstructured":"Wang, S.L., Zhang, S., Wang, Q., Shi, R.H.: Fault-tolerant quantum anonymous voting protocol. Int. J. Theor. Phys. 58(3), 1008\u20131016 (2019)","journal-title":"Int. J. Theor. Phys."},{"key":"3022_CR31","unstructured":"The IBM Quantum Experience. http:\/\/www.research.ibm.com\/quantum"},{"issue":"3","key":"3022_CR32","doi-asserted-by":"publisher","first-page":"032302","DOI":"10.1103\/PhysRevA.65.032302","volume":"65","author":"GL Long","year":"2002","unstructured":"Long, G.L., Liu, X.S.: Theoretically efficient high-capacity quantum-key-distribution scheme. Phys. Rev. A 65(3), 032302 (2002)","journal-title":"Phys. Rev. A"},{"issue":"4","key":"3022_CR33","first-page":"329","volume":"7","author":"F Gao","year":"2007","unstructured":"Gao, F., Qin, S.J., Wen, Q.Y., Zhu, F.C.: A simple participant attack on the br\u00e1dler-du\u0161ek protocol. Phys. Rev. A 7(4), 329\u2013334 (2007)","journal-title":"Phys. Rev. A"},{"issue":"3","key":"3022_CR34","doi-asserted-by":"publisher","first-page":"036301","DOI":"10.1103\/PhysRevA.76.036301","volume":"76","author":"S Lin","year":"2007","unstructured":"Lin, S., Gao, F., Guo, F.Z., Wen, Q.Y., Zhu, F.C.: Comment on \u201cmultiparty quantum secret sharing of classical messages based on entanglement swapping\u201d. Phys. Rev. A 76(3), 036301 (2007)","journal-title":"Phys. Rev. A"},{"key":"3022_CR35","unstructured":"Ramij, R., Guruprasad, K.: GHZ correlation provides secure Anonymous Veto Protocol. arXiv:quant-ph\/1507.00592v2"}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-021-03022-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11128-021-03022-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-021-03022-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,1]],"date-time":"2021-04-01T08:23:03Z","timestamp":1617265383000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11128-021-03022-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,3]]},"references-count":35,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2021,3]]}},"alternative-id":["3022"],"URL":"https:\/\/doi.org\/10.1007\/s11128-021-03022-2","relation":{},"ISSN":["1570-0755","1573-1332"],"issn-type":[{"type":"print","value":"1570-0755"},{"type":"electronic","value":"1573-1332"}],"subject":[],"published":{"date-parts":[[2021,3]]},"assertion":[{"value":"9 May 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 February 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 March 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"85"}}