{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,5]],"date-time":"2026-04-05T10:16:33Z","timestamp":1775384193857,"version":"3.50.1"},"reference-count":24,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2021,3,1]],"date-time":"2021-03-01T00:00:00Z","timestamp":1614556800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,3,1]],"date-time":"2021-03-01T00:00:00Z","timestamp":1614556800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61971021"],"award-info":[{"award-number":["61971021"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61571024"],"award-info":[{"award-number":["61571024"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004750","name":"Aeronautical Science Foundation of China","doi-asserted-by":"publisher","award":["2018ZC51016"],"award-info":[{"award-number":["2018ZC51016"]}],"id":[{"id":"10.13039\/501100004750","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National Key Research and Development Program of China","award":["2016YFC1000307"],"award-info":[{"award-number":["2016YFC1000307"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"published-print":{"date-parts":[[2021,3]]},"DOI":"10.1007\/s11128-021-03051-x","type":"journal-article","created":{"date-parts":[[2021,3,10]],"date-time":"2021-03-10T07:02:43Z","timestamp":1615359763000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":17,"title":["A multi-valued quantum fully homomorphic encryption scheme"],"prefix":"10.1007","volume":"20","author":[{"given":"Yuanjing","family":"Zhang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2369-1521","authenticated-orcid":false,"given":"Tao","family":"Shang","sequence":"additional","affiliation":[]},{"given":"Jianwei","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,3,10]]},"reference":[{"key":"3051_CR1","unstructured":"Gentry, C.: A fully homomorphic encryption scheme. In: Stanford University (2009)"},{"issue":"2","key":"3051_CR2","doi-asserted-by":"publisher","first-page":"831","DOI":"10.1137\/120868669","volume":"43","author":"Z Brakerski","year":"2014","unstructured":"Brakerski, Z., Vaikuntanathan, V.: Efficient fully homomorphic encryption from (standard) lwe. SIAM J. Comput. 43(2), 831\u2013871 (2014)","journal-title":"SIAM J. Comput."},{"issue":"3","key":"3051_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2633600","volume":"6","author":"Z Brakerski","year":"2014","unstructured":"Brakerski, Z., Gentry, C., Vaikuntanathan, V.: (leveled) fully homomorphic encryption without bootstrapping. ACM Trans. Comput. Theory 6(3), 1\u201336 (2014)","journal-title":"ACM Trans. Comput. Theory"},{"key":"3051_CR4","unstructured":"Dijk, M.V., Gentry, C., Halevi, S., Vaikuntanathan, V.: Fully homomorphic encryption over the integers. In: Advances in Cryptology CEUROCRYPT 2010 (2010)"},{"issue":"3","key":"3051_CR5","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1145\/1666420.1666444","volume":"53","author":"C Gentry","year":"2010","unstructured":"Gentry, C.: Computing arbitrary functions of encrypted data. Commun. ACM 53(3), 97\u2013105 (2010)","journal-title":"Commun. ACM"},{"issue":"11","key":"3051_CR6","first-page":"169","volume":"4","author":"RL Rivest","year":"1978","unstructured":"Rivest, R.L., Adleman, L.M., Dertouzos, M.L.: On data banks and privacy homomorphisms. Found. Secure Comput. 4(11), 169 (1978)","journal-title":"Found. Secure Comput."},{"issue":"3","key":"3051_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1525856.1525858","volume":"5","author":"C Castelluccia","year":"2009","unstructured":"Castelluccia, C., Chan, A.C.F., Mykletun, E., Tsudik, G.: Efficient and provably secure aggregation of encrypted data in wireless sensor networks. ACM Trans. Sensor Netw. 5(3), 1\u201336 (2009)","journal-title":"ACM Trans. Sensor Netw."},{"issue":"1","key":"3051_CR8","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1016\/j.comcom.2010.11.004","volume":"35","author":"A Hessler","year":"2012","unstructured":"Hessler, A., Kakumaru, T., Perrey, H., Westhoff, D.: Data obfuscation with network coding. Comput. Commun. 35(1), 48\u201361 (2012)","journal-title":"Comput. Commun."},{"issue":"15","key":"3051_CR9","doi-asserted-by":"publisher","first-page":"150501","DOI":"10.1103\/PhysRevLett.109.150501","volume":"109","author":"PP Rohde","year":"2012","unstructured":"Rohde, P.P., Fitzsimons, J.F., Gilchrist, A.: Quantum walks with encrypted data. Phys. Rev. Lett. 109(15), 150501 (2012)","journal-title":"Phys. Rev. Lett."},{"issue":"12","key":"3051_CR10","doi-asserted-by":"publisher","first-page":"3675","DOI":"10.1007\/s11128-013-0626-5","volume":"12","author":"M Liang","year":"2013","unstructured":"Liang, M.: Symmetric quantum fully homomorphic encryption with perfect security. Quantum Inf. Process. 12(12), 3675\u20133687 (2013)","journal-title":"Quantum Inf. Process."},{"issue":"8","key":"3051_CR11","doi-asserted-by":"publisher","first-page":"2749","DOI":"10.1007\/s11128-015-1034-9","volume":"14","author":"M Liang","year":"2015","unstructured":"Liang, M.: Quantum fully homomorphic encryption scheme based on universal quantum circuit. Quantum Inf. Process. 14(8), 2749\u20132759 (2015)","journal-title":"Quantum Inf. Process."},{"issue":"5","key":"3051_CR12","doi-asserted-by":"publisher","first-page":"050303","DOI":"10.1103\/PhysRevA.90.050303","volume":"90","author":"L Yu","year":"2014","unstructured":"Yu, L., P\u00e9rez-Delgado, C.A., Fitzsimons, J.F.: Limitations on information-theoretically-secure quantum homomorphic encryption. Phys. Rev. A 90(5), 050303 (2014)","journal-title":"Phys. Rev. A"},{"key":"3051_CR13","unstructured":"Tan, S. H., Kettlewell, J.A., Ouyang, Y. K., Chen, L., Fitzsimons, J. F.: A quantum approach to fully homomorphic encryption. Eprint Arxiv (2014)"},{"issue":"9216","key":"3051_CR14","first-page":"609","volume":"2015","author":"A Broadbent","year":"2015","unstructured":"Broadbent, A., Jeffery, S.: Quantum homomorphic encryption for circuits of low $$t$$-gate complexity. Proc. CRYPT 2015(9216), 609\u2013629 (2015)","journal-title":"Proc. CRYPT"},{"issue":"7","key":"3051_CR15","doi-asserted-by":"publisher","first-page":"1650076","DOI":"10.1142\/S0217984916500767","volume":"30","author":"YQ Wang","year":"2016","unstructured":"Wang, Y.Q., She, K., Luo, Q.B., Fan, Y., Chao, Z.: Symmetric weak ternary quantum homomorphic encryption schemes. Mod. Phys. Lett. B 30(7), 1650076 (2016)","journal-title":"Mod. Phys. Lett. B"},{"key":"3051_CR16","unstructured":"Alagic, G., Fefferman, B.: On quantum obfuscation. arXiv preprint arXiv:1602.01771 (2016)"},{"issue":"2","key":"3051_CR17","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1007\/s11128-019-2172-2","volume":"18","author":"T Shang","year":"2019","unstructured":"Shang, T., Chen, R.Y.L., Liu, J.W.: On the obfuscatability of quantum point functions. Quantum Inf. Process. 18(2), 55 (2019)","journal-title":"Quantum Inf. Process."},{"issue":"6","key":"3051_CR18","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1007\/s11128-019-2280-z","volume":"18","author":"RYL Chen","year":"2019","unstructured":"Chen, R.Y.L., Shang, T., Liu, J.W.: IND-secure quantum symmetric encryption based on point obfuscation. Quantum Inf. Process. 18(6), 16 (2019)","journal-title":"Quantum Inf. Process."},{"key":"3051_CR19","doi-asserted-by":"crossref","unstructured":"Boneh, D., Dagdelen, O., Fischlin, M., Lehmann, A., Schaffner, C., Zhandry, M.: Random oracles in a quantum world. In: Advances in Cryptology-EUROCRYPT 2004, International Conference on the Theory and Application of Cryptology and Information Security, pp. 41\u201369 (2011)","DOI":"10.1007\/978-3-642-25385-0_3"},{"key":"3051_CR20","doi-asserted-by":"publisher","first-page":"042314","DOI":"10.1103\/PhysRevA.94.042314","volume":"94","author":"T Shang","year":"2016","unstructured":"Shang, T., Lei, Q., Liu, J.W.: Quantum random oracle model for quantum digital signature. Phys. Rev. A 94, 042314 (2016)","journal-title":"Phys. Rev. A"},{"key":"3051_CR21","doi-asserted-by":"crossref","unstructured":"Shang, T., Chen, R. Y. L., Lei, Q.: Quantum random oracle model for quantum public-key encryption. In: IEEE Access, PP(99), pp. 1\u20131 (2019)","DOI":"10.1109\/ACCESS.2019.2940406"},{"issue":"4","key":"3051_CR22","doi-asserted-by":"publisher","first-page":"1335","DOI":"10.1007\/s10773-017-3275-0","volume":"56","author":"XQ Sun","year":"2017","unstructured":"Sun, X.Q., Wang, T., Sun, Z.W., Wang, P., Yu, J.P., Xie, W.X.: An efficient quantum somewhat homomorphic symmetric searchable encryption. Int. J. Theor. Phys. 56(4), 1335\u20131345 (2017)","journal-title":"Int. J. Theor. Phys."},{"issue":"4","key":"3051_CR23","doi-asserted-by":"publisher","first-page":"042317","DOI":"10.1103\/PhysRevA.67.042317","volume":"67","author":"PO Boykin","year":"2003","unstructured":"Boykin, P.O., Roychowdhury, V.: Optimal encryption of quantum bits. Phys. Rev. A 67(4), 042317 (2003)","journal-title":"Phys. Rev. A"},{"issue":"4","key":"3051_CR24","doi-asserted-by":"publisher","first-page":"042334","DOI":"10.1103\/PhysRevA.98.042334","volume":"98","author":"Y Ouyang","year":"2018","unstructured":"Ouyang, Y., Tan, S.H., Fitzsimons, J.: Quantum homomorphic encryption from quantum codes. Phys. Rev. A 98(4), 042334 (2018)","journal-title":"Phys. Rev. A"}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-021-03051-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11128-021-03051-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-021-03051-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,3,31]],"date-time":"2021-03-31T22:47:44Z","timestamp":1617230864000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11128-021-03051-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,3]]},"references-count":24,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2021,3]]}},"alternative-id":["3051"],"URL":"https:\/\/doi.org\/10.1007\/s11128-021-03051-x","relation":{},"ISSN":["1570-0755","1573-1332"],"issn-type":[{"value":"1570-0755","type":"print"},{"value":"1573-1332","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,3]]},"assertion":[{"value":"21 July 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 February 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 March 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"101"}}