{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T01:38:05Z","timestamp":1773538685148,"version":"3.50.1"},"reference-count":54,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2021,4,1]],"date-time":"2021-04-01T00:00:00Z","timestamp":1617235200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,4,1]],"date-time":"2021-04-01T00:00:00Z","timestamp":1617235200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61801126"],"award-info":[{"award-number":["61801126"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Open project of CAS Key Laboratory of Quantum Information, University of Science and Technology of China","award":["KQI201902"],"award-info":[{"award-number":["KQI201902"]}]},{"name":"Research and Application of Key Technologies for Open Source Software Security Monitoring","award":["SGFJXT00YJJS1800074"],"award-info":[{"award-number":["SGFJXT00YJJS1800074"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"published-print":{"date-parts":[[2021,4]]},"DOI":"10.1007\/s11128-021-03081-5","type":"journal-article","created":{"date-parts":[[2021,4,10]],"date-time":"2021-04-10T08:02:41Z","timestamp":1618041761000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["Quantum Bell states-based anonymous voting with anonymity trace"],"prefix":"10.1007","volume":"20","author":[{"given":"Qingle","family":"Wang","sequence":"first","affiliation":[]},{"given":"Jiangshan","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Yuancheng","family":"Li","sequence":"additional","affiliation":[]},{"given":"Chaohang","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Shijie","family":"Pan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,4,10]]},"reference":[{"key":"3081_CR1","doi-asserted-by":"crossref","unstructured":"Bennett, C.H., Brassard, G.: Quantum cryptography: public key distribution and coin tossing. In: Proceedings of IEEE International Conference on Computer, Systems Signal Processing, pp. 1\u20137, Bangalore (1984)","DOI":"10.1016\/j.tcs.2014.05.025"},{"key":"3081_CR2","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1007\/s00145-004-0142-y","volume":"18","author":"H Lo","year":"2005","unstructured":"Lo, H., Chau, H., Ardehali, M.: Efficient quantum key distribution scheme and a proof of its unconditional security. J. Cryptol. 18, 133\u2013165 (2005)","journal-title":"J. Cryptol."},{"issue":"2","key":"3081_CR3","doi-asserted-by":"publisher","first-page":"457","DOI":"10.1109\/TIT.2002.807289","volume":"49","author":"D Gottesman","year":"2003","unstructured":"Gottesman, D., Hoi-Kwong, L.: Proof of security of quantum key distribution with two-way classical communications. IEEE Trans. Inf. Theory 49(2), 457\u2013475 (2003)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"6","key":"3081_CR4","doi-asserted-by":"publisher","first-page":"2604","DOI":"10.1109\/TIT.2008.921870","volume":"54","author":"K Horodecki","year":"2008","unstructured":"Horodecki, K., Horodecki, M., Horodecki, P., Leung, D., Oppenheim, J.: Quantum key distribution based on private states: unconditional security over untrusted channels with zero quantum capacity. IEEE Trans. Inf. Theory 54(6), 2604\u20132620 (2008)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"5","key":"3081_CR5","doi-asserted-by":"publisher","first-page":"052307","DOI":"10.1103\/PhysRevA.69.052307","volume":"69","author":"L Xiao","year":"2004","unstructured":"Xiao, L., Deng, F.G., Long, G.L., Pan, J.W.: Efficient multiparty quantum-secret-sharing schemes. Phys. Rev. A 69(5), 052307 (2004)","journal-title":"Phys. Rev. A"},{"key":"3081_CR6","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1007\/s11128-019-2201-1","volume":"18","author":"KJ Zhang","year":"2019","unstructured":"Zhang, K.J., Zhang, X., Jia, H.Y., Zhang, L.: A new n-party quantum secret sharing model based on multiparty entangled states. Quantum Inf. Process. 18, 81 (2019)","journal-title":"Quantum Inf. Process."},{"key":"3081_CR7","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1007\/s11128-019-2319-1","volume":"18","author":"YG Yang","year":"2019","unstructured":"Yang, Y.G., Gao, S., Li, D., Zhou, Y.H., Shi, W.M.: Three-party quantum secret sharing against collective noise. Quantum Inf. Process. 18, 215 (2019)","journal-title":"Quantum Inf. Process."},{"key":"3081_CR8","doi-asserted-by":"publisher","first-page":"1797","DOI":"10.1007\/s11128-012-0492-6","volume":"12","author":"B Liu","year":"2013","unstructured":"Liu, B., Gao, F., Huang, W., Wen, Q.Y.: Multiparty quantum key agreement with single particles. Quantum Inf. Process. 12, 1797\u20131805 (2013)","journal-title":"Quantum Inf. Process."},{"key":"3081_CR9","doi-asserted-by":"publisher","first-page":"170","DOI":"10.1007\/s11128-017-1621-z","volume":"16","author":"P Wang","year":"2017","unstructured":"Wang, P., Sun, Z.W., Sun, X.Q.: Multi-party quantum key agreement protocol secure against collusion attacks. Quantum Inf. Process. 16, 170 (2017)","journal-title":"Quantum Inf. Process."},{"key":"3081_CR10","doi-asserted-by":"publisher","first-page":"180","DOI":"10.1007\/s11128-018-1951-5","volume":"17","author":"DH Jiang","year":"2018","unstructured":"Jiang, D.H., Xu, G.B.: Multiparty quantum key agreement protocol based on locally indistinguishable orthogonal product states. Quantum Inf. Process. 17, 180 (2018)","journal-title":"Quantum Inf. Process."},{"key":"3081_CR11","doi-asserted-by":"publisher","first-page":"042312","DOI":"10.1103\/PhysRevA.65.042312","volume":"65","author":"GH Zeng","year":"2002","unstructured":"Zeng, G.H., Keitel, C.H.: Arbitrated quantum-signature scheme. Phys. Rev. A 65, 042312 (2002)","journal-title":"Phys. Rev. A"},{"key":"3081_CR12","doi-asserted-by":"publisher","first-page":"2487","DOI":"10.1007\/s11128-016-1293-0","volume":"15","author":"YG Yang","year":"2016","unstructured":"Yang, Y.G., Lei, H., Liu, Z.C., Zhou, Y.H., Shi, W.M.: Arbitrated quantum signature scheme based on cluster states. Quantum Inf. Process. 15, 2487\u20132497 (2016)","journal-title":"Quantum Inf. Process."},{"key":"3081_CR13","doi-asserted-by":"publisher","first-page":"2577","DOI":"10.1007\/s11128-015-0995-z","volume":"14","author":"GB Xu","year":"2015","unstructured":"Xu, G.B., Zhang, K.J.: A novel quantum group signature scheme without using entangled states. Quantum Inf. Process. 14, 2577\u20132587 (2015)","journal-title":"Quantum Inf. Process."},{"key":"3081_CR14","doi-asserted-by":"publisher","first-page":"1017","DOI":"10.1007\/s11128-014-0902-z","volume":"14","author":"YG Yang","year":"2015","unstructured":"Yang, Y.G., Zhang, M.O., Yang, R.: Private database queries using one quantum state. Quantum Inf. Process. 14, 1017\u20131024 (2015)","journal-title":"Quantum Inf. Process."},{"issue":"7","key":"3081_CR15","doi-asserted-by":"publisher","first-page":"070301","DOI":"10.1007\/s11433-018-9324-6","volume":"62","author":"F Gao","year":"2019","unstructured":"Gao, F., Qin, S.J., Huang, W., Wen, Q.Y.: Quantum private query: a new kind of practical quantum cryptographic protocol. Sci. China Ser. G 62(7), 070301 (2019)","journal-title":"Sci. China Ser. G"},{"issue":"1","key":"3081_CR16","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1109\/TC.2017.2721404","volume":"67","author":"CY Wei","year":"2018","unstructured":"Wei, C.Y., Cai, X.Q., Liu, B., Wang, T.Y., Gao, F.: A generic construction of quantum-oblivious-key-transfer-based private query with ideal database security and zero failure. IEEE Trans. Comput. 67(1), 2\u20138 (2018)","journal-title":"IEEE Trans. Comput."},{"issue":"1","key":"3081_CR17","doi-asserted-by":"publisher","first-page":"19655","DOI":"10.1038\/srep19655","volume":"6","author":"RH Shi","year":"2016","unstructured":"Shi, R.H., Mu, Y., Zhong, H., Cui, J., Zhang, S.: Secure multiparty quantum computation for summation and multiplication. Sci. Rep. 6(1), 19655 (2016)","journal-title":"Sci. Rep."},{"issue":"11","key":"3081_CR18","doi-asserted-by":"publisher","first-page":"2375","DOI":"10.1007\/s11128-014-0774-2","volume":"13","author":"QL Wang","year":"2014","unstructured":"Wang, Q.L., Sun, H.X., Huang, W.: Multi-party quantum private comparison protocol with $$n$$-level entangled states. Quantum Inf. Process. 13(11), 2375\u20132389 (2014)","journal-title":"Quantum Inf. Process."},{"key":"3081_CR19","doi-asserted-by":"publisher","first-page":"287","DOI":"10.1007\/s11128-019-2401-8","volume":"18","author":"H Cao","year":"2019","unstructured":"Cao, H., Ma, W.P., L\u00fc, L.D., He, Y.F., Liu, G.: Multi-party quantum privacy comparison of size based on $$d$$-level GHZ states. Quantum Inf. Process. 18, 287 (2019)","journal-title":"Quantum Inf. Process."},{"issue":"4","key":"3081_CR20","doi-asserted-by":"publisher","first-page":"1216","DOI":"10.1109\/18.761271","volume":"45","author":"CA Fuchs","year":"1999","unstructured":"Fuchs, C.A., Graaf, J.V.D.: Cryptographic distinguishability measures for quantum mechanical states. IEEE Trans. Inf. Theory 45(4), 1216\u20131227 (1999)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"2","key":"3081_CR21","doi-asserted-by":"publisher","first-page":"398","DOI":"10.1016\/j.jcss.2003.07.010","volume":"68","author":"A Ambainis","year":"2004","unstructured":"Ambainis, A.: A new protocol and lower bounds for quantum coin flipping. J. Comput. Syst. Sci. 68(2), 398\u2013416 (2004)","journal-title":"J. Comput. Syst. Sci."},{"issue":"4","key":"3081_CR22","doi-asserted-by":"publisher","first-page":"1735","DOI":"10.1109\/TIT.2008.917697","volume":"54","author":"J Cederlof","year":"2008","unstructured":"Cederlof, J., Larsson, J.: Security aspects of the authentication used in quantum cryptography. IEEE Trans. Inf. Theory 54(4), 1735\u20131741 (2008)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"6","key":"3081_CR23","doi-asserted-by":"publisher","first-page":"2946","DOI":"10.1109\/TIT.2010.2046217","volume":"56","author":"F Dupuis","year":"2010","unstructured":"Dupuis, F., Hayden, P., Li, K.: A father protocol for quantum broadcast channels. IEEE Trans. Inf. Theory 56(6), 2946\u20132956 (2010)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"1","key":"3081_CR24","doi-asserted-by":"publisher","first-page":"012333","DOI":"10.1103\/PhysRevA.75.012333","volume":"75","author":"JA Vaccaro","year":"2007","unstructured":"Vaccaro, J.A., Spring, J., Chefles, A.: Quantum protocols for anonymous voting and surveying. Phys. Rev. A 75(1), 012333 (2007)","journal-title":"Phys. Rev. A"},{"key":"3081_CR25","doi-asserted-by":"crossref","unstructured":"Christandl, M., Wehner, S.: Quantum anonymous transmissions. In Proc. Asiacrypt 05: 11th International Conference on the Theory and Application of Cryptology and Information Security, vol. 3788, pp. 217\u2013235. Springer, Berlin (2005)","DOI":"10.1007\/11593447_12"},{"issue":"1\u20134","key":"3081_CR26","first-page":"5","volume":"349","author":"M Hillery","year":"2006","unstructured":"Hillery, M., Ziman, M., Bu\u017eek, V., Bielikov\u00e1, M.: Towards quantum-based privacy and voting. Phys. Lett. A 349(1\u20134), 5\u201381 (2006)","journal-title":"Phys. Lett. A"},{"issue":"5","key":"3081_CR27","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1007\/s10043-008-0034-8","volume":"15","author":"Y Li","year":"2008","unstructured":"Li, Y., Zeng, G.: Quantum anonymous voting systems based on entangled state. Opt. Rev. 15(5), 219\u2013223 (2008)","journal-title":"Opt. Rev."},{"issue":"8","key":"3081_CR28","doi-asserted-by":"publisher","first-page":"1172","DOI":"10.1016\/j.physleta.2011.01.038","volume":"375","author":"D Horoshko","year":"2009","unstructured":"Horoshko, D., Kilin, S.: Quantum anonymous voting with anonymity trace. Phys. Lett. A 375(8), 1172\u20131175 (2009)","journal-title":"Phys. Lett. A"},{"key":"3081_CR29","doi-asserted-by":"publisher","first-page":"022331","DOI":"10.1103\/PhysRevA.84.022331","volume":"84","author":"M Bonanome","year":"2011","unstructured":"Bonanome, M., Bu\u017eek, V., Hillery, M., Ziman, M.: Toward protocols for quantum-ensured privacy and secure voting. Phys. Rev. A 84, 022331 (2011)","journal-title":"Phys. Rev. A"},{"issue":"4","key":"3081_CR30","doi-asserted-by":"publisher","first-page":"9335","DOI":"10.1103\/PhysRevA.85.042309","volume":"85","author":"L Jiang","year":"2012","unstructured":"Jiang, L., He, G., Nie, D., Xiong, J., Zeng, G.H.: Quantum anonymous voting for continuous variables. Phys. Rev. A 85(4), 9335\u20139340 (2012)","journal-title":"Phys. Rev. A"},{"issue":"2","key":"3081_CR31","doi-asserted-by":"publisher","first-page":"022333","DOI":"10.1103\/PhysRevA.94.022333","volume":"94","author":"Q Wang","year":"2016","unstructured":"Wang, Q., Yu, C., Gao, F., Qi, H.Y., Wen, Q.Y.: Self-tallying quantum anonymous voting. Phys. Rev. A 94(2), 022333 (2016)","journal-title":"Phys. Rev. A"},{"issue":"16","key":"3081_CR32","first-page":"581","volume":"62","author":"YW Wang","year":"2013","unstructured":"Wang, Y.W.: Quantum voting protocols based on the non-symmetric quantum channel with controlled quantum operation teleportation. Acta Phys. Sin. 62(16), 581\u2013586 (2013)","journal-title":"Acta Phys. Sin."},{"key":"3081_CR33","doi-asserted-by":"publisher","first-page":"3327","DOI":"10.1007\/s11128-016-1349-1","volume":"15","author":"Y Guo","year":"2019","unstructured":"Guo, Y., Feng, Y.Y., Zeng, G.H.: Quantum anonymous voting with unweighted continuous-variable graph states. Quantum Inf. Process. 15, 3327\u20133345 (2019)","journal-title":"Quantum Inf. Process."},{"issue":"5","key":"3081_CR34","doi-asserted-by":"publisher","first-page":"2303","DOI":"10.1007\/s10773-015-2868-8","volume":"55","author":"JH Tian","year":"2016","unstructured":"Tian, J.H., Zhang, J.Z., Li, Y.P.: A voting protocol based on the controlled quantum operation teleportation. Int. J. Theor. Phys. 55(5), 2303\u20132310 (2016)","journal-title":"Int. J. Theor. Phys."},{"key":"3081_CR35","doi-asserted-by":"publisher","first-page":"7586","DOI":"10.1038\/s41598-017-07976-1","volume":"7","author":"P Xue","year":"2017","unstructured":"Xue, P., Zhang, X.: A simple quantum voting scheme with multi-qubit entanglement. Sci. Rep. 7, 7586 (2017)","journal-title":"Sci. Rep."},{"key":"3081_CR36","unstructured":"Arapinis, M., Kashefi, E., Lamprou, N., Pappa, A.: Definitions and analysis of quantum e-voting protocols. arXiv:1810.05083 (2018)"},{"key":"3081_CR37","doi-asserted-by":"publisher","unstructured":"Delaune, S., Kremer, S., M., Ryan, M.: Coercion-resistance and receipt-freeness in electronic voting. In: 19th IEEE Computer Security Foundations Workshop (CSFW\u201906), Venice, Italy, pp.12-42. https:\/\/doi.org\/10.1109\/CSFW.2006.8. (2006)","DOI":"10.1109\/CSFW.2006.8."},{"key":"3081_CR38","doi-asserted-by":"crossref","unstructured":"Canetti, R.: Universally composable security: a new paradigm for cryptographic protocols. In: Proceedings of the 42nd IEEE Symposium on Foundations of Computer Science, USA, pp. 136\u2013145 (2001)","DOI":"10.1109\/SFCS.2001.959888"},{"key":"3081_CR39","doi-asserted-by":"crossref","unstructured":"Unruh, D.: Universally composable quantum multi-party computation. Lecture Notes Comput Science pp. 486\u2013505 (2010)","DOI":"10.1007\/978-3-642-13190-5_25"},{"key":"3081_CR40","unstructured":"Kashefi, E., Music, L., Wallden, P.: The quantum cut-and-choose technique and quantum two-party computation. arXiv:1703.03754 (2017)"},{"key":"3081_CR41","unstructured":"Adida, B.: Helios: web-based open-audit voting. In: USENIX Security Symposium, vol. 17 (2008)"},{"key":"3081_CR42","doi-asserted-by":"crossref","unstructured":"Kiayias, A., Zacharias, T., Zhang, B.: End-to-end verifiable elections in the standard model. In: Proceedings of the 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Springer, Berlin (2015)","DOI":"10.1007\/978-3-662-46803-6_16"},{"issue":"4","key":"3081_CR43","doi-asserted-by":"publisher","first-page":"662","DOI":"10.1109\/TIFS.2009.2033233","volume":"4","author":"PY Ryan","year":"2010","unstructured":"Ryan, P.Y., Bismark, D., Heather, J., Schneider, S., Xia, Z.: Pr\u00eat \u00e0 voter: a voter-verifiable voting system. IEEE Trans. Inf. Forensic Security 4(4), 662\u2013673 (2010)","journal-title":"IEEE Trans. Inf. Forensic Security"},{"key":"3081_CR44","doi-asserted-by":"crossref","unstructured":"Cortier, V., Galindo, D., K\u00fcsters, R., Muller, J., Truderung, T.: Sok: verifiability notions for e-voting protocols. In: Proceedings of the IEEE Symposium on Security and Privacy, USA, pp. 779\u2013798 (2016)","DOI":"10.1109\/SP.2016.52"},{"issue":"6","key":"3081_CR45","doi-asserted-by":"publisher","first-page":"539","DOI":"10.1016\/S0167-4048(02)01014-3","volume":"21","author":"DA Gritzalis","year":"2002","unstructured":"Gritzalis, D.A.: Principles and requirements for a secure e-voting system. Comput. Security 21(6), 539\u2013556 (2002)","journal-title":"Comput. Security"},{"key":"3081_CR46","doi-asserted-by":"crossref","unstructured":"Kiayias, A.: Electronic voting (2010)","DOI":"10.1201\/9781420059823-c3"},{"issue":"4","key":"3081_CR47","doi-asserted-by":"publisher","first-page":"045009","DOI":"10.1088\/0031-8949\/81\/04\/045009","volume":"81","author":"NR Zhou","year":"2010","unstructured":"Zhou, N.R., Wang, L.J., Ding, J., Gong, L.H.: Quantum deterministic key distribution protocols based on the authenticated entanglement channel. Phys. Scr. 81(4), 045009 (2010)","journal-title":"Phys. Scr."},{"issue":"1","key":"3081_CR48","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11128-018-2124-2","volume":"18","author":"P Zawadzki","year":"2019","unstructured":"Zawadzki, P.: Quantum identity authentication without entanglement. Quantum Inf. Process. 18(1), 1\u201312 (2019)","journal-title":"Quantum Inf. Process."},{"key":"3081_CR49","doi-asserted-by":"publisher","first-page":"2793","DOI":"10.1007\/s11128-013-0536-6","volume":"12","author":"FZ Guo","year":"2013","unstructured":"Guo, F.Z., Gao, F., Qin, S.J., Zhang, J., Wen, Q.Y.: Quantum private comparison protocol based on entanglement swapping of $$d$$-level Bell states. Quantum Inf. Process. 12, 2793\u20132802 (2013)","journal-title":"Quantum Inf. Process."},{"key":"3081_CR50","doi-asserted-by":"publisher","first-page":"1830","DOI":"10.1007\/s10773-014-2388-y","volume":"54","author":"W Liu","year":"2015","unstructured":"Liu, W., Wang, Y., Wang, X.: Quantum multi-party private comparison protocol using d-dimensional Bell states. Int. J. Theor. Phys. 54, 1830\u20131839 (2015)","journal-title":"Int. J. Theor. Phys."},{"issue":"3","key":"3081_CR51","doi-asserted-by":"publisher","first-page":"032302","DOI":"10.1103\/PhysRevA.65.032302","volume":"65","author":"GL Long","year":"2002","unstructured":"Long, G.L., Liu, X.S.: Theoretically efficient high-capacity quantum-key-distribution scheme. Phys. Rev. A 65(3), 032302 (2002)","journal-title":"Phys. Rev. A"},{"issue":"4","key":"3081_CR52","doi-asserted-by":"publisher","first-page":"359","DOI":"10.1080\/0161-119691885040","volume":"20","author":"F Rubin","year":"1996","unstructured":"Rubin, F.: One-time pad cryptography. Cryptologia 20(4), 359\u2013364 (1996)","journal-title":"Cryptologia"},{"key":"3081_CR53","unstructured":"Ycart, B.: A case of mathematical eponymy: the Vandermonde determinant. arXiv:math.PR:1204.4716"},{"issue":"4","key":"3081_CR54","first-page":"329","volume":"7","author":"F Gao","year":"2007","unstructured":"Gao, F., Qin, S.J., Wen, Q.Y., Zhu, F.C.: A simple participant attack on the br\u00e1dler-du\u011bk protocol. Quantum Inf. Comput. 7(4), 329 (2007)","journal-title":"Quantum Inf. Comput."}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-021-03081-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11128-021-03081-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-021-03081-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,31]],"date-time":"2023-01-31T07:37:17Z","timestamp":1675150637000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11128-021-03081-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4]]},"references-count":54,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2021,4]]}},"alternative-id":["3081"],"URL":"https:\/\/doi.org\/10.1007\/s11128-021-03081-5","relation":{},"ISSN":["1570-0755","1573-1332"],"issn-type":[{"value":"1570-0755","type":"print"},{"value":"1573-1332","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,4]]},"assertion":[{"value":"3 April 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 March 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 April 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"142"}}