{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,17]],"date-time":"2026-03-17T08:15:09Z","timestamp":1773735309938,"version":"3.50.1"},"reference-count":56,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2021,5,1]],"date-time":"2021-05-01T00:00:00Z","timestamp":1619827200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,5,1]],"date-time":"2021-05-01T00:00:00Z","timestamp":1619827200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"Shanghai Science and Technology Project in 2020","award":["20040501500"],"award-info":[{"award-number":["20040501500"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61763014 and 62062035"],"award-info":[{"award-number":["61763014 and 62062035"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Science and technology research project of Jiangxi Provincial Education Department","award":["GJJ190297"],"award-info":[{"award-number":["GJJ190297"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"published-print":{"date-parts":[[2021,5]]},"DOI":"10.1007\/s11128-021-03103-2","type":"journal-article","created":{"date-parts":[[2021,5,3]],"date-time":"2021-05-03T08:24:38Z","timestamp":1620030278000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":47,"title":["A novel dynamic quantum secret sharing in high-dimensional quantum system"],"prefix":"10.1007","volume":"20","author":[{"given":"WenWen","family":"Hu","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8894-8108","authenticated-orcid":false,"given":"Ri-Gui","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Xin","family":"Li","sequence":"additional","affiliation":[]},{"given":"Ping","family":"Fan","sequence":"additional","affiliation":[]},{"given":"CanYun","family":"Tan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,5,3]]},"reference":[{"key":"3103_CR1","volume-title":"Quantum Computation and Quantum Information","author":"MA Nielsen","year":"2010","unstructured":"Nielsen, M.A., Chuang, I.L.: Quantum Computation and Quantum Information. Cambridge University, Cambridge, England (2010)"},{"key":"3103_CR2","doi-asserted-by":"publisher","first-page":"2050401","DOI":"10.1142\/S0217984920504011","volume":"34","author":"M Zidan","year":"2020","unstructured":"Zidan, M.: A novel quantum computing model based on entanglement degree. Mod. Phys. Lett. B 34, 2050401 (2020)","journal-title":"Mod. Phys. Lett. B"},{"key":"3103_CR3","doi-asserted-by":"publisher","first-page":"1484","DOI":"10.1137\/S0097539795293172","volume":"26","author":"P Shor","year":"1997","unstructured":"Shor, P.: Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM J. Comput. 26, 1484 (1997)","journal-title":"SIAM J. Comput."},{"key":"3103_CR4","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1103\/PhysRevLett.79.325","volume":"79","author":"LK Grover","year":"1997","unstructured":"Grover, L.K.: Quantum mechanics helps in searching for a needle in a haystack. Phys. Rev. Lett. 79, 325 (1997)","journal-title":"Phys. Rev. Lett."},{"key":"3103_CR5","doi-asserted-by":"publisher","first-page":"102549","DOI":"10.1016\/j.rinp.2019.102549","volume":"15","author":"M Zidan","year":"2019","unstructured":"Zidan, M., Abdel-Aty, A., Nguyene, D.M., et al.: A quantum algorithm based on entanglement measure for classifying multi-variate function into novel hidden classes. Results Phys. 15, 102549 (2019)","journal-title":"Results Phys."},{"key":"3103_CR6","doi-asserted-by":"publisher","first-page":"042309","DOI":"10.1103\/PhysRevA.73.042309","volume":"73","author":"G Gordon","year":"2006","unstructured":"Gordon, G., Rigolin, G.: Generalized teleportation protocol. Phys. Rev. A. 73, 042309 (2006)","journal-title":"Phys. Rev. A."},{"key":"3103_CR7","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1098\/rspa.1985.0070","volume":"400","author":"D Deutsch","year":"1985","unstructured":"Deutsch, D.: Quantum theory, the church-turing principle and the universal quantum computer. Proc. R. Soc. Lond. A. 400, 97 (1985)","journal-title":"Proc. R. Soc. Lond. A."},{"key":"3103_CR8","doi-asserted-by":"publisher","first-page":"103536","DOI":"10.1016\/j.rinp.2020.103536","volume":"21","author":"M Zidan","year":"2021","unstructured":"Zidan, M., Eleuch, H., Abdel-Aty, M.: Non-classical computing problems: Toward novel type of quantum computing problems. Results Phys. 21, 103536 (2021)","journal-title":"Results Phys."},{"key":"3103_CR9","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1016\/j.tcs.2014.05.025","volume":"560","author":"CH Bennett","year":"2014","unstructured":"Bennett, C.H., Brassard, G.: Quantum cryptography: Public key distribution and coin tossing. Theor. Comput. Sci. 560, 7\u201311 (2014)","journal-title":"Theor. Comput. Sci."},{"key":"3103_CR10","doi-asserted-by":"publisher","first-page":"661","DOI":"10.1103\/PhysRevLett.67.661","volume":"67","author":"AK Ekert","year":"1991","unstructured":"Ekert, A.K.: Quantum cryptography based on Bell\u2019s theorem. Phys. Rev. Lett. 67, 661 (1991)","journal-title":"Phys. Rev. Lett."},{"key":"3103_CR11","doi-asserted-by":"crossref","unstructured":"C.H. Bennett, G. Brassard, C. Crepeau, R. Jozsa, A, Peres, and W.K. Wootters, \u201cTeleporting an unknown quantum state via dual classical and Einstein-Podolsky-Rosen channels,\u201d Phys. Rev. Lett., 70, 1895 (1993).","DOI":"10.1103\/PhysRevLett.70.1895"},{"key":"3103_CR12","doi-asserted-by":"publisher","first-page":"1829","DOI":"10.1103\/PhysRevA.59.1829","volume":"59","author":"M Hillery","year":"1999","unstructured":"Hillery, M., Bu\u017eek, V., Berthiaume, A.: Quantum secret sharing. Phys. Rev. A 59, 1829 (1999)","journal-title":"Phys. Rev. A"},{"key":"3103_CR13","doi-asserted-by":"publisher","first-page":"172","DOI":"10.1016\/j.ins.2019.06.009","volume":"501","author":"XB Chen","year":"2019","unstructured":"Chen, X.B., Sun, Y.R., Xu, G., et al.: Quantum homomorphic encryption scheme with flexible number of evaluator based on (k, n)-threshold quantum state sharing. Inform. Sci. 501, 172 (2019)","journal-title":"Inform. Sci."},{"key":"3103_CR14","doi-asserted-by":"publisher","first-page":"187902","DOI":"10.1103\/PhysRevLett.89.187902","volume":"89","author":"K Bostr\u00f6m","year":"2002","unstructured":"Bostr\u00f6m, K., Felbinger, T.: Deterministic secure direct communication using entanglement. Phys. Rev. Lett. 89, 187902 (2002)","journal-title":"Phys. Rev. Lett."},{"key":"3103_CR15","doi-asserted-by":"publisher","first-page":"052319","DOI":"10.1103\/PhysRevA.69.052319","volume":"69","author":"FG Deng","year":"2004","unstructured":"Deng, F.G., Long, G.L.: Secure direct communication with a quantum one-time pad. Phys. Rev. A 69, 052319 (2004)","journal-title":"Phys. Rev. A"},{"key":"3103_CR16","first-page":"809","volume":"58","author":"G Xu","year":"2019","unstructured":"Xu, G., Xiao, K., Li, Z.P., et al.: Controlled Secure Direct Communication Protocol via the Three-Qubit Partially Entangled Set of States. Cmc-Comput. Mater. Con. 58, 809\u2013827 (2019)","journal-title":"Cmc-Comput. Mater. Con."},{"key":"3103_CR17","doi-asserted-by":"publisher","first-page":"022304","DOI":"10.1103\/PhysRevA.65.022304","volume":"65","author":"XS Liu","year":"2002","unstructured":"Liu, X.S., Long, G.L., Tong, D.M., Li, F.: General scheme for super dense coding between multi-parties. Phys. Rev. A 65, 022304 (2002)","journal-title":"Phys. Rev. A"},{"key":"3103_CR18","doi-asserted-by":"publisher","first-page":"4690","DOI":"10.1088\/1674-1056\/18\/11\/013","volume":"18","author":"B Gu","year":"2009","unstructured":"Gu, B., Li, C.Q., Xu, F., Chen, Y.L.: High-capacity three-party quantum secret sharing with superdense coding. Chin. Phys. B 18, 4690 (2009)","journal-title":"Chin. Phys. B"},{"key":"3103_CR19","doi-asserted-by":"publisher","first-page":"044003","DOI":"10.1088\/2058-9565\/ab9f93","volume":"5","author":"YC Li","year":"2020","unstructured":"Li, Y.C., Zhou, R.G., Xu, R.Q., Luo, J., Hu, W.W.: A quantum deep convolutional neural network for image recognition. Quantum Sci. Technol. 5, 044003 (2020)","journal-title":"Quantum Sci. Technol."},{"key":"3103_CR20","doi-asserted-by":"publisher","unstructured":"Li YC, Zhou RG, Xu RQ, J. Luo, S.X. Jiang, \u201cA quantum mechanics-based framework for EEG signal feature extraction and classification,\u201d in IEEE T. Emerg. Top Com. (2020), doi: https:\/\/doi.org\/10.1109\/TETC.2020.3000734.","DOI":"10.1109\/TETC.2020.3000734"},{"key":"3103_CR21","doi-asserted-by":"publisher","first-page":"014001","DOI":"10.1088\/2058-9565\/abbe66","volume":"6","author":"YC Li","year":"2020","unstructured":"Li, Y.C., Zhou, R.G., Xu, R.Q., Hu, W.W., Fan, P.: Quantum algorithm for the nonlinear dimensionality reduction with arbitrary kernel. Quantum Sci. Technol. 6, 014001 (2020)","journal-title":"Quantum Sci. Technol."},{"key":"3103_CR22","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A Shamir","year":"1979","unstructured":"Shamir, A.: How to share a secret. Commun. ACM. 22, 612\u2013613 (1979)","journal-title":"Commun. ACM."},{"key":"3103_CR23","doi-asserted-by":"publisher","unstructured":"G. R. Blakley, \u201cSafeguarding cryptographic key,\u201d In 1979 International Workshop on Managing Requirements Knowledge (MARK), New York, NY, USA, 1979, pp. 313-318https:\/\/doi.org\/10.1109\/MARK.1979.8817296","DOI":"10.1109\/MARK.1979.8817296"},{"key":"3103_CR24","doi-asserted-by":"publisher","first-page":"648","DOI":"10.1103\/PhysRevLett.83.648","volume":"83","author":"R Cleve","year":"1999","unstructured":"Cleve, R., Gottesman, D., Lo, H.K.: How to share a quantum secret. Phys. Rev. Lett. 83, 648 (1999)","journal-title":"Phys. Rev. Lett."},{"key":"3103_CR25","doi-asserted-by":"publisher","first-page":"052307","DOI":"10.1103\/PhysRevA.69.052307","volume":"69","author":"X Li","year":"2004","unstructured":"Li, X., Long, G.L., Deng, F.G., Pan, J.W.: Efficient multiparty quantum-secret-sharing schemes. Phys. Rev. A 69, 052307 (2004)","journal-title":"Phys. Rev. A"},{"key":"3103_CR26","doi-asserted-by":"crossref","unstructured":"T. Gao, F.L. Yan, LI, and Y.C. Li, \u201cQuantum secret sharing between m-party and n-party with six states,\u201d Sci. China Ser. G Phys. Mech. Astron., 52, 1191\u20131202 (2009).","DOI":"10.1007\/s11433-009-0157-3"},{"key":"3103_CR27","doi-asserted-by":"publisher","first-page":"2238","DOI":"10.1007\/s11433-010-4181-0","volume":"53","author":"RH Shi","year":"2010","unstructured":"Shi, R.H., Huang, L.S., Yang, W., Zhong, H.: Quantum secret sharing between multiparty and multiparty with Bell states and Bell measurements. Sci. China-Phys. Mech. Astron. 53, 2238\u20132244 (2010)","journal-title":"Sci. China-Phys. Mech. Astron."},{"key":"3103_CR28","doi-asserted-by":"publisher","first-page":"460","DOI":"10.1007\/s11433-012-4633-9","volume":"55","author":"CW Tsai","year":"2012","unstructured":"Tsai, C.W., Hwang, T.: Multi-party quantum secret sharing based on two special entangled states. Sci. China-Phys. Mech. Astron. 55, 460\u2013464 (2012)","journal-title":"Sci. China-Phys. Mech. Astron."},{"key":"3103_CR29","doi-asserted-by":"publisher","first-page":"1828","DOI":"10.1007\/s11433-012-4767-9","volume":"55","author":"HD Massoud","year":"2012","unstructured":"Massoud, H.D., Elham, F.: A novel and efficient multiparty quantum secret sharing scheme using entangled states. Sci. China-Phys. Mech. Astron. 55, 1828\u20131831 (2012)","journal-title":"Sci. China-Phys. Mech. Astron."},{"issue":"9","key":"3103_CR30","doi-asserted-by":"publisher","first-page":"1308","DOI":"10.1007\/s11433-008-0114-6","volume":"51","author":"YG Yang","year":"2008","unstructured":"Yang, Y.G., Wen, Q.Y.: Sci. China Ser. G-Phys. Mech. Astron. 51(9), 1308\u20131315 (2008)","journal-title":"Sci. China Ser. G-Phys. Mech. Astron."},{"key":"3103_CR31","doi-asserted-by":"publisher","first-page":"6366","DOI":"10.1038\/s41598-017-06486-4","volume":"7","author":"XL Song","year":"2017","unstructured":"Song, X.L., Liu, Y.B., Deng, H.Y., Xiao, Y.G.: Threshold quantum secret sharing between multi-party and multi-party. Sci. Rep. 7, 6366 (2017)","journal-title":"Sci. Rep."},{"key":"3103_CR32","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1007\/s11128-019-2571-4","volume":"19","author":"S Kartick","year":"2020","unstructured":"Kartick, S., Hari, O.: Efficient quantum secret sharing without a trusted player. Quantum Inf. Process. 19, 73 (2020)","journal-title":"Quantum Inf. Process."},{"key":"3103_CR33","doi-asserted-by":"publisher","first-page":"429","DOI":"10.1007\/s11128-013-0660-3","volume":"13","author":"MM Wang","year":"2014","unstructured":"Wang, M.M., Chen, X.B., Yang, Y.X.: Quantum secret sharing for general access structures based on multiparticle entanglements. Quantum Inf. Process. 13, 429\u2013443 (2014)","journal-title":"Quantum Inf. Process."},{"key":"3103_CR34","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1007\/s11128-019-2233-6","volume":"18","author":"S Mashhadi","year":"2019","unstructured":"Mashhadi, S.: General secret sharing based on quantum Fourier transform. Quantum Inf. Process. 18, 114 (2019)","journal-title":"Quantum Inf. Process."},{"key":"3103_CR35","doi-asserted-by":"publisher","first-page":"1035","DOI":"10.1016\/j.physleta.2012.02.004","volume":"376","author":"HY Jia","year":"2012","unstructured":"Jia, H.Y., Wen, Q.Y., Gao, F., Qin, S.J., Guo, F.Z.: Dynamic quantum secret sharing. Phys. Letts. A 376, 1035\u20131041 (2012)","journal-title":"Phys. Letts. A"},{"key":"3103_CR36","doi-asserted-by":"publisher","first-page":"331","DOI":"10.1007\/s11128-012-0380-0","volume":"12","author":"JL Hsu","year":"2013","unstructured":"Hsu, J.L., Chong, S.K., Hwang, T., Tsai, C.W.: Dynamic quantum secret sharing. Quantum Inf. Process. 12, 331\u2013344 (2013)","journal-title":"Quantum Inf. Process."},{"key":"3103_CR37","doi-asserted-by":"publisher","first-page":"1991","DOI":"10.1007\/s11128-012-0508-2","volume":"12","author":"TY Wang","year":"2013","unstructured":"Wang, T.Y., Li, Y.P.: Cryptanalysis of dynamic quantum secret sharing. Quantum Inf. Process. 12, 1991\u20131997 (2013)","journal-title":"Quantum Inf. Process."},{"key":"3103_CR38","doi-asserted-by":"publisher","first-page":"3143","DOI":"10.1007\/s11128-013-0591-z","volume":"12","author":"CH Liao","year":"2013","unstructured":"Liao, C.H., Yang, C.W., Hwang, T.: Comment on \u201cDynamic quantum secret sharing.\u201d Quantum Inf. Process. 12, 3143\u20133147 (2013)","journal-title":"Quantum Inf. Process."},{"key":"3103_CR39","doi-asserted-by":"publisher","first-page":"1907","DOI":"10.1007\/s11128-014-0779-x","volume":"13","author":"CH Liao","year":"2014","unstructured":"Liao, C.H., Yang, C.W., Hwang, T.: Dynamic quantum secret sharing protocol based on GHZ state. Quantum Inf. Process. 13, 1907\u20131916 (2014)","journal-title":"Quantum Inf. Process."},{"key":"3103_CR40","doi-asserted-by":"publisher","first-page":"3143","DOI":"10.1007\/s10773-015-2552-z","volume":"54","author":"S Mishra","year":"2015","unstructured":"Mishra, S., Shukla, C., Pathak, A., Srikanth, R., Venugopalan, A.: An integrated hierarchical dynamic quantum secret sharing protocol. Int. J. Theor. Phys. 54, 3143\u20133154 (2015)","journal-title":"Int. J. Theor. Phys."},{"key":"3103_CR41","doi-asserted-by":"publisher","first-page":"2349","DOI":"10.1016\/j.physleta.2016.05.032","volume":"380","author":"H Liu","year":"2016","unstructured":"Liu, H., Ma, H., Wei, K., Yang, X., Qu, W., Dou, T., Chen, Y., Li, R., Zhu, W.: Multi-group dynamic quantum secret sharing with single photons. Phys. Lett. A 380, 2349\u20132353 (2016)","journal-title":"Phys. Lett. A"},{"key":"3103_CR42","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1007\/s11128-017-1525-y","volume":"16","author":"HW Qin","year":"2017","unstructured":"Qin, H.W., Dai, Y.W.: Dynamic quantum secret sharing by using d-dimensional GHZ state. Quantum Inf. Process. 16, 64 (2017)","journal-title":"Quantum Inf. Process."},{"key":"3103_CR43","doi-asserted-by":"publisher","first-page":"244","DOI":"10.1007\/s11128-018-1970-2","volume":"17","author":"Y Song","year":"2018","unstructured":"Song, Y., Li, Z.H., Li, Y.M.: A dynamic multiparty quantum direct secret sharing based on generalized GHZ states. Quantum Inf. Process. 17, 244 (2018)","journal-title":"Quantum Inf. Process."},{"key":"3103_CR44","doi-asserted-by":"publisher","first-page":"162","DOI":"10.1007\/s11128-020-02662-0","volume":"19","author":"CW Yang","year":"2020","unstructured":"Yang, C.W., Tsai, C.W.: Efficient and secure dynamic quantum secret sharing protocol based on bell states. Quantum Inf. Process. 19, 162 (2020)","journal-title":"Quantum Inf. Process."},{"key":"3103_CR45","doi-asserted-by":"publisher","first-page":"042320","DOI":"10.1103\/PhysRevA.65.042320","volume":"65","author":"K Vahid","year":"2002","unstructured":"Vahid, K., Alireza, B., Saber, B.: Entanglement swapping of generalized cat states and secret sharing. Phys. Rev. A 65, 042320 (2002)","journal-title":"Phys. Rev. A"},{"key":"3103_CR46","doi-asserted-by":"publisher","first-page":"1155","DOI":"10.1142\/S0219749908004341","volume":"6","author":"X Wang","year":"2008","unstructured":"Wang, X., Liu, Y.M., Han, L.F., Zhang, Z.J.: Multiparty quantum secret sharing of secure direct communication with high-dimensional quantum superdense coding. Int. J. Quantum Inf. 6, 1155\u20131163 (2008)","journal-title":"Int. J. Quantum Inf."},{"key":"3103_CR47","doi-asserted-by":"publisher","first-page":"012344","DOI":"10.1103\/PhysRevA.78.012344","volume":"78","author":"IC Yu","year":"2008","unstructured":"Yu, I.C., Lin, F.L., Huang, C.Y.: Quantum secret sharing with multi-level mutually (un-)biased bases. Phys. Rev. A 78, 012344 (2008)","journal-title":"Phys. Rev. A"},{"key":"3103_CR48","doi-asserted-by":"publisher","first-page":"1785","DOI":"10.1007\/s11128-011-0333-z","volume":"11","author":"ZH Liu","year":"2012","unstructured":"Liu, Z.H., Chen, H.W., Xu, J.: High-dimensional deterministic multiparty quantum secret sharing without unitary operations. Quantum Inf. Process. 11, 1785\u20131795 (2012)","journal-title":"Quantum Inf. Process."},{"key":"3103_CR49","doi-asserted-by":"publisher","unstructured":"M.M. Wang, L.T. Tian, and Z.G. Qu, \u201cEfficient Multiparty Quantum Secret Sharing Scheme in High-dimensional System,\u201d In International Conference on Cloud Computing and Security, Lecture Notes in Computer Science, pp: 23\u201331. Available: https:\/\/doi.org\/https:\/\/doi.org\/10.1007\/978-3-030-00012-7_3.","DOI":"10.1007\/978-3-030-00012-7_3"},{"key":"3103_CR50","doi-asserted-by":"publisher","first-page":"6600106","DOI":"10.1109\/JSTQE.2020.2975600","volume":"26","author":"HW Qin","year":"2020","unstructured":"Qin, H.W., Tang, W., Tso, R.L.: Hierarchical Quantum Secret Sharing Based On Special High-dimensional Entangled State. IEEE J. Sel. Top. Quant. 26, 6600106 (2020)","journal-title":"IEEE J. Sel. Top. Quant."},{"key":"3103_CR51","doi-asserted-by":"publisher","first-page":"052331","DOI":"10.1103\/PhysRevA.65.052331","volume":"65","author":"K Vahid","year":"2002","unstructured":"Vahid, K., Alireza, B., Saber, B.: Quantum key distribution for d-level systems with generalized Bell states. Phys. Rev. A 65, 052331 (2002)","journal-title":"Phys. Rev. A"},{"key":"3103_CR52","doi-asserted-by":"publisher","first-page":"363","DOI":"10.1016\/0003-4916(89)90322-9","volume":"191","author":"WK Wootters","year":"1989","unstructured":"Wootters, W.K., Fields, B.D.: Optimal state-determination by mutually unbiased measurements. Ann. Phys. 191, 363\u2013381 (1989)","journal-title":"Ann. Phys."},{"key":"3103_CR53","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1016\/j.laa.2004.04.025","volume":"390","author":"AO Pittenge","year":"2004","unstructured":"Pittenge, A.O., Rubin, M.H.: Mutually unbiased bases, generalized spin matrices and separability. Linear Algebra Appl. 390, 255 (2004)","journal-title":"Linear Algebra Appl."},{"key":"3103_CR54","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1103\/RevModPhys.74.145","volume":"74","author":"N Gisin","year":"2002","unstructured":"Gisin, N., Ribordy, G., Tittel, W., Zbinden, H.: Quantum cryptography. Rev. Mod. Phys. 74, 145 (2002)","journal-title":"Rev. Mod. Phys."},{"key":"3103_CR55","doi-asserted-by":"publisher","first-page":"062311","DOI":"10.1103\/PhysRevA.100.062311","volume":"100","author":"A Fonseca","year":"2019","unstructured":"Fonseca, A.: High-dimensional quantum teleportation under noisy environments. Phys. Rev. A 100, 062311 (2019)","journal-title":"Phys. Rev. A"},{"key":"3103_CR56","doi-asserted-by":"publisher","first-page":"235303","DOI":"10.1088\/1751-8113\/41\/23\/235303","volume":"41","author":"RA Bertlmann","year":"2008","unstructured":"Bertlmann, R.A., Krammer, P.: Bloch vectors for qudits. J. Phys. A 41, 235303 (2008)","journal-title":"J. Phys. A"}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-021-03103-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11128-021-03103-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-021-03103-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,1]],"date-time":"2023-02-01T10:25:47Z","timestamp":1675247147000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11128-021-03103-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5]]},"references-count":56,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2021,5]]}},"alternative-id":["3103"],"URL":"https:\/\/doi.org\/10.1007\/s11128-021-03103-2","relation":{},"ISSN":["1570-0755","1573-1332"],"issn-type":[{"value":"1570-0755","type":"print"},{"value":"1573-1332","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,5]]},"assertion":[{"value":"14 December 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 April 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 May 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"159"}}