{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,15]],"date-time":"2026-04-15T10:05:34Z","timestamp":1776247534918,"version":"3.50.1"},"reference-count":61,"publisher":"Springer Science and Business Media LLC","issue":"10","license":[{"start":{"date-parts":[[2021,10,1]],"date-time":"2021-10-01T00:00:00Z","timestamp":1633046400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,10,1]],"date-time":"2021-10-01T00:00:00Z","timestamp":1633046400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62171264"],"award-info":[{"award-number":["62171264"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["11974373"],"award-info":[{"award-number":["11974373"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100007129","name":"Natural Science Foundation of Shandong Province","doi-asserted-by":"crossref","award":["ZR2019MF023"],"award-info":[{"award-number":["ZR2019MF023"]}],"id":[{"id":"10.13039\/501100007129","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"published-print":{"date-parts":[[2021,10]]},"DOI":"10.1007\/s11128-021-03288-6","type":"journal-article","created":{"date-parts":[[2021,10,15]],"date-time":"2021-10-15T14:28:36Z","timestamp":1634308116000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["A novel quantum anonymous ranking protocol"],"prefix":"10.1007","volume":"20","author":[{"given":"Yue-Ran","family":"Li","sequence":"first","affiliation":[]},{"given":"Dong-Huan","family":"Jiang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7061-126X","authenticated-orcid":false,"given":"Xiang-Qian","family":"Liang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,10,15]]},"reference":[{"key":"3288_CR1","doi-asserted-by":"crossref","unstructured":"Yao, A.C.: Protocols for secure computations. In: Proceedings of the 23rd Annual IEEE Symposium on Foundations of Computer Science, pp. 160-164. Chicago (1982)","DOI":"10.1109\/SFCS.1982.38"},{"key":"3288_CR2","doi-asserted-by":"crossref","unstructured":"Goldreich, O., Micali, S., Wigderson, A.: How to play any mental game-A completeness theorem for protocols with honest majority. In: Proceedings of the 19th Annual ACM Symposium on Theory of Computing, pp. 218\u2013229. New York (1987)","DOI":"10.1145\/28395.28420"},{"key":"3288_CR3","doi-asserted-by":"crossref","unstructured":"Canetti, R., Lindell, Y., Ostrovsky, R.: Universally composable two-party and multi-party secure computation. In: Proceedings of the Thiry-Fourth annual ACM symposium on Theory of computing, pp. 494\u2013503. Quebec (2002)","DOI":"10.1145\/509907.509980"},{"issue":"1","key":"3288_CR4","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1007\/s001459910006","volume":"13","author":"R Canetti","year":"2000","unstructured":"Canetti, R.: Security and composition of multiparty cryptographic protocols. J. Cryptol. 13(1), 143\u2013202 (2000)","journal-title":"J. Cryptol."},{"issue":"1","key":"3288_CR5","first-page":"59","volume":"1","author":"Y Lindell","year":"2009","unstructured":"Lindell, Y., Pinkas, B.: Secure multiparty computation for privacy-preserving data mining. J. Priv. Confid. 1(1), 59\u201398 (2009)","journal-title":"J. Priv. Confid."},{"issue":"2","key":"3288_CR6","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1103\/PhysRevLett.79.325","volume":"79","author":"LK Grover","year":"1997","unstructured":"Grover, L.K.: Quantum mechanics helps in searching for a needle in a haystack. Phys. Rev. Lett. 79(2), 325\u2013328 (1997)","journal-title":"Phys. Rev. Lett."},{"key":"3288_CR7","first-page":"212","volume":"79","author":"LK Grover","year":"1997","unstructured":"Grover, L.K.: A fast quantum mechanical algorithm for database search. Phys. Rev. Lett. 79, 212\u2013219 (1997)","journal-title":"Phys. Rev. Lett."},{"issue":"2","key":"3288_CR8","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1137\/S0036144598347011","volume":"41","author":"PW Shor","year":"1999","unstructured":"Shor, P.W.: Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM Rev. 41(2), 303\u2013332 (1999)","journal-title":"SIAM Rev."},{"key":"3288_CR9","unstructured":"Shor, P.W.: Algorithms for quantum computation: discrete logarithms and factoring. In: Proceedings 35th Annual Symposium on Foundations of Computer Science, pp. 124-134. IEEE, SantaFe (1994)"},{"key":"3288_CR10","unstructured":"Shi, Y.P.: A brief introduction to quantum computing and quantum information (I). Math. Model. Appl. 7(2), 1\u201310 (2018) (in Chinese)"},{"key":"3288_CR11","unstructured":"Shi, Y.P.: A brief introduction to quantum computing and quantum information (II). Math. Model. Appl. 7(3), 1\u201311 (2018) (in Chinese)"},{"key":"3288_CR12","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1007\/s11128-021-03062-8","volume":"20","author":"GB Xu","year":"2021","unstructured":"Xu, G.B., Jiang, D.H.: Novel methods to construct nonlocal sets of orthogonal product states in an arbitrary bipartite high-dimensional system. Quantum Inf. Process. 20, 128 (2021)","journal-title":"Quantum Inf. Process."},{"key":"3288_CR13","doi-asserted-by":"publisher","first-page":"052307","DOI":"10.1103\/PhysRevA.69.052307","volume":"69","author":"L Xiao","year":"2004","unstructured":"Xiao, L., Long, G.L., Deng, F.G., Pan, J.W.: Efficient multiparty quantum-secret-sharing schemes. Phys. Rev. A 69, 052307 (2004)","journal-title":"Phys. Rev. A"},{"key":"3288_CR14","doi-asserted-by":"publisher","first-page":"329","DOI":"10.1016\/j.physleta.2005.02.001","volume":"337","author":"FG Deng","year":"2005","unstructured":"Deng, F.G., Long, G.L., Zhou, H.Y.: Bidirectional quantum secret sharing and secret splitting with polarized single photons. Phys. Lett. A 337, 329 (2005)","journal-title":"Phys. Lett. A"},{"key":"3288_CR15","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1016\/j.physleta.2005.05.049","volume":"342","author":"ZJ Zhang","year":"2005","unstructured":"Zhang, Z.J.: Multiparty quantum secret sharing of secure direct communication. Phys. Lett. A 342, 60\u201366 (2005)","journal-title":"Phys. Lett. A"},{"key":"3288_CR16","doi-asserted-by":"publisher","first-page":"044301","DOI":"10.1103\/PhysRevA.71.044301","volume":"71","author":"ZJ Zhang","year":"2005","unstructured":"Zhang, Z.J., Li, Y., Man, Z.X.: Multiparty quantum secret sharing. Phys. Rev. A 71, 044301 (2005)","journal-title":"Phys. Rev. A"},{"key":"3288_CR17","doi-asserted-by":"publisher","first-page":"230502","DOI":"10.1103\/PhysRevLett.100.230502","volume":"100","author":"V Giovannetti","year":"2008","unstructured":"Giovannetti, V., Lloyd, S., Maccone, L.: Quantum private queries. Phys. Rev. Lett. 100, 230502 (2008)","journal-title":"Phys. Rev. Lett."},{"key":"3288_CR18","doi-asserted-by":"publisher","first-page":"022301","DOI":"10.1103\/PhysRevA.83.022301","volume":"83","author":"M Jakobi","year":"2011","unstructured":"Jakobi, M., Simon, C., Gisin, N., Bancal, G.D., Zbinden, H.: Practical private database queries based on a quantum-key-distribution protocol. Phys. Rev. A 83, 022301 (2011)","journal-title":"Phys. Rev. A"},{"key":"3288_CR19","doi-asserted-by":"publisher","first-page":"022313","DOI":"10.1103\/PhysRevA.84.022313","volume":"84","author":"L Olejnik","year":"2011","unstructured":"Olejnik, L.: Secure quantum private information retrieval using phase-encoded queries. Phys. Rev. A 84, 022313 (2011)","journal-title":"Phys. Rev. A"},{"issue":"16","key":"3288_CR20","doi-asserted-by":"publisher","first-page":"17414","DOI":"10.1364\/OE.20.017411","volume":"20","author":"F Gao","year":"2012","unstructured":"Gao, F., Liu, B., Wen, Q.Y., Chen, H.: Flexible quantum private queries based on quantum key distribution. Opt. Express 20(16), 17414\u201317420 (2012)","journal-title":"Opt. Express"},{"issue":"1","key":"3288_CR21","doi-asserted-by":"publisher","first-page":"012333","DOI":"10.1103\/PhysRevA.75.012333","volume":"75","author":"JA Vaccaro","year":"2007","unstructured":"Vaccaro, J.A., Spring, J., Chefles, A.: Quantum protocols for anonymous voting and surveying. Phys. Rev. A 75(1), 012333 (2007)","journal-title":"Phys. Rev. A"},{"issue":"2","key":"3288_CR22","doi-asserted-by":"publisher","first-page":"290","DOI":"10.1103\/PhysRevA.84.022331","volume":"84","author":"M Bonanome","year":"2011","unstructured":"Bonanome, M., Buzek, V., Hillery, M., Ziman, M.: Toward protocols for quantum-ensured privacy and secure voting. Phys. Rev. A 84(2), 290\u2013296 (2011)","journal-title":"Phys. Rev. A"},{"key":"3288_CR23","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1007\/s10043-008-0034-8","volume":"15","author":"Y Li","year":"2008","unstructured":"Li, Y., Zeng, G.: Quantum anonymous voting systems based on entangled state. Opt. Rev. 15, 219\u2013223 (2008)","journal-title":"Opt. Rev."},{"issue":"1","key":"3288_CR24","doi-asserted-by":"publisher","first-page":"545","DOI":"10.1016\/j.optcom.2010.09.005","volume":"284","author":"HY Jia","year":"2011","unstructured":"Jia, H.Y., Wen, Q.Y., Song, T.T., Gao, F.: Quantum protocol for millionaire problem. Opt. Commun. 284(1), 545 (2011)","journal-title":"Opt. Commun."},{"key":"3288_CR25","doi-asserted-by":"publisher","first-page":"055305","DOI":"10.1088\/1751-8113\/42\/5\/055305","volume":"42","author":"YG Yang","year":"2009","unstructured":"Yang, Y.G., Wen, Q.Y.: An efficient two-party quantum private comparison protocol with decoy photons and two-photon entanglement. J. Phys. A Math. Theor. 42, 055305 (2009)","journal-title":"J. Phys. A Math. Theor."},{"key":"3288_CR26","doi-asserted-by":"publisher","first-page":"559","DOI":"10.1007\/s11128-012-0395-6","volume":"12","author":"S Lin","year":"2013","unstructured":"Lin, S., Sun, Y., Liu, X.F., et al.: Quantum private comparison protocol with d-dimensional Bell states. Quantum Inf. Process. 12, 559\u2013568 (2013)","journal-title":"Quantum Inf. Process."},{"issue":"12","key":"3288_CR27","doi-asserted-by":"publisher","first-page":"2629","DOI":"10.1016\/j.optcom.2011.02.017","volume":"284","author":"W Liu","year":"2011","unstructured":"Liu, W., Wang, Y.B., Jiang, Z.T.: An efficient protocol for the quantum private comparison of equality with W state. Opt. Commun. 284(12), 2629\u20133182 (2011)","journal-title":"Opt. Commun."},{"key":"3288_CR28","doi-asserted-by":"publisher","first-page":"373","DOI":"10.1007\/s11128-011-0251-0","volume":"11","author":"HY Tseng","year":"2012","unstructured":"Tseng, H.Y., Lin, J., Hwang, T.: New quantum private comparison protocol using EPR pairs. Quantum Inf. Process. 11, 373\u2013384 (2012)","journal-title":"Quantum Inf. Process."},{"key":"3288_CR29","doi-asserted-by":"publisher","first-page":"3778","DOI":"10.1007\/s10773-020-04631-w","volume":"59","author":"YT Han","year":"2020","unstructured":"Han, Y.T., Zhang, Y.H., Liang, X.Q.: Quantum sealed-Bid auction protocol based on semi-honest model. Int. J. Theor. Phys. 59, 3778\u20133788 (2020)","journal-title":"Int. J. Theor. Phys."},{"key":"3288_CR30","doi-asserted-by":"publisher","first-page":"242","DOI":"10.1007\/s11128-019-2346-y","volume":"18","author":"HN Liu","year":"2019","unstructured":"Liu, H.N., Liang, X.Q., Jiang, D.H., et al.: Multi-party quantum key agreement with four-qubit cluster states. Quantum Inf. Process. 18, 242 (2019)","journal-title":"Quantum Inf. Process."},{"key":"3288_CR31","doi-asserted-by":"publisher","first-page":"190","DOI":"10.1007\/s11128-019-2305-7","volume":"18","author":"SS Wang","year":"2019","unstructured":"Wang, S.S., Jiang, D.H., Xu, G.B., et al.: Quantum key agreement with Bell states and Cluster states under collective noise channels. Quantum Inf. Process. 18, 190 (2019)","journal-title":"Quantum Inf. Process."},{"issue":"3","key":"3288_CR32","doi-asserted-by":"publisher","first-page":"032302","DOI":"10.1103\/PhysRevA.65.032302","volume":"65","author":"GL Long","year":"2002","unstructured":"Long, G.L., Liu, X.S.: Theoretically efficient high-capacity quantum-key-distribution scheme. Phys. Rev. A 65(3), 032302 (2002)","journal-title":"Phys. Rev. A"},{"issue":"3","key":"3288_CR33","doi-asserted-by":"publisher","first-page":"e51","DOI":"10.1002\/que2.51","volume":"2","author":"QS Xu","year":"2020","unstructured":"Xu, Q.S., Tan, X.Q., Huang, R., Zeng, X.D.: Parallel self-testing for device-independent verifiable blind quantum computation. Quantum Eng. 2(3), e51 (2020)","journal-title":"Quantum Eng."},{"issue":"1","key":"3288_CR34","doi-asserted-by":"publisher","first-page":"e58","DOI":"10.1002\/que2.58","volume":"3","author":"JY Quan","year":"2021","unstructured":"Quan, J.Y., Li, Q., et al.: A simplified verifiable blind quantum computing protocol with quantum input verification. Quantum Eng. 3(1), e58 (2021)","journal-title":"Quantum Eng."},{"issue":"14","key":"3288_CR35","doi-asserted-by":"publisher","first-page":"1025","DOI":"10.1016\/j.scib.2017.06.007","volume":"62","author":"YB Sheng","year":"2017","unstructured":"Sheng, Y.B., Zhou, L.: Distributed secure quantum machine learning. Sci. Bull. 62(14), 1025\u20131029 (2017)","journal-title":"Sci. Bull."},{"issue":"2","key":"3288_CR36","doi-asserted-by":"publisher","first-page":"022307","DOI":"10.1103\/PhysRevA.64.022307","volume":"64","author":"GL Long","year":"2001","unstructured":"Long, G.L.: Grover algorithm with zero theoretical failure rate. Phys. Rev. A 64(2), 022307 (2001)","journal-title":"Phys. Rev. A"},{"key":"3288_CR37","doi-asserted-by":"publisher","first-page":"1897","DOI":"10.1007\/s11128-012-0498-0","volume":"12","author":"FM Toyama","year":"2013","unstructured":"Toyama, F.M., Wytse, V.D., Nogami, Y.: Quantum search with certainty based on modified Grover algorithms: optimum choice of parameters. Quantum Inf. Process. 12, 1897\u20131914 (2013)","journal-title":"Quantum Inf. Process."},{"issue":"3","key":"3288_CR38","doi-asserted-by":"publisher","first-page":"360","DOI":"10.1007\/s10701-015-9968-4","volume":"46","author":"G Castagnoli","year":"2016","unstructured":"Castagnoli, G.: Highlighting the mechanism of the quantum speedup by time-symmetric and relational quantum mechanics. Found. Phys. 46(3), 360\u2013381 (2016)","journal-title":"Found. Phys."},{"key":"3288_CR39","doi-asserted-by":"publisher","first-page":"032325","DOI":"10.1103\/PhysRevA.89.032325","volume":"89","author":"W Huang","year":"2011","unstructured":"Huang, W., Wen, Q.Y., Liu, B., Su, Q., Gao, F.: Quantum anonymous ranking. Phys. Rev. A 89, 032325 (2011)","journal-title":"Phys. Rev. A"},{"key":"3288_CR40","volume-title":"Quantum Computation and Quantum Information","author":"MA Nielsen","year":"2000","unstructured":"Nielsen, M.A., Chuang, I.L.: Quantum Computation and Quantum Information. Cambridge University Press, Cambridge (2000)"},{"key":"3288_CR41","doi-asserted-by":"publisher","first-page":"103536","DOI":"10.1016\/j.rinp.2020.103536","volume":"21","author":"M Zidan","year":"2021","unstructured":"Zidan, M., Eleuch, H., Abdel-Aty, M.: Non-classical computing problems: toward novel type of quantum computing problems. Results Phys. 21, 103536 (2021)","journal-title":"Results Phys."},{"key":"3288_CR42","doi-asserted-by":"crossref","unstructured":"Liu, W., Wu, Q., Shen, J. et al.: An optimized quantum minimum searching algorithm with sure-success probability and its experiment simulation with Cirq. J Ambient Intell Human Comput (2021)","DOI":"10.1007\/s12652-020-02840-z"},{"key":"3288_CR43","doi-asserted-by":"crossref","unstructured":"Shumovsky, A.S., Rupasov, V.I.: Quantum communication and information technologies. ISBN 978-94-010-0171-7 (2003)","DOI":"10.1007\/978-94-010-0171-7"},{"issue":"3","key":"3288_CR44","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1007\/s11467-007-0050-3","volume":"2","author":"GL Long","year":"2007","unstructured":"Long, G.L., Deng, F.G., Wang, C., et al.: Quantum secure direct communication and deterministic secure quantum communication. Front. Phys. China 2(3), 251\u2013272 (2007)","journal-title":"Front. Phys. China"},{"issue":"1","key":"3288_CR45","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1103\/PhysRevA.60.157","volume":"60","author":"K Shimizu","year":"1999","unstructured":"Shimizu, K., Imoto, N.: Communication channels secured from eavesdropping via transmission of photonic Bell states. Phys. Rev. A 60(1), 157\u2013166 (1999)","journal-title":"Phys. Rev. A"},{"issue":"28","key":"3288_CR46","doi-asserted-by":"publisher","first-page":"L407","DOI":"10.1088\/0305-4470\/35\/28\/103","volume":"35","author":"A Beige","year":"2002","unstructured":"Beige, A., Englert, B.G., Kurtsiefer, C., Weinfurter, H.: Secure communication with singlephoton two-qubit states. J. Phys. A Math. Gen. 35(28), L407\u2013L413 (2002)","journal-title":"J. Phys. A Math. Gen."},{"issue":"18","key":"3288_CR47","doi-asserted-by":"publisher","first-page":"187902","DOI":"10.1103\/PhysRevLett.89.187902","volume":"89","author":"K Bostrom","year":"2002","unstructured":"Bostrom, K., T, Felbinger: Deterministic secure direct communication using entanglement. Phys. Rev. Lett. 89(18), 187902-1\u20134 (2002)","journal-title":"Phys. Rev. Lett."},{"issue":"14","key":"3288_CR48","doi-asserted-by":"publisher","first-page":"140501\/1","DOI":"10.1103\/PhysRevLett.94.140501","volume":"94","author":"M Lucamarini","year":"2005","unstructured":"Lucamarini, M., Mancini, S.: Secure deterministic communication without entanglement. Phys. Rev. Lett. 94(14), 140501\/1\u201314050\/14 (2005)","journal-title":"Phys. Rev. Lett."},{"issue":"35","key":"3288_CR49","doi-asserted-by":"publisher","first-page":"2050401","DOI":"10.1142\/S0217984920504011","volume":"34","author":"M Zidan","year":"2020","unstructured":"Zidan, M.: A novel quantum computing model based on entanglement degree. Mod. Phys. Lett. B 34(35), 2050401 (2020)","journal-title":"Mod. Phys. Lett. B"},{"key":"3288_CR50","doi-asserted-by":"publisher","first-page":"102549","DOI":"10.1016\/j.rinp.2019.102549","volume":"15","author":"M Zidan","year":"2019","unstructured":"Zidan, M., Abdel-Aty, M., et al.: A quantum algorithm based on entanglement measure for classifying Boolean multivariate function into novel hidden classes. Results Phys. 15, 102549 (2019)","journal-title":"Results Phys."},{"issue":"3","key":"3288_CR51","doi-asserted-by":"publisher","first-page":"2809","DOI":"10.3233\/JIFS-179566","volume":"38","author":"A Abdel-Aty","year":"2020","unstructured":"Abdel-Aty, A., Kadry, M., Zidan, M., et al.: A quantum classification algorithm for classification incomplete patterns based on entanglement measure. J. Intell. Fuzzy Syst. 38(3), 2809\u20132816 (2020)","journal-title":"J. Intell. Fuzzy Syst."},{"key":"3288_CR52","first-page":"339","volume":"8","author":"QB Luo","year":"2014","unstructured":"Luo, Q.B., Yang, G.W., She, K., Li, X.Y., Wang, Y.Q., Yang, F.: Quantum anonymous ranking with d-level single-particle states. Int. J. Softw. Inform. 8, 339\u2013343 (2014)","journal-title":"Int. J. Softw. Inform."},{"key":"3288_CR53","doi-asserted-by":"publisher","first-page":"012318","DOI":"10.1103\/PhysRevA.93.012318","volume":"93","author":"S Lin","year":"2016","unstructured":"Lin, S., Deng, F.G., Huang, F., Liu, X.F.: Quantum anonymous ranking based on the Chinese remainder theorem. Phys. Rev. A 93, 012318 (2016)","journal-title":"Phys. Rev. A"},{"key":"3288_CR54","doi-asserted-by":"publisher","first-page":"166","DOI":"10.1007\/s11128-020-02664-y","volume":"19","author":"QL Wang","year":"2020","unstructured":"Wang, Q.L., Li, Y.C., Yu, C.H., He, H., Zhang, K.J.: Quantum anonymous ranking and selection with verifiability. Quantum Inf. Process. 19, 166 (2020)","journal-title":"Quantum Inf. Process."},{"key":"3288_CR55","doi-asserted-by":"crossref","unstructured":"Andersson, A., Nilsson, S., Ranman, R.: Sorting in linear time? In: Proceedings of the 27th Annual ACM Symposium on the Theory of Computing, pp. 427\u2013436 (1995)","DOI":"10.1145\/225058.225173"},{"key":"3288_CR56","doi-asserted-by":"crossref","unstructured":"Andersson, A., Nilsson, S.: A new effcient radix sort. In: Proceedings of the 35th Annual IEEE Symposium on Foundations of Computer Science, pp. 714\u2013721. Washington (1994)","DOI":"10.1109\/SFCS.1994.365721"},{"key":"3288_CR57","first-page":"5","volume":"35","author":"CH Yu","year":"2014","unstructured":"Yu, C.H., Guo, G.D., Lin, S.: Quantum private comparison without entanglement. J. Chin. Comput. Syst. 35, 5 (2014)","journal-title":"J. Chin. Comput. Syst."},{"key":"3288_CR58","doi-asserted-by":"publisher","first-page":"022333","DOI":"10.1103\/PhysRevA.94.022333","volume":"94","author":"QL Wang","year":"2016","unstructured":"Wang, Q.L., Yu, C.H., et al.: Self-tallying quantum anonymous voting. Phys. Rev. A 94, 022333 (2016)","journal-title":"Phys. Rev. A"},{"key":"3288_CR59","first-page":"165","volume":"19","author":"O Tetsuhisa","year":"1984","unstructured":"Tetsuhisa, O.: A preliminary study of MSD-first radix-sorting methed. Bull. Aichi Inst. Technol. Part B 19, 165\u2013174 (1984)","journal-title":"Bull. Aichi Inst. Technol. Part B"},{"key":"3288_CR60","doi-asserted-by":"publisher","first-page":"009","DOI":"10.1007\/s11433-013-5224-0","volume":"056","author":"W Huang","year":"2013","unstructured":"Huang, W., Wen, Q.Y., Liu, B., Gao, F., Sun, Y.: Robust and efficient quantum private comparison of equality with collective detection over collective-noise channels. Sci. China Phys. Mech. 056, 009 (2013)","journal-title":"Sci. China Phys. Mech."},{"key":"3288_CR61","first-page":"15","volume":"438","author":"BC Wang","year":"2018","unstructured":"Wang, B.C., Lei, H., Hu, Y.P.: D-NTRU: more efficient and average-case IND-CPA secure NTRU variant. Inf. Sci. Int. J. 438, 15\u201331 (2018)","journal-title":"Inf. Sci. Int. J."}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-021-03288-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11128-021-03288-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-021-03288-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T00:26:39Z","timestamp":1725927999000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11128-021-03288-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10]]},"references-count":61,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2021,10]]}},"alternative-id":["3288"],"URL":"https:\/\/doi.org\/10.1007\/s11128-021-03288-6","relation":{},"ISSN":["1570-0755","1573-1332"],"issn-type":[{"value":"1570-0755","type":"print"},{"value":"1573-1332","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,10]]},"assertion":[{"value":"21 January 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 October 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 October 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"342"}}