{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T03:46:43Z","timestamp":1769744803379,"version":"3.49.0"},"reference-count":44,"publisher":"Springer Science and Business Media LLC","issue":"12","license":[{"start":{"date-parts":[[2021,11,17]],"date-time":"2021-11-17T00:00:00Z","timestamp":1637107200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,11,17]],"date-time":"2021-11-17T00:00:00Z","timestamp":1637107200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"national natural science foundation of china","doi-asserted-by":"publisher","award":["92046001"],"award-info":[{"award-number":["92046001"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"national natural science foundation of china","doi-asserted-by":"publisher","award":["61962009"],"award-info":[{"award-number":["61962009"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"fundamental research funds for the central universities","doi-asserted-by":"publisher","award":["2019XD-A02"],"award-info":[{"award-number":["2019XD-A02"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"published-print":{"date-parts":[[2021,12]]},"DOI":"10.1007\/s11128-021-03327-2","type":"journal-article","created":{"date-parts":[[2021,11,17]],"date-time":"2021-11-17T09:04:56Z","timestamp":1637139896000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":28,"title":["Cluster-state-based quantum secret sharing for users with different abilities"],"prefix":"10.1007","volume":"20","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1455-2714","authenticated-orcid":false,"given":"Chaoyang","family":"Li","sequence":"first","affiliation":[]},{"given":"Chongqiang","family":"Ye","sequence":"additional","affiliation":[]},{"given":"Yuan","family":"Tian","sequence":"additional","affiliation":[]},{"given":"Xiu-Bo","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Jian","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,11,17]]},"reference":[{"key":"3327_CR1","unstructured":"Bennett, C.H., Brassard, G.: Quantum cryptography: Public key distribution and coin tossing. arXiv preprint arXiv:2003.06557 (2020)"},{"issue":"21","key":"3327_CR2","doi-asserted-by":"publisher","first-page":"3121","DOI":"10.1103\/PhysRevLett.68.3121","volume":"68","author":"CH Bennett","year":"1992","unstructured":"Bennett, C.H.: Quantum cryptography using any two nonorthogonal states. Phys. Rev. Lett. 68(21), 3121 (1992)","journal-title":"Phys. Rev. Lett."},{"issue":"1","key":"3327_CR3","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1038\/s41598-016-0001-8","volume":"6","author":"J Li","year":"2016","unstructured":"Li, J., Li, N., Li, L.L., Wang, T.: One step quantum key distribution based on EPR entanglement. Sci. Rep. 6(1), 1\u201310 (2016)","journal-title":"Sci. Rep."},{"key":"3327_CR4","doi-asserted-by":"publisher","first-page":"620","DOI":"10.1007\/s11036-019-01408-2","volume":"26","author":"J Li","year":"2021","unstructured":"Li, J., Li, H.J., Wang, N., Li, C.Y., Hou, Y.Y., Chen, X.B., Yang, Y.G.: A quantum key distribution protocol based on the EPR Pairs and its simulation. Mob. Netw. Appl. 26, 620\u2013628 (2021)","journal-title":"Mob. Netw. Appl."},{"issue":"5","key":"3327_CR5","doi-asserted-by":"publisher","first-page":"052319","DOI":"10.1103\/PhysRevA.69.052319","volume":"69","author":"FG Deng","year":"2004","unstructured":"Deng, F.G., Long, G.L.: Secure direct communication with a quantum one-time pad. Phys. Rev. A 69(5), 052319 (2004)","journal-title":"Phys. Rev. A"},{"issue":"6","key":"3327_CR6","doi-asserted-by":"publisher","first-page":"063017","DOI":"10.1088\/1367-2630\/ab8ab5","volume":"22","author":"T Li","year":"2020","unstructured":"Li, T., Long, G.L.: Quantum secure direct communication based on single-photon Bell-state measurement. New J. Phys. 22(6), 063017 (2020)","journal-title":"New J. Phys."},{"issue":"5","key":"3327_CR7","doi-asserted-by":"publisher","first-page":"055305","DOI":"10.1088\/1751-8113\/42\/5\/055305","volume":"42","author":"YG Yang","year":"2009","unstructured":"Yang, Y.G., Wen, Q.Y.: An efficient two-party quantum private comparison protocol with decoy photons and two-photon entanglement. J. Phys. A Math. Theor. 42(5), 055305 (2009)","journal-title":"J. Phys. A Math. Theor."},{"issue":"5","key":"3327_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11128-019-2266-x","volume":"18","author":"C Li","year":"2019","unstructured":"Li, C., Chen, X.B., Li, H., et al.: Efficient quantum private comparison protocol based on the entanglement swapping between four-qubit cluster state and extended Bell state. Quantum Inf. Process. 18(5), 1\u201312 (2019)","journal-title":"Quantum Inf. Process."},{"issue":"2","key":"3327_CR9","first-page":"1","volume":"20","author":"CQ Ye","year":"2021","unstructured":"Ye, C.Q., Li, J., Cao, Z.W.: A class of protocols for multi-party quantum private comparison based on traveling mode. Quantum Inf. Process. 20(2), 1\u201318 (2021)","journal-title":"Quantum Inf. Process."},{"issue":"3","key":"3327_CR10","doi-asserted-by":"publisher","first-page":"1829","DOI":"10.1103\/PhysRevA.59.1829","volume":"59","author":"M Hillery","year":"1999","unstructured":"Hillery, M., Bu\u017eek, V., Berthiaume, A.: Quantum secret sharing[J]. Phys. Rev. A 59(3), 1829 (1999)","journal-title":"Phys. Rev. A"},{"issue":"4","key":"3327_CR11","doi-asserted-by":"publisher","first-page":"042311","DOI":"10.1103\/PhysRevA.61.042311","volume":"61","author":"D Gottesman","year":"2000","unstructured":"Gottesman, D.: Theory of quantum secret sharing. Phys. Rev. A 61(4), 042311 (2000)","journal-title":"Phys. Rev. A"},{"issue":"18","key":"3327_CR12","doi-asserted-by":"publisher","first-page":"1149","DOI":"10.1049\/el:20045183","volume":"40","author":"N Zhou","year":"2004","unstructured":"Zhou, N., Zeng, G., Xiong, J.: Quantum key agreement protocol. Electron. Lett. 40(18), 1149\u20131150 (2004)","journal-title":"Electron. Lett."},{"key":"3327_CR13","doi-asserted-by":"publisher","first-page":"1944","DOI":"10.1007\/s10773-020-04467-4","volume":"59","author":"W Wang","year":"2020","unstructured":"Wang, W., Zhou, B.M., Zhang, L.: The three-party quantum key agreement protocol with quantum fourier transform. Int. J. Theor. Phys. 59, 1944\u20131955 (2020)","journal-title":"Int. J. Theor. Phys."},{"issue":"6","key":"3327_CR14","doi-asserted-by":"publisher","first-page":"1457","DOI":"10.1007\/s11128-014-0740-z","volume":"13","author":"KF Yu","year":"2014","unstructured":"Yu, K.F., Yang, C.W., Liao, C.H., et al.: Authenticated semi-quantum key distribution protocol using Bell states. Quantum Inf. Process. 13(6), 1457\u20131465 (2014)","journal-title":"Quantum Inf. Process."},{"issue":"1","key":"3327_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11128-020-02927-8","volume":"20","author":"H Hajji","year":"2021","unstructured":"Hajji, H., El Baz, M.: Qutrit-based semi-quantum key distribution protocol. Quantum Inf. Process. 20(1), 1\u201325 (2021)","journal-title":"Quantum Inf. Process."},{"issue":"7","key":"3327_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11128-018-1953-3","volume":"17","author":"J Gu","year":"2018","unstructured":"Gu, J., Lin, P., Hwang, T.: Double C-NOT attack and counterattack on Three-step semi-quantum secure direct communication protocol. Quantum Inf. Process. 17(7), 1\u20138 (2018)","journal-title":"Quantum Inf. Process."},{"issue":"6","key":"3327_CR17","doi-asserted-by":"publisher","first-page":"1807","DOI":"10.1007\/s10773-020-04447-8","volume":"59","author":"Z Rong","year":"2020","unstructured":"Rong, Z., Qiu, D., Zou, X.: Semi-quantum secure direct communication using entanglement. Int. J. Theor. Phys. 59(6), 1807\u20131819 (2020)","journal-title":"Int. J. Theor. Phys."},{"issue":"6","key":"3327_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11128-020-02674-w","volume":"19","author":"LZ Jiang","year":"2020","unstructured":"Jiang, L.Z.: Semi-quantum private comparison based on Bell states. Quantum Inf. Process. 19(6), 1\u201321 (2020)","journal-title":"Quantum Inf. Process."},{"issue":"8","key":"3327_CR19","first-page":"1","volume":"20","author":"CQ Ye","year":"2021","unstructured":"Ye, C.Q., Li, J., Chen, X.B., et al.: Efficient semi-quantum private comparison without using entanglement resource and pre-shared key. Quantum Inf. Process. 20(8), 1\u201319 (2021)","journal-title":"Quantum Inf. Process."},{"issue":"3","key":"3327_CR20","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11128-021-03056-6","volume":"20","author":"NR Zhou","year":"2021","unstructured":"Zhou, N.R., Xu, Q.D., Du, N.S., et al.: Semi-quantum private comparison protocol of size relation with d-dimensional Bell states. Quantum Inf. Process. 20(3), 1\u201315 (2021)","journal-title":"Quantum Inf. Process."},{"issue":"2","key":"3327_CR21","doi-asserted-by":"publisher","first-page":"022303","DOI":"10.1103\/PhysRevA.82.022303","volume":"82","author":"Q Li","year":"2010","unstructured":"Li, Q., Chan, W.H., Long, D.Y.: Semi-quantum secret sharing using entangled states. Phys. Rev. A 82(2), 022303 (2010)","journal-title":"Phys. Rev. A"},{"issue":"6","key":"3327_CR22","doi-asserted-by":"publisher","first-page":"661","DOI":"10.1088\/0253-6102\/70\/6\/661","volume":"70","author":"CQ Ye","year":"2018","unstructured":"Ye, C.Q., Ye, T.Y.: Circular semi-quantum secret sharing using single particles. Commun. Theor. Phys. 70(6), 661 (2018)","journal-title":"Commun. Theor. Phys."},{"issue":"6","key":"3327_CR23","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11128-021-03157-2","volume":"20","author":"Y Tian","year":"2021","unstructured":"Tian, Y., Li, J., Chen, X.B., et al.: An efficient semi-quantum secret sharing protocol of specific bits. Quantum Inf. Process. 20(6), 1\u201311 (2021)","journal-title":"Quantum Inf. Process."},{"issue":"1","key":"3327_CR24","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1007\/s10773-020-04688-7","volume":"60","author":"A Yin","year":"2021","unstructured":"Yin, A., Chen, T.: Authenticated semi-quantum secret sharing based on GHZ-type states. Int. J. Theor. Phys. 60(1), 265\u2013273 (2021)","journal-title":"Int. J. Theor. Phys."},{"issue":"10","key":"3327_CR25","doi-asserted-by":"publisher","first-page":"3164","DOI":"10.1007\/s10773-017-3484-6","volume":"56","author":"WJ Liu","year":"2017","unstructured":"Liu, W.J., Chen, Z.Y., Ji, S., et al.: Multi-party semi-quantum key agreement with delegating quantum computation. Int. J. Theor. Phys. 56(10), 3164\u20133174 (2017)","journal-title":"Int. J. Theor. Phys."},{"issue":"11","key":"3327_CR26","doi-asserted-by":"publisher","first-page":"110304","DOI":"10.1088\/1674-1056\/abaedd","volume":"29","author":"HH Li","year":"2020","unstructured":"Li, H.H., Gong, L.H., Zhou, N.R.: New semi-quantum key agreement protocol based on high-dimensional single-particle states. Chinese Phys. B 29(11), 110304 (2020)","journal-title":"Chinese Phys. B"},{"issue":"4","key":"3327_CR27","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1016\/S0375-9601(03)00074-4","volume":"310","author":"GP Guo","year":"2003","unstructured":"Guo, G.P., Guo, G.C.: Quantum secret sharing without entanglement. Phys. Lett. A 310(4), 247\u2013251 (2003)","journal-title":"Phys. Lett. A"},{"issue":"6","key":"3327_CR28","doi-asserted-by":"publisher","first-page":"1019","DOI":"10.1088\/0253-6102\/54\/6\/13","volume":"54","author":"CR Hsieh","year":"2010","unstructured":"Hsieh, C.R., Tasi, C.W., Hwang, T.: Quantum secret sharing using GHZ-like state. Commun. Theor. Phys. 54(6), 1019 (2010)","journal-title":"Commun. Theor. Phys."},{"issue":"2","key":"3327_CR29","doi-asserted-by":"publisher","first-page":"022339","DOI":"10.1103\/PhysRevA.100.022339","volume":"100","author":"WP Grice","year":"2019","unstructured":"Grice, W.P., Qi, B.: Quantum secret sharing using weak coherent states. Phys. Rev. A 100(2), 022339 (2019)","journal-title":"Phys. Rev. A"},{"issue":"3","key":"3327_CR30","doi-asserted-by":"publisher","first-page":"032410","DOI":"10.1103\/PhysRevA.103.032410","volume":"103","author":"Q Liao","year":"2021","unstructured":"Liao, Q., Liu, H., Zhu, L., et al.: Quantum secret sharing using discretely modulated coherent states. Phys. Rev. A 103(3), 032410 (2021)","journal-title":"Phys. Rev. A"},{"issue":"17","key":"3327_CR31","doi-asserted-by":"publisher","first-page":"177903","DOI":"10.1103\/PhysRevLett.92.177903","volume":"92","author":"AM Lance","year":"2004","unstructured":"Lance, A.M., Symul, T., Bowen, W.P., Sanders, B.C., Lam, P.K.: Tripartite quantum state sharing. Phys. Rev. Lett. 92(17), 177903 (2004)","journal-title":"Phys. Rev. Lett."},{"issue":"1","key":"3327_CR32","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/JPHOT.2017.2653621","volume":"9","author":"H Cao","year":"2017","unstructured":"Cao, H., Ma, W.P.: (t, n) Threshold quantum state sharing scheme based on linear equations and unitary operation. IEEE Photonics J. 9(1), 1\u20137 (2017)","journal-title":"IEEE Photonics J."},{"issue":"6","key":"3327_CR33","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11128-018-1912-z","volume":"17","author":"H Qin","year":"2018","unstructured":"Qin, H., Tso, R.: Threshold quantum state sharing based on entanglement swapping. Quantum Inf. Process. 17(6), 1\u201311 (2018)","journal-title":"Quantum Inf. Process."},{"issue":"4","key":"3327_CR34","doi-asserted-by":"publisher","first-page":"042421","DOI":"10.1103\/PhysRevA.103.042421","volume":"103","author":"SH Lie","year":"2021","unstructured":"Lie, S.H., Choi, S., Jeong, H.: Min-entropy as a resource for one-shot private state transfer, quantum masking, and state transition. Phys. Rev. A 103(4), 042421 (2021)","journal-title":"Phys. Rev. A"},{"issue":"4","key":"3327_CR35","doi-asserted-by":"publisher","first-page":"045304","DOI":"10.1088\/1751-8113\/46\/4\/045304","volume":"46","author":"L Li","year":"2013","unstructured":"Li, L., Qiu, D., Mateus, P.: Quantum secret sharing with classical Bobs. J. Phys. A Math. Theor. 46(4), 045304 (2013)","journal-title":"J. Phys. A Math. Theor."},{"issue":"10","key":"3327_CR36","doi-asserted-by":"publisher","first-page":"3819","DOI":"10.1007\/s10773-015-2622-2","volume":"54","author":"C Xie","year":"2015","unstructured":"Xie, C., Li, L., Qiu, D.: A novel semi-quantum secret sharing scheme of specific bits. Int. J. Theor. Phys. 54(10), 3819\u20133824 (2015)","journal-title":"Int. J. Theor. Phys."},{"issue":"13","key":"3327_CR37","doi-asserted-by":"publisher","first-page":"1750150","DOI":"10.1142\/S0217984917501500","volume":"31","author":"A Yin","year":"2017","unstructured":"Yin, A., Wang, Z., Fu, F.: A novel semi-quantum secret sharing scheme based on Bell states. Modern Phys. Lett. B 31(13), 1750150 (2017)","journal-title":"Modern Phys. Lett. B"},{"issue":"22","key":"3327_CR38","doi-asserted-by":"publisher","first-page":"1850256","DOI":"10.1142\/S0217984918502561","volume":"32","author":"AH Yin","year":"2018","unstructured":"Yin, A.H., Tong, Y.: A novel semi-quantum secret sharing scheme using entangled states. Modern Phys. Lett. B 32(22), 1850256 (2018)","journal-title":"Modern Phys. Lett. B"},{"issue":"10","key":"3327_CR39","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11128-017-1770-0","volume":"17","author":"Z Li","year":"2018","unstructured":"Li, Z., Li, Q., Liu, C., et al.: Limited resource semiquantum secret sharing. Quantum Inf. Process. 17(10), 1\u201311 (2018)","journal-title":"Quantum Inf. Process."},{"key":"3327_CR40","doi-asserted-by":"crossref","unstructured":"Cao, G., Chen, C., Jiang, M.: A scalable and flexible multi-user semi-quantum secret sharing. Proceedings of the 2nd International Conference on Telecommunications and Communication Engineering. 28-32, (2018)","DOI":"10.1145\/3291842.3291857"},{"issue":"27","key":"3327_CR41","doi-asserted-by":"publisher","first-page":"1950213","DOI":"10.1142\/S0217732319502134","volume":"34","author":"CW Tsai","year":"2019","unstructured":"Tsai, C.W., Yang, C.W., Lee, N.Y.: Semi-quantum secret sharing protocol using W-state. Modern Phys. Lett. A 34(27), 1950213 (2019)","journal-title":"Modern Phys. Lett. A"},{"issue":"5","key":"3327_CR42","doi-asserted-by":"publisher","first-page":"910","DOI":"10.1103\/PhysRevLett.86.910","volume":"86","author":"HJ Briegel","year":"2001","unstructured":"Briegel, H.J., Raussendorf, R.: Persistent entanglement in arrays of interacting particles. Phys. Rev. Lett. 86(5), 910 (2001)","journal-title":"Phys. Rev. Lett."},{"issue":"14","key":"3327_CR43","doi-asserted-by":"publisher","first-page":"140501","DOI":"10.1103\/PhysRevLett.99.140501","volume":"99","author":"M Boyer","year":"2007","unstructured":"Boyer, M., Kenigsberg, D., Mor, T.: Quantum key distribution with classical bob. Phys. Rev. Lett. 99(14), 140501 (2007)","journal-title":"Phys. Rev. Lett."},{"key":"3327_CR44","doi-asserted-by":"crossref","unstructured":"Krawec, W.O.: Security proof of a semi-quantum key distribution protocol. 2015 IEEE International Symposium on Information Theory (ISIT). IEEE, 686-690 (2015)","DOI":"10.1109\/ISIT.2015.7282542"}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-021-03327-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11128-021-03327-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-021-03327-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,9]],"date-time":"2023-02-09T10:06:36Z","timestamp":1675937196000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11128-021-03327-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,17]]},"references-count":44,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2021,12]]}},"alternative-id":["3327"],"URL":"https:\/\/doi.org\/10.1007\/s11128-021-03327-2","relation":{},"ISSN":["1570-0755","1573-1332"],"issn-type":[{"value":"1570-0755","type":"print"},{"value":"1573-1332","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,11,17]]},"assertion":[{"value":"10 June 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 October 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 November 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"385"}}