{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:50:13Z","timestamp":1767340213511,"version":"3.37.3"},"reference-count":20,"publisher":"Springer Science and Business Media LLC","issue":"12","license":[{"start":{"date-parts":[[2021,11,23]],"date-time":"2021-11-23T00:00:00Z","timestamp":1637625600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,11,23]],"date-time":"2021-11-23T00:00:00Z","timestamp":1637625600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100003725","name":"National Research Foundation of Korea","doi-asserted-by":"crossref","award":["2019R1A2C2007037"],"award-info":[{"award-number":["2019R1A2C2007037"]}],"id":[{"id":"10.13039\/501100003725","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"published-print":{"date-parts":[[2021,12]]},"DOI":"10.1007\/s11128-021-03339-y","type":"journal-article","created":{"date-parts":[[2021,11,23]],"date-time":"2021-11-23T08:02:27Z","timestamp":1637654547000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["Quantum anonymous notification for network-based applications"],"prefix":"10.1007","volume":"20","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0347-6392","authenticated-orcid":false,"given":"Awais","family":"Khan","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2933-8609","authenticated-orcid":false,"given":"Junaid","family":"ur Rehman","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3364-8084","authenticated-orcid":false,"given":"Hyundong","family":"Shin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,11,23]]},"reference":[{"issue":"3","key":"3339_CR1","doi-asserted-by":"publisher","first-page":"648","DOI":"10.1103\/PhysRevLett.83.648","volume":"83","author":"R Cleve","year":"1999","unstructured":"Cleve, R., Gottesman, D., Lo, H.K.: How to share a quantum secret. Phys. Rev. Lett. 83(3), 648 (1999)","journal-title":"Phys. Rev. Lett."},{"issue":"1","key":"3339_CR2","first-page":"1","volume":"5","author":"B Bell","year":"2014","unstructured":"Bell, B., Markham, D., Herrera-Mart\u00ed, D., Marin, A., Wadsworth, W., Rarity, J., Tame, M.: Experimental demonstration of graph-state quantum secret sharing. Nat. Commun. 5(1), 1\u201312 (2014)","journal-title":"Nat. Commun."},{"issue":"6","key":"3339_CR3","doi-asserted-by":"publisher","first-page":"062306","DOI":"10.1103\/PhysRevA.95.062306","volume":"95","author":"N Bao","year":"2017","unstructured":"Bao, N., Halpern, N.Y.: Quantum voting and violation of Arrow\u2019s impossibility theorem. Phys. Rev. A 95(6), 062306 (2017)","journal-title":"Phys. Rev. A"},{"issue":"2","key":"3339_CR4","doi-asserted-by":"publisher","first-page":"022307","DOI":"10.1103\/PhysRevA.97.022307","volume":"97","author":"J Ribeiro","year":"2018","unstructured":"Ribeiro, J., Murta, G., Wehner, S.: Fully device-independent conference key agreement. Phys. Rev. A 97(2), 022307 (2018)","journal-title":"Phys. Rev. A"},{"issue":"7198","key":"3339_CR5","doi-asserted-by":"publisher","first-page":"1023","DOI":"10.1038\/nature07127","volume":"453","author":"HJ Kimble","year":"2008","unstructured":"Kimble, H.J.: The quantum internet. Nature 453(7198), 1023 (2008)","journal-title":"Nature"},{"key":"3339_CR6","doi-asserted-by":"crossref","unstructured":"Wehner, S., Elkouss, D., Hanson, R.: Quantum internet: A vision for the road ahead. Science 362(6412) (2018)","DOI":"10.1126\/science.aam9288"},{"key":"3339_CR7","doi-asserted-by":"crossref","unstructured":"Christandl, M., Wehner, S.: Quantum anonymous transmissions. In: International Conference on the Theory and Application of Cryptology and Information Security, Springer (2005) 217\u2013235","DOI":"10.1007\/11593447_12"},{"issue":"1","key":"3339_CR8","doi-asserted-by":"publisher","first-page":"012333","DOI":"10.1103\/PhysRevA.75.012333","volume":"75","author":"JA Vaccaro","year":"2007","unstructured":"Vaccaro, J.A., Spring, J., Chefles, A.: Quantum protocols for anonymous voting and surveying. Phys. Rev. A 75(1), 012333 (2007)","journal-title":"Phys. Rev. A"},{"key":"3339_CR9","doi-asserted-by":"crossref","unstructured":"Brassard, G., Broadbent, A., Fitzsimons, J., Gambs, S., Tapp, A.: Anonymous quantum communication. In: Advances in Cryptology \u2013 ASIACRYPT 2007, Springer Berlin Heidelberg, 460\u2013473 (2007)","DOI":"10.1007\/978-3-540-76900-2_28"},{"key":"3339_CR10","doi-asserted-by":"crossref","unstructured":"Bouda, J., Sprojcar, J.: Anonymous transmission of quantum information. In: 2007 first international conference on quantum, nano, and micro technologies (ICQNM\u201907), 12\u201312 (2007)","DOI":"10.1109\/ICQNM.2007.2"},{"issue":"4","key":"3339_CR11","doi-asserted-by":"publisher","first-page":"042309","DOI":"10.1103\/PhysRevA.85.042309","volume":"85","author":"L Jiang","year":"2012","unstructured":"Jiang, L., He, G., Nie, D., Xiong, J., Zeng, G.: Quantum anonymous voting for continuous variables. Phys. Rev. A 85(4), 042309 (2012)","journal-title":"Phys. Rev. A"},{"issue":"3","key":"3339_CR12","doi-asserted-by":"publisher","first-page":"032325","DOI":"10.1103\/PhysRevA.89.032325","volume":"89","author":"W Huang","year":"2014","unstructured":"Huang, W., Wen, Q.Y., Liu, B., Su, Q., Qin, S.J., Gao, F.: Quantum anonymous ranking. Phys. Rev. A 89(3), 032325 (2014)","journal-title":"Phys. Rev. A"},{"issue":"5","key":"3339_CR13","doi-asserted-by":"publisher","first-page":"052320","DOI":"10.1103\/PhysRevA.98.052320","volume":"98","author":"V Lipinska","year":"2018","unstructured":"Lipinska, V., Murta, G., Wehner, S.: Anonymous transmission in a noisy quantum network using the W state. Phys. Rev. A 98(5), 052320 (2018)","journal-title":"Phys. Rev. A"},{"issue":"24","key":"3339_CR14","doi-asserted-by":"publisher","first-page":"240501","DOI":"10.1103\/PhysRevLett.122.240501","volume":"122","author":"A Unnikrishnan","year":"2019","unstructured":"Unnikrishnan, A., MacFarlane, I.J., Yi, R., Diamanti, E., Markham, D., Kerenidis, I.: Anonymity for practical quantum networks. Phys. Rev. Lett. 122(24), 240501 (2019)","journal-title":"Phys. Rev. Lett."},{"issue":"6","key":"3339_CR15","doi-asserted-by":"publisher","first-page":"062311","DOI":"10.1103\/PhysRevA.101.062311","volume":"101","author":"YG Yang","year":"2020","unstructured":"Yang, Y.G., Yang, Y.L., Lv, X.L., Zhou, Y.H., Shi, W.M.: Examining the correctness of anonymity for practical quantum networks. Phys. Rev. A 101(6), 062311 (2020)","journal-title":"Phys. Rev. A"},{"key":"3339_CR16","doi-asserted-by":"crossref","unstructured":"Broadbent, A., Tapp, A.: Information-theoretic security without an honest majority. In: international conference on the theory and application of cryptology and information security, Springer (2007) 410\u2013426","DOI":"10.1007\/978-3-540-76900-2_25"},{"issue":"2","key":"3339_CR17","doi-asserted-by":"publisher","first-page":"020325","DOI":"10.1103\/PRXQuantum.1.020325","volume":"1","author":"F Hahn","year":"2020","unstructured":"Hahn, F., de Jong, J., Pappa, A.: Anonymous quantum conference key agreement. PRX Quantum 1(2), 020325 (2020)","journal-title":"PRX Quantum"},{"key":"3339_CR18","doi-asserted-by":"publisher","first-page":"79","DOI":"10.22331\/q-2018-08-06-79","volume":"2","author":"J Preskill","year":"2018","unstructured":"Preskill, J.: Quantum computing in the NISQ era and beyond. Quantum 2, 79 (2018)","journal-title":"Quantum"},{"key":"3339_CR19","unstructured":"IBM-Quantum-team: IBM. ibmq-vigo v1.0.2 https:\/\/quantum-computing.ibm.com (2020)"},{"key":"3339_CR20","unstructured":"Wilde, M.M.: From classical to quantum Shannon theory. arXiv preprint arXiv:1106.1445 (2011)"}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-021-03339-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11128-021-03339-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-021-03339-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,12,2]],"date-time":"2021-12-02T07:16:36Z","timestamp":1638429396000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11128-021-03339-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,23]]},"references-count":20,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2021,12]]}},"alternative-id":["3339"],"URL":"https:\/\/doi.org\/10.1007\/s11128-021-03339-y","relation":{},"ISSN":["1570-0755","1573-1332"],"issn-type":[{"type":"print","value":"1570-0755"},{"type":"electronic","value":"1573-1332"}],"subject":[],"published":{"date-parts":[[2021,11,23]]},"assertion":[{"value":"17 September 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 October 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 November 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"397"}}