{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,15]],"date-time":"2026-01-15T14:37:41Z","timestamp":1768487861776,"version":"3.49.0"},"reference-count":21,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2024,2,9]],"date-time":"2024-02-09T00:00:00Z","timestamp":1707436800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,2,9]],"date-time":"2024-02-09T00:00:00Z","timestamp":1707436800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"DOI":"10.1007\/s11128-024-04265-5","type":"journal-article","created":{"date-parts":[[2024,2,9]],"date-time":"2024-02-09T15:02:15Z","timestamp":1707490935000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["A resilient m-qubit quantum secret sharing scheme using quantum error correction code"],"prefix":"10.1007","volume":"23","author":[{"ORCID":"https:\/\/orcid.org\/0009-0006-0189-4837","authenticated-orcid":false,"given":"Sachi","family":"Gupta","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Aman","family":"Sinha","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Sumit Kumar","family":"Pandey","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2024,2,9]]},"reference":[{"key":"4265_CR1","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A Shamir","year":"1979","unstructured":"Shamir, A.: How to share a secret. Commun. ACM 22, 612\u2013613 (1979). https:\/\/doi.org\/10.1145\/359168.359176","journal-title":"Commun. ACM"},{"key":"4265_CR2","doi-asserted-by":"crossref","unstructured":"Blakley, G.R.: Safeguarding cryptographic keys. Paper presented at the 1979 International Workshop on Managing Requirements Knowledge (MARK) (1979)","DOI":"10.1109\/MARK.1979.8817296"},{"key":"4265_CR3","doi-asserted-by":"publisher","first-page":"1829","DOI":"10.1103\/PhysRevA.59.1829","volume":"59","author":"M Hillery","year":"1999","unstructured":"Hillery, M., Buzek, V., Berthiaume, A.: Quantum secret sharing. Phys. Rev. A 59, 1829\u20131834 (1999). https:\/\/doi.org\/10.1103\/PhysRevA.59.1829","journal-title":"Phys. Rev. A"},{"key":"4265_CR4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-69318-3","volume-title":"Introduction to Quantum Computing","author":"R LaPierre","year":"2021","unstructured":"LaPierre, R.: Introduction to Quantum Computing. Springer, Switzerland (2021)"},{"key":"4265_CR5","doi-asserted-by":"publisher","unstructured":"Karlsson, A., Koashi, M., Imoto, N.: Quantum entanglement for secret sharing and secret splitting. Phys. Rev. A 59(162) (1999) https:\/\/doi.org\/10.1103\/PhysRevA.59.162","DOI":"10.1103\/PhysRevA.59.162"},{"key":"4265_CR6","doi-asserted-by":"publisher","first-page":"355","DOI":"10.1504\/IJCSE.2020.106060","volume":"21","author":"MM Wang","year":"2020","unstructured":"Wang, M.M., Qu, Z.G., Gong, L.M.: Improved quantum secret sharing scheme based on ghz states. Int. J. Comput. Sci. Eng. 21, 355\u2013363 (2020). https:\/\/doi.org\/10.1504\/IJCSE.2020.106060","journal-title":"Int. J. Comput. Sci. Eng."},{"key":"4265_CR7","doi-asserted-by":"publisher","first-page":"2540","DOI":"10.1007\/s10773-012-1133-7","volume":"51","author":"LF Han","year":"2012","unstructured":"Han, L.F., Xu, H.F.: Probabilistic and controlled teleportation of an arbitrary two-qubit state via one dimensional five-qubit cluster-class state. Int. J. Theor. Phys. 51, 2540\u20132545 (2012). https:\/\/doi.org\/10.1007\/s10773-012-1133-7","journal-title":"Int. J. Theor. Phys."},{"key":"4265_CR8","doi-asserted-by":"publisher","first-page":"1367","DOI":"10.1007\/s10773-010-0645-2","volume":"50","author":"YY Nie","year":"2011","unstructured":"Nie, Y.Y., Sang, M.H., Li, Y.H., Liu, J.C.: Three-party quantum information splitting of an arbitrary two-qubit state by using six-qubit cluster state. Int. J. Theor. Phys. 50, 1367\u20131371 (2011). https:\/\/doi.org\/10.1007\/s10773-010-0645-2","journal-title":"Int. J. Theor. Phys."},{"key":"4265_CR9","doi-asserted-by":"publisher","first-page":"619","DOI":"10.1007\/s11128-010-0217-7","volume":"10","author":"N Paul","year":"2011","unstructured":"Paul, N., Menon, J.V., Karumnchi, S., Muralidharan, S., Panigrahi, P.K.: Quantum tasks using six qubit cluster states. Quantum Inf Process 10, 619\u2013632 (2011). https:\/\/doi.org\/10.1007\/s11128-010-0217-7","journal-title":"Quantum Inf Process"},{"key":"4265_CR10","doi-asserted-by":"publisher","first-page":"3037","DOI":"10.1007\/s10773-012-1186-7","volume":"51","author":"QY Zhang","year":"2012","unstructured":"Zhang, Q.Y., Zhan, Y.B.: Quantum information splitting by using asymmetric multi-particle state. Int. J. Theor. Phys. 51, 3037\u20133044 (2012). https:\/\/doi.org\/10.1007\/s10773-012-1186-7","journal-title":"Int. J. Theor. Phys."},{"key":"4265_CR11","doi-asserted-by":"publisher","unstructured":"Liu, F., Qin, S.J., Wen, Q.Y.: A quantum secret-sharing protocol with fairness. Phys. Scr. 89(075104) (2014) https:\/\/doi.org\/10.1088\/0031-8949\/89\/7\/075104","DOI":"10.1088\/0031-8949\/89\/7\/075104"},{"key":"4265_CR12","doi-asserted-by":"publisher","unstructured":"Deng, F.G., Li, X.H., Li, C.Y., Zhou, P., Zhou, H.Y.: Multiparty quantum-state sharing of an arbitrary two-particle state with Einstein\u2013Podolsky\u2013Rosen pairs. Phys. Rev. A 72(044301) (2005) https:\/\/doi.org\/10.1103\/PhysRevA.72.044301","DOI":"10.1103\/PhysRevA.72.044301"},{"key":"4265_CR13","doi-asserted-by":"publisher","first-page":"1082","DOI":"10.1016\/j.optcom.2010.10.026","volume":"284","author":"S Muralidharan","year":"2011","unstructured":"Muralidharan, S., Jain, S., Panigrahi, P.K.: Splitting of quantum information using n-qubit linear cluster states. Opt. Commun. 284, 1082\u20131085 (2011). https:\/\/doi.org\/10.1016\/j.optcom.2010.10.026","journal-title":"Opt. Commun."},{"key":"4265_CR14","doi-asserted-by":"publisher","unstructured":"Tang, J., Ma, S.Y., Li, Q.: Probabilistic hierarchical quantum information splitting of arbitrary multi-qubit states. Entropy 24(1077) (2022). https:\/\/doi.org\/10.3390\/e24081077","DOI":"10.3390\/e24081077"},{"key":"4265_CR15","doi-asserted-by":"publisher","unstructured":"Tang, J., Ma, S., Li, Q.: Universal hierarchical quantum information splitting schemes of an arbitrary multi-qubit state. Int. J. Theor. Phys. 61(209) (2022). https:\/\/doi.org\/10.1007\/s10773-022-05180-0","DOI":"10.1007\/s10773-022-05180-0"},{"key":"4265_CR16","doi-asserted-by":"crossref","unstructured":"Yuan, L., Xiaoqi, X., Yu, Y., Shunru, J.: Symmetric controlled quantum secret sharing scheme via stabilizer codes. Paper presented at the 2014 2nd International Conference on Systems and Informatics (ICSAI 2014) (2014)","DOI":"10.1109\/ICSAI.2014.7009364"},{"key":"4265_CR17","doi-asserted-by":"publisher","unstructured":"Rong, Z.Z., Tao, L.W., Zu, L.C.: Quantum secret sharing based on quantum error-correcting codes. Chin. Phys. B 20(050309) (2011). https:\/\/doi.org\/10.1088\/1674-1056\/20\/5\/050309","DOI":"10.1088\/1674-1056\/20\/5\/050309"},{"key":"4265_CR18","doi-asserted-by":"crossref","unstructured":"Rietjens, K., Schoenmakers, B., Tuyls, P.: Quantum information theoretical analysis of various constructions for quantum secret sharing. Paper presented at the International Symposium on Information Theory, 2005. ISIT 2005 (2005)","DOI":"10.1109\/ISIT.2005.1523614"},{"key":"4265_CR19","doi-asserted-by":"publisher","unstructured":"Maitra, A., Paul, G.: A resilient quantum secret sharing scheme. Int. J. Theor. Phys. 54, 398\u2013408 (2015) https:\/\/doi.org\/10.1007\/s10773-014-2233-3","DOI":"10.1007\/s10773-014-2233-3"},{"key":"4265_CR20","volume-title":"Quantum Computation and Quantum Information","author":"MA Nielsen","year":"2000","unstructured":"Nielsen, M.A., Chuang, I.L.: Quantum Computation and Quantum Information. Cambridge University Press, New York (2000)"},{"key":"4265_CR21","volume-title":"Quantum Information Processing, Quantum Computing, and Quantum Error Correction: An Engineering Approach","author":"IB Djordjevic","year":"2012","unstructured":"Djordjevic, I.B.: Quantum Information Processing, Quantum Computing, and Quantum Error Correction: An Engineering Approach. Academic Press, Cambridge (2012)"}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-024-04265-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11128-024-04265-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-024-04265-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,21]],"date-time":"2024-02-21T13:23:28Z","timestamp":1708521808000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11128-024-04265-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,2,9]]},"references-count":21,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2024,2]]}},"alternative-id":["4265"],"URL":"https:\/\/doi.org\/10.1007\/s11128-024-04265-5","relation":{},"ISSN":["1573-1332"],"issn-type":[{"value":"1573-1332","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,2,9]]},"assertion":[{"value":"24 June 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 January 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 February 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no competing interests to declare that are relevant to the content of this article.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"58"}}