{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T15:29:54Z","timestamp":1772119794693,"version":"3.50.1"},"reference-count":17,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2024,4,10]],"date-time":"2024-04-10T00:00:00Z","timestamp":1712707200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,4,10]],"date-time":"2024-04-10T00:00:00Z","timestamp":1712707200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"DOI":"10.1007\/s11128-024-04342-9","type":"journal-article","created":{"date-parts":[[2024,4,10]],"date-time":"2024-04-10T11:02:00Z","timestamp":1712746920000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Error mitigation using quantum neural Q network in secure qutrit distribution on Cleve's protocol on quantum computing"],"prefix":"10.1007","volume":"23","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-7688-4989","authenticated-orcid":false,"given":"R.","family":"Palanivel","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5422-6716","authenticated-orcid":false,"given":"P.","family":"Muthulakshmi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,4,10]]},"reference":[{"key":"4342_CR1","doi-asserted-by":"publisher","unstructured":"Cleve, R.:\u201cAn introduction to quantum complexity theory.\u201d Quantum Computation and Quantum Information Theory, pp. 103\u2013127 (2001). https:\/\/doi.org\/10.1142\/9789810248185_0004","DOI":"10.1142\/9789810248185_0004"},{"issue":"3","key":"4342_CR2","doi-asserted-by":"publisher","first-page":"648","DOI":"10.1103\/PhysRevLett.83.648","volume":"83","author":"R Cleve","year":"1999","unstructured":"Cleve, R., Gottesman, D., Lo, H.K.: How to share a quantum secret. Phys. Rev. Lett. 83(3), 648\u2013651 (1999). https:\/\/doi.org\/10.1103\/PhysRevLett.83.648","journal-title":"Phys. Rev. Lett."},{"key":"4342_CR3","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-84628-887-6","volume-title":"P.: Explorations in Quantum Computing","author":"C Williams","year":"2011","unstructured":"Williams, C.: P.: Explorations in Quantum Computing. Springer, London (2011). https:\/\/doi.org\/10.1007\/978-1-84628-887-6"},{"issue":"4","key":"4342_CR4","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1145\/863981.863982","volume":"33","author":"C Elliott","year":"2003","unstructured":"Elliott, C., Pearson, D., Troxel, G.: Quantum cryptography in practice. Comput. Commun. Rev. 33(4), 227\u2013238 (2003). https:\/\/doi.org\/10.1145\/863981.863982","journal-title":"Comput. Commun. Rev."},{"key":"4342_CR5","doi-asserted-by":"crossref","unstructured":"Barenco, A., et al.: Elementary gates for quantum computation. Phys. Rev. A 52, 3457 (1995). arXiv:quant-ph\/9503016","DOI":"10.1103\/PhysRevA.52.3457"},{"key":"4342_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.34133\/research.0134","volume":"6","author":"M-G Zhou","year":"2023","unstructured":"Zhou, M.-G., Liu, Z.-P., Yin, H.-L., Li, C.-L., Xu, T.-K., Chen, Z.-B.: Quantum neural network for quantum neural computing. Research 6, 1\u201310 (2023). https:\/\/doi.org\/10.34133\/research.0134","journal-title":"Research"},{"key":"4342_CR7","unstructured":"Hasan K.F. et al.: \u201cMigrating to Post-quantum cryptography: a framework using security dependency analysis,\u201d pp. 1\u201321 (2023). http:\/\/arxiv.org\/abs\/2307.06520"},{"issue":"1","key":"4342_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1103\/PhysRevA.105.L010401","volume":"105","author":"N Shettell","year":"2022","unstructured":"Shettell, N., Kashefi, E., Markham, D.: Cryptographic approach to quantum metrology. Phys. Rev. A 105(1), 1\u201313 (2022). https:\/\/doi.org\/10.1103\/PhysRevA.105.L010401","journal-title":"Phys. Rev. A"},{"key":"4342_CR9","unstructured":"George, I., Lin, J., van Himbeeck, T., Fang, K., L\u00fctkenhaus, N.: \u201cFinite-key analysis of quantum key distribution with characterized devices using entropy accumulation,\u201d pp. 1\u201372, 2022 (Online). http:\/\/arxiv.org\/abs\/2203.06554"},{"issue":"2","key":"4342_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/e24020260","volume":"24","author":"S Sun","year":"2022","unstructured":"Sun, S., Huang, A.: A review of security evaluation of practical quantum key distribution system. Entropy 24(2), 1\u201319 (2022). https:\/\/doi.org\/10.3390\/e24020260","journal-title":"Entropy"},{"issue":"4","key":"4342_CR11","doi-asserted-by":"publisher","first-page":"1012","DOI":"10.1364\/aop.361502","volume":"12","author":"S Pirandola","year":"2020","unstructured":"Pirandola, S., et al.: Advances in quantum cryptography. Adv. Opt. Photon. 12(4), 1012 (2020). https:\/\/doi.org\/10.1364\/aop.361502","journal-title":"Adv. Opt. Photon."},{"issue":"6","key":"4342_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/e25060956","volume":"25","author":"VA Pastushenko","year":"2023","unstructured":"Pastushenko, V.A., Kronberg, D.A.: Improving the performance of quantum cryptography by using the encryption of the error correction data. Entropy 25(6), 1\u20137 (2023). https:\/\/doi.org\/10.3390\/e25060956","journal-title":"Entropy"},{"key":"4342_CR13","doi-asserted-by":"crossref","unstructured":"Brylinski, J., Brylinski, R.: \u201cUniversal quantum gates,\u201d pp. 1\u201310 (2001)","DOI":"10.1201\/9781420035377.pt2"},{"issue":"5","key":"4342_CR14","doi-asserted-by":"publisher","first-page":"1895","DOI":"10.2514\/1.J062267","volume":"61","author":"R Renner","year":"2023","unstructured":"Renner, R., Wolf, R.: Quantum advantage in cryptography. AIAA J. 61(5), 1895\u20131910 (2023). https:\/\/doi.org\/10.2514\/1.J062267","journal-title":"AIAA J."},{"issue":"11","key":"4342_CR15","doi-asserted-by":"publisher","first-page":"2006","DOI":"10.18520\/v109\/i11\/2006-2016","volume":"109","author":"M Ozawa","year":"2015","unstructured":"Ozawa, M.: Heisenberg\u2019s original derivation of the uncertainty principle and its universally valid reformulations. Curr. Sci. 109(11), 2006\u20132016 (2015). https:\/\/doi.org\/10.18520\/v109\/i11\/2006-2016","journal-title":"Curr. Sci."},{"key":"4342_CR16","doi-asserted-by":"publisher","unstructured":"Petz, D.: \u201cEntropy, von Neumann and the von Neumann Entropy\u201d. John von Neumann Foundation of Quantum Physics, pp. 83\u201396 (2001). https:\/\/doi.org\/10.1007\/978-94-017-2012-0_7","DOI":"10.1007\/978-94-017-2012-0_7"},{"key":"4342_CR17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-7908-1856-7_11","volume-title":"Future Directions for Intelligent Systems and Information Sciences Studies in Fuzziness and Soft Computing","author":"AA Ezhov","year":"2000","unstructured":"Ezhov, A.A., Ventura, D.: Quantum neural networks. In: Kasabov, N. (ed.) Future Directions for Intelligent Systems and Information Sciences. Studies in Fuzziness and Soft Computing, vol. 45. Physica, Heidelberg (2000). https:\/\/doi.org\/10.1007\/978-3-7908-1856-7_11"}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-024-04342-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11128-024-04342-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-024-04342-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,30]],"date-time":"2024-04-30T14:18:50Z","timestamp":1714486730000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11128-024-04342-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4,10]]},"references-count":17,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2024,4]]}},"alternative-id":["4342"],"URL":"https:\/\/doi.org\/10.1007\/s11128-024-04342-9","relation":{"has-preprint":[{"id-type":"doi","id":"10.21203\/rs.3.rs-3578506\/v1","asserted-by":"object"}]},"ISSN":["1573-1332"],"issn-type":[{"value":"1573-1332","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,4,10]]},"assertion":[{"value":"8 November 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 March 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 April 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"147"}}