{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,25]],"date-time":"2026-01-25T23:31:27Z","timestamp":1769383887688,"version":"3.49.0"},"reference-count":27,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2025,5,19]],"date-time":"2025-05-19T00:00:00Z","timestamp":1747612800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,5,19]],"date-time":"2025-05-19T00:00:00Z","timestamp":1747612800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"The National Natural Science Fund","award":["62376047"],"award-info":[{"award-number":["62376047"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"DOI":"10.1007\/s11128-025-04746-1","type":"journal-article","created":{"date-parts":[[2025,5,19]],"date-time":"2025-05-19T07:07:33Z","timestamp":1747638453000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Quantum homomorphic encryption scheme based on elliptic curve cryptography"],"prefix":"10.1007","volume":"24","author":[{"given":"Xiuli","family":"Song","sequence":"first","affiliation":[]},{"given":"Jianbing","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Qian","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Tao","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Yousheng","family":"Zhou","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,5,19]]},"reference":[{"issue":"23","key":"4746_CR1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.100.230502","volume":"100","author":"V Giovannetti","year":"2008","unstructured":"Giovannetti, V., Lloyd, S., Maccone, L.: Quantum private queries. Phys. Rev. Lett. 100(23), 230502 (2008). https:\/\/doi.org\/10.1103\/PhysRevLett.100.230502","journal-title":"Phys. Rev. Lett."},{"issue":"3","key":"4746_CR2","doi-asserted-by":"publisher","first-page":"1829","DOI":"10.1103\/PhysRevA.59.1829","volume":"59","author":"M Hillery","year":"1999","unstructured":"Hillery, M., Bu\u017eek, V., Berthiaume, A.: Quantum secret sharing. Phys. Rev. A 59(3), 1829 (1999). https:\/\/doi.org\/10.1103\/PhysRevA.59.1829","journal-title":"Phys. Rev. A"},{"issue":"23","key":"4746_CR3","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.111.230501","volume":"111","author":"V Giovannetti","year":"2013","unstructured":"Giovannetti, V., Maccone, L., Morimae, T., Rudolph, T.G.: Efficient universal blind quantum computation. Phys. Rev. Lett. 111(23), 230501 (2013). https:\/\/doi.org\/10.1103\/PhysRevLett.111.230501","journal-title":"Phys. Rev. Lett."},{"issue":"15","key":"4746_CR4","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.109.150501","volume":"109","author":"PP Rohde","year":"2012","unstructured":"Rohde, P.P., Fitzsimons, J.F., Gilchrist, A.: Quantum walks with encrypted data. Phys. Rev. Lett. 109(15), 150501 (2012). https:\/\/doi.org\/10.1103\/PhysRevLett.109.150501","journal-title":"Phys. Rev. Lett."},{"issue":"12","key":"4746_CR5","doi-asserted-by":"publisher","first-page":"3675","DOI":"10.1007\/s11128-013-0626-5","volume":"12","author":"M Liang","year":"2013","unstructured":"Liang, M.: Symmetric quantum fully homomorphic encryption with perfect security. Quantum Inf. Process. 12(12), 3675\u20133687 (2013). https:\/\/doi.org\/10.1007\/s11128-013-0626-5","journal-title":"Quantum Inf. Process."},{"issue":"5","key":"4746_CR6","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.90.050303","volume":"90","author":"L Yu","year":"2014","unstructured":"Yu, L., P\u00e9rez-Delgado, C.A., Fitzsimons, J.F.: Limitations on information-theoretically-secure quantum homomorphic encryption. Phys. Rev. A 90(5), 050303 (2014). https:\/\/doi.org\/10.1103\/PhysRevA.90.050303","journal-title":"Phys. Rev. A"},{"issue":"8","key":"4746_CR7","doi-asserted-by":"publisher","first-page":"2749","DOI":"10.1007\/s11128-015-1034-9","volume":"14","author":"M Liang","year":"2015","unstructured":"Liang, M.: Quantum fully homomorphic encryption scheme based on universal quantum circuit. Quantum Inf. Process. 14(8), 2749\u20132759 (2015). https:\/\/doi.org\/10.1007\/s11128-015-1034-9","journal-title":"Quantum Inf. Process."},{"key":"4746_CR8","doi-asserted-by":"publisher","unstructured":"Liang, M., Yang, L.: Quantum fully homomorphic encryption scheme based on quantum fault-tolerant construction. (2015) arXiv preprint arXiv:1503.04061https:\/\/doi.org\/10.48550\/arXiv.1503.04061","DOI":"10.48550\/arXiv.1503.04061"},{"key":"4746_CR9","doi-asserted-by":"crossref","unstructured":"Broadbent, A., Jeffery, S.: Quantum homomorphic encryption for circuits of low t-gate complexity. In: Annual Cryptology Conference, pp. 609\u2013629. Springer (2015)","DOI":"10.1007\/978-3-662-48000-7_30"},{"issue":"1","key":"4746_CR10","doi-asserted-by":"publisher","first-page":"33467","DOI":"10.1038\/srep33467","volume":"6","author":"S-H Tan","year":"2016","unstructured":"Tan, S.-H., Kettlewell, J.A., Ouyang, Y., Chen, L., Fitzsimons, J.F.: A quantum approach to homomorphic encryption. Sci. Rep. 6(1), 33467 (2016). https:\/\/doi.org\/10.1038\/srep33467","journal-title":"Sci. Rep."},{"issue":"1","key":"4746_CR11","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1007\/s11128-019-2529-6","volume":"19","author":"M Liang","year":"2020","unstructured":"Liang, M.: Teleportation-based quantum homomorphic encryption scheme with quasi-compactness and perfect security. Quantum Inf. Process. 19(1), 28 (2020). https:\/\/doi.org\/10.1007\/s11128-019-2529-6","journal-title":"Quantum Inf. Process."},{"issue":"4","key":"4746_CR12","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.98.042334","volume":"98","author":"Y Ouyang","year":"2018","unstructured":"Ouyang, Y., Tan, S.-H., Fitzsimons, J.F.: Quantum homomorphic encryption from quantum codes. Phys. Rev. A 98(4), 042334 (2018). https:\/\/doi.org\/10.1103\/PhysRevA.98.042334","journal-title":"Phys. Rev. A"},{"key":"4746_CR13","doi-asserted-by":"publisher","first-page":"172","DOI":"10.1016\/j.ins.2019.06.009","volume":"501","author":"X-B Chen","year":"2019","unstructured":"Chen, X.-B., Sun, Y.-R., Xu, G., Yang, Y.-X.: Quantum homomorphic encryption scheme with flexible number of evaluator based on (k, n)-threshold quantum state sharing. Inf. Sci. 501, 172\u2013181 (2019). https:\/\/doi.org\/10.1016\/j.ins.2019.06.009","journal-title":"Inf. Sci."},{"issue":"7","key":"4746_CR14","doi-asserted-by":"publisher","DOI":"10.1088\/1674-1056\/ac003b","volume":"30","author":"J-W Zhang","year":"2021","unstructured":"Zhang, J.-W., Chen, X.-B., Xu, G., Yang, Y.-X.: Universal quantum circuit evaluation on encrypted data using probabilistic quantum homomorphic encryption scheme. Chin. Phys. B 30(7), 070309 (2021)","journal-title":"Chin. Phys. B"},{"issue":"3","key":"4746_CR15","doi-asserted-by":"publisher","first-page":"577","DOI":"10.1007\/s10623-021-00993-2","volume":"90","author":"J Liu","year":"2022","unstructured":"Liu, J., Li, Q., Quan, J., Wang, C., Shi, J., Situ, H.: Efficient quantum homomorphic encryption scheme with flexible evaluators and its simulation. Des. Codes Crypt. 90(3), 577\u2013591 (2022). https:\/\/doi.org\/10.1007\/s10623-021-00993-2","journal-title":"Des. Codes Crypt."},{"issue":"4","key":"4746_CR16","doi-asserted-by":"publisher","DOI":"10.1360\/SSPMA-2022-0381","volume":"53","author":"W Shuolin","year":"2023","unstructured":"Shuolin, W., Tao, S., Jianwei, L.: Non-interactive quantum homomorphic encryption scheme based on the rotation operator. Sci. Sin. Phys. Mech. Astron. 53(4), 240311 (2023). https:\/\/doi.org\/10.1360\/SSPMA-2022-0381","journal-title":"Sci. Sin. Phys. Mech. Astron."},{"issue":"4","key":"4746_CR17","doi-asserted-by":"publisher","DOI":"10.1088\/2058-9565\/ad7a9c","volume":"9","author":"R He","year":"2024","unstructured":"He, R., Chen, L., Li, Q., Tan, X., Chen, L.: Verifiable quantum homomorphic encryption based on garbled evaluation. Quantum Sci. Technol. 9(4), 045051 (2024). https:\/\/doi.org\/10.1088\/2058-9565\/ad7a9c","journal-title":"Quantum Sci. Technol."},{"issue":"2","key":"4746_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11128-025-04651-7","volume":"24","author":"I Sohn","year":"2025","unstructured":"Sohn, I., Kim, B., Bae, K., Song, W., Lee, W.: Error-correctable efficient quantum homomorphic encryption using Calderbank\u2013Shor\u2013Steane codes. Quantum Inf. Process. 24(2), 1\u201320 (2025). https:\/\/doi.org\/10.1007\/s11128-025-04651-7","journal-title":"Quantum Inf. Process."},{"issue":"5","key":"4746_CR19","doi-asserted-by":"publisher","first-page":"846","DOI":"10.3969\/j.issn.0372-2112.2020.05.003","volume":"48","author":"S Xiu-li","year":"2020","unstructured":"Xiu-li, S., Dao-yang, Z., Ai-jun, W.: Design and simulation of d-dimensional (t, n) threshold quantum homomorphic encryption algorithm. Acta Electron. Sin. 48(5), 846\u2013853 (2020). https:\/\/doi.org\/10.3969\/j.issn.0372-2112.2020.05.003","journal-title":"Acta Electron. Sin."},{"key":"4746_CR20","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11128-021-03051-x","volume":"20","author":"Y Zhang","year":"2021","unstructured":"Zhang, Y., Shang, T., Liu, J.: A multi-valued quantum fully homomorphic encryption scheme. Quantum Inf. Process. 20, 1\u201325 (2021). https:\/\/doi.org\/10.1007\/s11128-021-03051-x","journal-title":"Quantum Inf. Process."},{"key":"4746_CR21","doi-asserted-by":"publisher","unstructured":"Gottesman, D.: The heisenberg representation of quantum computers. arXiv preprint quant-ph\/9807006 (1998) https:\/\/doi.org\/10.48550\/arXiv.quant-ph\/9807006","DOI":"10.48550\/arXiv.quant-ph\/9807006"},{"key":"4746_CR22","doi-asserted-by":"crossref","unstructured":"Rand, R., Sundaram, A., Singhal, K., Lackey, B.: Gottesman types for quantum programs. (2021) arXiv preprint arXiv:2109.02197","DOI":"10.4204\/EPTCS.340.14"},{"key":"4746_CR23","doi-asserted-by":"publisher","unstructured":"Broadbent, A., Kazmi, R.A.: Constructions for quantum indistinguishability obfuscation. In: International Conference on Cryptology and Information Security in Latin America, pp. 24\u201343. Springer (2021). https:\/\/doi.org\/10.1360\/SSPMA-2022-0381","DOI":"10.1360\/SSPMA-2022-0381"},{"key":"4746_CR24","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11128-020-2603-0","volume":"19","author":"C Gong","year":"2020","unstructured":"Gong, C., Du, J., Dong, Z., Guo, Z., Gani, A., Zhao, L., Qi, H.: Grover algorithm-based quantum homomorphic encryption ciphertext retrieval scheme in quantum cloud computing. Quantum Inf. Process. 19, 1\u201317 (2020). https:\/\/doi.org\/10.1007\/s11128-020-2603-0","journal-title":"Quantum Inf. Process."},{"key":"4746_CR25","doi-asserted-by":"publisher","unstructured":"Liang, M.: Tripartite blind quantum computation. (2013) arXiv preprint arXiv:1311.6304https:\/\/doi.org\/10.48550\/arXiv.1311.6304","DOI":"10.48550\/arXiv.1311.6304"},{"issue":"5","key":"4746_CR26","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.69.052307","volume":"69","author":"L Xiao","year":"2004","unstructured":"Xiao, L., Lu Long, G., Deng, F.-G., Pan, J.-W.: Efficient multiparty quantum-secret-sharing schemes. Phys. Rev. A-Atom. Mol. Opt. Phys. 69(5), 052307 (2004). https:\/\/doi.org\/10.1103\/PhysRevA.69.052307","journal-title":"Phys. Rev. A-Atom. Mol. Opt. Phys."},{"issue":"13","key":"4746_CR27","doi-asserted-by":"publisher","first-page":"1895","DOI":"10.1103\/PhysRevLett.70.1895","volume":"70","author":"CH Bennett","year":"1993","unstructured":"Bennett, C.H., Brassard, G., Cr\u00e9peau, C., Jozsa, R., Peres, A., Wootters, W.K.: Teleporting an unknown quantum state via dual classical and Einstein\u2013Podolsky\u2013Rosen channels. Phys. Rev. Lett. 70(13), 1895 (1993). https:\/\/doi.org\/10.1103\/PhysRevLett.70.1895","journal-title":"Phys. Rev. Lett."}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-025-04746-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11128-025-04746-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-025-04746-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,2]],"date-time":"2025-06-02T16:40:23Z","timestamp":1748882423000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11128-025-04746-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5,19]]},"references-count":27,"journal-issue":{"issue":"5","published-online":{"date-parts":[[2025,5]]}},"alternative-id":["4746"],"URL":"https:\/\/doi.org\/10.1007\/s11128-025-04746-1","relation":{},"ISSN":["1573-1332"],"issn-type":[{"value":"1573-1332","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,5,19]]},"assertion":[{"value":"2 December 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 April 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 May 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"143"}}