{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T19:52:12Z","timestamp":1757620332005,"version":"3.44.0"},"reference-count":37,"publisher":"Springer Science and Business Media LLC","issue":"8","license":[{"start":{"date-parts":[[2025,7,29]],"date-time":"2025-07-29T00:00:00Z","timestamp":1753747200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,7,29]],"date-time":"2025-07-29T00:00:00Z","timestamp":1753747200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"Chongqing Municipal Education Commission Science and Technology Research Program Youth Projects","award":["KJQN202302401; KJQN202202401","KJQN202302401; KJQN202202401","KJQN202302401; KJQN202202401","KJQN202302401; KJQN202202401"],"award-info":[{"award-number":["KJQN202302401; KJQN202202401","KJQN202302401; KJQN202202401","KJQN202302401; KJQN202202401","KJQN202302401; KJQN202202401"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"DOI":"10.1007\/s11128-025-04841-3","type":"journal-article","created":{"date-parts":[[2025,7,29]],"date-time":"2025-07-29T05:49:29Z","timestamp":1753768169000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A chaotic maps-based multiparty quantum summation computation scheme for cloud environments"],"prefix":"10.1007","volume":"24","author":[{"given":"Lu","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Haocheng","family":"Kan","sequence":"additional","affiliation":[]},{"given":"Chaonan","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Hongfeng","family":"Zhu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,7,29]]},"reference":[{"key":"4841_CR1","doi-asserted-by":"crossref","unstructured":"Tajan, L., Westhoff, D., Reuter, C.A.,  Armknecht, F.: Private information retrieval and searchable encryption for privacy-preserving multi-client cloud auditing, in 2016 11th International Conference for Internet Technology and Secured Transactions (ICITST), 2016: IEEE, pp. 162\u2013169.","DOI":"10.1109\/ICITST.2016.7856690"},{"key":"4841_CR2","doi-asserted-by":"crossref","unstructured":"Abduljabbar, Z.A., et al.: \"Privacy-preserving image retrieval in IoT-cloud,\" in 2016 IEEE Trustcom\/BigDataSE\/ISPA, 2016: IEEE, pp. 799\u2013806.","DOI":"10.1109\/TrustCom.2016.0141"},{"issue":"15","key":"4841_CR3","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.5127","volume":"31","author":"R Handa","year":"2019","unstructured":"Handa, R., Krishna, C.R., Aggarwal, N.: Document clustering for efficient and secure information retrieval from cloud. Concurrency and Computation: Practice and Experience 31(15), e5127 (2019)","journal-title":"Concurrency and Computation: Practice and Experience"},{"issue":"7","key":"4841_CR4","doi-asserted-by":"publisher","first-page":"4981","DOI":"10.1109\/TII.2021.3103547","volume":"18","author":"T Wang","year":"2021","unstructured":"Wang, T., Yang, Q., Shen, X., Gadekallu, T.R., Wang, W., Dev, K.: A privacy-enhanced retrieval technology for the cloud-assisted internet of things. IEEE Trans. Industr. Inf. 18(7), 4981\u20134989 (2021)","journal-title":"IEEE Trans. Industr. Inf."},{"issue":"4","key":"4841_CR5","doi-asserted-by":"publisher","first-page":"530","DOI":"10.1109\/TETC.2017.2737789","volume":"7","author":"S Tahir","year":"2017","unstructured":"Tahir, S., Ruj, S., Rahulamathavan, Y., Rajarajan, M., Glackin, C.: A new secure and lightweight searchable encryption scheme over encrypted cloud data. IEEE Trans. Emerg. Top. Comput. 7(4), 530\u2013544 (2017)","journal-title":"IEEE Trans. Emerg. Top. Comput."},{"key":"4841_CR6","doi-asserted-by":"publisher","first-page":"152","DOI":"10.1016\/j.jpdc.2017.08.007","volume":"111","author":"L Wu","year":"2018","unstructured":"Wu, L., Chen, B., Choo, K.-K.R., He, D.: Efficient and secure searchable encryption protocol for cloud-based Internet of Things. Journal of Parallel and Distributed Computing 111, 152\u2013161 (2018)","journal-title":"Journal of Parallel and Distributed Computing"},{"issue":"5","key":"4841_CR7","first-page":"2419","volume":"18","author":"SK Kermanshahi","year":"2019","unstructured":"Kermanshahi, S.K., et al.: Multi-client cloud-based symmetric searchable encryption. IEEE Trans. Dependable Secure Comput. 18(5), 2419\u20132437 (2019)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"issue":"7","key":"4841_CR8","doi-asserted-by":"publisher","first-page":"9952","DOI":"10.1007\/s11227-022-04309-6","volume":"78","author":"N Andola","year":"2022","unstructured":"Andola, N., Gahlot, R., Yadav, V.K., Venkatesan, S., Verma, S.: Searchable encryption on the cloud: a survey. J. Supercomput. 78(7), 9952\u20139984 (2022)","journal-title":"J. Supercomput."},{"key":"4841_CR9","doi-asserted-by":"crossref","unstructured":"Das, D.: Secure cloud computing algorithm using homomorphic encryption and multi-party computation, in 2018 International Conference on Information Networking (ICOIN), 2018: IEEE, pp. 391\u2013396.","DOI":"10.1109\/ICOIN.2018.8343147"},{"key":"4841_CR10","doi-asserted-by":"crossref","unstructured":"Tso, R., Alelaiwi, A., Mizanur Rahman, S.M., Wu, M.-E., Hossain, M.S.: Privacy-preserving data communication through secure multi-party computation in healthcare sensor cloud, Journal of Signal Processing Systems, vol. 89, pp. 51\u201359, 2017.","DOI":"10.1007\/s11265-016-1198-2"},{"key":"4841_CR11","doi-asserted-by":"crossref","unstructured":"Alexandru, A.B., Pappas, G.J.: Secure multi-party computation for cloud-based control, Privacy in dynamical systems, pp. 179\u2013207, 2020.","DOI":"10.1007\/978-981-15-0493-8_9"},{"key":"4841_CR12","doi-asserted-by":"crossref","unstructured":"Pillai, S.E.V.S., Polimetla, K.: Enhancing Network Privacy through Secure Multi-Party Computation in Cloud Environments, in 2024 International Conference on Integrated Circuits and Communication Systems (ICICACS), 2024: IEEE, pp. 1\u20136.","DOI":"10.1109\/ICICACS60521.2024.10498662"},{"key":"4841_CR13","doi-asserted-by":"crossref","unstructured":"Yao, A.C.: Protocols for secure computations, in 23rd annual symposium on foundations of computer science (sfcs 1982), 1982: IEEE, pp. 160\u2013164.","DOI":"10.1109\/SFCS.1982.38"},{"issue":"10","key":"4841_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4018\/JOEUC.306752","volume":"34","author":"Y Luo","year":"2022","unstructured":"Luo, Y., Chen, Y., Li, T., Wang, Y., Yang, Y., Yu, X.: An entropy-view secure multiparty computation protocol based on semi-honest model. Journal of Organizational and End User Computing (JOEUC) 34(10), 1\u201317 (2022)","journal-title":"Journal of Organizational and End User Computing (JOEUC)"},{"key":"4841_CR15","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2021.103570","volume":"80","author":"Y Wu","year":"2022","unstructured":"Wu, Y., et al.: Mixed-protocol multi-party computation framework towards complex computation tasks with malicious security. Computer Standards & Interfaces 80, 103570 (2022)","journal-title":"Computer Standards & Interfaces"},{"key":"4841_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s40064-016-3061-0","volume":"5","author":"X Liu","year":"2016","unstructured":"Liu, X., Li, S., Liu, J., Chen, X., Xu, G.: Secure multiparty computation of a comparison problem. Springerplus 5, 1\u201317 (2016)","journal-title":"Springerplus"},{"issue":"1","key":"4841_CR17","doi-asserted-by":"publisher","first-page":"531","DOI":"10.1186\/s12859-022-05044-8","volume":"23","author":"FN Wirth","year":"2022","unstructured":"Wirth, F.N., Kussel, T., M\u00fcller, A., Hamacher, K., Prasser, F.: EasySMPC: a simple but powerful no-code tool for practical secure multiparty computation. BMC Bioinformatics 23(1), 531 (2022)","journal-title":"BMC Bioinformatics"},{"key":"4841_CR18","unstructured":"Huang, Y., Evans, D., Katz, J.: Private set intersection: Are garbled circuits better than custom protocols?, in NDSS, 2012."},{"key":"4841_CR19","first-page":"643","volume-title":"Annual Cryptology Conference","author":"I Damg\u00e5rd","year":"2012","unstructured":"Damg\u00e5rd, I., Pastro, V., Smart, N., Zakarias, S.: Multiparty computation from somewhat homomorphic encryption. In: Annual Cryptology Conference, pp. 643\u2013662. Springer (2012)"},{"key":"4841_CR20","doi-asserted-by":"crossref","unstructured":"Damg\u00e5rd, I., Keller, M., Larraia, E., Pastro, V., Scholl, P., Smart, N.P.: Practical covertly secure MPC for dishonest majority\u2013or: breaking the SPDZ limits, in Computer Security\u2013ESORICS 2013: 18th European Symposium on Research in Computer Security, Egham, UK, September 9\u201313, 2013. Proceedings 18, 2013: Springer, pp. 1\u201318.","DOI":"10.1007\/978-3-642-40203-6_1"},{"key":"4841_CR21","doi-asserted-by":"crossref","unstructured":"Goldreich, O., Micali, S., Wigderson, A.: How to play any mental game, or a completeness theorem for protocols with honest majority, in Providing Sound Foundations for Cryptography: On the Work of Shafi Goldwasser and Silvio Micali, 2019, pp. 307\u2013328.","DOI":"10.1145\/3335741.3335759"},{"issue":"02","key":"4841_CR22","doi-asserted-by":"publisher","first-page":"1550011","DOI":"10.1142\/S0219749915500112","volume":"13","author":"C Zhang","year":"2015","unstructured":"Zhang, C., Sun, Z.-W., Huang, X., Long, D.-Y.: Three-party quantum summation without a trusted third party. International Journal of Quantum Information 13(02), 1550011 (2015)","journal-title":"International Journal of Quantum Information"},{"key":"4841_CR23","doi-asserted-by":"publisher","first-page":"2783","DOI":"10.1007\/s10773-017-3442-3","volume":"56","author":"W Liu","year":"2017","unstructured":"Liu, W., Wang, Y.-B., Fan, W.-Q.: An novel protocol for the quantum secure multi-party summation based on two-particle bell states. Int. J. Theor. Phys. 56, 2783\u20132791 (2017)","journal-title":"Int. J. Theor. Phys."},{"issue":"1","key":"4841_CR24","doi-asserted-by":"publisher","first-page":"545","DOI":"10.1016\/j.optcom.2010.09.005","volume":"284","author":"H-Y Jia","year":"2011","unstructured":"Jia, H.-Y., Wen, Q.-Y., Song, T.-T., Gao, F.: Quantum protocol for millionaire problem. Optics communications 284(1), 545\u2013549 (2011)","journal-title":"Optics communications"},{"issue":"7","key":"4841_CR25","doi-asserted-by":"publisher","first-page":"719","DOI":"10.3390\/e21070719","volume":"21","author":"C Zhang","year":"2019","unstructured":"Zhang, C., Razavi, M., Sun, Z., Huang, Q., Situ, H.: Multi-party quantum summation based on quantum teleportation. Entropy 21(7), 719 (2019)","journal-title":"Entropy"},{"issue":"5","key":"4841_CR26","doi-asserted-by":"publisher","first-page":"1638","DOI":"10.1007\/s10773-020-04431-2","volume":"59","author":"D Ming-Yi","year":"2020","unstructured":"Ming-Yi, D.: Multi-party quantum summation within ad-level quantum system. Int. J. Theor. Phys. 59(5), 1638\u20131643 (2020)","journal-title":"Int. J. Theor. Phys."},{"issue":"3","key":"4841_CR27","doi-asserted-by":"publisher","first-page":"819","DOI":"10.1007\/s10773-020-04700-0","volume":"60","author":"T-Y Ye","year":"2021","unstructured":"Ye, T.-Y., Hu, J.-L.: Quantum secure multiparty summation based on the phase shifting operation of d-level quantum system and its application. Int. J. Theor. Phys. 60(3), 819\u2013827 (2021)","journal-title":"Int. J. Theor. Phys."},{"issue":"12","key":"4841_CR28","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10773-024-05867-6","volume":"63","author":"Y-F Lang","year":"2024","unstructured":"Lang, Y.-F., Cai, C.-C.: Secure Quantum Summation with Two Degrees of Freedom United as a Single Entity. Int. J. Theor. Phys. 63(12), 1\u20139 (2024)","journal-title":"Int. J. Theor. Phys."},{"issue":"1","key":"4841_CR29","doi-asserted-by":"publisher","first-page":"80","DOI":"10.3390\/e26010080","volume":"26","author":"Y Lu","year":"2024","unstructured":"Lu, Y., Ding, G.: Quantum secure multi-party summation with graph state. Entropy 26(1), 80 (2024)","journal-title":"Entropy"},{"issue":"4","key":"4841_CR30","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.67.042317","volume":"67","author":"PO Boykin","year":"2003","unstructured":"Boykin, P.O., Roychowdhury, V.: Optimal encryption of quantum bits. Phys. Rev. A 67(4), 042317 (2003)","journal-title":"Phys. Rev. A"},{"issue":"12","key":"4841_CR31","doi-asserted-by":"publisher","first-page":"3675","DOI":"10.1007\/s11128-013-0626-5","volume":"12","author":"M Liang","year":"2013","unstructured":"Liang, M.: Symmetric quantum fully homomorphic encryption with perfect security. Quantum Inf. Process. 12(12), 3675\u20133687 (2013)","journal-title":"Quantum Inf. Process."},{"key":"4841_CR32","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11128-020-2603-0","volume":"19","author":"C Gong","year":"2020","unstructured":"Gong, C., et al.: Grover algorithm-based quantum homomorphic encryption ciphertext retrieval scheme in quantum cloud computing. Quantum Inf. Process. 19, 1\u201317 (2020)","journal-title":"Quantum Inf. Process."},{"key":"4841_CR33","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2022.128397","volume":"610","author":"J-W Zhang","year":"2023","unstructured":"Zhang, J.-W., Xu, G., Chen, X.-B., Chang, Y., Dong, Z.-C.: Improved multiparty quantum private comparison based on quantum homomorphic encryption. Physica A 610, 128397 (2023)","journal-title":"Physica A"},{"issue":"1","key":"4841_CR34","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1007\/BF01020332","volume":"19","author":"MJ Feigenbaum","year":"1978","unstructured":"Feigenbaum, M.J.: Quantitative universality for a class of nonlinear transformations. J. Stat. Phys. 19(1), 25\u201352 (1978)","journal-title":"J. Stat. Phys."},{"issue":"3","key":"4841_CR35","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1007\/s11128-022-03428-6","volume":"21","author":"Y Xu","year":"2022","unstructured":"Xu, Y., Wang, C., Wang, X., Zhu, H.: Scalable multiple GHZ states equations and its applications in efficient quantum key agreement. Quantum Inf. Process. 21(3), 91 (2022)","journal-title":"Quantum Inf. Process."},{"issue":"8","key":"4841_CR36","doi-asserted-by":"publisher","first-page":"2749","DOI":"10.1007\/s11128-015-1034-9","volume":"14","author":"M Liang","year":"2015","unstructured":"Liang, M.: Quantum fully homomorphic encryption scheme based on universal quantum circuit. Quantum Inf. Process. 14(8), 2749\u20132759 (2015)","journal-title":"Quantum Inf. Process."},{"issue":"1","key":"4841_CR37","doi-asserted-by":"publisher","first-page":"531","DOI":"10.32604\/iasc.2022.028264","volume":"34","author":"G Xu","year":"2022","unstructured":"Xu, G., et al.: Secure multi-party quantum summation based on quantum homomorphic encryption. Intell. Autom. Soft Comput 34(1), 531\u2013541 (2022)","journal-title":"Intell. Autom. Soft Comput"}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-025-04841-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11128-025-04841-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-025-04841-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,8]],"date-time":"2025-09-08T05:58:54Z","timestamp":1757311134000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11128-025-04841-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,29]]},"references-count":37,"journal-issue":{"issue":"8","published-online":{"date-parts":[[2025,8]]}},"alternative-id":["4841"],"URL":"https:\/\/doi.org\/10.1007\/s11128-025-04841-3","relation":{},"ISSN":["1573-1332"],"issn-type":[{"type":"electronic","value":"1573-1332"}],"subject":[],"published":{"date-parts":[[2025,7,29]]},"assertion":[{"value":"24 November 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 June 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 July 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"No datasets were generated or analysed during the current study.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Data availability"}}],"article-number":"240"}}