{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T15:30:33Z","timestamp":1772119833391,"version":"3.50.1"},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2026,1,12]],"date-time":"2026-01-12T00:00:00Z","timestamp":1768176000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,12]],"date-time":"2026-01-12T00:00:00Z","timestamp":1768176000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100018542","name":"Natural Science Foundation of Sichuan Province","doi-asserted-by":"crossref","award":["25QNJJ4066"],"award-info":[{"award-number":["25QNJJ4066"]}],"id":[{"id":"10.13039\/501100018542","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Academic Degree and Postgraduate Education Reform Project of Sichuan Province, China","award":["YJGXM24-C017"],"award-info":[{"award-number":["YJGXM24-C017"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"DOI":"10.1007\/s11128-025-05038-4","type":"journal-article","created":{"date-parts":[[2026,1,12]],"date-time":"2026-01-12T06:14:41Z","timestamp":1768198481000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Multi-party verifiable blind quantum computation protocol with mutual authentication"],"prefix":"10.1007","volume":"25","author":[{"given":"Ming-Qiang","family":"Bai","sequence":"first","affiliation":[]},{"given":"Jing","family":"Wen","sequence":"additional","affiliation":[]},{"given":"Guang-Yang","family":"Wu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,1,12]]},"reference":[{"issue":"6066","key":"5038_CR1","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1126\/science.1214707","volume":"335","author":"S Barz","year":"2012","unstructured":"Barz, S., Kashefi, E., Broadbent, A., et al.: Demonstration of blind quantum computing. Science 335(6066), 303\u2013308 (2012)","journal-title":"Science"},{"issue":"2","key":"5038_CR2","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.111.020502","volume":"111","author":"M Tomoyuki","year":"2013","unstructured":"Tomoyuki, M., Keisuke, F.: Secure entanglement distillation for double-server blind quantum computation. Phys. Rev. Lett. 111(2), 020502 (2013)","journal-title":"Phys. Rev. Lett."},{"issue":"4","key":"5038_CR3","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.89.040302","volume":"89","author":"Q Li","year":"2014","unstructured":"Li, Q., Chan, W.H., Wu, C.H., et al.: Triple-server blind quantum computation using entanglement swapping. Phys. Rev. A 89(4), 040302 (2014)","journal-title":"Phys. Rev. A"},{"issue":"3\u20134","key":"5038_CR4","first-page":"200","volume":"15","author":"T Morimae","year":"2015","unstructured":"Morimae, T., Dunjko, V., Kashefi, E.: Ground state blind quantum computation on AKLT state. Quantum Inf. Comput. 15(3\u20134), 200\u2013234 (2015)","journal-title":"Quantum Inf. Comput."},{"issue":"5","key":"5038_CR5","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.93.052307","volume":"93","author":"Y Takeuchi","year":"2016","unstructured":"Takeuchi, Y., Fujii, K., Ikuta, R., et al.: Blind quantum computation over a collective-noise channel. Phys. Rev. A 93(5), 052307 (2016)","journal-title":"Phys. Rev. A"},{"issue":"3","key":"5038_CR6","volume":"7","author":"A Mantri","year":"2017","unstructured":"Mantri, A., Demarie, T.F., Menicucci, N.C., et al.: Flow ambiguity: a path towards classically driven blind quantum computation. Phys. Rev. X 7(3), 031004 (2017)","journal-title":"Phys. Rev. X"},{"key":"5038_CR7","doi-asserted-by":"publisher","first-page":"42861","DOI":"10.1038\/srep42861","volume":"7","author":"A Mantri","year":"2017","unstructured":"Mantri, A., Demarie, T.F., Fitzsimons, J.F.: Universality of quantum computation with cluster states and $$(X, Y)$$-plane measurements. Sci. Rep. 7, 42861 (2017)","journal-title":"Sci. Rep."},{"issue":"6","key":"5038_CR8","doi-asserted-by":"publisher","first-page":"134","DOI":"10.1007\/s11128-018-1901-2","volume":"17","author":"XQ Zhang","year":"2018","unstructured":"Zhang, X.Q., Weng, J., Li, X.C., et al.: Single-server blind quantum computation with quantum circuit model. Quantum Inf. Process. 17(6), 134 (2018)","journal-title":"Quantum Inf. Process."},{"issue":"1","key":"5038_CR9","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1038\/s41534-017-0025-3","volume":"3","author":"JF Fitzsimons","year":"2017","unstructured":"Fitzsimons, J.F.: Private quantum computation: an introduction to blind quantum computing and related protocols. npj Quantum Information 3(1), 23 (2017)","journal-title":"npj Quantum Information"},{"issue":"8","key":"5038_CR10","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1007\/s11128-020-02735-0","volume":"19","author":"Q Zhao","year":"2020","unstructured":"Zhao, Q., Li, Q.: Fault-tolerant quantum error correction code preparation in UBQC. Quantum Inf. Process. 19(8), 236 (2020)","journal-title":"Quantum Inf. Process."},{"issue":"29","key":"5038_CR11","doi-asserted-by":"publisher","first-page":"2050277","DOI":"10.1142\/S021797922050277X","volume":"34","author":"XD Zeng","year":"2020","unstructured":"Zeng, X.D., Tan, X.Q., Xu, Q.S., et al.: Blind quantum computation with hybrid model. Int. J. Mod. Phys. B 34(29), 2050277 (2020)","journal-title":"Int. J. Mod. Phys. B"},{"issue":"6","key":"5038_CR12","first-page":"456","volume":"5","author":"AM Childs","year":"2005","unstructured":"Childs, A.M.: Secure assisted quantum computation. Quantum Inf. Comput. 5(6), 456\u2013466 (2005)","journal-title":"Quantum Inf. Comput."},{"issue":"5","key":"5038_CR13","doi-asserted-by":"publisher","first-page":"883","DOI":"10.1142\/S0219749906002171","volume":"4","author":"P Arrighi","year":"2006","unstructured":"Arrighi, P., Salvail, L.: Blind quantum computation. Int. J. Quantum Inf. 4(5), 883\u2013898 (2006)","journal-title":"Int. J. Quantum Inf."},{"key":"5038_CR14","doi-asserted-by":"crossref","unstructured":"Broadbent, A., Fitzsimons, J., Kashefi, E.: Universal blind quantum computation. In: Proceedings of the 50th Annual IEEE Symposium on Foundations of Computer Science (FOCS 2009), pp. 517\u2013526 (2009)","DOI":"10.1109\/FOCS.2009.36"},{"issue":"5","key":"5038_CR15","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.87.050301","volume":"87","author":"T Morimae","year":"2013","unstructured":"Morimae, T., Fujii, K.: Blind quantum computation protocol in which Alice only makes measurements. Phys. Rev. A 87(5), 050301 (2013)","journal-title":"Phys. Rev. A"},{"key":"5038_CR16","doi-asserted-by":"publisher","first-page":"500","DOI":"10.1038\/nature13171","volume":"508","author":"R Barends","year":"2014","unstructured":"Barends, R., Kelly, J., Megrant, A., et al.: Superconducting quantum circuits at the surface code threshold for fault tolerance. Nature 508, 500\u2013503 (2014)","journal-title":"Nature"},{"key":"5038_CR17","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlastec.2021.107190","volume":"142","author":"Q Li","year":"2021","unstructured":"Li, Q., Liu, C.D., Peng, Y., et al.: Blind quantum computation where a user only performs single-qubit gates. Opt. Laser Technol. 142, 107190 (2021)","journal-title":"Opt. Laser Technol."},{"key":"5038_CR18","doi-asserted-by":"publisher","DOI":"10.1088\/1674-1056\/ace15a","volume":"32","author":"GY Wu","year":"2023","unstructured":"Wu, G.Y., Yang, Z., Yan, Y.Z., et al.: Blind quantum computation with a client performing different single-qubit gates. Chin. Phys. B 32, 110302 (2023)","journal-title":"Chin. Phys. B"},{"key":"5038_CR19","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.123.260504","volume":"123","author":"HJ Zhu","year":"2019","unstructured":"Zhu, H.J., Hayashi, M.: Efficient verification of pure quantum states in the adversarial scenario. Phys. Rev. Lett. 123, 260504 (2019)","journal-title":"Phys. Rev. Lett."},{"key":"5038_CR20","doi-asserted-by":"publisher","first-page":"382","DOI":"10.1038\/s42254-020-0186-4","volume":"2","author":"J Eisert","year":"2020","unstructured":"Eisert, J., Hangleiter, D., Walk, N., et al.: Quantum certification and benchmarking. Nat. Rev. Phys. 2, 382\u2013390 (2020)","journal-title":"Nat. Rev. Phys."},{"issue":"9","key":"5038_CR21","doi-asserted-by":"publisher","first-page":"996","DOI":"10.3390\/e22090996","volume":"22","author":"QS Xu","year":"2020","unstructured":"Xu, Q.S., Tan, X.Q., Huang, R.: Improved resource state for verifiable blind quantum computation. Entropy 22(9), 996 (2020)","journal-title":"Entropy"},{"key":"5038_CR22","doi-asserted-by":"publisher","first-page":"56921","DOI":"10.1109\/ACCESS.2020.2982090","volume":"8","author":"J Li","year":"2020","unstructured":"Li, J., Zhao, Y., Yang, Y.B., et al.: Verifiable quantum cloud computation scheme based on blind computation. IEEE Access 8, 56921\u201356926 (2020)","journal-title":"IEEE Access"},{"issue":"5","key":"5038_CR23","doi-asserted-by":"publisher","DOI":"10.1088\/1402-4896\/ad3f8d","volume":"99","author":"YM Luo","year":"2024","unstructured":"Luo, Y.M., Yang, Z., Wu, G.Y., et al.: Verifiable blind quantum computation over collective-noise. Phys. Scr. 99(5), 055040 (2024)","journal-title":"Phys. Scr."},{"issue":"1","key":"5038_CR24","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.96.012303","volume":"96","author":"J Fitzsimons","year":"2017","unstructured":"Fitzsimons, J., Kashefi, E.: Unconditionally verifiable blind quantum computation. Phys. Rev. A 96(1), 012303 (2017)","journal-title":"Phys. Rev. A"},{"issue":"14","key":"5038_CR25","doi-asserted-by":"publisher","first-page":"938","DOI":"10.1016\/j.physleta.2018.02.002","volume":"382","author":"Q Li","year":"2018","unstructured":"Li, Q., Li, Z.L., Chan, W.H., et al.: Blind quantum computation with identity authentication. Phys. Lett. A 382(14), 938\u2013941 (2018)","journal-title":"Phys. Lett. A"},{"issue":"6","key":"5038_CR26","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-020-2977-x","volume":"64","author":"RT Shan","year":"2021","unstructured":"Shan, R.T., Chen, X.B., Yuan, K.G.: Multi-party blind quantum computation protocol with mutual authentication in network. Sci. China Inf. Sci. 64(6), 162302 (2021)","journal-title":"Sci. China Inf. Sci."},{"key":"5038_CR27","doi-asserted-by":"publisher","first-page":"1687","DOI":"10.1109\/TIFS.2023.3340859","volume":"19","author":"JY Quan","year":"2024","unstructured":"Quan, J.Y., Li, Q., Li, L.Z.: Verifiable blind quantum computation with identity authentication for multi-type clients. IEEE Trans. Inf. Forensics Secur. 19, 1687\u20131698 (2024)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"5038_CR28","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2022.128396","volume":"609","author":"YG Yang","year":"2023","unstructured":"Yang, Y.G., Huang, R.C., Zhou, Y.H., et al.: Multiparty blind quantum computation protocol with deterministic mutual identity authentication. Phys. A 609, 128396 (2023)","journal-title":"Phys. A"}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-025-05038-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11128-025-05038-4","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-025-05038-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T07:26:01Z","timestamp":1770967561000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11128-025-05038-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,1,12]]},"references-count":28,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2026,1]]}},"alternative-id":["5038"],"URL":"https:\/\/doi.org\/10.1007\/s11128-025-05038-4","relation":{"has-preprint":[{"id-type":"doi","id":"10.21203\/rs.3.rs-5285967\/v1","asserted-by":"object"}]},"ISSN":["1573-1332"],"issn-type":[{"value":"1573-1332","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,1,12]]},"assertion":[{"value":"18 October 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 December 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 January 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"20"}}