{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T07:42:03Z","timestamp":1773819723287,"version":"3.50.1"},"reference-count":45,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T00:00:00Z","timestamp":1773792000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T00:00:00Z","timestamp":1773792000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"name":"Future Communications Research Centre, Macquarie University"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"abstract":"<jats:title>Abstract<\/jats:title>\n                  <jats:p>\n                    We present a quantum protocol which securely and implicitly implements a random shuffle to realize differential privacy in the shuffle model. The shuffle model of differential privacy amplifies privacy achievable via local differential privacy by randomly permuting the tuple of outcomes from data contributors. In practice, one needs to address how this shuffle is implemented. Examples include implementing the shuffle via mix-networks, or shuffling via a trusted third party. These implementation specific issues raise non-trivial computational and trust requirements in a classical system. We propose a quantum version of the protocol using entanglement of quantum states and show that the shuffle can be implemented without these extra requirements. Our protocol implements\n                    <jats:inline-formula>\n                      <jats:alternatives>\n                        <jats:tex-math>$$\\kappa $$<\/jats:tex-math>\n                        <mml:math xmlns:mml=\"http:\/\/www.w3.org\/1998\/Math\/MathML\">\n                          <mml:mi>\u03ba<\/mml:mi>\n                        <\/mml:math>\n                      <\/jats:alternatives>\n                    <\/jats:inline-formula>\n                    -ary randomized response, for any value of\n                    <jats:inline-formula>\n                      <jats:alternatives>\n                        <jats:tex-math>$$\\kappa \\ge 2$$<\/jats:tex-math>\n                        <mml:math xmlns:mml=\"http:\/\/www.w3.org\/1998\/Math\/MathML\">\n                          <mml:mrow>\n                            <mml:mi>\u03ba<\/mml:mi>\n                            <mml:mo>\u2265<\/mml:mo>\n                            <mml:mn>2<\/mml:mn>\n                          <\/mml:mrow>\n                        <\/mml:math>\n                      <\/jats:alternatives>\n                    <\/jats:inline-formula>\n                    , and furthermore, can be efficiently implemented using fault-tolerant computation.\n                  <\/jats:p>","DOI":"10.1007\/s11128-026-05087-3","type":"journal-article","created":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T06:37:09Z","timestamp":1773815829000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Efficient fault-tolerant quantum protocol for differential privacy in the shuffle model"],"prefix":"10.1007","volume":"25","author":[{"given":"Hassan","family":"Asghar","sequence":"first","affiliation":[]},{"given":"Arghya","family":"Mukherjee","sequence":"additional","affiliation":[]},{"given":"Gavin K.","family":"Brennen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,3,18]]},"reference":[{"key":"5087_CR1","doi-asserted-by":"publisher","unstructured":"Dwork, C., McSherry, F., Nissim, K., Smith, A.: Calibrating noise to sensitivity in private data analysis. In: Theory of Cryptography: Third Theory of Cryptography Conference, TCC 2006, New York, NY, USA, March 4-7, 2006. Proceedings 3, pp. 265\u2013284 (2006). https:\/\/doi.org\/10.1007\/11681878_14 . Springer","DOI":"10.1007\/11681878_14"},{"issue":"3","key":"5087_CR2","doi-asserted-by":"publisher","first-page":"793","DOI":"10.1137\/090756090","volume":"40","author":"SP Kasiviswanathan","year":"2011","unstructured":"Kasiviswanathan, S.P., Lee, H.K., Nissim, K., Raskhodnikova, S., Smith, A.: What can we learn privately? SIAM J. Comput. 40(3), 793\u2013826 (2011). https:\/\/doi.org\/10.1137\/090756090","journal-title":"SIAM J. Comput."},{"key":"5087_CR3","doi-asserted-by":"publisher","unstructured":"Dwork, C., Roth, A.: The algorithmic foundations of differential privacy. Foundations and Trends\u00ae in Theoretical Computer Science 9(3\u20134), 211\u2013407 (2014) https:\/\/doi.org\/10.1561\/0400000042","DOI":"10.1561\/0400000042"},{"key":"5087_CR4","doi-asserted-by":"crossref","unstructured":"Bittau, A., Erlingsson, \u00da., Maniatis, P., Mironov, I., Raghunathan, A., Lie, D., Rudominer, M., Kode, U., Tinnes, J., Seefeld, B.: Prochlo: Strong privacy for analytics in the crowd. In: Proceedings of the 26th Symposium on Operating Systems Principles, pp. 441\u2013459 (2017)","DOI":"10.1145\/3132747.3132769"},{"key":"5087_CR5","doi-asserted-by":"publisher","unstructured":"Balle, B., Bell, J., Gasc\u00f3n, A., Nissim, K.: The privacy blanket of the shuffle model. In: Advances in Cryptology \u2013 CRYPTO 2019: 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18\u201322, 2019, Proceedings, Part II, pp. 638\u2013667. Springer, Berlin, Heidelberg (2019). https:\/\/doi.org\/10.1007\/978-3-030-26951-7_22","DOI":"10.1007\/978-3-030-26951-7_22"},{"key":"5087_CR6","doi-asserted-by":"publisher","unstructured":"Cheu, A., Smith, A., Ullman, J., Zeber, D., Zhilyaev, M.: Distributed differential privacy via shuffling. In: Advances in Cryptology \u2013 EUROCRYPT 2019: 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19\u201323, 2019, Proceedings, Part I, pp. 375\u2013403. Springer, Berlin, Heidelberg (2019).https:\/\/doi.org\/10.1007\/978-3-030-17653-2_13","DOI":"10.1007\/978-3-030-17653-2_13"},{"key":"5087_CR7","doi-asserted-by":"publisher","unstructured":"Dwork, C., Kenthapadi, K., McSherry, F., Mironov, I., Naor, M.: Our data, ourselves: Privacy via distributed noise generation. In: Advances in Cryptology-EUROCRYPT 2006: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, May 28-June 1, 2006. Proceedings 25, pp. 486\u2013503 (2006).https:\/\/doi.org\/10.1007\/11761679_29 . Springer","DOI":"10.1007\/11761679_29"},{"issue":"43","key":"5087_CR8","doi-asserted-by":"publisher","first-page":"943","DOI":"10.1088\/1751-8113\/40\/43\/F03","volume":"40","author":"H Havlicek","year":"2007","unstructured":"Havlicek, H., Saniga, M.: Projective ring line of a specific qudit. J. Phys. A: Math. Theor. 40(43), 943 (2007). https:\/\/doi.org\/10.1088\/1751-8113\/40\/43\/F03","journal-title":"J. Phys. A: Math. Theor."},{"key":"5087_CR9","doi-asserted-by":"publisher","DOI":"10.3389\/fphy.2020.589504","volume":"8","author":"Y Wang","year":"2020","unstructured":"Wang, Y., Hu, Z., Sanders, B.C., Kais, S.: Qudits and high-dimensional quantum computing. Frontiers in Physics 8, 589504 (2020). https:\/\/doi.org\/10.3389\/fphy.2020.589504","journal-title":"Frontiers in Physics"},{"key":"5087_CR10","doi-asserted-by":"publisher","first-page":"589504","DOI":"10.3389\/fphy.2020.589504","volume":"8","author":"G Giuliani","year":"2020","unstructured":"Giuliani, G., Viscido, L., Castrignan\u00f2, S., Tanaka, S.J., Stefanon, M.: Statistical validation of machine learning applied to low-statistics nuclear physics data. Front. Phys. 8, 589504 (2020). https:\/\/doi.org\/10.3389\/fphy.2020.589504","journal-title":"Front. Phys."},{"issue":"1\u20134","key":"5087_CR11","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1016\/j.physleta.2005.09.010","volume":"349","author":"M Hillery","year":"2006","unstructured":"Hillery, M., Ziman, M., Bu\u017eek, V., Bielikov\u00e1, M.: Towards quantum-based privacy and voting. Phys. Lett. A 349(1\u20134), 75\u201381 (2006). https:\/\/doi.org\/10.1016\/j.physleta.2005.09.010","journal-title":"Phys. Lett. A"},{"key":"5087_CR12","doi-asserted-by":"publisher","unstructured":"Christandl, M., Wehner, S.: Quantum anonymous transmissions. In: Advances in Cryptology-ASIACRYPT 2005: 11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India, December 4-8, 2005. Proceedings 11, pp. 217\u2013235 (2005). https:\/\/doi.org\/10.1007\/11593447_12 . Springer","DOI":"10.1007\/11593447_12"},{"key":"5087_CR13","unstructured":"Gottesman, D.: Surviving as a quantum computer in a classical world. Department of Computer Science, University of Maryland (2024). https:\/\/www.cs.umd.edu\/class\/spring2024\/cmsc858G\/QECCbook-2024-ch1-11.pdf"},{"issue":"11","key":"5087_CR14","doi-asserted-by":"publisher","DOI":"10.1088\/1402-4896\/ad0006","volume":"98","author":"S Dutta","year":"2023","unstructured":"Dutta, S., Banerjee, S., Rani, M.: Qudit states in noisy quantum channels. Phys. Scr. 98(11), 115113 (2023). https:\/\/doi.org\/10.1088\/1402-4896\/ad0006","journal-title":"Phys. Scr."},{"key":"5087_CR15","doi-asserted-by":"publisher","unstructured":"Nielsen, M.A., Chuang, I.L.: Quantum Computation and Quantum Information: 10th Anniversary Edition. Cambridge University Press, Cambridge (2010). https:\/\/doi.org\/10.1017\/CBO9780511976667","DOI":"10.1017\/CBO9780511976667"},{"issue":"13","key":"5087_CR16","doi-asserted-by":"publisher","first-page":"3481","DOI":"10.1088\/1751-8113\/40\/13\/013","volume":"40","author":"SS Bullock","year":"2007","unstructured":"Bullock, S.S., Brennen, G.K.: Qudit surface codes and gauge theory with finite cyclic groups. J. Phys. A: Math. Theor. 40(13), 3481 (2007). https:\/\/doi.org\/10.1088\/1751-8113\/40\/13\/013","journal-title":"J. Phys. A: Math. Theor."},{"issue":"2","key":"5087_CR17","doi-asserted-by":"publisher","first-page":"035","DOI":"10.21468\/SciPostPhysCore.6.2.035","volume":"6","author":"K Kawabata","year":"2023","unstructured":"Kawabata, K., Nishioka, T., Okuda, T.: Narain cfts from qudit stabilizer codes. SciPost Physics Core 6(2), 035 (2023). https:\/\/doi.org\/10.21468\/SciPostPhysCore.6.2.035","journal-title":"SciPost Physics Core"},{"issue":"5\u20136","key":"5087_CR18","doi-asserted-by":"publisher","first-page":"505","DOI":"10.1016\/j.physleta.2013.12.009","volume":"378","author":"V Gheorghiu","year":"2014","unstructured":"Gheorghiu, V.: Standard form of qudit stabilizer groups. Phys. Lett. A 378(5\u20136), 505\u2013509 (2014). https:\/\/doi.org\/10.1016\/j.physleta.2013.12.009","journal-title":"Phys. Lett. A"},{"key":"5087_CR19","unstructured":"Bravyi, S.B., Kitaev, A.Y.: Quantum codes on a lattice with boundary (1998). arXiv:abs\/quant-ph\/9811052"},{"key":"5087_CR20","doi-asserted-by":"publisher","first-page":"032324","DOI":"10.1103\/PhysRevA.86.032324","volume":"86","author":"AG Fowler","year":"2012","unstructured":"Fowler, A.G., Mariantoni, M., Martinis, J.M., Cleland, A.N.: Surface codes: Towards practical large-scale quantum computation. Phys. Rev. A 86, 032324 (2012). https:\/\/doi.org\/10.1103\/PhysRevA.86.032324","journal-title":"Phys. Rev. A"},{"key":"5087_CR21","unstructured":"Anwar, H.: Towards fault-tolerant quantum computation with higher-dimensional systems. PhD thesis, Department of Physics and Astronomy, University College London (2014). https:\/\/discovery.ucl.ac.uk\/id\/eprint\/1421173"},{"key":"5087_CR22","doi-asserted-by":"publisher","first-page":"032309","DOI":"10.1103\/PhysRevA.92.032309","volume":"92","author":"FHE Watson","year":"2015","unstructured":"Watson, F.H.E., Anwar, H., Browne, D.E.: Fast fault-tolerant decoder for qubit and qudit surface codes. Phys. Rev. A 92, 032309 (2015). https:\/\/doi.org\/10.1103\/PhysRevA.92.032309","journal-title":"Phys. Rev. A"},{"key":"5087_CR23","doi-asserted-by":"publisher","first-page":"045006","DOI":"10.1103\/RevModPhys.95.045006","volume":"95","author":"K Azuma","year":"2023","unstructured":"Azuma, K., Economou, S.E., Elkouss, D., Hilaire, P., Jiang, L., Lo, H.-K., Tzitrin, I.: Quantum repeaters: From quantum networks to the quantum internet. Rev. Mod. Phys. 95, 045006 (2023). https:\/\/doi.org\/10.1103\/RevModPhys.95.045006","journal-title":"Rev. Mod. Phys."},{"issue":"3","key":"5087_CR24","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1109\/JSTQE.2015.2392076","volume":"21","author":"WJ Munro","year":"2015","unstructured":"Munro, W.J., Azuma, K., Tamaki, K., Nemoto, K.: Inside quantum repeaters. IEEE J. Sel. Top. Quantum Electron. 21(3), 78\u201390 (2015). https:\/\/doi.org\/10.1109\/JSTQE.2015.2392076","journal-title":"IEEE J. Sel. Top. Quantum Electron."},{"key":"5087_CR25","doi-asserted-by":"publisher","unstructured":"Rohde, P.P.: The Quantum Internet: The Second Quantum Revolution. Cambridge University Press, Cambridge (2021). https:\/\/doi.org\/10.1017\/9781108868815","DOI":"10.1017\/9781108868815"},{"issue":"1","key":"5087_CR26","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1038\/s41534-022-00535-1","volume":"8","author":"Z Huang","year":"2022","unstructured":"Huang, Z., Joshi, S.K., Aktas, D., Lupo, C., Quintavalle, A.O., Venkatachalam, N., Wengerowsky, S., Lon\u010dari\u0107, M., Neumann, S.P., Liu, B., Samec, \u017d, Kling, L., Stip\u010devi\u0107, M., Ursin, R., Rarity, J.G.: Experimental implementation of secure anonymous protocols on an eight-user quantum key distribution network. Npj Quantum Information 8(1), 25 (2022). https:\/\/doi.org\/10.1038\/s41534-022-00535-1","journal-title":"Npj Quantum Information"},{"key":"5087_CR27","doi-asserted-by":"crossref","unstructured":"Edmunds, C.L., Rico, E., Arrazola, I., Brennen, G.K., Meth, M., Blatt, R., Ringbauer, M.: Constructing the spin-1 Haldane phase on a qudit quantum processor (2024). arXiv:abs\/2408.04702","DOI":"10.1103\/PRXQuantum.6.020349"},{"key":"5087_CR28","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.83.062314","volume":"83","author":"NC Menicucci","year":"2011","unstructured":"Menicucci, N.C.: Temporal-mode continuous-variable cluster states using linear optics. Phys. Rev. A 83, 062314 (2011). https:\/\/doi.org\/10.1103\/PhysRevA.83.062314","journal-title":"Phys. Rev. A"},{"key":"5087_CR29","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.90.032325","volume":"90","author":"P Wang","year":"2014","unstructured":"Wang, P., Chen, M., Menicucci, N.C., Pfister, O.: Weaving quantum optical frequency combs into continuous-variable hypercubic cluster states. Phys. Rev. A 90, 032325 (2014). https:\/\/doi.org\/10.1103\/PhysRevA.90.032325","journal-title":"Phys. Rev. A"},{"key":"5087_CR30","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.97.032345","volume":"97","author":"NC Menicucci","year":"2018","unstructured":"Menicucci, N.C., Baragiola, B.Q., Demarie, T.F., Brennen, G.K.: Anonymous broadcasting of classical information with a continuous-variable topological quantum code. Phys. Rev. A 97, 032345 (2018). https:\/\/doi.org\/10.1103\/PhysRevA.97.032345","journal-title":"Phys. Rev. A"},{"issue":"1","key":"5087_CR31","doi-asserted-by":"publisher","first-page":"4338","DOI":"10.1038\/s41467-022-31639-z","volume":"13","author":"H-H Lu","year":"2022","unstructured":"Lu, H.-H., Myilswamy, K.V., Bennink, R.S., Seshadri, S., Alshaykh, M.S., Liu, J., Kippenberg, T.J., Leaird, D.E., Weiner, A.M., Lukens, J.M.: Bayesian tomography of high-dimensional on-chip biphoton frequency combs with randomized measurements. Nat. Commun. 13(1), 4338 (2022). https:\/\/doi.org\/10.1038\/s41467-022-31639-z","journal-title":"Nat. Commun."},{"issue":"1","key":"5087_CR32","doi-asserted-by":"publisher","first-page":"2242","DOI":"10.1038\/s41467-023-37375-2","volume":"14","author":"P Hrmo","year":"2023","unstructured":"Hrmo, P., Wilhelm, B., Gerster, L., Mourik, M.W., Huber, M., Blatt, R., Schindler, P., Monz, T., Ringbauer, M.: Native qudit entanglement in a trapped ion quantum processor. Nat. Commun. 14(1), 2242 (2023). https:\/\/doi.org\/10.1038\/s41467-023-37375-2","journal-title":"Nat. Commun."},{"issue":"7","key":"5087_CR33","doi-asserted-by":"publisher","first-page":"365","DOI":"10.1038\/s42254-020-0193-5","volume":"2","author":"M Erhard","year":"2020","unstructured":"Erhard, M., Krenn, M., Zeilinger, A.: Advances in high-dimensional quantum entanglement. Nature Reviews Physics 2(7), 365\u2013381 (2020). https:\/\/doi.org\/10.1038\/s42254-020-0193-5","journal-title":"Nature Reviews Physics"},{"key":"5087_CR34","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.98.052320","volume":"98","author":"V Lipinska","year":"2018","unstructured":"Lipinska, V., Murta, G., Wehner, S.: Anonymous transmission in a noisy quantum network using the $$w$$ state. Phys. Rev. A 98, 052320 (2018). https:\/\/doi.org\/10.1103\/PhysRevA.98.052320","journal-title":"Phys. Rev. A"},{"key":"5087_CR35","doi-asserted-by":"publisher","unstructured":"Zhou, L., Ying, M.: Differential privacy in quantum computation. In: 2017 IEEE 30th Computer Security Foundations Symposium (CSF), pp. 249\u2013262 (2017). https:\/\/doi.org\/10.1109\/CSF.2017.23","DOI":"10.1109\/CSF.2017.23"},{"issue":"9","key":"5087_CR36","doi-asserted-by":"publisher","first-page":"5771","DOI":"10.1109\/TIT.2023.3272904","volume":"69","author":"C Hirche","year":"2023","unstructured":"Hirche, C., Rouz\u00e9, C., Fran\u00e7a, D.S.: Quantum differential privacy: An information theory perspective. IEEE Trans. Inf. Theory 69(9), 5771\u20135787 (2023). https:\/\/doi.org\/10.1109\/TIT.2023.3272904","journal-title":"IEEE Trans. Inf. Theory"},{"key":"5087_CR37","doi-asserted-by":"publisher","unstructured":"Aaronson, S., Rothblum, G.N.: Gentle measurement of quantum states and differential privacy. In: Proceedings of the 51st Annual ACM SIGACT Symposium on Theory of Computing. STOC 2019, pp. 322\u2013333. Association for Computing Machinery, New York, NY, USA (2019). https:\/\/doi.org\/10.1145\/3313276.3316378","DOI":"10.1145\/3313276.3316378"},{"key":"5087_CR38","doi-asserted-by":"publisher","unstructured":"Guan, J., Fang, W., Huang, M., Ying, M.: Detecting violations of differential privacy for quantum algorithms. In: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security. CCS \u201923, pp. 2277\u20132291. Association for Computing Machinery, New York, NY, USA (2023). https:\/\/doi.org\/10.1145\/3576915.3623108","DOI":"10.1145\/3576915.3623108"},{"issue":"1","key":"5087_CR39","doi-asserted-by":"publisher","first-page":"2453","DOI":"10.1038\/s41598-022-24082-z","volume":"13","author":"WM Watkins","year":"2023","unstructured":"Watkins, W.M., Chen, S.Y.-C., Yoo, S.: Quantum machine learning with differential privacy. Sci. Rep. 13(1), 2453 (2023). https:\/\/doi.org\/10.1038\/s41598-022-24082-z","journal-title":"Sci. Rep."},{"key":"5087_CR40","unstructured":"Angrisani, A., Doosti, M., Kashefi, E.: Differential privacy amplification in quantum and quantum-inspired algorithms. arXiv preprint arXiv:2203.03604 (2022)"},{"key":"5087_CR41","doi-asserted-by":"publisher","first-page":"1895","DOI":"10.1103\/PhysRevLett.70.1895","volume":"70","author":"CH Bennett","year":"1993","unstructured":"Bennett, C.H., Brassard, G., Cr\u00e9peau, C., Jozsa, R., Peres, A., Wootters, W.K.: Teleporting an unknown quantum state via dual classical and einstein-podolsky-rosen channels. Phys. Rev. Lett. 70, 1895\u20131899 (1993). https:\/\/doi.org\/10.1103\/PhysRevLett.70.1895","journal-title":"Phys. Rev. Lett."},{"issue":"12","key":"5087_CR42","doi-asserted-by":"publisher","DOI":"10.1088\/1367-2630\/14\/12\/123011","volume":"14","author":"D Horsman","year":"2012","unstructured":"Horsman, D., Fowler, A.G., Devitt, S., Meter, R.V.: Surface code quantum computing by lattice surgery. New J. Phys. 14(12), 123011 (2012). https:\/\/doi.org\/10.1088\/1367-2630\/14\/12\/123011","journal-title":"New J. Phys."},{"key":"5087_CR43","unstructured":"Fowler, A.G., Gidney, C.: Low overhead quantum computation using lattice surgery (2019). arXiv:abs\/1808.06709"},{"key":"5087_CR44","doi-asserted-by":"publisher","first-page":"128","DOI":"10.22331\/q-2019-03-05-128","volume":"3","author":"D Litinski","year":"2019","unstructured":"Litinski, D.: A Game of Surface Codes: Large-Scale Quantum Computing with Lattice Surgery. Quantum 3, 128 (2019). https:\/\/doi.org\/10.22331\/q-2019-03-05-128","journal-title":"Quantum"},{"key":"5087_CR45","unstructured":"Cowtan, A.: Qudit lattice surgery (2022). arXiv:2204.13228"}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-026-05087-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11128-026-05087-3","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-026-05087-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T06:37:18Z","timestamp":1773815838000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11128-026-05087-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,3,18]]},"references-count":45,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2026,4]]}},"alternative-id":["5087"],"URL":"https:\/\/doi.org\/10.1007\/s11128-026-05087-3","relation":{},"ISSN":["1573-1332"],"issn-type":[{"value":"1573-1332","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,3,18]]},"assertion":[{"value":"4 September 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 January 2026","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 March 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"104"}}