{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,6]],"date-time":"2026-04-06T07:15:00Z","timestamp":1775459700319,"version":"3.50.1"},"reference-count":106,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2026,4,6]],"date-time":"2026-04-06T00:00:00Z","timestamp":1775433600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,4,6]],"date-time":"2026-04-06T00:00:00Z","timestamp":1775433600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"DOI":"10.1007\/s11128-026-05097-1","type":"journal-article","created":{"date-parts":[[2026,4,6]],"date-time":"2026-04-06T06:27:22Z","timestamp":1775456842000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Resource reduction in multiparty quantum secret sharing of both classical and quantum information under noisy scenario"],"prefix":"10.1007","volume":"25","author":[{"given":"Nirupam","family":"Basak","sequence":"first","affiliation":[]},{"given":"Goutam","family":"Paul","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,4,6]]},"reference":[{"issue":"11","key":"5097_CR1","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A Shamir","year":"1979","unstructured":"Shamir, A.: How to share a secret. Commun. ACM 22(11), 612\u2013613 (1979). https:\/\/doi.org\/10.1145\/359168.359176","journal-title":"Commun. ACM"},{"key":"5097_CR2","doi-asserted-by":"publisher","unstructured":"Blakley, G.R.: Safeguarding cryptographic keys, in 1979 International Workshop on Managing Requirements Knowledge (MARK) , 313\u2013318 (1979). https:\/\/doi.org\/10.1109\/MARK.1979.8817296","DOI":"10.1109\/MARK.1979.8817296"},{"key":"5097_CR3","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2023.100608","volume":"51","author":"AK Chattopadhyay","year":"2024","unstructured":"Chattopadhyay, A.K., Saha, S., Nag, A., Nandi, S.: Secret sharing: a comprehensive survey, taxonomy and applications. Comput. Sci. Rev. 51, 100608 (2024). https:\/\/doi.org\/10.1016\/j.cosrev.2023.100608","journal-title":"Comput. Sci. Rev."},{"key":"5097_CR4","doi-asserted-by":"publisher","unstructured":"Panagopoulos, D.: A secret sharing scheme using groups. arXiv:1009.0026 (2010). https:\/\/doi.org\/10.48550\/arXiv.1009.0026","DOI":"10.48550\/arXiv.1009.0026"},{"key":"5097_CR5","doi-asserted-by":"publisher","unstructured":"Habeeb, M., Kahrobaei, D., Shpilrain, V.: A secret sharing scheme based on group presentations and the word problem. In Computational and combinatorial group theory and cryptography (American Mathematical Society, 2012). https:\/\/doi.org\/10.1090\/conm\/582\/11557","DOI":"10.1090\/conm\/582\/11557"},{"issue":"1","key":"5097_CR6","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1007\/s11277-016-3332-7","volume":"90","author":"S Mashhadi","year":"2016","unstructured":"Mashhadi, S.: How to fairly share multiple secrets stage by stage. Wireless Pers. Commun. 90(1), 93\u2013107 (2016). https:\/\/doi.org\/10.1007\/s11277-016-3332-7","journal-title":"Wireless Pers. Commun."},{"key":"5097_CR7","doi-asserted-by":"publisher","first-page":"1591","DOI":"10.1049\/el:19941076","volume":"30","author":"J He","year":"1994","unstructured":"He, J., Dawson, E.: Multistage secret sharing based on one-way function. Electron. Lett. 30, 1591\u20131592 (1994). https:\/\/doi.org\/10.1049\/el:19941076","journal-title":"Electron. Lett."},{"key":"5097_CR8","doi-asserted-by":"publisher","unstructured":"Shor, P.W.: Algorithms for quantum computation: discrete logarithms and factoring. In: Proceedings 35th Annual Symposium on Foundations of Computer Science. 124\u2013134 (1994). https:\/\/doi.org\/10.1109\/SFCS.1994.365700","DOI":"10.1109\/SFCS.1994.365700"},{"key":"5097_CR9","doi-asserted-by":"publisher","unstructured":"Grover, L.K.: A fast quantum mechanical algorithm for database search. In: Proceedings of the twenty-eighth Annual ACM symposium on theory of computing. (Association for Computing Machinery, New York, NY, USA, 1996), STOC \u201996, 212\u2013219. https:\/\/doi.org\/10.1145\/237814.237866","DOI":"10.1145\/237814.237866"},{"key":"5097_CR10","doi-asserted-by":"publisher","first-page":"1829","DOI":"10.1103\/PhysRevA.59.1829","volume":"59","author":"M Hillery","year":"1999","unstructured":"Hillery, M., Bu\u017eek, V., Berthiaume, A.: Quantum secret sharing. Phys. Rev. A 59, 1829\u20131834 (1999). https:\/\/doi.org\/10.1103\/PhysRevA.59.1829","journal-title":"Phys. Rev. A"},{"key":"5097_CR11","doi-asserted-by":"publisher","unstructured":"Zhang, Z.j., Li, Y., Man, Z.x.: Multiparty quantum secret sharing. Phys. Rev. A 71, 044301 (2005) https:\/\/doi.org\/10.1103\/PhysRevA.71.044301","DOI":"10.1103\/PhysRevA.71.044301"},{"key":"5097_CR12","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.69.052307","volume":"69","author":"L Xiao","year":"2004","unstructured":"Xiao, L., Lu Long, G., Deng, F.G., Pan, J.W.: Efficient multiparty quantum-secret-sharing schemes. Phys. Rev. A 69, 052307 (2004). https:\/\/doi.org\/10.1103\/PhysRevA.69.052307","journal-title":"Phys. Rev. A"},{"issue":"4","key":"5097_CR13","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1016\/S0375-9601(03)00074-4","volume":"310","author":"GP Guo","year":"2003","unstructured":"Guo, G.P., Guo, G.C.: Quantum secret sharing without entanglement. Phys. Lett. A 310(4), 247\u2013251 (2003). https:\/\/doi.org\/10.1016\/S0375-9601(03)00074-4","journal-title":"Phys. Lett. A"},{"key":"5097_CR14","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.61.042311","volume":"61","author":"D Gottesman","year":"2000","unstructured":"Gottesman, D.: Theory of quantum secret sharing. Phys. Rev. A 61, 042311 (2000). https:\/\/doi.org\/10.1103\/PhysRevA.61.042311","journal-title":"Phys. Rev. A"},{"key":"5097_CR15","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.121.150502","volume":"121","author":"Y Zhou","year":"2018","unstructured":"Zhou, Y., Yu, J., Yan, Z., Jia, X., Zhang, J., Xie, C., Peng, K.: Quantum secret sharing among four players using multipartite bound entanglement of an optical field. Phys. Rev. Lett. 121, 150502 (2018). https:\/\/doi.org\/10.1103\/PhysRevLett.121.150502","journal-title":"Phys. Rev. Lett."},{"key":"5097_CR16","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.103.032410","volume":"103","author":"Q Liao","year":"2021","unstructured":"Liao, Q., Liu, H., Zhu, L., Guo, Y.: Quantum secret sharing using discretely modulated coherent states. Phys. Rev. A 103, 032410 (2021). https:\/\/doi.org\/10.1103\/PhysRevA.103.032410","journal-title":"Phys. Rev. A"},{"key":"5097_CR17","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.63.042301","volume":"63","author":"W Tittel","year":"2001","unstructured":"Tittel, W., Zbinden, H., Gisin, N.: Experimental demonstration of quantum secret sharing. Phys. Rev. A 63, 042301 (2001). https:\/\/doi.org\/10.1103\/PhysRevA.63.042301","journal-title":"Phys. Rev. A"},{"issue":"3","key":"5097_CR18","doi-asserted-by":"publisher","first-page":"172","DOI":"10.1007\/BF01397280","volume":"43","author":"W Heisenberg","year":"1927","unstructured":"Heisenberg, W.: \u00dcber den anschaulichen inhalt der quantentheoretischen kinematik und mechanik. Z. Phys. 43(3), 172\u2013198 (1927). https:\/\/doi.org\/10.1007\/BF01397280","journal-title":"Z. Phys."},{"issue":"5886","key":"5097_CR19","doi-asserted-by":"publisher","first-page":"802","DOI":"10.1038\/299802a0","volume":"299","author":"WK Wootters","year":"1982","unstructured":"Wootters, W.K., Zurek, W.H.: A single quantum cannot be cloned. Nature 299(5886), 802\u2013803 (1982). https:\/\/doi.org\/10.1038\/299802a0","journal-title":"Nature"},{"issue":"11","key":"5097_CR20","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1007\/s11128-023-04129-4","volume":"22","author":"N Basak","year":"2023","unstructured":"Basak, N., Das, N., Paul, G., Nandi, K., Patel, N.: Quantum secret sharing protocol using ghz state: implementation on ibm qiskit. Quantum Inf. Process. 22(11), 393 (2023). https:\/\/doi.org\/10.1007\/s11128-023-04129-4","journal-title":"Quantum Inf. Process."},{"issue":"1","key":"5097_CR21","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1140\/epjqt\/s40507-023-00186-x","volume":"10","author":"SY Kuo","year":"2023","unstructured":"Kuo, S.Y., Tseng, K.C., Yang, C.C., Chou, Y.H.: Efficient multiparty quantum secret sharing based on a novel structure and single qubits. EPJ Quantum Technol. 10(1), 29 (2023). https:\/\/doi.org\/10.1140\/epjqt\/s40507-023-00186-x","journal-title":"EPJ Quantum Technol."},{"key":"5097_CR22","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.92.030301","volume":"92","author":"V Karimipour","year":"2015","unstructured":"Karimipour, V., Asoudeh, M.: Quantum secret sharing and random hopping: Using single states instead of entanglement. Phys. Rev. A 92, 030301 (2015). https:\/\/doi.org\/10.1103\/PhysRevA.92.030301","journal-title":"Phys. Rev. A"},{"key":"5097_CR23","doi-asserted-by":"publisher","unstructured":"yin Wang, T., yan Wen, Q., bo Chen, X., zhuo Guo, F., chen Zhu, F.: An efficient and secure multiparty quantum secret sharing scheme based on single photons. Optics Commun. 281(24), 6130\u20136134 (2008). https:\/\/doi.org\/10.1016\/j.optcom.2008.09.026","DOI":"10.1016\/j.optcom.2008.09.026"},{"issue":"45","key":"5097_CR24","doi-asserted-by":"publisher","first-page":"14089","DOI":"10.1088\/0305-4470\/39\/45\/018","volume":"39","author":"FG Deng","year":"2006","unstructured":"Deng, F.G., Zhou, H.Y., Long, G.L.: Circular quantum secret sharing. J. Phys. A: Math. Gen. 39(45), 14089 (2006). https:\/\/doi.org\/10.1088\/0305-4470\/39\/45\/018","journal-title":"J. Phys. A: Math. Gen."},{"key":"5097_CR25","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.95.230505","volume":"95","author":"C Schmid","year":"2005","unstructured":"Schmid, C., Trojek, P., Bourennane, M., Kurtsiefer, C., \u017bukowski, M., Weinfurter, H.: Experimental single qubit quantum secret sharing. Phys. Rev. Lett. 95, 230505 (2005). https:\/\/doi.org\/10.1103\/PhysRevLett.95.230505","journal-title":"Phys. Rev. Lett."},{"issue":"1","key":"5097_CR26","doi-asserted-by":"publisher","first-page":"18385","DOI":"10.1038\/s41598-024-69417-0","volume":"14","author":"XQ Cai","year":"2024","unstructured":"Cai, X.Q., Li, S., Liu, Z.F., Wang, T.Y.: Improving security of efficient multiparty quantum secret sharing based on a novel structure and single qubits. Sci. Rep. 14(1), 18385 (2024). https:\/\/doi.org\/10.1038\/s41598-024-69417-0","journal-title":"Sci. Rep."},{"key":"5097_CR27","doi-asserted-by":"publisher","first-page":"79","DOI":"10.22331\/q-2018-08-06-79","volume":"2","author":"J Preskill","year":"2018","unstructured":"Preskill, J.: Quantum Computing in the NISQ era and beyond. Quantum 2, 79 (2018). https:\/\/doi.org\/10.22331\/q-2018-08-06-79","journal-title":"Quantum"},{"key":"5097_CR28","doi-asserted-by":"publisher","unstructured":"Nielsen, M.A., Chuang, I.L.: Quantum computation and quantum information: 10th Anniversary Edition (Cambridge University Press, 2010). https:\/\/doi.org\/10.1017\/CBO9780511976667","DOI":"10.1017\/CBO9780511976667"},{"issue":"6","key":"5097_CR29","doi-asserted-by":"publisher","first-page":"595","DOI":"10.1038\/s41567-018-0124-x","volume":"14","author":"S Boixo","year":"2018","unstructured":"Boixo, S., Isakov, S.V., Smelyanskiy, V.N., Babbush, R., Ding, N., Jiang, Z., Bremner, M.J., Martinis, J.M., Neven, H.: Characterizing quantum supremacy in near-term devices. Nat. Phys. 14(6), 595\u2013600 (2018). https:\/\/doi.org\/10.1038\/s41567-018-0124-x","journal-title":"Nat. Phys."},{"key":"5097_CR30","doi-asserted-by":"publisher","unstructured":"Gottesman, D.: An introduction to quantum error correction and fault-tolerant quantum computation. arXiv:0904.2557 (2009). https:\/\/doi.org\/10.48550\/arXiv.0904.2557 [quant-ph]","DOI":"10.48550\/arXiv.0904.2557"},{"issue":"7497","key":"5097_CR31","doi-asserted-by":"publisher","first-page":"500","DOI":"10.1038\/nature13171","volume":"508","author":"R Barends","year":"2014","unstructured":"Barends, R., Kelly, J., Megrant, A., Veitia, A., Sank, D., Jeffrey, E., White, T.C., Mutus, J., Fowler, A.G., Campbell, B., et al.: Superconducting quantum circuits at the surface code threshold for fault tolerance. Nature 508(7497), 500\u2013503 (2014). https:\/\/doi.org\/10.1038\/nature13171","journal-title":"Nature"},{"key":"5097_CR32","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11128-019-2531-z","volume":"19","author":"D Joy","year":"2020","unstructured":"Joy, D., Sabir, M., Behera, B.K., Panigrahi, P.K.: Implementation of quantum secret sharing and quantum binary voting protocol in the ibm quantum computer. Quantum Inf. Process. 19, 1\u201320 (2020). https:\/\/doi.org\/10.1007\/s11128-019-2531-z","journal-title":"Quantum Inf. Process."},{"issue":"3","key":"5097_CR33","doi-asserted-by":"publisher","first-page":"226","DOI":"10.1080\/00107514.2019.1667078","volume":"60","author":"J Roffe","year":"2019","unstructured":"Roffe, J.: Quantum error correction: an introductory guide. Contemp. Phys. 60(3), 226\u2013245 (2019). https:\/\/doi.org\/10.1080\/00107514.2019.1667078","journal-title":"Contemp. Phys."},{"key":"5097_CR34","doi-asserted-by":"publisher","DOI":"10.1103\/RevModPhys.95.045005","volume":"95","author":"Z Cai","year":"2023","unstructured":"Cai, Z., Babbush, R., Benjamin, S.C., Endo, S., Huggins, W.J., Li, Y., McClean, J.R., O\u2019Brien, T.E.: Quantum error mitigation. Rev. Mod. Phys. 95, 045005 (2023). https:\/\/doi.org\/10.1103\/RevModPhys.95.045005","journal-title":"Rev. Mod. Phys."},{"key":"5097_CR35","doi-asserted-by":"publisher","first-page":"2152","DOI":"10.1103\/PhysRevLett.81.2152","volume":"81","author":"DG Cory","year":"1998","unstructured":"Cory, D.G., Price, M.D., Maas, W., Knill, E., Laflamme, R., Zurek, W.H., Havel, T.F., Somaroo, S.S.: Experimental quantum error correction. Phys. Rev. Lett. 81, 2152\u20132155 (1998). https:\/\/doi.org\/10.1103\/PhysRevLett.81.2152","journal-title":"Phys. Rev. Lett."},{"issue":"7","key":"5097_CR36","doi-asserted-by":"publisher","DOI":"10.1088\/0034-4885\/76\/7\/076001","volume":"76","author":"SJ Devitt","year":"2013","unstructured":"Devitt, S.J., Munro, W.J., Nemoto, K.: Quantum error correction for beginners. Rep. Prog. Phys. 76(7), 076001 (2013). https:\/\/doi.org\/10.1088\/0034-4885\/76\/7\/076001","journal-title":"Rep. Prog. Phys."},{"key":"5097_CR37","doi-asserted-by":"publisher","first-page":"2493","DOI":"10.1103\/PhysRevA.52.R2493","volume":"52","author":"PW Shor","year":"1995","unstructured":"Shor, P.W.: Scheme for reducing decoherence in quantum computer memory. Phys. Rev. A 52, 2493\u20132496 (1995). https:\/\/doi.org\/10.1103\/PhysRevA.52.R2493","journal-title":"Phys. Rev. A"},{"key":"5097_CR38","doi-asserted-by":"publisher","first-page":"3306","DOI":"10.1103\/PhysRevLett.79.3306","volume":"79","author":"P Zanardi","year":"1997","unstructured":"Zanardi, P., Rasetti, M.: Noiseless quantum codes. Phys. Rev. Lett. 79, 3306\u20133309 (1997). https:\/\/doi.org\/10.1103\/PhysRevLett.79.3306","journal-title":"Phys. Rev. Lett."},{"issue":"25","key":"5097_CR39","doi-asserted-by":"publisher","first-page":"1085","DOI":"10.1142\/S0217984997001304","volume":"11","author":"P Zanardi","year":"1997","unstructured":"Zanardi, P., Rasetti, M.: Error avoiding quantum codes. Mod. Phys. Lett. B 11(25), 1085\u20131093 (1997). https:\/\/doi.org\/10.1142\/S0217984997001304","journal-title":"Mod. Phys. Lett. B"},{"key":"5097_CR40","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.73.060302","volume":"73","author":"F Yamaguchi","year":"2006","unstructured":"Yamaguchi, F., Nemoto, K., Munro, W.J.: Quantum error correction via robust probe modes. Phys. Rev. A 73, 060302 (2006). https:\/\/doi.org\/10.1103\/PhysRevA.73.060302","journal-title":"Phys. Rev. A"},{"key":"5097_CR41","doi-asserted-by":"publisher","first-page":"4741","DOI":"10.1103\/PhysRevA.54.4741","volume":"54","author":"AM Steane","year":"1996","unstructured":"Steane, A.M.: Simple quantum error-correcting codes. Phys. Rev. A 54, 4741\u20134751 (1996). https:\/\/doi.org\/10.1103\/PhysRevA.54.4741","journal-title":"Phys. Rev. A"},{"key":"5097_CR42","doi-asserted-by":"publisher","first-page":"793","DOI":"10.1103\/PhysRevLett.77.793","volume":"77","author":"AM Steane","year":"1996","unstructured":"Steane, A.M.: Error correcting codes in quantum theory. Phys. Rev. Lett. 77, 793\u2013797 (1996). https:\/\/doi.org\/10.1103\/PhysRevLett.77.793","journal-title":"Phys. Rev. Lett."},{"key":"5097_CR43","doi-asserted-by":"publisher","first-page":"1862","DOI":"10.1103\/PhysRevA.54.1862","volume":"54","author":"D Gottesman","year":"1996","unstructured":"Gottesman, D.: Class of quantum error-correcting codes saturating the quantum hamming bound. Phys. Rev. A 54, 1862\u20131868 (1996). https:\/\/doi.org\/10.1103\/PhysRevA.54.1862","journal-title":"Phys. Rev. A"},{"key":"5097_CR44","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1103\/PhysRevA.57.127","volume":"57","author":"D Gottesman","year":"1998","unstructured":"Gottesman, D.: Theory of fault-tolerant quantum computation. Phys. Rev. A 57, 127\u2013137 (1998). https:\/\/doi.org\/10.1103\/PhysRevA.57.127","journal-title":"Phys. Rev. A"},{"issue":"1954","key":"5097_CR45","doi-asserted-by":"publisher","first-page":"2551","DOI":"10.1098\/rspa.1996.0136","volume":"452","author":"A Steane","year":"1996","unstructured":"Steane, A.: Multiple-particle interference and quantum error correction. Proc. R. Soc. London Ser. A Math. Phys. Eng. Sci. 452(1954), 2551\u20132577 (1996). https:\/\/doi.org\/10.1098\/rspa.1996.0136","journal-title":"Proc. R. Soc. London Ser. A Math. Phys. Eng. Sci."},{"issue":"1","key":"5097_CR46","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1103\/PhysRevLett.77.198","volume":"77","author":"R Laflamme","year":"1996","unstructured":"Laflamme, R., Miquel, C., Paz, J.P., Zurek, W.H.: Perfect quantum error correcting code. Phys. Rev. Lett. 77(1), 198 (1996). https:\/\/doi.org\/10.1103\/PhysRevLett.77.198","journal-title":"Phys. Rev. Lett."},{"issue":"4","key":"5097_CR47","doi-asserted-by":"publisher","first-page":"2567","DOI":"10.1103\/PhysRevA.56.2567","volume":"56","author":"DW Leung","year":"1997","unstructured":"Leung, D.W., Nielsen, M.A., Chuang, I.L., Yamamoto, Y.: Approximate quantum error correction can lead to better codes. Phys. Rev. A 56(4), 2567 (1997). https:\/\/doi.org\/10.1103\/PhysRevA.56.2567","journal-title":"Phys. Rev. A"},{"key":"5097_CR48","doi-asserted-by":"publisher","unstructured":"Bennett, C.H.: Quantum cryptography: public key distribution and coin tossing. In: Proceedings of the IEEE international conference on computers, systems, and signal processing, Bangalore 175\u2013179 (1984). https:\/\/doi.org\/10.1016\/j.tcs.2014.05.025","DOI":"10.1016\/j.tcs.2014.05.025"},{"key":"5097_CR49","doi-asserted-by":"publisher","first-page":"3121","DOI":"10.1103\/PhysRevLett.68.3121","volume":"68","author":"CH Bennett","year":"1992","unstructured":"Bennett, C.H.: Quantum cryptography using any two nonorthogonal states. Phys. Rev. Lett. 68, 3121\u20133124 (1992). https:\/\/doi.org\/10.1103\/PhysRevLett.68.3121","journal-title":"Phys. Rev. Lett."},{"key":"5097_CR50","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.76.062316","volume":"76","author":"R Matsumoto","year":"2007","unstructured":"Matsumoto, R.: Multiparty quantum-key-distribution protocol without use of entanglement. Phys. Rev. A 76, 062316 (2007). https:\/\/doi.org\/10.1103\/PhysRevA.76.062316","journal-title":"Phys. Rev. A"},{"key":"5097_CR51","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.92.057901","volume":"92","author":"V Scarani","year":"2004","unstructured":"Scarani, V., Ac\u00edn, A., Ribordy, G., Gisin, N.: Quantum cryptography protocols robust against photon number splitting attacks for weak laser pulse implementations. Phys. Rev. Lett. 92, 057901 (2004). https:\/\/doi.org\/10.1103\/PhysRevLett.92.057901","journal-title":"Phys. Rev. Lett."},{"key":"5097_CR52","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.69.052319","volume":"69","author":"FG Deng","year":"2004","unstructured":"Deng, F.G., Long, G.L.: Secure direct communication with a quantum one-time pad. Phys. Rev. A 69, 052319 (2004). https:\/\/doi.org\/10.1103\/PhysRevA.69.052319","journal-title":"Phys. Rev. A"},{"key":"5097_CR53","doi-asserted-by":"publisher","unstructured":"Wang, J., Zhang, Q., jing Tang, C,: Quantum secure direct communication based on order rearrangement of single photons. Phys. Lett. A 358(4), 256\u2013258 (2006). https:\/\/doi.org\/10.1016\/j.physleta.2006.05.035","DOI":"10.1016\/j.physleta.2006.05.035"},{"issue":"305","key":"5097_CR54","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11128-017-1757-x","volume":"16","author":"A Maitra","year":"2017","unstructured":"Maitra, A.: Measurement device-independent quantum dialogue. Quantum Inf. Process. 16(305), 1\u201315 (2017). https:\/\/doi.org\/10.1007\/s11128-017-1757-x","journal-title":"Quantum Inf. Process."},{"issue":"7","key":"5097_CR55","doi-asserted-by":"publisher","first-page":"1418","DOI":"10.1088\/1009-1963\/15\/7\/005","volume":"15","author":"J Xin","year":"2006","unstructured":"Xin, J., Shou, Z.: Secure quantum dialogue based on single-photon. Chin. Phys. B 15(7), 1418\u20131420 (2006). https:\/\/doi.org\/10.1088\/1009-1963\/15\/7\/005","journal-title":"Chin. Phys. B"},{"issue":"11","key":"5097_CR56","doi-asserted-by":"publisher","first-page":"2355","DOI":"10.1007\/s11128-014-0767-1","volume":"13","author":"DJ Guan","year":"2014","unstructured":"Guan, D.J., Wang, Y.J., Zhuang, E.S.: A practical protocol for three-party authenticated quantum key distribution. Quantum Inf. Process. 13(11), 2355\u20132374 (2014). https:\/\/doi.org\/10.1007\/s11128-014-0767-1","journal-title":"Quantum Inf. Process."},{"key":"5097_CR57","doi-asserted-by":"publisher","unstructured":"Hwang, T., Lee, K.c., Li, C.M.: Provably secure three-party authenticated quantum key distribution protocols. IEEE Trans. Dependable Secure Comput. 4(1), 71\u201380 (2007). https:\/\/doi.org\/10.1109\/TDSC.2007.13","DOI":"10.1109\/TDSC.2007.13"},{"issue":"01","key":"5097_CR58","doi-asserted-by":"publisher","first-page":"1650002","DOI":"10.1142\/S0219749916500027","volume":"14","author":"S Lin","year":"2016","unstructured":"Lin, S., Wang, H., Guo, G.D., Ye, G.H., Du, H.Z., Liu, X.F.: Authenticated multi-user quantum key distribution with single particles. Int. J. Quantum Inf. 14(01), 1650002 (2016). https:\/\/doi.org\/10.1142\/S0219749916500027","journal-title":"Int. J. Quantum Inf."},{"key":"5097_CR59","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.62.022305","volume":"62","author":"D Ljunggren","year":"2000","unstructured":"Ljunggren, D., Bourennane, M., Karlsson, A.: Authority-based user authentication in quantum key distribution. Phys. Rev. A 62, 022305 (2000). https:\/\/doi.org\/10.1103\/PhysRevA.62.022305","journal-title":"Phys. Rev. A"},{"issue":"7","key":"5097_CR60","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11128-018-2124-2","volume":"18","author":"P Zawadzki","year":"2019","unstructured":"Zawadzki, P.: Quantum identity authentication without entanglement. Quantum Inf. Process. 18(7), 1\u201312 (2019). https:\/\/doi.org\/10.1007\/s11128-018-2124-2","journal-title":"Quantum Inf. Process."},{"key":"5097_CR61","doi-asserted-by":"publisher","unstructured":"Djordjevic, I.: Quantum information processing and quantum error correction, ed. by I.\u00a0Djordjevic (Academic Press, Oxford, 2012), 227\u2013276. https:\/\/doi.org\/10.1016\/B978-0-12-385491-9.00007-1","DOI":"10.1016\/B978-0-12-385491-9.00007-1"},{"key":"5097_CR62","doi-asserted-by":"publisher","first-page":"162","DOI":"10.1103\/PhysRevA.59.162","volume":"59","author":"A Karlsson","year":"1999","unstructured":"Karlsson, A., Koashi, M., Imoto, N.: Quantum entanglement for secret sharing and secret splitting. Phys. Rev. A 59, 162\u2013168 (1999). https:\/\/doi.org\/10.1103\/PhysRevA.59.162","journal-title":"Phys. Rev. A"},{"issue":"3","key":"5097_CR63","doi-asserted-by":"publisher","first-page":"379","DOI":"10.1002\/j.1538-7305.1948.tb01338.x.","volume":"27","author":"CE Shannon","year":"1948","unstructured":"Shannon, C.E.: A mathematical theory of communication. Bell Syst. Tech. J. 27(3), 379\u2013423 (1948). https:\/\/doi.org\/10.1002\/j.1538-7305.1948.tb01338.x. (https:\/\/doi.org\/10.1002\/j.1538-7305.1948.tb01338.x)","journal-title":"Bell Syst. Tech. J."},{"issue":"4","key":"5097_CR64","doi-asserted-by":"publisher","first-page":"623","DOI":"10.1002\/j.1538-7305.1948.tb00917.x.","volume":"27","author":"CE Shannon","year":"1948","unstructured":"Shannon, C.E.: A mathematical theory of communication. Bell Syst. Tech. J. 27(4), 623\u2013656 (1948). https:\/\/doi.org\/10.1002\/j.1538-7305.1948.tb00917.x. (https:\/\/doi.org\/10.1002\/j.1538-7305.1948.tb00917.x)","journal-title":"Bell Syst. Tech. J."},{"issue":"1","key":"5097_CR65","doi-asserted-by":"publisher","first-page":"269","DOI":"10.1109\/18.651037","volume":"44","author":"A Holevo","year":"1998","unstructured":"Holevo, A.: The capacity of the quantum channel with general signal states. IEEE Trans. Inf. Theory 44(1), 269\u2013273 (1998). https:\/\/doi.org\/10.1109\/18.651037","journal-title":"IEEE Trans. Inf. Theory"},{"key":"5097_CR66","unstructured":"Qiskit noise model [Online. Accessed on: September 11, 2025]. https:\/\/qiskit.github.io\/qiskit-aer\/stubs\/qiskit_aer.noise.phase_amplitude_damping_error.html"},{"key":"5097_CR67","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.86.062318","volume":"86","author":"J Ghosh","year":"2012","unstructured":"Ghosh, J., Fowler, A.G., Geller, M.R.: Surface code with decoherence: an analysis of three superconducting architectures. Phys. Rev. A 86, 062318 (2012). https:\/\/doi.org\/10.1103\/PhysRevA.86.062318","journal-title":"Phys. Rev. A"},{"key":"5097_CR68","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.73.052306","volume":"73","author":"CM Dawson","year":"2006","unstructured":"Dawson, C.M., Haselgrove, H.L., Nielsen, M.A.: Noise thresholds for optical cluster-state quantum computation. Phys. Rev. A 73, 052306 (2006). https:\/\/doi.org\/10.1103\/PhysRevA.73.052306","journal-title":"Phys. Rev. A"},{"key":"5097_CR69","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.101.062305","volume":"101","author":"E Ben Av","year":"2020","unstructured":"Ben Av, E., Shapira, Y., Akerman, N., Ozeri, R.: Direct reconstruction of the quantum-master-equation dynamics of a trapped-ion qubit. Phys. Rev. A 101, 062305 (2020). https:\/\/doi.org\/10.1103\/PhysRevA.101.062305","journal-title":"Phys. Rev. A"},{"issue":"4","key":"5097_CR70","doi-asserted-by":"publisher","DOI":"10.1002\/que2.77","volume":"3","author":"J Zeng","year":"2021","unstructured":"Zeng, J., Wu, Z., Cao, C., Zhang, C., Hou, S.Y., Xu, P., Zeng, B.: Simulating noisy variational quantum eigensolver with local noise models. Quantum Eng. 3(4), e77 (2021). https:\/\/doi.org\/10.1002\/que2.77","journal-title":"Quantum Eng."},{"key":"5097_CR71","doi-asserted-by":"publisher","first-page":"28","DOI":"10.22331\/q-2017-09-19-28","volume":"1","author":"D Leung","year":"2017","unstructured":"Leung, D., Watrous, J.: On the complementary quantum capacity of the depolarizing channel. Quantum 1, 28 (2017). https:\/\/doi.org\/10.22331\/q-2017-09-19-28","journal-title":"Quantum"},{"key":"5097_CR72","doi-asserted-by":"publisher","DOI":"10.3390\/electronics13020439","author":"F Chapeau-Blondeau","year":"2024","unstructured":"Chapeau-Blondeau, F.: Simulating quantum pauli noise with three independently controlled pauli gates. Electronics (2024). https:\/\/doi.org\/10.3390\/electronics13020439","journal-title":"Electronics"},{"key":"5097_CR73","unstructured":"IBM Quantum Platform [Online. Accessed on: September 11, 2025]. https:\/\/quantum-computing.ibm.com"},{"issue":"2","key":"5097_CR74","doi-asserted-by":"publisher","DOI":"10.1088\/2058-9565\/abe519","volume":"6","author":"P Jurcevic","year":"2021","unstructured":"Jurcevic, P., Javadi-Abhari, A., Bishop, L.S., Lauer, I., Bogorin, D.F., Brink, M., Capelluto, L., G\u00fcnl\u00fck, O., Itoko, T., Kanazawa, N., Kandala, A., Keefe, G.A., Krsulich, K., Landers, W., Lewandowski, E.P., McClure, D.T., Nannicini, G., Narasgond, A., Nayfeh, H.M., Pritchett, E., Rothwell, M.B., Srinivasan, S., Sundaresan, N., Wang, C., Wei, K.X., Wood, C.J., Yau, J.B., Zhang, E.J., Dial, O.E., Chow, J.M., Gambetta, J.M.: Demonstration of quantum volume 64 on a superconducting quantum computing system. Quantum Sci. Technol. 6(2), 025020 (2021). https:\/\/doi.org\/10.1088\/2058-9565\/abe519","journal-title":"Quantum Sci. Technol."},{"key":"5097_CR75","doi-asserted-by":"crossref","unstructured":"Srivastava, S., Nath, M., Pal, T.H., Manoj\u00a0Kavitha, V., Majumdar, R., Seshadri, P.V., Ray, A., Simmhan, Y.: Towards platform-aware application of qubit reuse in hybrid quantum-classical workflows. In: 2024 IEEE 31st International Conference on High Performance Computing, Data and Analytics Workshop (HiPCW) (2024), 133\u2013134","DOI":"10.1109\/HiPCW63042.2024.00044"},{"key":"5097_CR76","unstructured":"IBM Fake Backend Provider [Online. Accessed on: September 11, 2025]. https:\/\/quantum.cloud.ibm.com\/docs\/en\/api\/qiskit-ibm-runtime\/fake-provider"},{"key":"5097_CR77","doi-asserted-by":"publisher","unstructured":"Shor, P.: Fault-tolerant quantum computation. In: Proceedings of 37th conference on foundations of computer science (1996), 56\u201365. https:\/\/doi.org\/10.1109\/SFCS.1996.548464","DOI":"10.1109\/SFCS.1996.548464"},{"key":"5097_CR78","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.86.032324","volume":"86","author":"AG Fowler","year":"2012","unstructured":"Fowler, A.G., Mariantoni, M., Martinis, J.M., Cleland, A.N.: Surface codes: Towards practical large-scale quantum computation. Phys. Rev. A 86, 032324 (2012). https:\/\/doi.org\/10.1103\/PhysRevA.86.032324","journal-title":"Phys. Rev. A"},{"key":"5097_CR79","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevResearch.5.043161","volume":"5","author":"AP Babu","year":"2023","unstructured":"Babu, A.P., Orell, T., Vadimov, V., Teixeira, W., M\u00f6tt\u00f6nen, M., Silveri, M.: Quantum error correction under numerically exact open-quantum-system dynamics. Phys. Rev. Res. 5, 043161 (2023). https:\/\/doi.org\/10.1103\/PhysRevResearch.5.043161","journal-title":"Phys. Rev. Res."},{"issue":"6033","key":"5097_CR80","doi-asserted-by":"publisher","first-page":"1059","DOI":"10.1126\/science.1203329","volume":"332","author":"P Schindler","year":"2011","unstructured":"Schindler, P., Barreiro, J.T., Monz, T., Nebendahl, V., Nigg, D., Chwalla, M., Hennrich, M., Blatt, R.: Experimental repetitive quantum error correction. Science 332(6033), 1059\u20131061 (2011). https:\/\/doi.org\/10.1126\/science.1203329","journal-title":"Science"},{"key":"5097_CR81","doi-asserted-by":"publisher","DOI":"10.1038\/ncomms11526","author":"J Cramer","year":"2016","unstructured":"Cramer, J., Kalb, N., Rol, M.A., Hensen, B., Blok, M.S., Markham, M., Twitchen, D.J., Hanson, R., Taminiau, T.H.: Repeated quantum error correction on a continuously encoded qubit by real-time feedback. Nat. Commun. (2016). https:\/\/doi.org\/10.1038\/ncomms11526","journal-title":"Nat. Commun."},{"issue":"7541","key":"5097_CR82","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1038\/nature14270","volume":"519","author":"J Kelly","year":"2015","unstructured":"Kelly, J., Barends, R., Fowler, A.G., Megrant, A., Jeffrey, E., White, T.C., Sank, D., Mutus, J.Y., Campbell, B., Chen, Y., Chen, Z., Chiaro, B., Dunsworth, A., Hoi, I.C., Neill, C., O\u2019Malley, P.J.J., Quintana, C., Roushan, P., Vainsencher, A., Wenner, J., Cleland, A.N., Martinis, J.M.: State preservation by repetitive error detection in a superconducting quantum circuit. Nature 519(7541), 66\u201369 (2015). https:\/\/doi.org\/10.1038\/nature14270","journal-title":"Nature"},{"issue":"8","key":"5097_CR83","doi-asserted-by":"publisher","first-page":"875","DOI":"10.1038\/s41567-020-0920-y","volume":"16","author":"CK Andersen","year":"2020","unstructured":"Andersen, C.K., Remm, A., Lazar, S., Krinner, S., Lacroix, N., Norris, G.J., Gabureac, M., Eichler, C., Wallraff, A.: Repeated quantum error detection in a surface code. Nat. Phys. 16(8), 875\u2013880 (2020). https:\/\/doi.org\/10.1038\/s41567-020-0920-y","journal-title":"Nat. Phys."},{"issue":"7911","key":"5097_CR84","doi-asserted-by":"publisher","first-page":"669","DOI":"10.1038\/s41586-022-04566-8","volume":"605","author":"S Krinner","year":"2022","unstructured":"Krinner, S., Lacroix, N., Remm, A., Di Paolo, A., Genois, E., Leroux, C., Hellings, C., Lazar, S., Swiadek, F., Herrmann, J., Norris, G.J., Andersen, C.K., M\u00fcller, M., Blais, A., Eichler, C., Wallraff, A.: Realizing repeated quantum error correction in a distance-three surface code. Nature 605(7911), 669\u2013674 (2022). https:\/\/doi.org\/10.1038\/s41586-022-04566-8","journal-title":"Nature"},{"issue":"9","key":"5097_CR85","doi-asserted-by":"publisher","first-page":"4452","DOI":"10.1063\/1.1499754","volume":"43","author":"E Dennis","year":"2002","unstructured":"Dennis, E., Kitaev, A., Landahl, A., Preskill, J.: Topological quantum memory. J. Math. Phys. 43(9), 4452\u20134505 (2002). https:\/\/doi.org\/10.1063\/1.1499754","journal-title":"J. Math. Phys."},{"key":"5097_CR86","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.89.022321","volume":"89","author":"AM Stephens","year":"2014","unstructured":"Stephens, A.M.: Fault-tolerant thresholds for quantum error correction with the surface code. Phys. Rev. A 89, 022321 (2014). https:\/\/doi.org\/10.1103\/PhysRevA.89.022321","journal-title":"Phys. Rev. A"},{"key":"5097_CR87","doi-asserted-by":"publisher","unstructured":"Shalby, M.A., Wang, R., Sedov, D., Pryadko, L.P.: Optimized noise-resilient surface code teleportation interfaces. arXiv:2503.04968 (2025). https:\/\/doi.org\/10.48550\/arXiv.2503.04968 [quant-ph]","DOI":"10.48550\/arXiv.2503.04968"},{"key":"5097_CR88","doi-asserted-by":"publisher","first-page":"1895","DOI":"10.1103\/PhysRevLett.70.1895","volume":"70","author":"CH Bennett","year":"1993","unstructured":"Bennett, C.H., Brassard, G., Cr\u00e9peau, C., Jozsa, R., Peres, A., Wootters, W.K.: Teleporting an unknown quantum state via dual classical and einstein-podolsky-rosen channels. Phys. Rev. Lett. 70, 1895\u20131899 (1993). https:\/\/doi.org\/10.1103\/PhysRevLett.70.1895","journal-title":"Phys. Rev. Lett."},{"key":"5097_CR89","doi-asserted-by":"publisher","unstructured":"Stack, J., Wang, M., Mueller, F.: Assessing teleportation of logical qubits in a distributed quantum architecture under error correction. arXiv:2504.05611 (2025). https:\/\/doi.org\/10.48550\/arXiv.2504.05611 [quant-ph]","DOI":"10.48550\/arXiv.2504.05611"},{"key":"5097_CR90","doi-asserted-by":"publisher","unstructured":"Ataides, J.P.B., Zhou, H., Xu, Q., Baranes, G., Li, B., Lukin, M.D., Jiang, L.: Constant-overhead fault-tolerant bell-pair distillation using high-rate codes. arXiv:2502.09542 (2025). https:\/\/doi.org\/10.48550\/arXiv.2502.09542 [quant-ph]","DOI":"10.48550\/arXiv.2502.09542"},{"key":"5097_CR91","doi-asserted-by":"publisher","first-page":"722","DOI":"10.1103\/PhysRevLett.76.722","volume":"76","author":"CH Bennett","year":"1996","unstructured":"Bennett, C.H., Brassard, G., Popescu, S., Schumacher, B., Smolin, J.A., Wootters, W.K.: Purification of noisy entanglement and faithful teleportation via noisy channels. Phys. Rev. Lett. 76, 722\u2013725 (1996). https:\/\/doi.org\/10.1103\/PhysRevLett.76.722","journal-title":"Phys. Rev. Lett."},{"issue":"6715","key":"5097_CR92","doi-asserted-by":"publisher","first-page":"1327","DOI":"10.1126\/science.adp6016","volume":"385","author":"C Ryan-Anderson","year":"2024","unstructured":"Ryan-Anderson, C., Brown, N.C., Baldwin, C.H., Dreiling, J.M., Foltz, C., Gaebler, J.P., Gatterman, T.M., Hewitt, N., Holliman, C., Horst, C.V., Johansen, J., Lucchetti, D., Mengle, T., Matheny, M., Matsuoka, Y., Mayer, K., Mills, M., Moses, S.A., Neyenhuis, B., Pino, J., Siegfried, P., Stutz, R.P., Walker, J., Hayes, D.: High-fidelity teleportation of a logical qubit using transversal gates and lattice surgery. Science 385(6715), 1327\u20131331 (2024). https:\/\/doi.org\/10.1126\/science.adp6016","journal-title":"Science"},{"issue":"6660","key":"5097_CR93","doi-asserted-by":"publisher","first-page":"575","DOI":"10.1038\/37539","volume":"390","author":"D Bouwmeester","year":"1997","unstructured":"Bouwmeester, D., Pan, J.W., Mattle, K., Eibl, M., Weinfurter, H., Zeilinger, A.: Experimental quantum teleportation. Nature 390(6660), 575\u2013579 (1997). https:\/\/doi.org\/10.1038\/37539","journal-title":"Nature"},{"key":"5097_CR94","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.120.050505","volume":"120","author":"DK Tuckett","year":"2018","unstructured":"Tuckett, D.K., Bartlett, S.D., Flammia, S.T.: Ultrahigh error threshold for surface codes with biased noise. Phys. Rev. Lett. 120, 050505 (2018). https:\/\/doi.org\/10.1103\/PhysRevLett.120.050505","journal-title":"Phys. Rev. Lett."},{"key":"5097_CR95","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.124.130501","volume":"124","author":"DK Tuckett","year":"2020","unstructured":"Tuckett, D.K., Bartlett, S.D., Flammia, S.T., Brown, B.J.: Fault-tolerant thresholds for the surface code in excess of $$5\\%$$ under biased noise. Phys. Rev. Lett. 124, 130501 (2020). https:\/\/doi.org\/10.1103\/PhysRevLett.124.130501","journal-title":"Phys. Rev. Lett."},{"key":"5097_CR96","doi-asserted-by":"publisher","first-page":"1512","DOI":"10.1134\/S1054660X06110041","volume":"16","author":"D Tong","year":"2006","unstructured":"Tong, D., Chen, J.L., Huang, J., Kwek, L., Oh, C.: Kraus representation for the density operator of a qubit. Laser Phys. 16, 1512\u20131516 (2006). https:\/\/doi.org\/10.1134\/S1054660X06110041","journal-title":"Laser Phys."},{"issue":"3","key":"5097_CR97","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1080\/00018730802218067","volume":"57","author":"L Chirolli","year":"2008","unstructured":"Chirolli, L., Burkard, G.: Decoherence in solid-state qubits. Adv. Phys. 57(3), 225\u2013285 (2008). https:\/\/doi.org\/10.1080\/00018730802218067","journal-title":"Adv. Phys."},{"key":"5097_CR98","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevResearch.4.023034","volume":"4","author":"A Jayashankar","year":"2022","unstructured":"Jayashankar, A., Long, M.D.H., Ng, H.K., Mandayam, P.: Achieving fault tolerance against amplitude-damping noise. Phys. Rev. Res. 4, 023034 (2022). https:\/\/doi.org\/10.1103\/PhysRevResearch.4.023034","journal-title":"Phys. Rev. Res."},{"issue":"5","key":"5097_CR99","doi-asserted-by":"publisher","first-page":"3824","DOI":"10.1103\/PhysRevA.54.3824","volume":"54","author":"CH Bennett","year":"1996","unstructured":"Bennett, C.H., DiVincenzo, D.P., Smolin, J.A., Wootters, W.K.: Mixed-state entanglement and quantum error correction. Phys. Rev. A 54(5), 3824 (1996). https:\/\/doi.org\/10.1103\/PhysRevA.54.3824","journal-title":"Phys. Rev. A"},{"key":"5097_CR100","doi-asserted-by":"publisher","unstructured":"Dutta, S., Jain, A., Mandayam, P.: Smallest quantum codes for amplitude damping noise. arXiv:2410.00155 (2025). https:\/\/doi.org\/10.48550\/arXiv.2410.00155 [quant-ph]","DOI":"10.48550\/arXiv.2410.00155"},{"key":"5097_CR101","doi-asserted-by":"publisher","unstructured":"Basak, N., Tanggara, A., Mohan, A., Paul, G., Bharti, K.: Approximate dynamical quantum error-correcting codes. arXiv:2502.09177 (2025). https:\/\/doi.org\/10.48550\/arXiv.2502.09177 [quant-ph]","DOI":"10.48550\/arXiv.2502.09177"},{"key":"5097_CR102","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.75.012338","volume":"75","author":"AS Fletcher","year":"2007","unstructured":"Fletcher, A.S., Shor, P.W., Win, M.Z.: Optimum quantum error recovery using semidefinite programming. Phys. Rev. A 75, 012338 (2007). https:\/\/doi.org\/10.1103\/PhysRevA.75.012338","journal-title":"Phys. Rev. A"},{"key":"5097_CR103","doi-asserted-by":"publisher","unstructured":"Crepeau, C., Gottesman, D., Smith, A.: Approximate quantum error-correcting codes and secret sharing schemes. arXiv:uant-ph\/0503139 (2005). https:\/\/doi.org\/10.1007\/11426639_17 [quant-ph]","DOI":"10.1007\/11426639_17"},{"key":"5097_CR104","doi-asserted-by":"publisher","first-page":"564","DOI":"10.22331\/q-2021-10-19-564","volume":"5","author":"MB Hastings","year":"2021","unstructured":"Hastings, M.B., Haah, J.: Dynamically Generated Logical Qubits. Quantum 5, 564 (2021). https:\/\/doi.org\/10.22331\/q-2021-10-19-564","journal-title":"Quantum"},{"key":"5097_CR105","doi-asserted-by":"publisher","DOI":"10.1103\/PRXQuantum.4.020341","volume":"4","author":"M Davydova","year":"2023","unstructured":"Davydova, M., Tantivasadakarn, N., Balasubramanian, S.: Floquet codes without parent subsystem codes. PRX Quantum 4, 020341 (2023). https:\/\/doi.org\/10.1103\/PRXQuantum.4.020341","journal-title":"PRX Quantum"},{"key":"5097_CR106","doi-asserted-by":"publisher","first-page":"693","DOI":"10.22331\/q-2022-04-21-693","volume":"6","author":"J Haah","year":"2022","unstructured":"Haah, J., Hastings, M.B.: Boundaries for the Honeycomb Code. Quantum 6, 693 (2022). https:\/\/doi.org\/10.22331\/q-2022-04-21-693","journal-title":"Quantum"}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-026-05097-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11128-026-05097-1","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-026-05097-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,6]],"date-time":"2026-04-06T06:27:26Z","timestamp":1775456846000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11128-026-05097-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,4,6]]},"references-count":106,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2026,4]]}},"alternative-id":["5097"],"URL":"https:\/\/doi.org\/10.1007\/s11128-026-05097-1","relation":{},"ISSN":["1573-1332"],"issn-type":[{"value":"1573-1332","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,4,6]]},"assertion":[{"value":"27 January 2026","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 January 2026","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 April 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no Conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"132"}}