{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T09:00:16Z","timestamp":1774947616314,"version":"3.50.1"},"reference-count":24,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T00:00:00Z","timestamp":1774915200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T00:00:00Z","timestamp":1774915200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"Key Program of the Ye Qisun Science Foundation, National Natural Science Foundation of China","award":["U2441219"],"award-info":[{"award-number":["U2441219"]}]},{"name":"Hunan Provincial Science and Technology Innovation Program Project","award":["2022GK2016"],"award-info":[{"award-number":["2022GK2016"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"DOI":"10.1007\/s11128-026-05137-w","type":"journal-article","created":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T07:57:38Z","timestamp":1774943858000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Graph-based Hamiltonian path approach for free-space quantum secret sharing scheme"],"prefix":"10.1007","volume":"25","author":[{"given":"Runsheng","family":"Peng","sequence":"first","affiliation":[]},{"given":"Yijun","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Ying","family":"Guo","sequence":"additional","affiliation":[]},{"given":"Hang","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Tianyu","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,3,31]]},"reference":[{"key":"5137_CR1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.95.230505","volume":"95","author":"C Schmid","year":"2005","unstructured":"Schmid, C., et al.: Experimental single qubit quantum secret sharing. Phys. Rev. Lett. 95, 230505 (2005). https:\/\/doi.org\/10.1103\/PhysRevLett.95.230505","journal-title":"Phys. Rev. Lett."},{"issue":"2","key":"5137_CR2","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.100.022339","volume":"100","author":"WP Grice","year":"2019","unstructured":"Grice, W.P., Qi, B.: Quantum secret sharing using weak coherent states. Phys. Rev. A 100(2), 022339 (2019). https:\/\/doi.org\/10.1103\/PhysRevA.100.022339","journal-title":"Phys. Rev. A"},{"issue":"3","key":"5137_CR3","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.103.032410","volume":"103","author":"Q Liao","year":"2021","unstructured":"Liao, Q., et al.: Quantum secret sharing using discretely modulated coherent states. Phys. Rev. A 103(3), 032410 (2021). https:\/\/doi.org\/10.1103\/PhysRevA.103.032410","journal-title":"Phys. Rev. A"},{"issue":"2","key":"5137_CR4","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.101.022301","volume":"101","author":"X YijunWang","year":"2020","unstructured":"YijunWang, X., Huang, D.: Passive continuous-variable quantum secret sharing using a thermal source. Phys. Rev. A 101(2), 022301 (2020). https:\/\/doi.org\/10.1103\/PhysRevA.101.022301","journal-title":"Phys. Rev. A"},{"issue":"10","key":"5137_CR5","doi-asserted-by":"publisher","first-page":"368","DOI":"10.1007\/s11128-023-04126-7","volume":"22","author":"R Peng","year":"2023","unstructured":"Peng, R., et al.: Decentralized continuous-variable quantum secret sharing. Quantum Inf. Process. 22(10), 368 (2023). https:\/\/doi.org\/10.1007\/s11128-023-04126-7","journal-title":"Quantum Inf. Process."},{"issue":"18","key":"5137_CR6","doi-asserted-by":"publisher","first-page":"24260","DOI":"10.1364\/OE.26.024260","volume":"26","author":"Q Zhang","year":"2018","unstructured":"Zhang, Q., et al.: Large scale quantum key distribution: challenges and solutions. Opt. Express 26(18), 24260\u201324273 (2018). https:\/\/doi.org\/10.1364\/OE.26.024260","journal-title":"Opt. Express"},{"key":"5137_CR7","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevResearch.3.013279","volume":"3","author":"S Pirandola","year":"2021","unstructured":"Pirandola, S.: Limits and security of free-space quantum communications. Phys. Rev. Res. 3, 013279 (2021). https:\/\/doi.org\/10.1103\/PhysRevResearch.3.013279","journal-title":"Phys. Rev. Res."},{"key":"5137_CR8","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevResearch.3.023130","volume":"3","author":"S Pirandola","year":"2021","unstructured":"Pirandola, S.: Satellite quantum communications: fundamental bounds and practical security. Phys. Rev. Res. 3, 023130 (2021). https:\/\/doi.org\/10.1103\/PhysRevResearch.3.023130","journal-title":"Phys. Rev. Res."},{"key":"5137_CR9","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevResearch.3.043014","volume":"3","author":"S Pirandola","year":"2021","unstructured":"Pirandola, S.: Composable security for continuous variable quantum key distribution: trust levels and practical key rates in wired and wireless networks. Phys. Rev. Res. 3, 043014 (2021). https:\/\/doi.org\/10.1103\/PhysRevResearch.3.043014","journal-title":"Phys. Rev. Res."},{"key":"5137_CR10","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.104.022615","volume":"104","author":"Z Zuo","year":"2021","unstructured":"Zuo, Z., et al.: Overcoming the uplink limit of satellite-based quantum communication with deterministic quantum teleportation. Phys. Rev. A 104, 022615 (2021). https:\/\/doi.org\/10.1103\/PhysRevA.104.022615","journal-title":"Phys. Rev. A"},{"issue":"4","key":"5137_CR11","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.108.042621","volume":"108","author":"M Ghalaii","year":"2023","unstructured":"Ghalaii, M., Pirandola, S.: Continuous-variable measurement device-independent quantum key distribution in free-space channels. Phys. Rev. A 108(4), 042621 (2023). https:\/\/doi.org\/10.1103\/PhysRevA.108.042621","journal-title":"Phys. Rev. A"},{"issue":"7198","key":"5137_CR12","doi-asserted-by":"publisher","first-page":"1023","DOI":"10.1038\/nature07127","volume":"453","author":"HJ Kimble","year":"2008","unstructured":"Kimble, H.J.: The quantum internet. Nature 453(7198), 1023\u20131030 (2008). https:\/\/doi.org\/10.1038\/nature07127","journal-title":"Nature"},{"issue":"7598","key":"5137_CR13","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1038\/s41586-016-0002-0","volume":"532","author":"S Pirandola","year":"2016","unstructured":"Pirandola, S., Braunstein, S.L.: Physics: unite to build a quantum internet. Nature 532(7598), 169\u2013171 (2016). https:\/\/doi.org\/10.1038\/s41586-016-0002-0","journal-title":"Nature"},{"issue":"9","key":"5137_CR14","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-024-4289-6","volume":"68","author":"J Liu","year":"2025","unstructured":"Liu, J., et al.: A formal model for multiagent Q-learning on graphs. Sci. China Inf. Sci. 68(9), 192206 (2025). https:\/\/doi.org\/10.1007\/s11432-024-4289-6","journal-title":"Sci. China Inf. Sci."},{"issue":"1","key":"5137_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3689341","volume":"22","author":"X Gan","year":"2025","unstructured":"Gan, X.: GraphService: topology-aware constructor for largescale graph applications. ACM Trans. Architect. Code Optim. 22(1), 1\u201324 (2025). https:\/\/doi.org\/10.1145\/3689341","journal-title":"ACM Trans. Architect. Code Optim."},{"key":"5137_CR16","doi-asserted-by":"publisher","first-page":"4337","DOI":"10.1016\/j.procs.2021.09.210","volume":"192","author":"K Bouazzi","year":"2021","unstructured":"Bouazzi, K., Hammami, M., Bouamama, S.: Application of an improved genetic algorithm to Hamiltonian circuit problem. Procedia Comput. Sci. 192, 4337\u20134347 (2021)","journal-title":"Procedia Comput. Sci."},{"issue":"1","key":"5137_CR17","doi-asserted-by":"publisher","first-page":"55","DOI":"10.2307\/2308928","volume":"67","author":"O Ore","year":"1960","unstructured":"Ore, O.: Note on Hamilton Circuits. Am. Math. Mon. 67(1), 55\u201355 (1960)","journal-title":"Am. Math. Mon."},{"issue":"5","key":"5137_CR18","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.88.057902","volume":"88","author":"F Grosshans","year":"2002","unstructured":"Grosshans, F., Grangier, P.: Continuous variable quantum cryptography using coherent states. Phys. Rev. Lett. 88(5), 057902 (2002). https:\/\/doi.org\/10.1103\/PhysRevLett.88.057902","journal-title":"Phys. Rev. Lett."},{"issue":"11","key":"5137_CR19","doi-asserted-by":"publisher","DOI":"10.1088\/0953-4075\/42\/11\/114014","volume":"42","author":"S Fossier","year":"2009","unstructured":"Fossier, S., et al.: Improvement of continuous-variable quantum key distribution systems by using optical preamplifiers. J. Phys. B: At. Mol. Opt. Phys. 42(11), 114014 (2009). https:\/\/doi.org\/10.1088\/0953-4075\/42\/11\/114014","journal-title":"J. Phys. B: At. Mol. Opt. Phys."},{"issue":"7","key":"5137_CR20","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.114.070501","volume":"114","author":"A Leverrier","year":"2015","unstructured":"Leverrier, A.: Composable security proof for continuous-variable quantum key distribution with coherent states. Phys. Rev. Lett. 114(7), 070501 (2015). https:\/\/doi.org\/10.1103\/PhysRevLett.114.070501","journal-title":"Phys. Rev. Lett."},{"issue":"2","key":"5137_CR21","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.96.022320","volume":"96","author":"Y Guo","year":"2017","unstructured":"Guo, Y., et al.: Entanglement-distillation attack on continuous-variable quantum key distribution in a turbulent atmospheric channel. Phys. Rev. A 96(2), 022320 (2017). https:\/\/doi.org\/10.1103\/PhysRevA.96.022320","journal-title":"Phys. Rev. A"},{"issue":"1","key":"5137_CR22","doi-asserted-by":"publisher","DOI":"10.1088\/1361-6455\/aaf0b7","volume":"52","author":"Y Zhao","year":"2018","unstructured":"Zhao, Y., et al.: Polarization attack on continuous-variable quantum key distribution. J. Phys. B: At. Mol. Opt. Phys. 52(1), 015501 (2018). https:\/\/doi.org\/10.1088\/1361-6455\/aaf0b7","journal-title":"J. Phys. B: At. Mol. Opt. Phys."},{"issue":"4","key":"5137_CR23","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.76.042305","volume":"76","author":"J Lodewyck","year":"2007","unstructured":"Lodewyck, J., et al.: Quantum key distribution over 25 km with an all-fiber continuous-variable system. Phys. Rev. A 76(4), 042305 (2007). https:\/\/doi.org\/10.1103\/PhysRevA.76.042305","journal-title":"Phys. Rev. A"},{"issue":"2","key":"5137_CR24","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevX.9.021059","volume":"9","author":"S Ghorai","year":"2019","unstructured":"Ghorai, S., et al.: Asymptotic security of continuous-variable quantum key distribution with a discrete modulation. Phys. Rev. X 9(2), 021059 (2019). https:\/\/doi.org\/10.1103\/PhysRevX.9.021059","journal-title":"Phys. Rev. X"}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-026-05137-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11128-026-05137-w","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-026-05137-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T07:57:40Z","timestamp":1774943860000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11128-026-05137-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,3,31]]},"references-count":24,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2026,4]]}},"alternative-id":["5137"],"URL":"https:\/\/doi.org\/10.1007\/s11128-026-05137-w","relation":{},"ISSN":["1573-1332"],"issn-type":[{"value":"1573-1332","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,3,31]]},"assertion":[{"value":"18 February 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 March 2026","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"31 March 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"We declare that we have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"124"}}