{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,6]],"date-time":"2026-04-06T07:15:04Z","timestamp":1775459704597,"version":"3.50.1"},"reference-count":34,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2026,4,6]],"date-time":"2026-04-06T00:00:00Z","timestamp":1775433600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,4,6]],"date-time":"2026-04-06T00:00:00Z","timestamp":1775433600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"DOI":"10.1007\/s11128-026-05140-1","type":"journal-article","created":{"date-parts":[[2026,4,6]],"date-time":"2026-04-06T06:27:28Z","timestamp":1775456848000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Dynamic multi-party to multi-party quantum secret sharing based on Monotone Span program"],"prefix":"10.1007","volume":"25","author":[{"given":"Chao","family":"Qin","sequence":"first","affiliation":[]},{"given":"Yuqi","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Jiaji","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Junda","family":"Zhuang","sequence":"additional","affiliation":[]},{"given":"Deng","family":"Zuo","sequence":"additional","affiliation":[]},{"given":"Weichao","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,4,6]]},"reference":[{"issue":"11","key":"5140_CR1","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A Shamir","year":"1979","unstructured":"Shamir, A.: How to share a secret. Commun. ACM 22(11), 612\u2013613 (1979)","journal-title":"Commun. ACM"},{"key":"5140_CR2","doi-asserted-by":"crossref","unstructured":"Blakley, G.R.: Safeguarding cryptographic keys. In: Managing requirements knowledge, international workshop on, pp. 313\u2013313 (1979). IEEE computer society","DOI":"10.1109\/MARK.1979.8817296"},{"issue":"5886","key":"5140_CR3","doi-asserted-by":"publisher","first-page":"802","DOI":"10.1038\/299802a0","volume":"299","author":"WK Wootters","year":"1982","unstructured":"Wootters, W.K., Zurek, W.H.: A single quantum cannot be cloned. Nature 299(5886), 802\u2013803 (1982)","journal-title":"Nature"},{"issue":"3","key":"5140_CR4","doi-asserted-by":"publisher","first-page":"172","DOI":"10.1007\/BF01397280","volume":"43","author":"W Heisenberg","year":"1927","unstructured":"Heisenberg, W.: \u00dcber den anschaulichen inhalt der quantentheoretischen kinematik und mechanik. Z. Phys. 43(3), 172\u2013198 (1927)","journal-title":"Z. Phys."},{"key":"5140_CR5","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1016\/j.tcs.2014.05.025","volume":"560","author":"CH Bennett","year":"2014","unstructured":"Bennett, C.H., Brassard, G.: Quantum cryptography: Public key distribution and coin tossing. Theoret. Comput. Sci. 560, 7\u201311 (2014)","journal-title":"Theoret. Comput. Sci."},{"issue":"3","key":"5140_CR6","doi-asserted-by":"publisher","first-page":"1829","DOI":"10.1103\/PhysRevA.59.1829","volume":"59","author":"M Hillery","year":"1999","unstructured":"Hillery, M., Bu\u017eek, V., Berthiaume, A.: Quantum secret sharing. Phys. Rev. A 59(3), 1829 (1999)","journal-title":"Phys. Rev. A"},{"issue":"2","key":"5140_CR7","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.72.022303","volume":"72","author":"Z Zhang","year":"2005","unstructured":"Zhang, Z., Man, Z.: Multiparty quantum secret sharing of classical messages based on entanglement swapping. Phys. Rev. A-Atomic Mol. Opt. Phys. 72(2), 022303 (2005)","journal-title":"Phys. Rev. A-Atomic Mol. Opt. Phys."},{"issue":"22","key":"5140_CR8","doi-asserted-by":"publisher","first-page":"4455","DOI":"10.1016\/j.optcom.2009.07.053","volume":"282","author":"S Lin","year":"2009","unstructured":"Lin, S., Wen, Q.-Y., Qin, S.-J., Zhu, F.-C.: Multiparty quantum secret sharing with collective eavesdropping-check. Opt. Commun. 282(22), 4455\u20134459 (2009)","journal-title":"Opt. Commun."},{"issue":"5","key":"5140_CR9","first-page":"434","volume":"11","author":"T-Y Wang","year":"2011","unstructured":"Wang, T.-Y., Wen, Q.-Y.: Security of a kind of quantum secret sharing with single photons. Quantum Inform. Comput. 11(5), 434\u2013443 (2011)","journal-title":"Quantum Inform. Comput."},{"issue":"2","key":"5140_CR10","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.95.022320","volume":"95","author":"J Wang","year":"2017","unstructured":"Wang, J., Li, L., Peng, H., Yang, Y.: Quantum-secret-sharing scheme based on local distinguishability of orthogonal multiqudit entangled states. Phys. Rev. A 95(2), 022320 (2017)","journal-title":"Phys. Rev. A"},{"issue":"2","key":"5140_CR11","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1007\/s10773-022-05009-w","volume":"61","author":"Y Wang","year":"2022","unstructured":"Wang, Y., Lou, X., Fan, Z., Wang, S., Huang, G.: Verifiable multi-dimensional (t, n) threshold quantum secret sharing based on quantum walk. Int. J. Theor. Phys. 61(2), 24 (2022)","journal-title":"Int. J. Theor. Phys."},{"issue":"2","key":"5140_CR12","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1007\/s11128-019-2571-4","volume":"19","author":"K Sutradhar","year":"2020","unstructured":"Sutradhar, K., Om, H.: Efficient quantum secret sharing without a trusted player. Quantum Inf. Process. 19(2), 73 (2020)","journal-title":"Quantum Inf. Process."},{"issue":"5","key":"5140_CR13","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.69.052307","volume":"69","author":"L Xiao","year":"2004","unstructured":"Xiao, L., Lu Long, G., Deng, F.-G., Pan, J.-W.: Efficient multiparty quantum-secret-sharing schemes. Phys. Rev. A-Atomic Mol. Opt. Phys. 69(5), 052307 (2004)","journal-title":"Phys. Rev. A-Atomic Mol. Opt. Phys."},{"issue":"1","key":"5140_CR14","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.72.012304","volume":"72","author":"F-L Yan","year":"2005","unstructured":"Yan, F.-L., Gao, T.: Quantum secret sharing between multiparty and multiparty without entanglement. Phys. Rev. A-Atomic Mol. Opt. Phys. 72(1), 012304 (2005)","journal-title":"Phys. Rev. A-Atomic Mol. Opt. Phys."},{"issue":"9","key":"5140_CR15","doi-asserted-by":"publisher","first-page":"1308","DOI":"10.1007\/s11433-008-0114-6","volume":"51","author":"Y Yang","year":"2008","unstructured":"Yang, Y., Wen, Q.: Threshold quantum secret sharing between multi-party and multi-party. Sci. China, Ser. G 51(9), 1308\u20131315 (2008)","journal-title":"Sci. China, Ser. G"},{"issue":"3","key":"5140_CR16","doi-asserted-by":"publisher","first-page":"460","DOI":"10.1007\/s11433-012-4633-9","volume":"55","author":"C Tsai","year":"2012","unstructured":"Tsai, C., Hwang, T.: Multi-party quantum secret sharing based on two special entangled states. Sci. China Phys. Mech. Astronomy 55(3), 460\u2013464 (2012)","journal-title":"Sci. China Phys. Mech. Astronomy"},{"issue":"29","key":"5140_CR17","doi-asserted-by":"publisher","first-page":"1850350","DOI":"10.1142\/S0217984918503505","volume":"32","author":"H Qin","year":"2018","unstructured":"Qin, H., Tang, W.K., Tso, R.: Multiparty to multiparty quantum secret sharing. Mod. Phys. Lett. B 32(29), 1850350 (2018)","journal-title":"Mod. Phys. Lett. B"},{"issue":"2","key":"5140_CR18","doi-asserted-by":"publisher","DOI":"10.1088\/1572-9494\/ab5d01","volume":"72","author":"X-W Zha","year":"2020","unstructured":"Zha, X.-W., Jiang, R.-X., Wang, M.-R.: Two schemes of multiparty quantum direct secret sharing via a six-particle GHZ state. Commun. Theor. Phys. 72(2), 025102 (2020)","journal-title":"Commun. Theor. Phys."},{"key":"5140_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11128-019-2319-1","volume":"18","author":"Y-G Yang","year":"2019","unstructured":"Yang, Y.-G., Gao, S., Li, D., Zhou, Y.-H., Shi, W.-M.: Three-party quantum secret sharing against collective noise. Quantum Inf. Process. 18, 1\u201311 (2019)","journal-title":"Quantum Inf. Process."},{"issue":"1","key":"5140_CR20","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1007\/s10773-020-04688-7","volume":"60","author":"A Yin","year":"2021","unstructured":"Yin, A., Chen, T.: Authenticated semi-quantum secret sharing based on GHZ-type states. Int. J. Theor. Phys. 60(1), 265\u2013273 (2021)","journal-title":"Int. J. Theor. Phys."},{"issue":"2","key":"5140_CR21","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1007\/s11128-021-03402-8","volume":"21","author":"C-W Tsai","year":"2022","unstructured":"Tsai, C.-W., Yang, C.-W., Lin, J.: Multiparty mediated quantum secret sharing protocol. Quantum Inf. Process. 21(2), 63 (2022)","journal-title":"Quantum Inf. Process."},{"key":"5140_CR22","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijleo.2022.169896","volume":"270","author":"S Mashhadi","year":"2022","unstructured":"Mashhadi, S.: Verifiable quantum secret sharing with multi access structures. Optik 270, 169896 (2022)","journal-title":"Optik"},{"issue":"7","key":"5140_CR23","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1007\/s11128-022-03617-3","volume":"21","author":"F Li","year":"2022","unstructured":"Li, F., Hu, H., Zhu, S., Yan, J., Ding, J.: A verifiable (k, n)-threshold dynamic quantum secret sharing scheme. Quantum Inf. Process. 21(7), 259 (2022)","journal-title":"Quantum Inf. Process."},{"key":"5140_CR24","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2023.128893","volume":"624","author":"Z You","year":"2023","unstructured":"You, Z., Wang, Y., Dou, Z., Li, J., Chen, X., Li, L.: Dynamic quantum secret sharing between multiparty and multiparty based on single photons. Physica A 624, 128893 (2023)","journal-title":"Physica A"},{"issue":"5","key":"5140_CR25","doi-asserted-by":"publisher","first-page":"827","DOI":"10.3390\/e25050827","volume":"25","author":"D Meng","year":"2023","unstructured":"Meng, D., Li, Z., Luo, S., Han, Z.: A kind of (t, n) threshold quantum secret sharing with identity authentication. Entropy 25(5), 827 (2023)","journal-title":"Entropy"},{"issue":"10","key":"5140_CR26","doi-asserted-by":"publisher","first-page":"358","DOI":"10.1007\/s11128-024-04572-x","volume":"23","author":"F Li","year":"2024","unstructured":"Li, F., Wu, Q., Lin, C., Zhu, S.: A threshold changeable dynamic quantum secret sharing scheme with cheating identification. Quantum Inf. Process. 23(10), 358 (2024)","journal-title":"Quantum Inf. Process."},{"issue":"7","key":"5140_CR27","doi-asserted-by":"publisher","first-page":"2400116","DOI":"10.1002\/qute.202400116","volume":"7","author":"Y Tian","year":"2024","unstructured":"Tian, Y., Wang, J., Bian, G., Chang, J., Li, J.: Dynamic multi-party to multi-party quantum secret sharing based on bell states. Adv. Quantum Technol. 7(7), 2400116 (2024)","journal-title":"Adv. Quantum Technol."},{"key":"5140_CR28","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2024.129615","volume":"638","author":"J Lin","year":"2024","unstructured":"Lin, J., Chen, C.-C., Huang, C.-Y.: Efficient dynamic quantum secret sharing in pre-measurement and post-measurement phases. Physica A 638, 129615 (2024)","journal-title":"Physica A"},{"issue":"10","key":"5140_CR29","doi-asserted-by":"publisher","DOI":"10.1088\/1402-4896\/ad75cc","volume":"99","author":"Q-L Wang","year":"2024","unstructured":"Wang, Q.-L., Wang, Y.-Y., Li, Y.-C., Li, G.-D., Han, Y.-G., Cheng, L.: A secure dynamic quantum anonymous secret sharing protocol utilizing GHZ states. Phys. Scr. 99(10), 105115 (2024)","journal-title":"Phys. Scr."},{"issue":"3","key":"5140_CR30","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevResearch.6.033036","volume":"6","author":"Y Qin","year":"2024","unstructured":"Qin, Y., Cheng, J., Ma, J., Zhao, D., Yan, Z., Jia, X., Xie, C., Peng, K.: Efficient and secure quantum secret sharing for eight users. Phys. Rev. Res. 6(3), 033036 (2024)","journal-title":"Phys. Rev. Res."},{"issue":"33","key":"5140_CR31","doi-asserted-by":"publisher","first-page":"79715","DOI":"10.1007\/s11042-024-18661-7","volume":"83","author":"H-K Wang","year":"2024","unstructured":"Wang, H.-K., Xu, G.-B., Liang, X.-Q., Jiang, D.-H.: A (t, n) threshold quantum image secret sharing scheme. Multimedia Tools Appl. 83(33), 79715\u201379739 (2024)","journal-title":"Multimedia Tools Appl."},{"issue":"10","key":"5140_CR32","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11128-024-04532-5","volume":"23","author":"P Mawlia","year":"2024","unstructured":"Mawlia, P., Siwach, V., Bijaranian, P., Singh, D.: Quantum secret sharing with (m, n) threshold: Qft and identity authentication. Quantum Inf. Process. 23(10), 1\u201320 (2024)","journal-title":"Quantum Inf. Process."},{"issue":"2","key":"5140_CR33","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1007\/s11128-024-04269-1","volume":"23","author":"F Li","year":"2024","unstructured":"Li, F., Liu, Z., Liu, L., Zhu, S.: A rational hierarchical (t, n)-threshold quantum secret sharing scheme. Quantum Inf. Process. 23(2), 60 (2024)","journal-title":"Quantum Inf. Process."},{"issue":"1","key":"5140_CR34","doi-asserted-by":"publisher","first-page":"10819","DOI":"10.1038\/s41598-025-95608-4","volume":"15","author":"C-M Bai","year":"2025","unstructured":"Bai, C.-M., Shu, Y.-X., Zhang, S.: Authenticable quantum secret sharing based on special entangled state. Sci. Rep. 15(1), 10819 (2025)","journal-title":"Sci. Rep."}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-026-05140-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11128-026-05140-1","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-026-05140-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,6]],"date-time":"2026-04-06T06:27:29Z","timestamp":1775456849000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11128-026-05140-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,4,6]]},"references-count":34,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2026,4]]}},"alternative-id":["5140"],"URL":"https:\/\/doi.org\/10.1007\/s11128-026-05140-1","relation":{},"ISSN":["1573-1332"],"issn-type":[{"value":"1573-1332","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,4,6]]},"assertion":[{"value":"9 May 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 March 2026","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 April 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"134"}}