{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T12:50:15Z","timestamp":1774615815211,"version":"3.50.1"},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T00:00:00Z","timestamp":1774569600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T00:00:00Z","timestamp":1774569600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62201525"],"award-info":[{"award-number":["62201525"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["CUC24QT08"],"award-info":[{"award-number":["CUC24QT08"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Tianjin Natural Science Foundation Project","award":["24JCZDJC01000"],"award-info":[{"award-number":["24JCZDJC01000"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Quantum Inf Process"],"DOI":"10.1007\/s11128-026-05147-8","type":"journal-article","created":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T11:52:42Z","timestamp":1774612362000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["An efficient restricted (k,\u00a0n)-threshold quantum-secret-sharing scheme based on local distinguishability"],"prefix":"10.1007","volume":"25","author":[{"given":"Jing-Tao","family":"Wang","sequence":"first","affiliation":[]},{"given":"Xin-Yu","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Yun","family":"Pan","sequence":"additional","affiliation":[]},{"given":"Jing","family":"Li","sequence":"additional","affiliation":[]},{"given":"Yan-rong","family":"Lu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,3,27]]},"reference":[{"key":"5147_CR1","doi-asserted-by":"publisher","first-page":"1829","DOI":"10.1103\/PhysRevA.59.1829","volume":"59","author":"M Hillery","year":"1999","unstructured":"Hillery, M., Bu\u017eek, V., Berthiaume, A.: Quantum secret sharing. Phys. Rev. A 59, 1829\u20131834 (1999). https:\/\/doi.org\/10.1103\/PhysRevA.59.1829","journal-title":"Phys. Rev. A"},{"key":"5147_CR2","doi-asserted-by":"publisher","first-page":"648","DOI":"10.1103\/PhysRevLett.83.648","volume":"83","author":"R Cleve","year":"1999","unstructured":"Cleve, R., Gottesman, D., Lo, H.K.: How to share a quantum secret. Phys. Rev. Lett. 83, 648\u2013651 (1999). https:\/\/doi.org\/10.1103\/PhysRevLett.83.648","journal-title":"Phys. Rev. Lett."},{"key":"5147_CR3","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.78.042309","volume":"78","author":"D Markham","year":"2008","unstructured":"Markham, D., Sanders, B.C.: Graph states for quantum secret sharing. Phys. Rev. A 78, 042309 (2008). https:\/\/doi.org\/10.1103\/PhysRevA.78.042309","journal-title":"Phys. Rev. A"},{"key":"5147_CR4","doi-asserted-by":"publisher","first-page":"030302(R)","DOI":"10.1103\/PhysRevA.92.030302","volume":"92","author":"A Tavakoli","year":"2015","unstructured":"Tavakoli, A., Herbauts, I., \u017bukowski, M., et al.: Secret sharing with a single $$d$$-level quantum system. Phys. Rev. A 92, 030302(R) (2015). https:\/\/doi.org\/10.1103\/PhysRevA.92.030302","journal-title":"Phys. Rev. A"},{"key":"5147_CR5","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.117.030501","volume":"117","author":"H Lu","year":"2016","unstructured":"Lu, H., Zhang, Z., Chen, L.K., et al.: Secret sharing of a quantum state. Phys. Rev. Lett. 117, 030501 (2016). https:\/\/doi.org\/10.1103\/PhysRevLett.117.030501","journal-title":"Phys. Rev. Lett."},{"key":"5147_CR6","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.121.150502","volume":"121","author":"YY Zhou","year":"2018","unstructured":"Zhou, Y.Y., Yu, J., Yan, Z.H., et al.: Quantum secret sharing among four players using multipartite bound entanglement of an optical field. Phys. Rev. Lett. 121, 150502 (2018). https:\/\/doi.org\/10.1103\/PhysRevLett.121.150502","journal-title":"Phys. Rev. Lett."},{"key":"5147_CR7","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.99.062311","volume":"99","author":"BP Williams","year":"2019","unstructured":"Williams, B.P., Lukens, J.M., Peters, N.A., et al.: Quantum secret sharing with polarization-entangled photon pairs. Phys. Rev. A 99, 062311 (2019). https:\/\/doi.org\/10.1103\/PhysRevA.99.062311","journal-title":"Phys. Rev. A"},{"key":"5147_CR8","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.88.022340","volume":"88","author":"V Gheorghiu","year":"2013","unstructured":"Gheorghiu, V., Sanders, B.C.: Accessing quantum secrets via local operations and classical communication. Phys. Rev. A 88, 022340 (2013). https:\/\/doi.org\/10.1103\/PhysRevA.88.022340","journal-title":"Phys. Rev. A"},{"key":"5147_CR9","doi-asserted-by":"publisher","first-page":"3658","DOI":"10.1038\/ncomms4658","volume":"5","author":"BA Bell","year":"2014","unstructured":"Bell, B.A., et al.: Experimental demonstration of a graph-state quantum error-correction code. Nat. Commun. 5, 3658 (2014). https:\/\/doi.org\/10.1038\/ncomms4658","journal-title":"Nat. Commun."},{"key":"5147_CR10","doi-asserted-by":"publisher","first-page":"1098","DOI":"10.1038\/s41467-017-01245-5","volume":"8","author":"GL Roberts","year":"2017","unstructured":"Roberts, G.L., Lucamarini, M., Yuan, Z.L., et al.: Experimental measurement-device-independent quantum digital signatures. Nat. Commun. 8, 1098 (2017). https:\/\/doi.org\/10.1038\/s41467-017-01245-5","journal-title":"Nat. Commun."},{"key":"5147_CR11","doi-asserted-by":"publisher","first-page":"3672","DOI":"10.1007\/s10773-020-04599-7","volume":"59","author":"DL Zhi","year":"2020","unstructured":"Zhi, D.L., Li, Z.H., Han, Z.W., et al.: Verifiable quantum secret sharing based on a single qudit. Int. J. Theor. Phys. 59, 3672\u20133684 (2020). https:\/\/doi.org\/10.1007\/s10773-020-04599-7","journal-title":"Int. J. Theor. Phys."},{"key":"5147_CR12","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1007\/s11128-021-03343-2","volume":"21","author":"CH Yan","year":"2022","unstructured":"Yan, C.H., Li, Z.H., Liu, L., et al.: Cheating identifiable $$(k, n)$$-threshold quantum secret sharing scheme. Quantum Inf. Process. 21, 8 (2022). https:\/\/doi.org\/10.1007\/s11128-021-03343-2","journal-title":"Quantum Inf. Process."},{"key":"5147_CR13","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1007\/s10773-023-05383-z","volume":"62","author":"FL Li","year":"2023","unstructured":"Li, F.L., Chen, T.Y., Zhu, S.X.: A $$(t, n)$$-threshold quantum secret sharing scheme with fairness. Int. J. Theor. Phys. 62, 119 (2023). https:\/\/doi.org\/10.1007\/s10773-023-05383-z","journal-title":"Int. J. Theor. Phys."},{"key":"5147_CR14","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1007\/s11128-023-03928-z","volume":"22","author":"D Rathi","year":"2023","unstructured":"Rathi, D., Kumar, S.: A $$d$$-level quantum secret sharing scheme with cheat-detection $$(t, m)$$ threshold. Quantum Inf. Process. 22, 183 (2023). https:\/\/doi.org\/10.1007\/s11128-023-03928-z","journal-title":"Quantum Inf. Process."},{"key":"5147_CR15","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1007\/s11128-025-04679-9","volume":"24","author":"S Ghosh","year":"2025","unstructured":"Ghosh, S., Adhikari, A.: Arbitrary $$d \\ge 2$$-level $$(t, n)$$ threshold quantum secret reconstruction scheme using symmetric entanglements. Quantum Inf. Process. 24, 64 (2025). https:\/\/doi.org\/10.1007\/s11128-025-04679-9","journal-title":"Quantum Inf. Process."},{"key":"5147_CR16","unstructured":"Ma, R.H., Chen, H.N., Cai, B.B., et al.: Quantum $$(t,n)$$-threshold multi-secret sharing based on cluster states. arXiv:2505.09317 (2025)"},{"key":"5147_CR17","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.91.022330","volume":"91","author":"R Rahaman","year":"2015","unstructured":"Rahaman, R., Parker, M.G.: Quantum scheme for secret sharing based on local distinguishability. Phys. Rev. A 91, 022330 (2015). https:\/\/doi.org\/10.1103\/PhysRevA.91.022330","journal-title":"Phys. Rev. A"},{"key":"5147_CR18","doi-asserted-by":"publisher","first-page":"998","DOI":"10.1016\/j.physleta.2017.01.053","volume":"381","author":"JT Wang","year":"2017","unstructured":"Wang, J.T., Xu, G., Chen, X.B., et al.: Local distinguishability of Dicke states in quantum secret sharing. Phys. Lett. A 381, 998\u20131002 (2017). https:\/\/doi.org\/10.1016\/j.physleta.2017.01.053","journal-title":"Phys. Lett. A"},{"key":"5147_CR19","doi-asserted-by":"publisher","first-page":"16967","DOI":"10.1038\/srep16967","volume":"5","author":"YH Yang","year":"2015","unstructured":"Yang, Y.H., Gao, F., Wu, X., et al.: Quantum secret sharing via local operations and classical communication. Sci. Rep. 5, 16967 (2015). https:\/\/doi.org\/10.1038\/srep16967","journal-title":"Sci. Rep."},{"key":"5147_CR20","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.95.022320","volume":"95","author":"J Wang","year":"2017","unstructured":"Wang, J., Li, L., Peng, H., et al.: Quantum-secret-sharing scheme based on local distinguishability of orthogonal multiqudit entangled states. Phys. Rev. A 95, 022320 (2017). https:\/\/doi.org\/10.1103\/PhysRevA.95.022320","journal-title":"Phys. Rev. A"},{"key":"5147_CR21","doi-asserted-by":"publisher","first-page":"428","DOI":"10.1007\/s10773-017-3574-5","volume":"57","author":"CJ Liu","year":"2018","unstructured":"Liu, C.J., Li, Z.H., Bai, C.M., et al.: Quantum-secret-sharing scheme based on local distinguishability of orthogonal seven-qudit entangled states. Int. J. Theor. Phys. 57, 428\u2013442 (2018). https:\/\/doi.org\/10.1007\/s10773-017-3574-5","journal-title":"Int. J. Theor. Phys."},{"key":"5147_CR22","doi-asserted-by":"publisher","first-page":"368","DOI":"10.1007\/s11128-020-02809-z","volume":"19","author":"Z Dou","year":"2020","unstructured":"Dou, Z., Xu, G., Chen, X.B., et al.: Searching for optimal quantum secret sharing scheme based on local distinguishability. Quantum Inf. Process. 19, 368 (2020). https:\/\/doi.org\/10.1007\/s11128-020-02809-z","journal-title":"Quantum Inf. Process."},{"key":"5147_CR23","doi-asserted-by":"publisher","first-page":"304","DOI":"10.1007\/s11128-017-1739-z","volume":"16","author":"CM Bai","year":"2017","unstructured":"Bai, C.M., Li, Z.H., Liu, C.J., et al.: Quantum secret sharing using orthogonal multiqudit entangled states. Quantum Inf. Process. 16, 304 (2017). https:\/\/doi.org\/10.1007\/s11128-017-1739-z","journal-title":"Quantum Inf. Process."},{"key":"5147_CR24","doi-asserted-by":"publisher","first-page":"312","DOI":"10.1007\/s11128-018-2080-x","volume":"17","author":"CM Bai","year":"2018","unstructured":"Bai, C.M., Li, Z.H., Wang, J.T., et al.: Restricted $$(k, n)$$-threshold quantum secret sharing scheme based on local distinguishability of orthogonal multiqudit entangled states. Quantum Inf. Process. 17, 312 (2018). https:\/\/doi.org\/10.1007\/s11128-018-2080-x","journal-title":"Quantum Inf. Process."},{"key":"5147_CR25","doi-asserted-by":"publisher","first-page":"22649","DOI":"10.1038\/s41598-021-01893-0","volume":"11","author":"YX Long","year":"2021","unstructured":"Long, Y.X., Zhang, C., Sun, Z.W.: Standard $$(3,5)$$-threshold quantum secret sharing by maximally entangled $$6$$-qubit states. Sci. Rep. 11, 22649 (2021). https:\/\/doi.org\/10.1038\/s41598-021-01893-0","journal-title":"Sci. Rep."},{"key":"5147_CR26","doi-asserted-by":"publisher","first-page":"168","DOI":"10.1007\/s11128-024-04378-x","volume":"23","author":"FL Li","year":"2024","unstructured":"Li, F.L., Wu, Q.G., Lin, C.L., Zhu, S.X.: Standard $$(k, n)$$-threshold hierarchical quantum secret sharing. Quantum Inf. Process. 23, 168 (2024). https:\/\/doi.org\/10.1007\/s11128-024-04378-x","journal-title":"Quantum Inf. Process."},{"key":"5147_CR27","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1007\/s11128-024-04269-1","volume":"23","author":"FL Li","year":"2024","unstructured":"Li, F.L., Liu, Z., Liu, L., Zhu, S.X.: A rational hierarchical $$(t, n)$$-threshold quantum secret sharing scheme. Quantum Inf. Process. 23, 60 (2024). https:\/\/doi.org\/10.1007\/s11128-024-04269-1","journal-title":"Quantum Inf. Process."},{"key":"5147_CR28","doi-asserted-by":"publisher","first-page":"516","DOI":"10.1007\/s10773-008-9827-6","volume":"48","author":"K Yang","year":"2009","unstructured":"Yang, K., Huang, L., Yang, W., et al.: Quantum teleportation via GHZ-like state. Int. J. Theor. Phys. 48, 516\u2013521 (2009). https:\/\/doi.org\/10.1007\/s10773-008-9827-6","journal-title":"Int. J. Theor. Phys."}],"container-title":["Quantum Information Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-026-05147-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11128-026-05147-8","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11128-026-05147-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T11:52:44Z","timestamp":1774612364000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11128-026-05147-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,3,27]]},"references-count":28,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2026,4]]}},"alternative-id":["5147"],"URL":"https:\/\/doi.org\/10.1007\/s11128-026-05147-8","relation":{},"ISSN":["1573-1332"],"issn-type":[{"value":"1573-1332","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,3,27]]},"assertion":[{"value":"19 November 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 March 2026","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 March 2026","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"117"}}