{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,11]],"date-time":"2026-02-11T13:54:07Z","timestamp":1770818047943,"version":"3.50.1"},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2017,9,28]],"date-time":"2017-09-28T00:00:00Z","timestamp":1506556800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Sci. China Inf. Sci."],"published-print":{"date-parts":[[2018,2]]},"DOI":"10.1007\/s11432-016-9151-x","type":"journal-article","created":{"date-parts":[[2017,10,6]],"date-time":"2017-10-06T07:16:19Z","timestamp":1507274179000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":28,"title":["A secure rational quantum state sharing protocol"],"prefix":"10.1007","volume":"61","author":[{"given":"Zhao","family":"Dou","sequence":"first","affiliation":[]},{"given":"Gang","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Xiu-Bo","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Xin","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Yi-Xian","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,9,28]]},"reference":[{"key":"9151_CR1","doi-asserted-by":"crossref","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A Shamir","year":"1979","unstructured":"Shamir A. How to share a secret. Commun ACM, 1979, 22: 612\u2013613","journal-title":"Commun ACM"},{"key":"9151_CR2","first-page":"313","volume-title":"Safeguarding cryptographic keys","author":"G R Blakley","year":"1979","unstructured":"Blakley G R. Safeguarding cryptographic keys. In: Proceedings of the National Computer Conference 1979, New York, 1979. 313\u2013317"},{"key":"9151_CR3","doi-asserted-by":"crossref","first-page":"2050","DOI":"10.1126\/science.283.5410.2050","volume":"283","author":"H K Lo","year":"1999","unstructured":"Lo H K, Chau H F. Unconditional security of quantum key distribution over arbitrarily long distances. Science, 1999, 283: 2050\u20132056","journal-title":"Science"},{"key":"9151_CR4","doi-asserted-by":"crossref","first-page":"351","DOI":"10.1145\/382780.382781","volume":"48","author":"D Mayers","year":"2001","unstructured":"Mayers D. Unconditional security in quantum cryptography. J ACM, 2001, 48: 351\u2013406","journal-title":"J ACM"},{"key":"9151_CR5","doi-asserted-by":"crossref","first-page":"1829","DOI":"10.1103\/PhysRevA.59.1829","volume":"59","author":"M Hillery","year":"1999","unstructured":"Hillery M, Bu\u017eek V, Berthiaume A. Quantum secret sharing. Phys Rev A, 1999, 59: 1829","journal-title":"Phys Rev A"},{"key":"9151_CR6","doi-asserted-by":"crossref","first-page":"648","DOI":"10.1103\/PhysRevLett.83.648","volume":"83","author":"R Cleve","year":"1999","unstructured":"Cleve R, Gottesman D, Lo H K. How to share a quantum secret. Phys Rev Lett, 1999, 83: 648","journal-title":"Phys Rev Lett"},{"key":"9151_CR7","doi-asserted-by":"crossref","first-page":"802","DOI":"10.1038\/299802a0","volume":"299","author":"W K Wootters","year":"1982","unstructured":"Wootters W K, Zurek W H. A single quantum cannot be cloned. Nature, 1982, 299: 802\u2013803","journal-title":"Nature"},{"key":"9151_CR8","doi-asserted-by":"crossref","first-page":"420","DOI":"10.1016\/j.physleta.2004.03.034","volume":"324","author":"Y Li","year":"2004","unstructured":"Li Y, Zhang K, Peng K. Multiparty secret sharing of quantum information based on entanglement swapping. Phys Lett A, 2004, 324: 420\u2013424","journal-title":"Phys Lett A"},{"key":"9151_CR9","doi-asserted-by":"crossref","first-page":"177903","DOI":"10.1103\/PhysRevLett.92.177903","volume":"92","author":"A M Lance","year":"2004","unstructured":"Lance A M, Symul T, Bowen W P, et al. Tripartite quantum state sharing. Phys Rev Lett, 2004, 92: 177903","journal-title":"Phys Rev Lett"},{"key":"9151_CR10","doi-asserted-by":"crossref","first-page":"022338","DOI":"10.1103\/PhysRevA.72.022338","volume":"72","author":"F G Deng","year":"2005","unstructured":"Deng F G, Li C Y, Li Y S, et al. Symmetric multiparty-controlled teleportation of an arbitrary two-particle entanglement. Phys Rev A, 2005, 72: 022338","journal-title":"Phys Rev A"},{"key":"9151_CR11","doi-asserted-by":"crossref","first-page":"1975","DOI":"10.1088\/0953-4075\/39\/8\/015","volume":"39","author":"X H Li","year":"2006","unstructured":"Li X H, Zhou P, Li C Y, et al. Efficient symmetric multiparty quantum state sharing of an arbitrary m-qubit state. J Phys B-At Mol Opt, 2006, 39: 1975","journal-title":"J Phys B-At Mol Opt"},{"key":"9151_CR12","doi-asserted-by":"crossref","first-page":"032321","DOI":"10.1103\/PhysRevA.77.032321","volume":"77","author":"S Muralidharan","year":"2008","unstructured":"Muralidharan S, Panigrahi P K. Perfect teleportation, quantum-state sharing, and superdense coding through a genuinely entangled five-qubit state. Phys Rev A, 2008, 77: 032321","journal-title":"Phys Rev A"},{"key":"9151_CR13","doi-asserted-by":"crossref","first-page":"1103","DOI":"10.1007\/s11128-014-0906-8","volume":"14","author":"D Li","year":"2015","unstructured":"Li D, Wang R, Zhang F, et al. Quantum information splitting of arbitrary two-qubit state by using four-qubit cluster state and Bell-state. Quantum Inf Proc, 2015, 14: 1103\u20131116","journal-title":"Quantum Inf Proc"},{"key":"9151_CR14","first-page":"623","volume-title":"Rational secret sharing and multiparty computation","author":"J Halpern","year":"2004","unstructured":"Halpern J, Teague V. Rational secret sharing and multiparty computation. In: Proceedings of the 36th Annual ACM Symposium on Theory of Computing, New York, 2004. 623\u2013632"},{"key":"9151_CR15","doi-asserted-by":"crossref","first-page":"022305","DOI":"10.1103\/PhysRevA.92.022305","volume":"92","author":"A J d S P G Maitra","year":"2015","unstructured":"Maitra A, Joyee de S, Paul G, et al. Proposal for quantum rational secret sharing. Phys Rev A, 2015, 92: 022305","journal-title":"Phys Rev A"},{"key":"9151_CR16","first-page":"595","volume":"47","author":"A Stefanov","year":"2000","unstructured":"Stefanov A, Gisin N, Guinnard O, et al. Optical quantum random number generator. J Mod Opt, 2000, 47: 595\u2013598","journal-title":"J Mod Opt"},{"key":"9151_CR17","doi-asserted-by":"crossref","first-page":"032303","DOI":"10.1103\/PhysRevA.71.032303","volume":"71","author":"G Rigolin","year":"2005","unstructured":"Rigolin G. Quantum teleportation of an arbitrary two-qubit state and its relation to multipartite entanglement. Phys Rev A, 2005, 71: 032303","journal-title":"Phys Rev A"},{"key":"9151_CR18","doi-asserted-by":"crossref","first-page":"377","DOI":"10.1016\/j.physleta.2007.05.001","volume":"369","author":"X W Zha","year":"2007","unstructured":"Zha X W, Song H Y. Non-Bell-pair quantum channel for teleporting an arbitrary two-qubit state. Phys Lett A, 2007, 369: 377\u2013379","journal-title":"Phys Lett A"},{"key":"9151_CR19","doi-asserted-by":"crossref","first-page":"2818","DOI":"10.1007\/s10773-013-1573-8","volume":"52","author":"Y B Li","year":"2013","unstructured":"Li Y B, Wang T Y, Chen H Y, et al. Fault-tolerate quantum private comparison based on GHZ states and ECC. Int J Theor Phys, 2013, 52: 2818\u20132825","journal-title":"Int J Theor Phys"},{"key":"9151_CR20","doi-asserted-by":"crossref","first-page":"2325","DOI":"10.1007\/s11128-014-0786-y","volume":"13","author":"Y B Li","year":"2014","unstructured":"Li Y B. Analysis of counterfactual quantum key distribution using error-correcting theory. Quantum Inf Proc, 2014, 13: 2325\u20132342","journal-title":"Quantum Inf Proc"},{"key":"9151_CR21","doi-asserted-by":"crossref","first-page":"2191","DOI":"10.1007\/s11128-012-0517-1","volume":"12","author":"Y B Li","year":"2013","unstructured":"Li Y B, Qin S J, Yuan Z, et al. Quantum private comparison against decoherence noise. Quantum Inf Proc, 2013, 12: 2191\u20132205","journal-title":"Quantum Inf Proc"},{"key":"9151_CR22","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1140\/epjd\/e2011-10641-3","volume":"66","author":"Y B Li","year":"2012","unstructured":"Li Y B, Wen Q Y, Gao F, et al. Information leak in Liu et al.\u2019s quantum private comparison and a new protocol. Eur Phys J D, 2012, 66: 1\u20136","journal-title":"Eur Phys J D"},{"key":"9151_CR23","doi-asserted-by":"crossref","first-page":"022313","DOI":"10.1103\/PhysRevA.74.022313","volume":"74","author":"V Makarov","year":"2006","unstructured":"Makarov V, Anisimov A, Skaar J. Effects of detector efficiency mismatch on security of quantum cryptosystems. Phys Rev A, 2006, 74: 022313","journal-title":"Phys Rev A"},{"key":"9151_CR24","first-page":"51","volume":"5","author":"N Jain","year":"2016","unstructured":"Jain N, Stiller B, Khan I, et al. Attacks on practical quantum key distribution systems (and how to prevent them). Contemp Phys, 2016, 5: 51\u201361","journal-title":"Contemp Phys"},{"key":"9151_CR25","first-page":"73","volume":"7","author":"B Qi","year":"2007","unstructured":"Qi B, Fung C H F, Lo H K, et al. Time-shift attack in practical quantum cryptosystems. Quantum Inf Comput, 2007, 7: 73\u201382","journal-title":"Quantum Inf Comput"},{"key":"9151_CR26","doi-asserted-by":"crossref","first-page":"441","DOI":"10.1103\/PhysRevLett.85.441","volume":"85","author":"P W Shor","year":"2000","unstructured":"Shor P W, Preskill J. Simple proof of security of the BB84 quantum key distribution protocol. Phys Rev Lett, 2000, 85: 441","journal-title":"Phys Rev Lett"},{"key":"9151_CR27","first-page":"81","volume-title":"Proceedings of Annual International Conference on the Theory and Applications of Cryptographic Techniques","author":"A Groce","year":"2012","unstructured":"Groce A, Katz J. Fair computation with rational players. In: Proceedings of Annual International Conference on the Theory and Applications of Cryptographic Techniques. Berlin: Springer, 2012. 81\u201398"},{"key":"9151_CR28","doi-asserted-by":"crossref","first-page":"97","DOI":"10.2307\/1912531","volume":"50","author":"A Rubinstein","year":"1982","unstructured":"Rubinstein A. Perfect equilibrium in a bargaining model. Econometrica, 1982, 50: 97\u2013109","journal-title":"Econometrica"},{"key":"9151_CR29","doi-asserted-by":"crossref","first-page":"195","DOI":"10.1257\/jep.2.4.195","volume":"2","author":"R H Thaler","year":"1988","unstructured":"Thaler R H. Anomalies: the ultimatum game. J Econ Perspect, 1988, 2: 195\u2013206","journal-title":"J Econ Perspect"},{"key":"9151_CR30","volume-title":"Bargaining Theory","author":"I St\u00e5hl","year":"1972","unstructured":"St\u00e5hl I. Bargaining Theory. Stockholm: Stockholm School of Economics, 1972"},{"key":"9151_CR31","doi-asserted-by":"crossref","first-page":"340","DOI":"10.1109\/TPDS.2015.2401003","volume":"27","author":"Z Xia","year":"2016","unstructured":"Xia Z, Wang X, Sun X, et al. A secure and dynamic multi-keyword ranked search scheme over encrypted cloud data. IEEE Trans Parall Distr, 2016, 27: 340\u2013352","journal-title":"IEEE Trans Parall Distr"},{"key":"9151_CR32","doi-asserted-by":"crossref","first-page":"2546","DOI":"10.1109\/TPDS.2015.2506573","volume":"27","author":"Z Fu","year":"2016","unstructured":"Fu Z, Ren K, Shu J, et al. Enabling personalized search over encrypted outsourced data with efficiency improvement. IEEE Trans Parall Distr, 2016, 27: 2546\u20132559","journal-title":"IEEE Trans Parall Distr"},{"key":"9151_CR33","doi-asserted-by":"crossref","first-page":"092103","DOI":"10.1007\/s11432-015-0957-4","volume":"59","author":"Y D Chen","year":"2016","unstructured":"Chen Y D, Hao C Y, Wu W, et al. Robust dense reconstruction by range merging based on confidence estimation. Sci China Inf Sci, 2016, 59: 092103","journal-title":"Sci China Inf Sci"},{"key":"9151_CR34","doi-asserted-by":"crossref","first-page":"2402","DOI":"10.1109\/TIFS.2017.2705620","volume":"12","author":"J Shen","year":"2017","unstructured":"Shen J, Shen J, Chen X F, et al. An efficient public auditing protocol with novel dynamic structure for cloud data. IEEE Trans Inf Forensics Secur, 2017, 12: 2402\u20132415","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"9151_CR35","doi-asserted-by":"crossref","first-page":"2706","DOI":"10.1109\/TIFS.2016.2596138","volume":"11","author":"Z Fu","year":"2016","unstructured":"Fu Z, Wu X, Guan C, et al. Toward efficient multi-keyword fuzzy search over encrypted outsourced data with accuracy improvement. IEEE Trans Inf Foren Sec, 2016, 11: 2706\u20132716","journal-title":"IEEE Trans Inf Foren Sec"},{"key":"9151_CR36","first-page":"1","volume-title":"Towards efficient content-aware search over encrypted outsourced data in cloud","author":"Z Fu","year":"2016","unstructured":"Fu Z, Sun X, Ji S, et al. Towards efficient content-aware search over encrypted outsourced data in cloud. In: Proceedings of the 35th Annual IEEE International on Conference Computer Communications, San Francisco, 2016. 1\u20139"},{"key":"9151_CR37","doi-asserted-by":"crossref","first-page":"2793","DOI":"10.1007\/s10773-010-0472-5","volume":"49","author":"X B Chen","year":"2010","unstructured":"Chen X B, Xu G, Yang Y X, et al. An efficient protocol for the secure multi-party quantum summation. Int J Theor Phys, 2010, 49: 2793\u20132804","journal-title":"Int J Theor Phys"},{"key":"9151_CR38","doi-asserted-by":"crossref","first-page":"1561","DOI":"10.1016\/j.optcom.2009.11.085","volume":"283","author":"X B Chen","year":"2010","unstructured":"Chen X B, Xu G, Niu X X, et al. An efficient protocol for the private comparison of equal information based on the triplet entangled state and single-particle measurement. Opt Commun, 2010, 283: 1561\u20131565","journal-title":"Opt Commun"}],"container-title":["Science China Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-016-9151-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11432-016-9151-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-016-9151-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,10,6]],"date-time":"2017-10-06T07:16:28Z","timestamp":1507274188000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11432-016-9151-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,9,28]]},"references-count":38,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2018,2]]}},"alternative-id":["9151"],"URL":"https:\/\/doi.org\/10.1007\/s11432-016-9151-x","relation":{},"ISSN":["1674-733X","1869-1919"],"issn-type":[{"value":"1674-733X","type":"print"},{"value":"1869-1919","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,9,28]]},"article-number":"022501"}}