{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,9]],"date-time":"2026-02-09T23:29:06Z","timestamp":1770679746343,"version":"3.49.0"},"reference-count":61,"publisher":"Springer Science and Business Media LLC","issue":"7","license":[{"start":{"date-parts":[[2019,5,7]],"date-time":"2019-05-07T00:00:00Z","timestamp":1557187200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2019,5,7]],"date-time":"2019-05-07T00:00:00Z","timestamp":1557187200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Sci. China Inf. Sci."],"published-print":{"date-parts":[[2019,7]]},"DOI":"10.1007\/s11432-018-9705-x","type":"journal-article","created":{"date-parts":[[2019,5,8]],"date-time":"2019-05-08T05:40:35Z","timestamp":1557294035000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":27,"title":["Measurement-device-independent quantum secret sharing and quantum conference based on Gaussian cluster state"],"prefix":"10.1007","volume":"62","author":[{"given":"Yu","family":"Wang","sequence":"first","affiliation":[]},{"given":"Caixing","family":"Tian","sequence":"additional","affiliation":[]},{"given":"Qi","family":"Su","sequence":"additional","affiliation":[]},{"given":"Meihong","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Xiaolong","family":"Su","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,5,7]]},"reference":[{"key":"9705_CR1","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1103\/RevModPhys.74.145","volume":"74","author":"N Gisin","year":"2002","unstructured":"Gisin N, Ribordy G, Tittel W, et al. Quantum cryptography. Rev Mod Phys, 2002, 74: 145\u2013195","journal-title":"Rev Mod Phys"},{"key":"9705_CR2","doi-asserted-by":"publisher","first-page":"621","DOI":"10.1103\/RevModPhys.84.621","volume":"84","author":"C Weedbrook","year":"2012","unstructured":"Weedbrook C, Pirandola S, Garc\u00eda-Patr\u00f3n R, et al. Gaussian quantum information. Rev Mod Phys, 2012, 84: 621\u2013669","journal-title":"Rev Mod Phys"},{"key":"9705_CR3","doi-asserted-by":"publisher","first-page":"21739","DOI":"10.1364\/OE.22.021739","volume":"22","author":"S Wang","year":"2014","unstructured":"Wang S, Chen W, Yin Z Q, et al. Field and long-term demonstration of a wide area quantum key distribution network. Opt Express, 2014, 22: 21739","journal-title":"Opt Express"},{"key":"9705_CR4","doi-asserted-by":"publisher","first-page":"1008","DOI":"10.1364\/OL.37.001008","volume":"37","author":"S Wang","year":"2012","unstructured":"Wang S, Chen W, Guo J F, et al. 2 GHz clock quantum key distribution over 260 km of standard telecom fiber. Opt Lett, 2012, 37: 1008","journal-title":"Opt Lett"},{"key":"9705_CR5","doi-asserted-by":"publisher","first-page":"025006","DOI":"10.1088\/2058-9565\/aaace4","volume":"3","author":"S Wang","year":"2018","unstructured":"Wang S, Yin Z Q, Chau H F, et al. Proof-of-principle experimental realization of a qubit-like qudit-based quantum key distribution scheme. Quantum Sci Technol, 2018, 3: 025006","journal-title":"Quantum Sci Technol"},{"key":"9705_CR6","doi-asserted-by":"publisher","first-page":"457","DOI":"10.1038\/s41467-017-02211-x","volume":"9","author":"Z Q Yin","year":"2018","unstructured":"Yin Z Q, Wang S, Chen W, et al. Improved security bound for the round-robin-differential-phase-shift quantum key distribution. Nat Commun, 2018, 9: 457","journal-title":"Nat Commun"},{"key":"9705_CR7","doi-asserted-by":"publisher","first-page":"16025","DOI":"10.1038\/npjqi.2016.25","volume":"2","author":"E Diamanti","year":"2016","unstructured":"Diamanti E, Lo H K, Qi B, et al. Practical challenges in quantum key distribution. Npj Quantum Inf, 2016, 2: 16025","journal-title":"Npj Quantum Inf"},{"key":"9705_CR8","doi-asserted-by":"publisher","first-page":"130502","DOI":"10.1103\/PhysRevLett.108.130502","volume":"108","author":"S L Braunstein","year":"2012","unstructured":"Braunstein S L, Pirandola S. Side-channel-free quantum key distribution. Phys Rev Lett, 2012, 108: 130502","journal-title":"Phys Rev Lett"},{"key":"9705_CR9","doi-asserted-by":"publisher","first-page":"2030","DOI":"10.1364\/OL.43.002030","volume":"43","author":"S Wang","year":"2018","unstructured":"Wang S, Chen W, Yin Z Q, et al. Practical gigahertz quantum key distribution robust against channel disturbance. Opt Lett, 2018, 43: 2030","journal-title":"Opt Lett"},{"key":"9705_CR10","doi-asserted-by":"publisher","first-page":"832","DOI":"10.1038\/nphoton.2015.209","volume":"9","author":"S Wang","year":"2015","unstructured":"Wang S, Yin Z Q, Chen W, et al. Experimental demonstration of a quantum key distribution without signal disturbance monitoring. Nat Photon, 2015, 9: 832\u2013836","journal-title":"Nat Photon"},{"key":"9705_CR11","doi-asserted-by":"publisher","first-page":"230501","DOI":"10.1103\/PhysRevLett.98.230501","volume":"98","author":"A Ac\u00edn","year":"2007","unstructured":"Ac\u00edn A, Brunner N, Gisin N, et al. Device-independent security of quantum cryptography against collective attacks. Rhys Rev Lett, 2007, 98: 230501","journal-title":"Rhys Rev Lett"},{"key":"9705_CR12","doi-asserted-by":"publisher","first-page":"1016","DOI":"10.1364\/OPTICA.4.001016","volume":"4","author":"C Wang","year":"2017","unstructured":"Wang C, Yin Z Q, Wang S, et al. Measurement-device-independent quantum key distribution robust against environmental disturbances. Optica, 2017, 4: 1016","journal-title":"Optica"},{"key":"9705_CR13","doi-asserted-by":"publisher","first-page":"130503","DOI":"10.1103\/PhysRevLett.108.130503","volume":"108","author":"H K Lo","year":"2012","unstructured":"Lo H K, Curty M, Qi B. Measurement-device-independent quantum key distribution. Phys Rev Lett, 2012, 108: 130503","journal-title":"Phys Rev Lett"},{"key":"9705_CR14","doi-asserted-by":"publisher","first-page":"062501","DOI":"10.1007\/s11432-017-9291-6","volume":"61","author":"H Lai","year":"2018","unstructured":"Lai H, Luo M X, Pieprzyk J, et al. High-rate and high-capacity measurement-device-independent quantum key distribution with Fibonacci matrix coding in free space. Sci China Inf Sci, 2018, 61: 062501","journal-title":"Sci China Inf Sci"},{"key":"9705_CR15","doi-asserted-by":"publisher","first-page":"130501","DOI":"10.1103\/PhysRevLett.111.130501","volume":"111","author":"A Rubenok","year":"2013","unstructured":"Rubenok A, Slater J A, Chan P, et al. Real-world two-photon interference and proof-of-principle quantum key distribution immune to detector attacks. Phys Rev Lett, 2013, 111: 130501","journal-title":"Phys Rev Lett"},{"key":"9705_CR16","doi-asserted-by":"publisher","first-page":"052303","DOI":"10.1103\/PhysRevA.88.052303","volume":"88","author":"T Ferreira da Silva","year":"2013","unstructured":"Ferreira da Silva T, Vitoreti D, Xavier G B, et al. Proof-of-principle demonstration of measurement-device-independent quantum key distribution using polarization qubits. Phys Rev A, 2013, 88: 052303","journal-title":"Phys Rev A"},{"key":"9705_CR17","doi-asserted-by":"publisher","first-page":"190503","DOI":"10.1103\/PhysRevLett.112.190503","volume":"112","author":"Z Tang","year":"2014","unstructured":"Tang Z, Liao Z, Xu F, et al. Experimental demonstration of polarization encoding measurement-device-independent quantum key distribution. Phys Rev Lett, 2014, 112: 190503","journal-title":"Phys Rev Lett"},{"key":"9705_CR18","doi-asserted-by":"publisher","first-page":"190501","DOI":"10.1103\/PhysRevLett.117.190501","volume":"117","author":"H L Yin","year":"2016","unstructured":"Yin H L, Chen T Y, Yu Z W, et al. Measurement-device-independent quantum key distribution over a 404 km optical fiber. Phys Rev Lett, 2016, 117: 190501","journal-title":"Phys Rev Lett"},{"key":"9705_CR19","doi-asserted-by":"publisher","first-page":"513","DOI":"10.1103\/RevModPhys.77.513","volume":"77","author":"S L Braunstein","year":"2005","unstructured":"Braunstein S L, van Loock P. Quantum information with continuous variables. Rev Mod Phys, 2005, 77: 513\u2013577","journal-title":"Rev Mod Phys"},{"key":"9705_CR20","doi-asserted-by":"publisher","first-page":"052301","DOI":"10.1103\/PhysRevA.89.052301","volume":"89","author":"Z Li","year":"2014","unstructured":"Li Z, Zhang Y C, Xu F, et al. Continuous-variable measurement-device-independent quantum key distribution. Phys Rev A, 2014, 89: 052301","journal-title":"Phys Rev A"},{"key":"9705_CR21","doi-asserted-by":"publisher","first-page":"052325","DOI":"10.1103\/PhysRevA.90.052325","volume":"90","author":"Y C Zhang","year":"2014","unstructured":"Zhang Y C, Li Z, Yu S, et al. Continuous-variable measurement-device-independent quantum key distribution using squeezed states. Phys Rev A, 2014, 90: 052325","journal-title":"Phys Rev A"},{"key":"9705_CR22","first-page":"535","volume":"3","author":"F Grosshans","year":"2003","unstructured":"Grosshans F, Cerf N J, Wenger J, et al. Virtual entanglement and reconciliation protocols for quantum cryptography with continuous variables. Quantum Inf Comput, 2003, 3: 535\u2013552","journal-title":"Quantum Inf Comput"},{"key":"9705_CR23","doi-asserted-by":"publisher","first-page":"397","DOI":"10.1038\/nphoton.2015.83","volume":"9","author":"S Pirandola","year":"2015","unstructured":"Pirandola S, Ottaviani C, Spedalieri G, et al. High-rate measurement-device-independent quantum cryptography. Nat Photon, 2015, 9: 397\u2013402","journal-title":"Nat Photon"},{"key":"9705_CR24","doi-asserted-by":"publisher","first-page":"648","DOI":"10.1103\/PhysRevLett.83.648","volume":"83","author":"R Cleve","year":"1999","unstructured":"Cleve R, Gottesman D, Lo H K. How to share a quantum secret. Phys Rev Lett, 1999, 83: 648\u2013651","journal-title":"Phys Rev Lett"},{"key":"9705_CR25","doi-asserted-by":"publisher","first-page":"1829","DOI":"10.1103\/PhysRevA.59.1829","volume":"59","author":"M Hillery","year":"1999","unstructured":"Hillery M, Bu\u017eek V, Berthiaume A. Quantum secret sharing. Phys Rev A, 1999, 59: 1829\u20131834","journal-title":"Phys Rev A"},{"key":"9705_CR26","doi-asserted-by":"publisher","first-page":"042311","DOI":"10.1103\/PhysRevA.61.042311","volume":"61","author":"D Gottesman","year":"2000","unstructured":"Gottesman D. Theory of quantum secret sharing. Phys Rev A, 2000, 61: 042311","journal-title":"Phys Rev A"},{"key":"9705_CR27","doi-asserted-by":"publisher","first-page":"022501","DOI":"10.1007\/s11432-016-9151-x","volume":"61","author":"Z Dou","year":"2018","unstructured":"Dou Z, Xu G, Chen X B, et al. A secure rational quantum state sharing protocol. Sci China Inf Sci, 2018, 61: 022501","journal-title":"Sci China Inf Sci"},{"key":"9705_CR28","doi-asserted-by":"publisher","first-page":"042333","DOI":"10.1103\/PhysRevA.78.042333","volume":"78","author":"Y Zhao","year":"2008","unstructured":"Zhao Y, Fung C H F, Qi B, et al. Quantum hacking: experimental demonstration of time-shift attack against practical quantum-key-distribution systems. Phys Rev A, 2008, 78: 042333","journal-title":"Phys Rev A"},{"key":"9705_CR29","doi-asserted-by":"publisher","first-page":"3482","DOI":"10.1103\/PhysRevLett.84.3482","volume":"84","author":"P van Loock","year":"2000","unstructured":"van Loock P, Braunstein S L. Multipartite entanglement for continuous variables: a quantum teleportation network. Rhys Rev Lett, 2000, 84: 3482\u20133485","journal-title":"Rhys Rev Lett"},{"key":"9705_CR30","doi-asserted-by":"publisher","first-page":"032318","DOI":"10.1103\/PhysRevA.73.032318","volume":"73","author":"J Zhang","year":"2006","unstructured":"Zhang J, Braunstein S L. Continuous-variable Gaussian analog of cluster states. Phys Rev A, 2006, 73: 032318","journal-title":"Phys Rev A"},{"key":"9705_CR31","doi-asserted-by":"publisher","first-page":"910","DOI":"10.1103\/PhysRevLett.86.910","volume":"86","author":"H J Briegel","year":"2001","unstructured":"Briegel H J, Raussendorf R. Persistent entanglement in arrays of interacting particles. Phys Rev Lett, 2001, 86: 910\u2013913","journal-title":"Phys Rev Lett"},{"key":"9705_CR32","doi-asserted-by":"publisher","first-page":"032321","DOI":"10.1103\/PhysRevA.76.032321","volume":"76","author":"P van Loock","year":"2007","unstructured":"van Loock P, Weedbrook C, Gu M. Building Gaussian cluster states by linear optics. Phys Rev A, 2007, 76: 032321","journal-title":"Phys Rev A"},{"key":"9705_CR33","doi-asserted-by":"publisher","first-page":"043873","DOI":"10.1103\/PhysRevA.96.043873","volume":"96","author":"S Lv","year":"2017","unstructured":"Lv S, Jing J. Generation of quadripartite entanglement from cascaded four-wave-mixing processes. Phys Rev A, 2017, 96: 043873","journal-title":"Phys Rev A"},{"key":"9705_CR34","doi-asserted-by":"publisher","first-page":"23459","DOI":"10.1364\/OE.24.023459","volume":"24","author":"H Wang","year":"2016","unstructured":"Wang H, Zheng Z, Wang Y, et al. Generation of tripartite entanglement from cascaded four-wave mixing processes. Opt Express, 2016, 24: 23459","journal-title":"Opt Express"},{"key":"9705_CR35","doi-asserted-by":"publisher","first-page":"5178","DOI":"10.1364\/OL.37.005178","volume":"37","author":"X Su","year":"2012","unstructured":"Su X, Zhao Y, Hao S, et al. Experimental preparation of eight-partite cluster state for photonic qumodes. Opt Lett, 2012, 37: 5178","journal-title":"Opt Lett"},{"key":"9705_CR36","doi-asserted-by":"publisher","first-page":"120505","DOI":"10.1103\/PhysRevLett.112.120505","volume":"112","author":"M Chen","year":"2014","unstructured":"Chen M, Menicucci N C, Pfister O. Experimental realization of multipartite entanglement of 60 modes of a quantum optical frequency comb. Phys Rev Lett, 2014, 112: 120505","journal-title":"Phys Rev Lett"},{"key":"9705_CR37","doi-asserted-by":"publisher","first-page":"982","DOI":"10.1038\/nphoton.2013.287","volume":"7","author":"S Yokoyama","year":"2013","unstructured":"Yokoyama S, Ukai R, Armstrong S C, et al. Ultra-large-scale continuous-variable cluster states multiplexed in the time domain. Nat Photon, 2013, 7: 982\u2013986","journal-title":"Nat Photon"},{"key":"9705_CR38","doi-asserted-by":"publisher","first-page":"5188","DOI":"10.1103\/PhysRevLett.86.5188","volume":"86","author":"R Raussendorf","year":"2001","unstructured":"Raussendorf R, Briegel H J. A one-way quantum computer. Phys Rev Lett, 2001, 86: 5188\u20135191","journal-title":"Phys Rev Lett"},{"key":"9705_CR39","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1038\/nature03347","volume":"434","author":"P Walther","year":"2005","unstructured":"Walther P, Resch K J, Rudolph T, et al. Experimental one-way quantum computing. Nature, 2005, 434: 169\u2013176","journal-title":"Nature"},{"key":"9705_CR40","doi-asserted-by":"publisher","first-page":"110501","DOI":"10.1103\/PhysRevLett.97.110501","volume":"97","author":"N C Menicucci","year":"2006","unstructured":"Menicucci N C, van Loock P, Gu M, et al. Universal quantum computation with continuous-variable cluster states. Rhys Rev Lett, 2006, 97: 110501","journal-title":"Rhys Rev Lett"},{"key":"9705_CR41","doi-asserted-by":"publisher","first-page":"062318","DOI":"10.1103\/PhysRevA.79.062318","volume":"79","author":"M Gu","year":"2009","unstructured":"Gu M, Weedbrook C, Menicucci N C, et al. Quantum computing with continuous-variable clusters. Phys Rev A, 2009, 79: 062318","journal-title":"Phys Rev A"},{"key":"9705_CR42","doi-asserted-by":"publisher","first-page":"340","DOI":"10.1364\/JOSAB.24.000340","volume":"24","author":"P Loock","year":"2007","unstructured":"Loock P. Examples of Gaussian cluster computation. J Opt Soc Am B, 2007, 24: 340\u2013346","journal-title":"J Opt Soc Am B"},{"key":"9705_CR43","doi-asserted-by":"publisher","first-page":"022311","DOI":"10.1103\/PhysRevA.81.022311","volume":"81","author":"Y Wang","year":"2010","unstructured":"Wang Y, Su X, Shen H, et al. Toward demonstrating controlled-X operation based on continuous-variable four-partite cluster states and quantum teleporters. Phys Rev A, 2010, 81: 022311","journal-title":"Phys Rev A"},{"key":"9705_CR44","doi-asserted-by":"publisher","first-page":"240504","DOI":"10.1103\/PhysRevLett.106.240504","volume":"106","author":"R Ukai","year":"2011","unstructured":"Ukai R, Iwata N, Shimokawa Y, et al. Demonstration of unconditional one-way quantum computations for continuous variables. Phys Rev Lett, 2011, 106: 240504","journal-title":"Phys Rev Lett"},{"key":"9705_CR45","doi-asserted-by":"publisher","first-page":"2828","DOI":"10.1038\/ncomms3828","volume":"4","author":"X Su","year":"2013","unstructured":"Su X, Hao S, Deng X, et al. Gate sequence for continuous variable one-way quantum computation. Nat Commun, 2013, 4: 2828","journal-title":"Nat Commun"},{"key":"9705_CR46","doi-asserted-by":"publisher","first-page":"17457","DOI":"10.1364\/OE.25.017457","volume":"25","author":"L Wang","year":"2017","unstructured":"Wang L, Lv S, Jing J. Quantum steering in cascaded four-wave mixing processes. Opt Express, 2017, 25: 17457","journal-title":"Opt Express"},{"key":"9705_CR47","doi-asserted-by":"publisher","first-page":"042313","DOI":"10.1103\/PhysRevA.88.042313","volume":"88","author":"H K Lau","year":"2013","unstructured":"Lau H K, Weedbrook C. Quantum secret sharing with continuous-variable cluster states. Phys Rev A, 2013, 88: 042313","journal-title":"Phys Rev A"},{"key":"9705_CR48","doi-asserted-by":"publisher","first-page":"230501","DOI":"10.1103\/PhysRevLett.118.230501","volume":"118","author":"X Deng","year":"2017","unstructured":"Deng X, Xiang Y, Tian C, et al. Demonstration of monogamy relations for einstein-podolsky-rosen steering in gaussian cluster states. Phys Rev Lett, 2017, 118: 230501","journal-title":"Phys Rev Lett"},{"key":"9705_CR49","doi-asserted-by":"publisher","first-page":"022325","DOI":"10.1103\/PhysRevA.93.022325","volume":"93","author":"Y Wu","year":"2016","unstructured":"Wu Y, Zhou J, Gong X, et al. Continuous-variable measurement-device-independent multipartite quantum communication. Phys Rev A, 2016, 93: 022325","journal-title":"Phys Rev A"},{"key":"9705_CR50","unstructured":"Ottaviani C, Lupo C, Laurenza R, et al. High-rate secure quantum conferencing. 2017. ArXiv: 1709.06988"},{"key":"9705_CR51","doi-asserted-by":"publisher","first-page":"052307","DOI":"10.1103\/PhysRevA.78.052307","volume":"78","author":"J Zhang","year":"2008","unstructured":"Zhang J. Graphical description of local Gaussian operations for continuous-variable weighted graph states. Phys Rev A, 2008, 78: 052307","journal-title":"Phys Rev A"},{"key":"9705_CR52","doi-asserted-by":"publisher","first-page":"070502","DOI":"10.1103\/PhysRevLett.98.070502","volume":"98","author":"X Su","year":"2007","unstructured":"Su X, Tan A, Jia X, et al. Experimental preparation of quadripartite cluster and Greenberger-Horne-Zeilinger entangled states for continuous variables. Phys Rev Lett, 2007, 98: 070502","journal-title":"Phys Rev Lett"},{"key":"9705_CR53","doi-asserted-by":"publisher","first-page":"012301","DOI":"10.1103\/PhysRevA.78.012301","volume":"78","author":"M Yukawa","year":"2008","unstructured":"Yukawa M, Ukai R, van Loock P, et al. Experimental generation of four-mode continuous-variable cluster states. Phys Rev A, 2008, 78: 012301","journal-title":"Phys Rev A"},{"key":"9705_CR54","doi-asserted-by":"publisher","first-page":"062337","DOI":"10.1103\/PhysRevA.92.062337","volume":"92","author":"V C Usenko","year":"2015","unstructured":"Usenko V C, Grosshans F. Unidimensional continuous-variable quantum key distribution. Phys Rev A, 2015, 92: 062337","journal-title":"Phys Rev A"},{"key":"9705_CR55","doi-asserted-by":"publisher","first-page":"062330","DOI":"10.1103\/PhysRevA.95.062330","volume":"95","author":"X Wang","year":"2017","unstructured":"Wang X, Liu W, Wang P, et al. Experimental study on all-fiber-based unidimensional continuous-variable quantum key distribution. Phys Rev A, 2017, 95: 062330","journal-title":"Phys Rev A"},{"key":"9705_CR56","doi-asserted-by":"crossref","unstructured":"Beimel A. Secret-sharing schemes: a survey. In: Proceedings of the 3rd International Conference on Coding and Cryptology (IWCC\u201911), Heidelberg, 2011. 11\u201346","DOI":"10.1007\/978-3-642-20901-7_2"},{"key":"9705_CR57","doi-asserted-by":"crossref","unstructured":"Goyal V, Kumar A. Non-malleable secret sharing. In: Proceedings of the 50th Annual ACM SIGACT Symposium on Theory of Computing, New York, 2018. 685\u2013698","DOI":"10.1145\/3188745.3188872"},{"key":"9705_CR58","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1088\/1367-2630\/5\/1\/304","volume":"5","author":"A M Lance","year":"2003","unstructured":"Lance A M, Symul T, Bowen W P, et al. Continuous variable (2, 3) threshold quantum secret sharing schemes. New J Phys, 2003, 5: 4","journal-title":"New J Phys"},{"key":"9705_CR59","doi-asserted-by":"publisher","first-page":"7821","DOI":"10.1088\/1751-8113\/40\/28\/S01","volume":"40","author":"G Adesso","year":"2007","unstructured":"Adesso G, Illuminati F. Entanglement in continuous-variable systems: recent advances and current perspectives. J Phys A-Math Theor, 2007, 40: 7821\u20137880","journal-title":"J Phys A-Math Theor"},{"key":"9705_CR60","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/S0375-9601(96)00706-2","volume":"223","author":"M Horodecki","year":"1996","unstructured":"Horodecki M, Horodecki P, Horodecki R. Separability of mixed states: necessary and sufficient conditions. Phys Lett A, 1996, 223: 1\u20138","journal-title":"Phys Lett A"},{"key":"9705_CR61","doi-asserted-by":"publisher","first-page":"2726","DOI":"10.1103\/PhysRevLett.84.2726","volume":"84","author":"R Simon","year":"2000","unstructured":"Simon R. Peres-Horodecki separability criterion for continuous variable systems. Phys Rev Lett, 2000, 84: 2726\u20132729","journal-title":"Phys Rev Lett"}],"container-title":["Science China Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-018-9705-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11432-018-9705-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-018-9705-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,16]],"date-time":"2023-05-16T15:28:45Z","timestamp":1684250925000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11432-018-9705-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,5,7]]},"references-count":61,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2019,7]]}},"alternative-id":["9705"],"URL":"https:\/\/doi.org\/10.1007\/s11432-018-9705-x","relation":{},"ISSN":["1674-733X","1869-1919"],"issn-type":[{"value":"1674-733X","type":"print"},{"value":"1869-1919","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,5,7]]},"assertion":[{"value":"3 September 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 November 2018","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 November 2018","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 May 2019","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"72501"}}