{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,5]],"date-time":"2026-04-05T10:16:35Z","timestamp":1775384195180,"version":"3.50.1"},"reference-count":39,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2021,4,2]],"date-time":"2021-04-02T00:00:00Z","timestamp":1617321600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,4,2]],"date-time":"2021-04-02T00:00:00Z","timestamp":1617321600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Sci. China Inf. Sci."],"published-print":{"date-parts":[[2021,6]]},"DOI":"10.1007\/s11432-020-2977-x","type":"journal-article","created":{"date-parts":[[2021,4,6]],"date-time":"2021-04-06T21:02:58Z","timestamp":1617742978000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":25,"title":["Multi-party blind quantum computation protocol with mutual authentication in network"],"prefix":"10.1007","volume":"64","author":[{"given":"Rui-Ting","family":"Shan","sequence":"first","affiliation":[]},{"given":"Xiubo","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Kai-Guo","family":"Yuan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,4,2]]},"reference":[{"key":"2977_CR1","doi-asserted-by":"publisher","first-page":"883","DOI":"10.1142\/S0219749906002171","volume":"4","author":"P Arrighi","year":"2006","unstructured":"Arrighi P, Salvail L. Blind quantum computation. Int J Quantum Inform, 2006, 4: 883\u2013898","journal-title":"Int J Quantum Inform"},{"key":"2977_CR2","doi-asserted-by":"publisher","first-page":"456","DOI":"10.26421\/QIC5.6-4","volume":"5","author":"A M Childs","year":"2005","unstructured":"Childs A M. Secure assisted quantum computation. Quantum Inform Comput, 2005, 5: 456\u2013466","journal-title":"Quantum Inform Comput"},{"key":"2977_CR3","doi-asserted-by":"crossref","unstructured":"Broadbent A, Fitzsimons J, Kashefi E. Universal blind quantum computation. In: Proceedings of 2009 50th Annual IEEE Symposium on Foundations of Computer Science, 2009. 517\u2013526","DOI":"10.1109\/FOCS.2009.36"},{"key":"2977_CR4","doi-asserted-by":"publisher","first-page":"040302","DOI":"10.1103\/PhysRevA.89.040302","volume":"89","author":"Q Li","year":"2014","unstructured":"Li Q, Chan W H, Wu C, et al. Triple-server blind quantum computation using entanglement swapping. Phys Rev A, 2014, 89: 040302","journal-title":"Phys Rev A"},{"key":"2977_CR5","doi-asserted-by":"publisher","first-page":"5188","DOI":"10.1103\/PhysRevLett.86.5188","volume":"86","author":"R Raussendorf","year":"2001","unstructured":"Raussendorf R, Briegel H J. A one-way quantum computer. Phys Rev Lett, 2001, 86: 5188\u20135191","journal-title":"Phys Rev Lett"},{"key":"2977_CR6","doi-asserted-by":"publisher","first-page":"013020","DOI":"10.1088\/1367-2630\/18\/1\/013020","volume":"18","author":"C Greganti","year":"2016","unstructured":"Greganti C, Roehsner M C, Barz S, et al. Demonstration of measurement-only blind quantum computing. New J Phys, 2016, 18: 013020","journal-title":"New J Phys"},{"key":"2977_CR7","doi-asserted-by":"publisher","first-page":"050503","DOI":"10.1103\/PhysRevLett.119.050503","volume":"119","author":"H L Huang","year":"2017","unstructured":"Huang H L, Zhao Q, Ma X, et al. Experimental blind quantum computing for a classical client. Phys Rev Lett, 2017, 119: 050503","journal-title":"Phys Rev Lett"},{"key":"2977_CR8","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1007\/s11128-017-1652-5","volume":"16","author":"H L Huang","year":"2017","unstructured":"Huang H L, Bao W S, Li T, et al. Universal blind quantum computation for hybrid system. Quantum Inf Process, 2017, 16: 199","journal-title":"Quantum Inf Process"},{"key":"2977_CR9","doi-asserted-by":"publisher","first-page":"190501","DOI":"10.1103\/PhysRevLett.117.190501","volume":"117","author":"H L Yin","year":"2016","unstructured":"Yin H L, Chen T Y, Yu Z W, et al. Measurement-device-independent quantum key distribution over a 404 km optical fiber. Phys Rev Lett, 2016, 117: 190501","journal-title":"Phys Rev Lett"},{"key":"2977_CR10","unstructured":"Morimae T, Koshiba T. Impossibility of perfectly-secure delegated quantum computing for classical client. 2014. ArXiv: 1407.1636"},{"key":"2977_CR11","doi-asserted-by":"publisher","first-page":"220502","DOI":"10.1103\/PhysRevLett.115.220502","volume":"115","author":"M Hayashi","year":"2015","unstructured":"Hayashi M, Morimae T. Verifiable measurement-only blind quantum computing with stabilizer testing. Phys Rev Lett, 2015, 115: 220502","journal-title":"Phys Rev Lett"},{"key":"2977_CR12","unstructured":"Morimae T, Fitzsimons J F. Post hoc verification with a single prover. 2016. ArXiv: 1603.06046"},{"key":"2977_CR13","doi-asserted-by":"publisher","first-page":"060302","DOI":"10.1103\/PhysRevA.89.060302","volume":"89","author":"T Morimae","year":"2014","unstructured":"Morimae T. Verification for measurement-only blind quantum computing. Phys Rev A, 2014, 89: 060302","journal-title":"Phys Rev A"},{"key":"2977_CR14","doi-asserted-by":"publisher","first-page":"083040","DOI":"10.1088\/1367-2630\/17\/8\/083040","volume":"17","author":"A Gheorghiu","year":"2015","unstructured":"Gheorghiu A, Kashefi E, Wallden P. Robustness and device independence of verifiable blind quantum computing. New J Phys, 2015, 17: 083040","journal-title":"New J Phys"},{"key":"2977_CR15","doi-asserted-by":"publisher","first-page":"023043","DOI":"10.1088\/1367-2630\/aa5cff","volume":"19","author":"A Gheorghiu","year":"2017","unstructured":"Gheorghiu A, Wallden P, Kashefi E. Rigidity of quantum steering and one-sided device-independent verifiable quantum computation. New J Phys, 2017, 19: 023043","journal-title":"New J Phys"},{"key":"2977_CR16","doi-asserted-by":"publisher","first-page":"055305","DOI":"10.1088\/1751-8113\/42\/5\/055305","volume":"42","author":"Y G Yang","year":"2009","unstructured":"Yang Y G, Wen Q Y. An efficient two-party quantum private comparison protocol with decoy photons and two-photon entanglement. J Phys A-Math Theor, 2009, 42: 055305","journal-title":"J Phys A-Math Theor"},{"key":"2977_CR17","doi-asserted-by":"publisher","first-page":"373","DOI":"10.1007\/s11128-011-0251-0","volume":"11","author":"H Y Tseng","year":"2012","unstructured":"Tseng H Y, Lin J, Hwang T. New quantum private comparison protocol using EPR pairs. Quantum Inf Process, 2012, 11: 373\u2013384","journal-title":"Quantum Inf Process"},{"key":"2977_CR18","doi-asserted-by":"publisher","first-page":"1981","DOI":"10.1007\/s11128-012-0507-3","volume":"12","author":"W W Zhang","year":"2013","unstructured":"Zhang W W, Zhang K J. Cryptanalysis and improvement of the quantum private comparison protocol with semi-honest third party. Quantum Inform Process, 2013, 12: 1981\u20131990","journal-title":"Quantum Inform Process"},{"key":"2977_CR19","doi-asserted-by":"publisher","first-page":"517","DOI":"10.1109\/JSAC.2020.2968998","volume":"38","author":"C Y Wei","year":"2020","unstructured":"Wei C Y, Cai X Q, Wang T Y, et al. Error tolerance bound in QKD-based quantum private query. IEEE J Sel Areas Commun, 2020, 38: 517\u2013527","journal-title":"IEEE J Sel Areas Commun"},{"key":"2977_CR20","doi-asserted-by":"publisher","first-page":"70301","DOI":"10.1007\/s11433-018-9324-6","volume":"62","author":"F Gao","year":"2019","unstructured":"Gao F, Qin S J, Huang W, et al. Quantum private query: a new kind of practical quantum cryptographic protocol. Sci China-Phys Mech Astron, 2019, 62: 70301","journal-title":"Sci China-Phys Mech Astron"},{"key":"2977_CR21","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1109\/TC.2017.2721404","volume":"67","author":"C Y Wei","year":"2018","unstructured":"Wei C Y, Cai X Q, Liu B, et al. A generic construction of quantum-oblivious-key-transfer-based private query with ideal database security and zero failure. IEEE Trans Comput, 2018, 67: 2\u20138","journal-title":"IEEE Trans Comput"},{"key":"2977_CR22","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1126\/science.1214707","volume":"335","author":"S Barz","year":"2012","unstructured":"Barz S, Kashefi E, Broadbent A, et al. Demonstration of blind quantum computing. Science, 2012, 335: 303\u2013308","journal-title":"Science"},{"key":"2977_CR23","doi-asserted-by":"publisher","first-page":"200502","DOI":"10.1103\/PhysRevLett.108.200502","volume":"108","author":"V Dunjko","year":"2012","unstructured":"Dunjko V, Kashefi E, Leverrier A. Blind quantum computing with weak coherent pulses. Phys Rev Lett, 2012, 108: 200502","journal-title":"Phys Rev Lett"},{"key":"2977_CR24","doi-asserted-by":"publisher","first-page":"050301","DOI":"10.1103\/PhysRevA.87.050301","volume":"87","author":"T Morimae","year":"2013","unstructured":"Morimae T, Fujii K. Blind quantum computation protocol in which Alice only makes measurements. Phys Rev A, 2013, 87: 050301","journal-title":"Phys Rev A"},{"key":"2977_CR25","doi-asserted-by":"publisher","first-page":"3001","DOI":"10.1007\/s10773-016-2932-z","volume":"55","author":"X Q Kong","year":"2016","unstructured":"Kong X Q, Li Q, Wu C, et al. Multiple-server flexible blind quantum computation in networks. Int J Theor Phys, 2016, 55: 3001\u20133007","journal-title":"Int J Theor Phys"},{"key":"2977_CR26","doi-asserted-by":"publisher","first-page":"938","DOI":"10.1016\/j.physleta.2018.02.002","volume":"382","author":"Q Li","year":"2018","unstructured":"Li Q, Li Z, Chan W H, et al. Blind quantum computation with identity authentication. Phys Lett A, 2018, 382: 938\u2013941","journal-title":"Phys Lett A"},{"key":"2977_CR27","doi-asserted-by":"publisher","first-page":"130503","DOI":"10.1103\/PhysRevLett.108.130503","volume":"108","author":"H K Lo","year":"2012","unstructured":"Lo H K, Curty M, Qi B. Measurement-device-independent quantum key distribution. Phys Rev Lett, 2012, 108: 130503","journal-title":"Phys Rev Lett"},{"key":"2977_CR28","doi-asserted-by":"crossref","unstructured":"Dunjko V, Fitzsimons J, Portmann C, et al. Composable security of delegated quantum computation. In: Proceedings of the 20th Annual International Conference on the Theory and Application of Cryptology and Information Security, 2014. 406\u2013425","DOI":"10.1007\/978-3-662-45608-8_22"},{"key":"2977_CR29","unstructured":"Morimae T, Koshiba T. Composable security of measuring-Alice blind quantum computation. 2013. ArXiv: 1306.2113"},{"key":"2977_CR30","unstructured":"Liang M. Blind quantum computation with completely classical client and a trusted center. 2015. ArXiv: 1508.07778"},{"key":"2977_CR31","doi-asserted-by":"publisher","first-page":"7815","DOI":"10.1038\/srep07815","volume":"5","author":"Y B Sheng","year":"2015","unstructured":"Sheng Y B, Zhou L. Deterministic entanglement distillation for secure double-server blind quantum computation. Sci Rep, 2015, 5: 7815","journal-title":"Sci Rep"},{"key":"2977_CR32","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1038\/nphys1157","volume":"5","author":"H J Briegel","year":"2009","unstructured":"Briegel H J, Browne D E, D\u00fcr W, et al. Measurement-based quantum computation. Nat Phys, 2009, 5: 19\u201326","journal-title":"Nat Phys"},{"key":"2977_CR33","doi-asserted-by":"publisher","first-page":"022312","DOI":"10.1103\/PhysRevA.68.022312","volume":"68","author":"R Raussendorf","year":"2003","unstructured":"Raussendorf R, Browne D E, Briegel H J. Measurement-based quantum computation on cluster states. Phys Rev A, 2003, 68: 022312","journal-title":"Phys Rev A"},{"key":"2977_CR34","doi-asserted-by":"publisher","first-page":"113022","DOI":"10.1088\/1367-2630\/15\/11\/113022","volume":"15","author":"M Rossi","year":"2013","unstructured":"Rossi M, Huber M, Bru\u00df D, et al. Quantum hypergraph states. New J Phys, 2013, 15: 113022","journal-title":"New J Phys"},{"key":"2977_CR35","doi-asserted-by":"publisher","first-page":"052308","DOI":"10.1103\/PhysRevA.97.052308","volume":"97","author":"M Hayashi","year":"2018","unstructured":"Hayashi M, Hajdusek M. Self-guaranteed measurement-based quantum computation. Phys Rev A, 2018, 97: 052308","journal-title":"Phys Rev A"},{"key":"2977_CR36","doi-asserted-by":"publisher","first-page":"032318","DOI":"10.1103\/PhysRevA.71.032318","volume":"71","author":"A M Childs","year":"2005","unstructured":"Childs A M, Leung D W, Nielsen M A. Unified derivations of measurement-based schemes for quantum computation. Phys Rev A, 2005, 71: 032318","journal-title":"Phys Rev A"},{"key":"2977_CR37","unstructured":"Hein M, Dur W, Eisert J, et al. Entanglement in graph states and its applications. 2006. ArXiv: quant-ph\/0602096"},{"key":"2977_CR38","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1016\/j.ins.2019.05.057","volume":"498","author":"X Zhang","year":"2019","unstructured":"Zhang X, Luo W, Zeng G, et al. A hybrid universal blind quantum computation. Inf Sci, 2019, 498: 135\u2013143","journal-title":"Inf Sci"},{"key":"2977_CR39","unstructured":"Gottesman D, Lo H K, Lutkenhaus N, et al. Security of quantum key distribution with imperfect devices. In: Proceedings of International Symposium on Information Theory, 2004. 136"}],"container-title":["Science China Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-020-2977-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11432-020-2977-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-020-2977-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,20]],"date-time":"2022-07-20T20:08:52Z","timestamp":1658347732000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11432-020-2977-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4,2]]},"references-count":39,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2021,6]]}},"alternative-id":["2977"],"URL":"https:\/\/doi.org\/10.1007\/s11432-020-2977-x","relation":{},"ISSN":["1674-733X","1869-1919"],"issn-type":[{"value":"1674-733X","type":"print"},{"value":"1869-1919","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,4,2]]},"assertion":[{"value":"14 May 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 June 2020","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 July 2020","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 April 2021","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"162302"}}