{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T04:41:47Z","timestamp":1777610507893,"version":"3.51.4"},"reference-count":44,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61672110"],"award-info":[{"award-number":["61672110"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61671082"],"award-info":[{"award-number":["61671082"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61976024"],"award-info":[{"award-number":["61976024"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61972048"],"award-info":[{"award-number":["61972048"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61572246"],"award-info":[{"award-number":["61572246"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61602232"],"award-info":[{"award-number":["61602232"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Program for Science and Technology Innovation Research Team in Universities of Henan Province","award":["18IRTSTHN014"],"award-info":[{"award-number":["18IRTSTHN014"]}]},{"name":"Plan for Scientific Innovation Talents of Henan Province","award":["184200510011"],"award-info":[{"award-number":["184200510011"]}]},{"name":"Project for Teaching Reform and Practice Research of High Education in Henan Province","award":["2019SJGLX094Y"],"award-info":[{"award-number":["2019SJGLX094Y"]}]},{"name":"Key Project for Inter-Governmental International Scientific and Technological Innovation Cooperation","award":["2016YFE0104600"],"award-info":[{"award-number":["2016YFE0104600"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2019]]},"DOI":"10.1109\/access.2019.2941971","type":"journal-article","created":{"date-parts":[[2019,9,17]],"date-time":"2019-09-17T19:57:51Z","timestamp":1568750271000},"page":"134854-134861","source":"Crossref","is-referenced-by-count":10,"title":["Security of Verifiable Threshold Quantum Secret Sharing With Sequential Communication"],"prefix":"10.1109","volume":"7","author":[{"given":"Xiaoqiu","family":"Cai","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6237-4364","authenticated-orcid":false,"given":"Tianyin","family":"Wang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ruiling","family":"Zhang","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Fei","family":"Gao","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"crossref","first-page":"1333","DOI":"10.1088\/1674-1056\/18\/4\/007","article-title":"Participant attack on quantum secret sharing based on entanglement swapping","volume":"18","author":"song","year":"2009","journal-title":"Chin Phys B"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.101.208901"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.91.109801"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.physleta.2006.08.016"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/JQE.2011.2107889"},{"key":"ref30","doi-asserted-by":"crossref","first-page":"3189","DOI":"10.1088\/1674-1056\/17\/9\/006","article-title":"Teleportation attack on the QSDC protocol with a random basis and order","volume":"17","author":"gao","year":"2008","journal-title":"Chin Phys B"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.76.062324"},{"key":"ref36","first-page":"329","article-title":"A simple participant attack on the Br&#x00E1;dler-Du&#x0161;ek protocol","volume":"7","author":"gao","year":"2007","journal-title":"Quantum Inf Comput"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/s11128-012-0477-5"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.77.014302"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.63.042301"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1016\/j.physleta.2008.11.004"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.69.052307"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.95.230505"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.optcom.2008.09.026"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/s11128-010-0225-7"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.92.030302"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.121.150502"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.59.1829"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/s11128-010-0180-3"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/s10773-010-0616-7"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2880875"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/62212.62213"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2676021"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/BF01388382"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45539-6_22"},{"key":"ref29","first-page":"40","article-title":"Some attacks on quantum-based cryptographic protocols","volume":"5","author":"lo","year":"2005","journal-title":"Quantum Inf Comput"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/62212.62214"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2016.7906973"},{"key":"ref7","article-title":"Non-interactive and information-theoretic secure verifiable secret sharing","author":"pedersen","year":"1991","journal-title":"Advances Cryptology"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1985.64"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2018.2886262"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/s11128-011-0323-1"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/s11128-018-2059-7"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipl.2016.01.005"},{"key":"ref42","first-page":"434","article-title":"Security of a kind of quantum secret sharing with single photons","volume":"11","author":"wang","year":"2011","journal-title":"Quantum Inf Comput"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/s11128-016-1460-3"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/j.optcom.2010.11.038"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.84.022344"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-017-02543-0"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/s11433-018-9324-6"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1007\/s11128-012-0508-2"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2017.2721404"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8600701\/08840841.pdf?arnumber=8840841","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,8,10]],"date-time":"2021-08-10T19:41:08Z","timestamp":1628624468000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8840841\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"references-count":44,"URL":"https:\/\/doi.org\/10.1109\/access.2019.2941971","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019]]}}}