{"id":"https://openalex.org/W2761386781","doi":"https://doi.org/10.1007/s11432-016-9151-x","title":"A secure rational quantum state sharing protocol","display_name":"A secure rational quantum state sharing protocol","publication_year":2017,"publication_date":"2017-09-28","ids":{"openalex":"https://openalex.org/W2761386781","doi":"https://doi.org/10.1007/s11432-016-9151-x","mag":"2761386781"},"language":"en","primary_location":{"id":"doi:10.1007/s11432-016-9151-x","is_oa":false,"landing_page_url":"https://doi.org/10.1007/s11432-016-9151-x","pdf_url":null,"source":{"id":"https://openalex.org/S4210218743","display_name":"Science China Information Sciences","issn_l":"1674-733X","issn":["1674-733X","1869-1919"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Science China Information Sciences","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5063095646","display_name":"Zhao Dou","orcid":"https://orcid.org/0000-0002-2995-7186"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Zhao Dou","raw_affiliation_strings":["Information Security Center, State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, 100876, China"],"affiliations":[{"raw_affiliation_string":"Information Security Center, State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, 100876, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5045319978","display_name":"Gang Xu","orcid":"https://orcid.org/0000-0002-1409-252X"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Gang Xu","raw_affiliation_strings":["Information Security Center, State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, 100876, China","School of Software Engineering, Beijing University of Posts and Telecommunications, Beijing, 100876, China"],"affiliations":[{"raw_affiliation_string":"Information Security Center, State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, 100876, China","institution_ids":["https://openalex.org/I139759216"]},{"raw_affiliation_string":"School of Software Engineering, Beijing University of Posts and Telecommunications, Beijing, 100876, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5005902299","display_name":"Xiu\u2010Bo Chen","orcid":"https://orcid.org/0000-0002-9761-3414"},"institutions":[{"id":"https://openalex.org/I178232147","display_name":"Guizhou University","ror":"https://ror.org/02wmsc916","country_code":"CN","type":"education","lineage":["https://openalex.org/I178232147"]},{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiu-Bo Chen","raw_affiliation_strings":["GuiZhou University, Guizhou Provincial Key Laboratory of Public Big Data, Guiyang, 550025, China","Information Security Center, State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, 100876, China"],"affiliations":[{"raw_affiliation_string":"GuiZhou University, Guizhou Provincial Key Laboratory of Public Big Data, Guiyang, 550025, China","institution_ids":["https://openalex.org/I178232147"]},{"raw_affiliation_string":"Information Security Center, State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, 100876, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100352218","display_name":"Xin Liu","orcid":"https://orcid.org/0000-0002-3450-3808"},"institutions":[{"id":"https://openalex.org/I31637741","display_name":"Inner Mongolia University of Science and Technology","ror":"https://ror.org/044rgx723","country_code":"CN","type":"education","lineage":["https://openalex.org/I31637741"]},{"id":"https://openalex.org/I88830068","display_name":"Shaanxi Normal University","ror":"https://ror.org/0170z8493","country_code":"CN","type":"education","lineage":["https://openalex.org/I88830068"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xin Liu","raw_affiliation_strings":["School of Computer Science, Shaanxi Normal University, Xi\u2019an, 710062, China","School of Information Engineering, Inner Mongolia University of Science and Technology, Baotou, 014010, China","School of Computer Science, Shaanxi Normal University, Xi'an, 710062, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science, Shaanxi Normal University, Xi\u2019an, 710062, China","institution_ids":["https://openalex.org/I88830068"]},{"raw_affiliation_string":"School of Information Engineering, Inner Mongolia University of Science and Technology, Baotou, 014010, China","institution_ids":["https://openalex.org/I31637741"]},{"raw_affiliation_string":"School of Computer Science, Shaanxi Normal University, Xi'an, 710062, China","institution_ids":["https://openalex.org/I88830068"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5071134614","display_name":"Yixian Yang","orcid":"https://orcid.org/0000-0001-8067-4774"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]},{"id":"https://openalex.org/I178232147","display_name":"Guizhou University","ror":"https://ror.org/02wmsc916","country_code":"CN","type":"education","lineage":["https://openalex.org/I178232147"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yi-Xian Yang","raw_affiliation_strings":["GuiZhou University, Guizhou Provincial Key Laboratory of Public Big Data, Guiyang, 550025, China","Information Security Center, State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, 100876, China"],"affiliations":[{"raw_affiliation_string":"GuiZhou University, Guizhou Provincial Key Laboratory of Public Big Data, Guiyang, 550025, China","institution_ids":["https://openalex.org/I178232147"]},{"raw_affiliation_string":"Information Security Center, State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, 100876, China","institution_ids":["https://openalex.org/I139759216"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5063095646"],"corresponding_institution_ids":["https://openalex.org/I139759216"],"apc_list":{"value":2390,"currency":"EUR","value_usd":2990},"apc_paid":null,"fwci":2.6971,"has_fulltext":false,"cited_by_count":32,"citation_normalized_percentile":{"value":0.92452279,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":93,"max":99},"biblio":{"volume":"61","issue":"2","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10020","display_name":"Quantum Information and Cryptography","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10020","display_name":"Quantum Information and Cryptography","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10622","display_name":"Quantum Mechanics and Applications","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/3107","display_name":"Atomic and Molecular Physics, and Optics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10682","display_name":"Quantum Computing Algorithms and Architecture","score":0.9944999814033508,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/correctness","display_name":"Correctness","score":0.8579119443893433},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.733971357345581},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6892871856689453},{"id":"https://openalex.org/keywords/state","display_name":"State (computer science)","score":0.575440526008606},{"id":"https://openalex.org/keywords/nash-equilibrium","display_name":"Nash equilibrium","score":0.5466384291648865},{"id":"https://openalex.org/keywords/qubit","display_name":"Qubit","score":0.4831082820892334},{"id":"https://openalex.org/keywords/verifiable-secret-sharing","display_name":"Verifiable secret sharing","score":0.48295801877975464},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.43565788865089417},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.4273523688316345},{"id":"https://openalex.org/keywords/pareto-principle","display_name":"Pareto principle","score":0.4177652597427368},{"id":"https://openalex.org/keywords/quantum","display_name":"Quantum","score":0.389661967754364},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.375750333070755},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3232092261314392},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.28694719076156616},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.24017208814620972},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.21685755252838135},{"id":"https://openalex.org/keywords/mathematical-optimization","display_name":"Mathematical optimization","score":0.20662784576416016},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.17336022853851318},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.1207784116268158},{"id":"https://openalex.org/keywords/quantum-mechanics","display_name":"Quantum mechanics","score":0.07753944396972656},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.06130141019821167}],"concepts":[{"id":"https://openalex.org/C55439883","wikidata":"https://www.wikidata.org/wiki/Q360812","display_name":"Correctness","level":2,"score":0.8579119443893433},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.733971357345581},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6892871856689453},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.575440526008606},{"id":"https://openalex.org/C46814582","wikidata":"https://www.wikidata.org/wiki/Q23389","display_name":"Nash equilibrium","level":2,"score":0.5466384291648865},{"id":"https://openalex.org/C203087015","wikidata":"https://www.wikidata.org/wiki/Q378201","display_name":"Qubit","level":3,"score":0.4831082820892334},{"id":"https://openalex.org/C85847156","wikidata":"https://www.wikidata.org/wiki/Q59015987","display_name":"Verifiable secret sharing","level":3,"score":0.48295801877975464},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.43565788865089417},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.4273523688316345},{"id":"https://openalex.org/C137635306","wikidata":"https://www.wikidata.org/wiki/Q182667","display_name":"Pareto principle","level":2,"score":0.4177652597427368},{"id":"https://openalex.org/C84114770","wikidata":"https://www.wikidata.org/wiki/Q46344","display_name":"Quantum","level":2,"score":0.389661967754364},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.375750333070755},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3232092261314392},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.28694719076156616},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.24017208814620972},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.21685755252838135},{"id":"https://openalex.org/C126255220","wikidata":"https://www.wikidata.org/wiki/Q141495","display_name":"Mathematical optimization","level":1,"score":0.20662784576416016},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.17336022853851318},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.1207784116268158},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.07753944396972656},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.06130141019821167},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/s11432-016-9151-x","is_oa":false,"landing_page_url":"https://doi.org/10.1007/s11432-016-9151-x","pdf_url":null,"source":{"id":"https://openalex.org/S4210218743","display_name":"Science China Information Sciences","issn_l":"1674-733X","issn":["1674-733X","1869-1919"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Science China Information Sciences","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":41,"referenced_works":["https://openalex.org/W1594876169","https://openalex.org/W1967069736","https://openalex.org/W1970006170","https://openalex.org/W1973941408","https://openalex.org/W1979493600","https://openalex.org/W1979553069","https://openalex.org/W1995070764","https://openalex.org/W2011682372","https://openalex.org/W2018081766","https://openalex.org/W2046167847","https://openalex.org/W2049471987","https://openalex.org/W2054730889","https://openalex.org/W2056848539","https://openalex.org/W2057012185","https://openalex.org/W2060656324","https://openalex.org/W2062854284","https://openalex.org/W2066326392","https://openalex.org/W2067828974","https://openalex.org/W2071764857","https://openalex.org/W2082010788","https://openalex.org/W2083019346","https://openalex.org/W2086965045","https://openalex.org/W2091856245","https://openalex.org/W2111556950","https://openalex.org/W2112374372","https://openalex.org/W2120755151","https://openalex.org/W2141420453","https://openalex.org/W2168325212","https://openalex.org/W2344811709","https://openalex.org/W2465180413","https://openalex.org/W2475932160","https://openalex.org/W2490265015","https://openalex.org/W2514617867","https://openalex.org/W2616646314","https://openalex.org/W2963646213","https://openalex.org/W2970097841","https://openalex.org/W3101747871","https://openalex.org/W3123997348","https://openalex.org/W4285719527","https://openalex.org/W6635546969","https://openalex.org/W6789860910"],"related_works":["https://openalex.org/W2355730523","https://openalex.org/W152021879","https://openalex.org/W2365629437","https://openalex.org/W2072918937","https://openalex.org/W2023935927","https://openalex.org/W2348330439","https://openalex.org/W2350372928","https://openalex.org/W2377292126","https://openalex.org/W2956602083","https://openalex.org/W3013119816"],"abstract_inverted_index":null,"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":6},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":4},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":7}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
