Abstract
Quantum secret sharing (QSS) protocols without entanglement have showed high security by virtue of the characteristics of quantum mechanics. However, it is still a challenge to compare the security of such protocols depending on quantitative security analysis. Based on our previous security analysis work on protocols using single qubits and two-level unitary operations, QSS protocols with single qutrits and three-level unitary operations are considered in this paper. Under the Bell-state attack we propose, the quantitative security analyses according to different three-level unitary operations are provided respectively in the one-step and two-step situations. Finally, important conclusions are drawn for designing and implementing such QSS protocols. The method and results may also contribute to analyze the security of other high-level quantum cryptography schemes based on unitary operations.
1 Introduction
Quantum secret sharing (QSS) is an important branch of quantum cryptography, whose security is based on the fundamental principle of quantum mechanics. It can share both the classical message [1–11] and quantum information [12–22]. Taking QSS protocols for classical message sharing into account, it is observed that it is a more efficient and lower cost way to use single particles instead of entangled particles. In addition, to achieve the unconditional security (in theory) and the ability of detecting eavesdropping, unitary operations are always used in such protocols. The classical secret message is encoded into quanta and/or scrambles the particles by unitary operations so that the eavesdropper cannot reliably identify each quantum state by appropriate measurement.
The quantitative security analysis of such protocols can be transformed into a quantitative calculation of unitary operation security. The feasibility of this idea has been proven by our pioneering work [23]. In [23], we proposed the substitute-Bell-state attack and the definition of minimum failure probability for the attack. Thus, the quantitative security analysis can be conducted according to the different selection methods of unitary operations. Several cases of two-level unitary operations were analyzed in [23] and more two-level cases are considered in our recent research [24].
However, these works on the security analysis of QSS are focused on the qubit system. In many scenarios, quantum communication protocols using high-dimensional states demonstrate larger capacity and better performance than the qubit system. Thus, it is worth studying the security of QSS protocols beyond the two-level system. Quantitative security analysis of QSS protocols remains a tough problem, and our pioneering idea is worth recommending. However, the research work based on this idea is not sufficient. In this paper, the security of QSS protocols using three-level unitary operations is analyzed quantitatively, and some comparisons between two-level and three-level situations are made. Finally, valuable conclusions are obtained, which can guide the designing and implementation of QSS protocols with single qutrits.
2 The security of unitary operations in quantum secret sharing protocols based on qutrits
2.1 Three-level Bell states and unitary operations
In a three-level quantum system, we call a single quantum state as a qutrit. The Z-basis of a three-level quantum system is , and another basis can be constructed by a quantum Fourier transform, which is called the X-basis. For an arbitrary d-level quantum system, we havewhere . So when , the X-basis can be formed as follows:where .
To analyze the security of QSS protocols based on qutrits quantitatively, we design the Bell-state attack, which uses three-level Bell states and unitary operations. In a -level double quantum system, the d-level Bell state can be denoted aswhere , , , and the symbol means module d plus. Obviously, there are d-level Bell states. In addition, the vector group constitutes a complete orthogonal basis of the double quantum system. Thus, nine Bell states forming a complete orthogonal basis in a three-level quantum system can be specified as
Without loss of generality, the first Bell state is chosen to be the initial state that the eavesdropper uses for a Bell-state attack. Furthermore, an arbitrary three-level double quantum state can be expressed as follows:where .
A unitary operation is a bounded linear operation on a Hilbert space that satisfies , where is the adjoint of and is the identity operation. In a three-level system, the unitary operations can be represented by a matrix. For simplicity, we consider the double quantum states consisting of three basis states, that is, one of , , and ; , , and ; or , , and is 1 (see Formula 5). Here, is bound to and because the two-qutrit quantum state is obtained under a Bell-state attack and selected unitary operation (see Section 2.3). Therefore, there will be six situations showed as follows (if the unitary matrix at the left side of the arrow is supposed to be used in a Bell-state attack, three Bell states will be obtained at the right side of the arrow):
Without the loss of generality, we select the first situation as an example for research.
Next, to measure the security of different unitary operations, we first provide a general QSS protocol based on qutrits, and then propose the so-called Bell-state attack and state the minimum failure probability for this attack. The quantitative computing results show how to select appropriate three-level unitary operations to protect the QSS protocols against a Bell-state attack.
2.2 A general quantum secret sharing protocol based on qutrits
A generic QSS protocol based on qutrits is shown in
Figure 1(it is supposed to be a (
n,
n) secret sharing threshold protocol). The procedure is as follows:
(1) First, Alice prepares qutrits all in . A binary string is the secret to be shared. Alice performs unitary operations on qutrits according to the value of and a random string (to be used to change the basis).
(2) After that, the qutrit sequence, denoted as , is sent to Bob 1.
(3) Bob 1 to Bob n perform local three-level unitary operations according to the values of and .
(4) Bob n sends the qutrits back to Alice. Then, Bob 1 to Bob n declare the information about individual unitary operations (not unitary operations themselves) via classical communication.
(5) Alice measures the qutrits using proper bases according to the information and publishes the result.
(6) Only when all the Bobs collaborate together, the secret can be revealed. Sample detection can be implemented by classical communication to judge if there is a wiretap.
FIGURE 1
In addition, unitary operations can be executed in one or two steps, which were defined in our previous work, shown as follows [23].
Definition 1(one-step unitary operation): Bob i performs once a random local unitary operation on each quantum state before sending. All possible options are put into “{}”, called a unitary operation set.
Definition 2(two-step unitary operation): Bob i performs twice a random local unitary operation on each quantum state before sending, and the probability of the first and second operations being the same is zero. The symbol “{; }” is used to indicate the two-step unitary operation, while the first possible options are listed before the semicolon, and the subsequent options, after the semicolon.
2.3 Bell-state attack in a three-level quantum system
Bob
iis supposed to be dishonest during the execution of the three-level QSS protocol. He aims to generate a Bell-state attack to obtain the integrated encoded information from Bob
i+1 to Bob
j. The schematic diagram of the Bell-state attack is illustrated in
Figure 2(which is a variant of the substitute-Bell-state attack [
23]), and the procedure of the attack is as follows:
(1) Bob retains the single qutrits sent from Bob -1 and does nothing on these particles. Meanwhile, he generates N three-level Bell states . can be any one of the nine Bell states given in Formula 4. Without the loss of generality, is assumed to be .
(2) Bob transmits the second particles of the Bell states to Bob and retains the first particles .
(3) Bob intercepts the single qutrits sent from Bob to Bob +1 and replaces it with .
(4) The particle sequences and are combined in pairs by Bob to form new N Bell states . Then, Bob measures the new Bell states by proper bases in order to obtain integrated encoded information from Bob i+1 to Bob j.
(5) When samples are tested, Bob claims the unitary operations that are consistent with the comprehensive effect of the unitary operations that Bob +1, Bob +2, . . ., and Bob j implemented, to avoid the attack from being detected.
FIGURE 2
It should be noted that Bob j can also be Bob i+1, and in this situation, Bob i aims only to obtain the unitary operations that Bob +1 has performed.
Now, the key question is how to measure the effect of the Bell-state attack? To determine this, we pick up the minimum failure probability formula that we put forward previously [23, 24].
Definition 3(minimum failure probability): Assume that a QSS protocol based on single qutrits is under a Bell-state attack. The attacker has acquired N new two-qutrit states . Suppose the prior probability of is , and the number of quantum states to be distinguished is n. Thus, the minimum failure probability of the Bell-state attack (denoted as ) is defined as follows:Apparently, equals to 1 minus the maximum probability of reliably distinguishing different quantum states. The value of is between 0 and 1. When , the protocol is totally unsecure. In other words, all the states are mutually orthogonal; Bob i could definitely distinguish each state by proper measurement and interpret all encoded information successfully. It should be noted that because if , the states to be distinguished must be the same, and this is impossible in QSS protocols.Therefore, when is larger, the effective information that a Bell-state attack can gain is less, that is, the QSS protocol is verified to be safer and vice versa.
2.4 The security of one-step three-level unitary operations
To research the security of three-level unitary operations under a Bell-state attack, we first provide the nine unitary operations corresponding to nine Bell states (shown in Formula 4) in Formula 8. In other words, the nine Bell states can be obtained when the second qutrit of the initial state is affected individually by the nine unitary operations and recombined with the first qutrit.where .
Moreover, without the loss of generality, (shown in Formula 6), , and are chosen as the three-level unitary operations in QSS protocols for encoding the message and/or scrambling states, relabeled as
It should be noted that can transform a qutrit between the X-basis and Z-basis.
Here is the explanation of why , and are chosen as , and , respectively. When is chosen, we get = . So we select preferentially the unitary operations leading to the states that are not orthogonal to . It is easy to find that selecting , and is optimal, which leads to , and the maximum value of . On the contrary, if other unitary operations are selected, the denominator of Formula 9 remains unchanged, while the numerator decreases, that is, decreases and the security reduces.
Finally, there are seven sets of one-step three-level unitary operations corresponding to the aforementioned matrices, and the minimum failure probability of each set is calculated and shown in Table 1.
TABLE 1
| Selected unitary Operations | Obtained quantum states | |
|---|---|---|
The minimum failure probability of Bell-state attack under one-step three-level unitary operations. The quantum states are obtained from the different transformations of initial state under selected unitary operations. The curly braces of selected unitary operations, Dirac symbol and normalization of obtained quantum states are omitted.
From
Table 1, we can conclude the following:
(1) If the four unitary operations of , , and are chosen for the quantum secret sharing process, only three values of the minimum failure probability are available. In other words, when two unitary operations are selected; when three are selected; and when all four are selected. In a word, in one-step three-level unitary operations, the fewer unitary operations the legitimate communicator selects, the larger is and the higher the security of this QSS protocol is verified.
(2) Based on the aforementioned analysis, the minimum failure probability formula in a three-level quantum system can be simplified as follows:
where
Ndenotes the number of selected unitary operations. For the six situations listed in
Formula 6, if we choose the other five situations and corresponding
and
, the same values of
will be attained, along with the same simplified formula of minimum failure probability.
2.5 The security of two-step three-level unitary operations
The one-step unitary operation case is mentioned previously. We try the similar analysis in a two-step unitary operation instance.
First of all, according to the definition of a two-step unitary operation and the selected four unitary operations
,
,
and
, all combinations can be divided into four categories as follows:
1. combinations;
2. combinations;
3. ;
4. .
Here, the first possible unitary operations are listed before the semicolon, and the subsequent operations, after the semicolon; the symbol “” means that there are three similar unitary operation combinations in the first step; the symbol “(3)” denotes that there are three similar unitary operation combinations in the second step. For example, in the first category, “” indicates that there are three similar combinations, that is, , , and . In short, there are totally combinations.
Second, we provide the states after continuous action of two unitary operations (shown in Table 2), supposing the initial state is . If the two unitary operations are executed in an opposite order, the same state is obtained. So there are totally 10 results, as shown in Table 2. In addition, denotes the obtained state after the two unitary operations, where the subscripts i and j represent the corresponding unitary operations and .
TABLE 2
| Two used unitary operations | Obtained quantum state | Two used unitary operations | Obtained quantum state |
|---|---|---|---|
The states after continuous action of two unitary operations. The two subscripts of correspond to subscripts of the two used unitary operations.
Third, to calculate , we first calculate the norm of the inner product of the two quantum states, that is, . The results are shown in Table 3.
TABLE 3
| 0 | 0 | |||||||||
| 0 | 0 | |||||||||
| 0 | 0 | |||||||||
| 0 | 0 | 0 | 1 | 0 | ||||||
| 0 | 0 | 0 | 0 | 1 | ||||||
| 0 | 0 | 1 | 0 | 0 | ||||||
| 0 | 0 | 1 | 0 | 0 | ||||||
| 1 | 0 | 0 | 0 | 0 | ||||||
| 0 | 1 | 0 | 0 | 0 |
The norm of inner product of the two quantum states. The inner product values are symmetric about the diagonal.
From Table 3 we can see that the inner product values are symmetric about the diagonal and the inner product values between and is 0. So the four combinations in the first category with “" and “” in the second step can be omitted. Therefore, there are totally combinations, which are divided into 18 situations, and the values of are shown in Table 4.
TABLE 4
| Case | Typical unitary operations | Number of similar sets | |
|---|---|---|---|
| 1 | 3 | ||
| 2 | 3 | ||
| 3 | 1 | ||
| 4 | 9 | ||
| 5 | 9 | ||
| 6 | 3 | ||
| 7 | 6 | ||
| 8 | 9 | ||
| 9 | 3 | ||
| 10 | 9 | ||
| 11 | 3 | ||
| 12 | 6 | ||
| 13 | 3 | ||
| 14 | 6 | ||
| 15 | 3 | ||
| 16 | 3 | ||
| 17 | 3 | ||
| 18 | 1 |
The values of and the corresponding numbers of unitary operation sets. All the 83 non zero combinations are showed in 18 cases. The first-step possible unitary options are listed before the semicolon, and the second-step options after the semicolon.
From Table 4, it can be seen that the values of are the same separately in cases 1 and 4; in cases 2, 5, and 10; and in cases 3 and 16. So it can be merged into 14 cases. Thus, the values of (accurate to four decimal places) and the number of unitary operation sets corresponding to each value are shown in Table 5.
TABLE 5
| Number of sets | Number of sets | ||
|---|---|---|---|
| 0.5774 | 12 | 0.2402 | 3 |
| 0.3657 | 6 | 0.3849 | 21 |
| 0.2887 | 4 | 0.3464 | 3 |
| 0.2544 | 1 | 0.2628 | 3 |
| 0.4811 | 6 | 0.3746 | 6 |
| 0.3557 | 9 | 0.3435 | 3 |
| 0.2773 | 3 | 0.2590 | 3 |
The values of and the corresponding numbers of unitary operation sets when the values in Table 4 are accurate to four decimal places. Thus 18 cases are merged to 14 cases.
The results in
Table 5are also illustrated in
Figure 3for clarity. Then, some conclusions can be drawn based on the results.
(1) Among the two-step three-level unitary operations, the minimum failure probability of the Bell-state attack densely distributed between [0.34, 0.39], totally 48 sets, and there are 17 sets between [0.24, 0.29]. Furthermore, 12 sets have the highest value of , that is, , and 6 sets have the second highest value of .
(2) The sets that have the highest value of are and . This means the sets possessing the least selected operations have the highest security, except for , and whose . This is similar to the two-level unitary operation situation [24].
(3) Among the six situations shown in Formula 6, if another situation is selected, that is, another Bell-state combination and corresponding and are selected, the similar calculation process and conclusions will be obtained because their mutual relationship is consistent with the first situation.
FIGURE 3
2.6 The selection of three-level unitary operations
Based on the quantitative computing results and analysis on one-step and two-step unitary operations in a three-level system, the selection rules of unitary operations are summarized as follows:
(1) The unitary operations in QSS protocols based on qutrits should be chosen carefully. First, the unitary operations whose is 0 should not be chosen since the protocol is obviously insecure in such a situation. Second, the unitary operation to transform the basis is a necessary but not a sufficient condition for the security. In other words, the unitary operation like can change the basis; so if is not selected, the QSS protocol is totally insecure. However, although is the possible choice, the security of the protocol still cannot be guaranteed. For example, of , , and is 0.
(2) More complex unitary operations cannot be counted on to generate higher security. In a one-step unitary operation, Max [ ()] > Max [ ()], that is, fewer unitary operations lead to larger and higher security of the QSS protocol. The two-step unitary operation has the similar situation. This is because in one-step scene, the more the unitary operations, the more the pairwise non-orthogonal quantum states obtained.
(3) When the same unitary operations are selected, the security of two-step unitary operations is not necessarily higher than that of one-step unitary operations. There exist possibilities. For example, ({}) = ({}) ; ({}) < ({}) ; ({}) > ({}) . So we should choose the two-step unitary operations with the highest value of .
(4) The maximum of of the three-level unitary operations () is less than the maximum of of the two-level unitary operations () [23, 24]. This does not mean that two-level unitary operations are safer than three-level unitary operations because the value of is influenced by specified unitary operation types. We have restricted the types of two-level and three-level unitary operations, so this is just a comparison between two preset conditions.
In brief, we should choose the unitary operation sets that have a higher value of to ensure the security of QSS protocols based on qutrits.
3 Conclusion
In this paper, we first present a general QSS protocol based on single qutrits, and then propose the Bell-state attack and the definition of minimum failure probability for the attack. In this way, QSS protocols based on single qutrits and three-level unitary operations are considered, and the quantitative security analysis is performed corresponding to different sets of four three-level unitary operations. The results show that the selection of unitary operations will significantly affect the security of such QSS protocols. As a result, some crucial rules for choosing unitary operations are given to ensure the security or achieve a higher security. This work can serve as an important guidance in designing and implementing QSS protocols based on single qutrits and three-level unitary operations. The method and results may also contribute to analyze the security of other high-level quantum cryptography protocols based on unitary operations, such as secure computation [25], quantum secure direct communication [26], quantum key agreement [27], quantum private query [28], and quantum oblivious transfer [29]. Furthermore, unitary operations are also used in other quantum algorithms, for example, the quantum blockchain algorithm [30] and quantum artificial intelligence algorithm [31], and it will be interesting in attempting to analyze their security using our method.
Statements
Data availability statement
The original contributions presented in the study are included in the article/Supplementary Material; further inquiries can be directed to the corresponding author.
Author contributions
JX, XL, and ZL conceived the presented idea. YH and YZ verified the methods and developed the analyses. ZZ and YS completed the calculation. All authors contributed to the article and approved the submitted version.
Funding
This work is supported by the National Natural Science Foundation of China (Grant nos 62201252 and 62071240), the Innovation Program for Quantum Science and Technology (Grant no. 2021ZD0302900), and the Natural Science Foundation of Jiangsu Province, China (Grant no. BK20220804).
Conflict of interest
The authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.
Publisher’s note
All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors, and the reviewers. Any product that may be evaluated in this article, or claim that may be made by its manufacturer, is not guaranteed or endorsed by the publisher.
References
1.
MatsumotoR. Message randomization and strong security in quantum stabilizer-based secret sharing for classical secrets. Des Code Cryptogr (2020) 88:1893–907. 10.1007/s10623-020-00751-w
2.
ZhangZLiYManZ. Multiparty quantum secret sharing. Phys Rev A (2005) 71:044301. 10.1103/physreva.71.044301
3.
TavakoliAHerbautsIZukowskiMBourennaneM. Secret sharing with a single d-level quantum system. Phys Rev A (2015) 92:030302. 10.1103/PhysRevA.92.030302
4.
KarimipourVAsoudehM. Quantum secret sharing and random hopping: Using single states instead of entanglement. Phys Rev A (2015) 92:030301. 10.1103/PhysRevA.92.030301
5.
LinSSGuoGXuYSunYLiuX. Cryptanalysis of quantum secret sharing with d-level single particles. Phys Rev A (2016) 93:062343. 10.1103/PhysRevA.93.062343
6.
LiZLiQLiuCPengYChanWH. Limited resource semiquantum secret sharing. Quan Inf Process (2018) 17(10):285. 10.1007/s11128-018-2058-8
7.
TsaiCChangYLaiYYangCW. Cryptanalysis of limited resource semi-quantum secret sharing. Quan Inf Process (2020) 19(8):224–8. 10.1007/s11128-020-02690-w
8.
HuZChenCZhangZZhangH. Secure cooperative transmission for mixed RF/FSO spectrum sharing networks. IEEE Trans Commun (2020) 68(5):3010–23. 10.1109/tcomm.2020.2971483
9.
HuWWZhouRGLiXFanPTanC. A novel dynamic quantum secret sharing in high-dimensional quantum system. Quan Inf Process (2021) 20:159–28. 10.1007/s11128-021-03103-2
10.
TianYLiJChenXBYeCQLiHJ. An efficient semi-quantum secret sharing protocol of specific bits. Quan Inf Process (2021) 20(6):217. 10.1007/s11128-021-03157-2
11.
TsaiCWYangCWLinJ. Multiparty mediated quantum secret sharing protocol. Quan Inf Process (2022) 21(2):63. 10.1007/s11128-021-03402-8
12.
DouZXuGChenXBLiuXYangYX. A secure rational quantum state sharing protocol. Sci China Inf Sci (2018) 61:022501. 10.1007/s11432-016-9151-x
13.
ZhaXJiangRWangM. Two schemes of multiparty quantum direct secret sharing via a six-particle GHZ state. Commun Theor Phys (2020) 72(2):025102. 10.1088/1572-9494/ab5d01
14.
WangJLiLPengHYangY. Quantum-secret-sharing scheme based on local distinguishability of orthogonal multiqudit entangled states. Phys Rev A (2017) 95:022320. 10.1103/physreva.95.022320
15.
LipinskaVMurtaGRibeiroJWehnerS. Verifiable hybrid secret sharing with few qubits. Phys Rev A (2020) 101(3):032332. 10.1103/physreva.101.032332
16.
ZhangKZhangXJiaHZhangL. A new n-party quantum secret sharing model based on multiparty entangled states. Quan Inf Process (2019) 18(3):81. 10.1007/s11128-019-2201-1
17.
ShiR. Useful equations about Bell states and their applications to quantum secret sharing. IEEE Commun Lett (2019) 24(2):386–90. 10.1109/lcomm.2019.2954134
18.
QinHWallaceTRaylinT. Hierarchical quantum secret sharing based on special high-dimensional entangled state. IEEE J Sel Top Quant (2020) 26(3):6600106. 10.1007/s11128-019-2571-4
19.
SutradharKOmH. Efficient quantum secret sharing without a trusted player. Quan Inf Process (2020) 19(2):73. 10.1007/s11128-019-2571-4
20.
HabibidavijaniMBarryS. Continuous-variable ramp quantum secret sharing with Gaussian states and operations. New J Phys (2019) 21(11):113023. 10.1088/1367-2630/ab4d9c
21.
YangYGaSLiDZhouYHShiWM. Three-party quantum secret sharing against collective noise. Quan Inf Process (2019) 18(7):215. 10.1007/s11128-019-2319-1
22.
WangYLouXFanZWangSHuangG. Verifiable multi-dimensional (t,n) threshold quantum secret sharing based on quantum walk. Int J Theor Phys (2022) 61(2):24.10.1007/s10773-022-05009-w
23.
XuJChenHLiuWLiuZ. Selection of unitary operations in quantum secret sharing without entanglement. Sci China Inf Sci (2011) 54:1837–42. 10.1007/s11432-011-4240-9
24.
XuJXiLLiuZZhouYHanYChenDet alQuantitative security analysis of two-level unitary operations in quantum secret sharing protocols based on single qubits (2023).
25.
TanXZhangXSongT. Verifiable delegated quantum computation with χ-type entangled states. Comput Stand Inter (2017) 54:36–40. 10.1016/j.csi.2016.09.008
26.
ZouZZhouLZhongWShengY. Measurement-device-independent quantum secure direct communication of multiple degree of freedom of a single photon. Sci China Phys Mech (2020) 63:230362. 10.1007/s11433-019-1450-8
27.
LiLLiZ. A multi-party quantum key agreement protocol based on Shamir’s secret sharing. Intj Theor Phys (2019) 58:3081–90. 10.1007/s10773-019-04187-4
28.
YangYGaoSLiDZhouYShiW. Three-party quantum secret sharing against collective noise. Quan Inf Process (2019) 18:215. 10.1007/s11128-019-2319-1
29.
ZhangXWeiCQinSGaoFWenQ. Practical efficient 1-out-of-n quantum oblivious transfer protocol. Quan Inf Process (2023) 22(2):99. 10.1007/s11128-022-03817-x
30.
GaoXXXuJFanJH. A novel quantum byzantine consensus protocol based on malicious node prevention mechanism. In: 2022 International Conference on Blockchain Technology and Information Security; July 15-17, 2022; Huaihua (2022).
31.
ZhouNRZhangTFXieXWWuJY. Hybrid quantum-classical generative adversarial networks for image generation via learning discrete distribution. SIGNAL Process-image (2023) 110:116891. 10.1016/j.image.2022.116891
Summary
Keywords
quantum cryptography, quantum secret sharing, three-level unitary operation, quantitative security analysis, qutrit
Citation
Xu J, Li X, Han Y, Zhou Y, Liu Z, Zhang Z and Song Y (2023) Quantitative security analysis of three-level unitary operations in quantum secret sharing without entanglement. Front. Phys. 11:1213153. doi: 10.3389/fphy.2023.1213153
Received
27 April 2023
Accepted
23 May 2023
Published
19 June 2023
Volume
11 - 2023
Edited by
Weibin Li, University of Nottingham, United Kingdom
Reviewed by
Lihua Gong, Nanchang University, China
Su-Juan Qin, Beijing University of Posts and Telecommunications (BUPT), China
Updates
Copyright
© 2023 Xu, Li, Han, Zhou, Liu, Zhang and Song.
This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) and the copyright owner(s) are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.
*Correspondence: Juan Xu, juanxu@nuaa.edu.cn
Disclaimer
All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article or claim that may be made by its manufacturer is not guaranteed or endorsed by the publisher.