Cheating identifiable \((k, n)\) threshold quantum secret sharing scheme
From MaRDI portal
Publication:2102185
DOI10.1007/s11128-021-03343-2OpenAlexW4200256728MaRDI QIDQ2102185
Chenhong Yan, Lu Liu, Zhi-Hui Li, Dian-Jun Lu
Publication date: 28 November 2022
Published in: Quantum Information Processing (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s11128-021-03343-2
Related Items (4)
Quantum secret sharing protocol using GHZ state: implementation on IBM qiskit ⋮ Authenticable quantum multi-secret sharing scheme based on monotone span program ⋮ A \(d\)-level quantum secret sharing scheme with cheat-detection \((t, m)\) threshold ⋮ A \((k, n)\)-threshold dynamic quantum secure multiparty multiplication protocol
Cites Work
- Unnamed Item
- Cryptanalysis and improvement of verifiable quantum \((k,n)\) secret sharing
- Quantum cryptography: public key distribution and coin tossing
- Threshold quantum secret sharing between multi-party and multi-party
- Public-key quantum digital signature scheme with one-time pad private-key
- Quantum secret sharing using orthogonal multiqudit entangled states
- Verifiable threshold quantum secret sharing with sequential communication
- Trojan-horse attacks on quantum key distribution with classical bob
- Cheating identifiable secret sharing scheme using symmetric bivariate polynomial
- Verifiable quantum secret sharing protocols based on four-qubit entangled states
- Verifiable quantum \((k,n)\)-threshold secret key sharing
- A verifiable multiparty quantum key agreement based on bivariate polynomial
- High-capacity (2,3) threshold quantum secret sharing based on asymmetric quantum lossy channels
- A verifiable framework of entanglement-free quantum secret sharing with information-theoretical security
- A novel three-party quantum secret sharing scheme based on Bell state sequential measurements with application in quantum image sharing
- Protecting Information
- Quantum secret sharing
- Verifiable \((t,n)\) threshold quantum secret sharing using \(d\)-dimensional Bell state
This page was built for publication: Cheating identifiable \((k, n)\) threshold quantum secret sharing scheme