Journal ArticleDOI
Verifiable (t,n) threshold quantum secret sharing using d-dimensional Bell state
Huawang Qin,Yuewei Dai +1 more
TLDR
A verifiable ( t, n ) threshold quantum secret sharing scheme is proposed by using the d-dimensional Bell state and the Lagrange interpolation and can give more perfect security proof.About:
This article is published in Information Processing Letters.The article was published on 2016-05-01. It has received 40 citations till now. The article focuses on the topics: Verifiable secret sharing & Secret sharing.read more
Citations
More filters
Journal ArticleDOI
Proofs from THE BOOK , by Martin Aigner and Günter M. Ziegler. Pp. 199. £19. 1999. ISBN 3 540 63698 6 (Springer-Verlag).
TL;DR: Aigner and Ziegler as discussed by the authors presented beautiful proofs of some of the most exciting and historically important mathematical theorems, focusing on human endeavour to make the proofs more and more simple and striking.
Journal ArticleDOI
Quantum secret sharing using the d-dimensional GHZ state
TL;DR: A quantum secret sharing scheme that uses an orthogonal pair of n-qudit GHZ states and local distinguishability and (2, n)-threshold schemes that enable any two cooperating players from two disjoint groups to always reconstruct the secret.
Journal ArticleDOI
Quantum secret sharing using orthogonal multiqudit entangled states
TL;DR: The distinguishability of orthogonal multiqudit entangled states under restricted local operations and classical communication is investigated and a quantum secret sharing scheme to realize three types of access structures is proposed.
Journal ArticleDOI
General secret sharing based on quantum Fourier transform
TL;DR: This hybrid scheme has the advantages of both classical and quantum secret sharing, and has general access structure, and is secure against quantum computation and eavesdropper attacks.
Journal ArticleDOI
Limited Resource Semi-Quantum Secret Sharing Based on Multi-Level Systems
TL;DR: A novel and resultful semi-quantum secret sharing protocol, which is implemented using product states based on multi-level systems and the security of the protocol is analyzed in detail from two aspects of Intercept-measure-resend and Entangle-measuring attacks initiated by internal malicious participants.
References
More filters
Journal ArticleDOI
How to share a secret
TL;DR: This technique enables the construction of robust key management schemes for cryptographic systems that can function securely and reliably even when misfortunes destroy half the pieces and security breaches expose all but one of the remaining pieces.
Proceedings ArticleDOI
Safeguarding cryptographic keys
TL;DR: Certain cryptographic keys, such as a number which makes it possible to compute the secret decoding exponent in an RSA public key cryptosystem, 1 , 5 or the system master key and certain other keys in a DES cryptos system, 3 are so important that they present a dilemma.
Journal ArticleDOI
Quantum secret sharing
TL;DR: This work shows how GHZ states can be used to split quantum information into two parts so that both parts are necessary to reconstruct the original qubit.
Journal ArticleDOI
Secure direct communication with a quantum one-time pad
Fu-Guo Deng,Gui-Lu Long +1 more
TL;DR: The protocol uses batches of single photons prepared randomly in one of four different states to serve as a one-time pad which is used directly to encode the secret messages in one communication process and is unconditionally secure.
Journal ArticleDOI
Proofs from The BOOK
TL;DR: Aigner and Ziegler as discussed by the authors present proofs for a broad collection of theorems and their proofs that would undoubtedly be in the Book of Erds, including the spectral theorem from linear algebra, some more recent jewels like the Borromean rings and other surprises.