scispace - formally typeset
Journal ArticleDOI

Verifiable (t,n) threshold quantum secret sharing using d-dimensional Bell state

TLDR
A verifiable ( t, n ) threshold quantum secret sharing scheme is proposed by using the d-dimensional Bell state and the Lagrange interpolation and can give more perfect security proof.
About
This article is published in Information Processing Letters.The article was published on 2016-05-01. It has received 40 citations till now. The article focuses on the topics: Verifiable secret sharing & Secret sharing.

read more

Citations
More filters
Journal ArticleDOI

Proofs from THE BOOK , by Martin Aigner and Günter M. Ziegler. Pp. 199. £19. 1999. ISBN 3 540 63698 6 (Springer-Verlag).

TL;DR: Aigner and Ziegler as discussed by the authors presented beautiful proofs of some of the most exciting and historically important mathematical theorems, focusing on human endeavour to make the proofs more and more simple and striking.
Journal ArticleDOI

Quantum secret sharing using the d-dimensional GHZ state

TL;DR: A quantum secret sharing scheme that uses an orthogonal pair of n-qudit GHZ states and local distinguishability and (2, n)-threshold schemes that enable any two cooperating players from two disjoint groups to always reconstruct the secret.
Journal ArticleDOI

Quantum secret sharing using orthogonal multiqudit entangled states

TL;DR: The distinguishability of orthogonal multiqudit entangled states under restricted local operations and classical communication is investigated and a quantum secret sharing scheme to realize three types of access structures is proposed.
Journal ArticleDOI

General secret sharing based on quantum Fourier transform

TL;DR: This hybrid scheme has the advantages of both classical and quantum secret sharing, and has general access structure, and is secure against quantum computation and eavesdropper attacks.
Journal ArticleDOI

Limited Resource Semi-Quantum Secret Sharing Based on Multi-Level Systems

TL;DR: A novel and resultful semi-quantum secret sharing protocol, which is implemented using product states based on multi-level systems and the security of the protocol is analyzed in detail from two aspects of Intercept-measure-resend and Entangle-measuring attacks initiated by internal malicious participants.
References
More filters
Journal ArticleDOI

How to share a secret

TL;DR: This technique enables the construction of robust key management schemes for cryptographic systems that can function securely and reliably even when misfortunes destroy half the pieces and security breaches expose all but one of the remaining pieces.
Proceedings ArticleDOI

Safeguarding cryptographic keys

TL;DR: Certain cryptographic keys, such as a number which makes it possible to compute the secret decoding exponent in an RSA public key cryptosystem, 1 , 5 or the system master key and certain other keys in a DES cryptos system, 3 are so important that they present a dilemma.
Journal ArticleDOI

Quantum secret sharing

TL;DR: This work shows how GHZ states can be used to split quantum information into two parts so that both parts are necessary to reconstruct the original qubit.
Journal ArticleDOI

Secure direct communication with a quantum one-time pad

TL;DR: The protocol uses batches of single photons prepared randomly in one of four different states to serve as a one-time pad which is used directly to encode the secret messages in one communication process and is unconditionally secure.
Journal ArticleDOI

Proofs from The BOOK

TL;DR: Aigner and Ziegler as discussed by the authors present proofs for a broad collection of theorems and their proofs that would undoubtedly be in the Book of Erds, including the spectral theorem from linear algebra, some more recent jewels like the Borromean rings and other surprises.
Related Papers (5)