Two quantum secret sharing schemes with adversary structure
From MaRDI portal
Publication:2165333
DOI10.1007/s10773-022-05176-wzbMath1501.81013OpenAlexW4287881785MaRDI QIDQ2165333
Tingting Wu, Li Liu, Shixin Zhu, Fulin Li
Publication date: 19 August 2022
Published in: International Journal of Theoretical Physics (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s10773-022-05176-w
Quantum computation (81P68) (n)-body problems (70F10) Quantum coherence, entanglement, quantum correlations (81P40) Quantum coding (general) (81P70) Quantum cryptography (quantum-theoretic aspects) (81P94)
Cites Work
- Unnamed Item
- \(d\)-dimensional quantum state sharing with adversary structure
- Secret sharing based on quantum Fourier transform
- \((t,n)\) threshold quantum secret sharing using the phase shift operation
- General secret sharing based on quantum Fourier transform
- Multi-dimensional quantum state sharing based on quantum Fourier transform
- Threshold quantum secret sharing based on single qubit
- Player simulation and general adversary structures in perfect multiparty computation
- Verifiable threshold quantum secret sharing with sequential communication
- Verifiable quantum secret sharing based on a single qudit
- Verifiable quantum secret sharing scheme using \(d\)-dimensional GHZ state
- Quantum secret sharing for general access structures based on multiparticle entanglements
- Efficient quantum secret sharing without a trusted player
- General quantum secret sharing scheme based on two qudit
- How to share a secret
- Sharing classical secrets with Calderbank-Shor-Steane codes
- Quantum secret sharing
- Verifiable \((t,n)\) threshold quantum secret sharing using \(d\)-dimensional Bell state
This page was built for publication: Two quantum secret sharing schemes with adversary structure