Verifiable threshold quantum secret sharing with sequential communication
From MaRDI portal
Publication:1994772
Abstract: A (, ) threshold quantum secret sharing (QSS) is proposed based on a single -level quantum system. It enables the (, ) threshold structure based on Shamir's secret sharing and simply requires sequential communication in -level quantum system to recover secret. Besides, the scheme provides a verification mechanism which employs an additional qudit to detect cheats and eavesdropping during secret reconstruction, and allows a participant to use the share repeatedly. Analyses show that the proposed scheme is resistant to typical attacks. Moreover, the scheme is salable in participant number and easier to realize compared to related schemes. More generally, our scheme also presents a generic method to construct new (, ) threshold QSS schemes based on -level quantum system from other classical threshold secret sharing.
Recommendations
- Verifiable \((t,n)\) threshold quantum secret sharing using \(d\)-dimensional Bell state
- A verifiable \((k, n)\)-threshold dynamic quantum secret sharing scheme
- Threshold quantum secret sharing based on single qubit
- Verifiable quantum \((k,n)\)-threshold secret key sharing
- Threshold secret sharing scheme based on quantum circuit
Cites work
- A modular approach to key safeguarding
- A simple participant attack on the Bradler--Dusek protocol
- Graph states for quantum secret sharing
- Group Authentication
- Group-oriented (t, n) threshold digital signature scheme and digital multisignature
- How to share a secret
- How to share a secret
- Quantum secret sharing
- Quantum secret sharing using the \(d\)-dimensional GHZ state
- Quantum secret sharing with continuous variable graph state
- Quantum secret sharing without entanglement
- Secret sharing based on quantum Fourier transform
- Threshold Signatures, Multisignatures and Blind Signatures Based on the Gap-Diffie-Hellman-Group Signature Scheme
- Threshold quantum secret sharing based on single qubit
- \((t,n)\) threshold quantum secret sharing using the phase shift operation
Cited in
(31)- Extremal set theory and LWE based access structure hiding verifiable secret sharing with malicious-majority and free verification
- \((t,n)\) threshold quantum secret sharing using the phase shift operation
- Verifiable quantum secret sharing scheme using \(d\)-dimensional GHZ state
- Verifiable quantum \((k,n)\)-threshold secret key sharing
- Searching for optimal quantum secret sharing scheme based on local distinguishability
- A verifiable \((k, n)\)-threshold dynamic quantum secret sharing scheme
- Continuous-variable \((3, 3)\)-threshold quantum secret sharing based on one-sided device-independent security
- A \((w, t, n)\)-weighted threshold dynamic quantum secret sharing scheme with cheating identification
- Standard \((k, n)\)-threshold hierarchical quantum secret sharing
- A verifiable multi-party quantum key distribution protocol based on repetitive codes
- Efficient quantum secret sharing without a trusted player
- Quantum advantage of threshold changeable secret sharing scheme
- Verifiable multi-dimensional (t,n) threshold quantum secret sharing based on quantum walk
- Sequential quantum secret sharing in noisy environments
- Verifiable \((t,n)\) threshold quantum secret sharing using \(d\)-dimensional Bell state
- Threshold quantum secure direct communication without entanglement
- Threshold secret sharing scheme based on quantum circuit
- Efficient verifiable quantum secret sharing schemes via eight-quantum-entangled states
- A verifiable \((t, n)\) threshold quantum state sharing scheme on IBM quantum cloud platform
- Quantum state sharing of an arbitrary \(m\)-particle state using Einstein-Podolsky-Rosen pairs and application in quantum voting
- A threshold changeable dynamic quantum secret sharing scheme with cheating identification
- Cheating identifiable \((k, n)\) threshold quantum secret sharing scheme
- Threshold quantum secret sharing based on single qubit
- Verifiable quantum secret sharing based on a single qudit
- Cryptanalysis and improvement of verifiable quantum \((k,n)\) secret sharing
- Verifiable dynamic quantum secret sharing based on generalized Hadamard gate
- A \(d\)-level quantum secret sharing scheme with cheat-detection \((t, m)\) threshold
- Quantum multi-secret sharing scheme with access structures and cheat identification
- \((t,n)\) Threshold quantum secret sharing using rotation operation
- A verifiable framework of entanglement-free quantum secret sharing with information-theoretical security
- Two quantum secret sharing schemes with adversary structure
This page was built for publication: Verifiable threshold quantum secret sharing with sequential communication
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1994772)