Verifiable threshold quantum secret sharing with sequential communication
From MaRDI portal
Publication:1994772
Abstract: A (, ) threshold quantum secret sharing (QSS) is proposed based on a single -level quantum system. It enables the (, ) threshold structure based on Shamir's secret sharing and simply requires sequential communication in -level quantum system to recover secret. Besides, the scheme provides a verification mechanism which employs an additional qudit to detect cheats and eavesdropping during secret reconstruction, and allows a participant to use the share repeatedly. Analyses show that the proposed scheme is resistant to typical attacks. Moreover, the scheme is salable in participant number and easier to realize compared to related schemes. More generally, our scheme also presents a generic method to construct new (, ) threshold QSS schemes based on -level quantum system from other classical threshold secret sharing.
Recommendations
- Verifiable \((t,n)\) threshold quantum secret sharing using \(d\)-dimensional Bell state
- A verifiable \((k, n)\)-threshold dynamic quantum secret sharing scheme
- Threshold quantum secret sharing based on single qubit
- Verifiable quantum \((k,n)\)-threshold secret key sharing
- Threshold secret sharing scheme based on quantum circuit
Cites work
- A modular approach to key safeguarding
- A simple participant attack on the Bradler--Dusek protocol
- Graph states for quantum secret sharing
- Group Authentication
- Group-oriented (t, n) threshold digital signature scheme and digital multisignature
- How to share a secret
- How to share a secret
- Quantum secret sharing
- Quantum secret sharing using the d-dimensional GHZ state
- Quantum secret sharing with continuous variable graph state
- Quantum secret sharing without entanglement
- Secret sharing based on quantum Fourier transform
- Threshold Signatures, Multisignatures and Blind Signatures Based on the Gap-Diffie-Hellman-Group Signature Scheme
- Threshold quantum secret sharing based on single qubit
- \((t,n)\) threshold quantum secret sharing using the phase shift operation
Cited in
(31)- Cryptanalysis and improvement of verifiable quantum (k,n) secret sharing
- Cheating identifiable \((k, n)\) threshold quantum secret sharing scheme
- A verifiable framework of entanglement-free quantum secret sharing with information-theoretical security
- A verifiable \((k, n)\)-threshold dynamic quantum secret sharing scheme
- Verifiable multi-dimensional (t,n) threshold quantum secret sharing based on quantum walk
- Quantum advantage of threshold changeable secret sharing scheme
- Efficient quantum secret sharing without a trusted player
- Threshold quantum secret sharing based on single qubit
- Extremal set theory and LWE based access structure hiding verifiable secret sharing with malicious-majority and free verification
- Quantum state sharing of an arbitrary \(m\)-particle state using Einstein-Podolsky-Rosen pairs and application in quantum voting
- Verifiable quantum secret sharing based on a single qudit
- Verifiable quantum secret sharing scheme using \(d\)-dimensional GHZ state
- \((t,n)\) Threshold quantum secret sharing using rotation operation
- Threshold secret sharing scheme based on quantum circuit
- Verifiable quantum \((k,n)\)-threshold secret key sharing
- Verifiable dynamic quantum secret sharing based on generalized Hadamard gate
- Quantum multi-secret sharing scheme with access structures and cheat identification
- \((t,n)\) threshold quantum secret sharing using the phase shift operation
- Two quantum secret sharing schemes with adversary structure
- A threshold changeable dynamic quantum secret sharing scheme with cheating identification
- Searching for optimal quantum secret sharing scheme based on local distinguishability
- Efficient verifiable quantum secret sharing schemes via eight-quantum-entangled states
- A verifiable \((t, n)\) threshold quantum state sharing scheme on IBM quantum cloud platform
- A \(d\)-level quantum secret sharing scheme with cheat-detection \((t, m)\) threshold
- A verifiable multi-party quantum key distribution protocol based on repetitive codes
- Continuous-variable \((3, 3)\)-threshold quantum secret sharing based on one-sided device-independent security
- A \((w, t, n)\)-weighted threshold dynamic quantum secret sharing scheme with cheating identification
- Threshold quantum secure direct communication without entanglement
- Sequential quantum secret sharing in noisy environments
- Standard \((k, n)\)-threshold hierarchical quantum secret sharing
- Verifiable \((t,n)\) threshold quantum secret sharing using \(d\)-dimensional Bell state
This page was built for publication: Verifiable threshold quantum secret sharing with sequential communication
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1994772)