Reexamining the security of the reconstruction phase of the Hillery-Buzěk-Berthiaume quantum secret-sharing protocol
From MaRDI portal
Publication:3401034
Recommendations
- The cryptanalysis of Yuan et al.'s multiparty quantum secret sharing protocol
- A stronger participant attack on the measurement-device-independent protocol for deterministic quantum secret sharing
- Comment on ``Proactive quantum secret sharing
- Participant attack and improvement to multiparty quantum secret sharing based on GHZ states
- A simple participant attack on the Bradler--Dusek protocol
Cites work
- A new efficient \((t,n)\) verifiable multi-secret sharing (VMSS) based on YCH scheme
- Cryptanalysis and improvement of multiparty quantum secret sharing schemes
- Dynamic and verifiable secret sharing among weighted participants
- Efficient high-capacity quantum secret sharing with two-photon entanglement
- How to share a secret
- Improving the security of a quantum secret sharing protocol between multiparty and multiparty without entanglement
- Improving the security of multiparty quantum secret sharing against an attack with a fake signal
- Improving the security of multiparty quantum secret splitting and quantum state sharing
- MULTIPARTY QUANTUM SECRET SHARING SCHEME OF CLASSICAL MESSAGES BY SWAPPING QUDIT-STATE ENTANGLEMENT
- New efficient and practical verifiable multi-secret sharing schemes
- Quantum secret sharing
- Quantum secret sharing based on Smolin states alone
- Three-partyd-level quantum secret sharing protocol
Cited in
(2)
This page was built for publication: Reexamining the security of the reconstruction phase of the Hillery-Buzěk-Berthiaume quantum secret-sharing protocol
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3401034)