Secret sharing based on quantum Fourier transform
DOI10.1007/S11128-013-0534-8zbMATH Open1319.94083OpenAlexW2092849112MaRDI QIDQ356899FDOQ356899
Authors: Wei Yang, Run-hua Shi, Liusheng Huang, Li-Bao He
Publication date: 26 July 2013
Published in: Quantum Information Processing (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s11128-013-0534-8
Recommendations
- General secret sharing based on quantum Fourier transform
- Multiparty Quantum Secret Sharing Using Quantum Fourier Transform
- General quantum secret sharing scheme based on two qudit
- A new quantum secret sharing scheme based on mutually unbiased bases
- Quantum secret sharing without monitoring signal disturbance
Numerical methods for discrete and fast Fourier transforms (65T50) Quantum cryptography (quantum-theoretic aspects) (81P94) Authentication, digital signatures and secret sharing (94A62)
Cites Work
- How to share a secret
- Unconditional security in quantum cryptography
- Graph states for quantum secret sharing
- Quantum secret sharing
- The size of a share must be large
- Title not available (Why is that?)
- Title not available (Why is that?)
- Introduction to modern cryptography.
- Secure multi-party quantum computation
- Efficient quantum key distribution scheme and a proof of its unconditional security
Cited In (20)
- Verifiable threshold quantum secret sharing with sequential communication
- Secret sharing based multiparty quantum computation for multiplication
- High-dimensional quantum key distribution based on qudits transmission with quantum Fourier transform
- A novel three-party quantum secret sharing scheme based on Bell state sequential measurements with application in quantum image sharing
- Multi-dimensional quantum state sharing based on quantum Fourier transform
- Quantum communication and quantum multivariate polynomial interpolation
- Efficient quantum secret sharing without a trusted player
- Quantum secure clockwise sorting
- General quantum secret sharing scheme based on two qudit
- Verifiable dynamic quantum secret sharing based on generalized Hadamard gate
- Two quantum secret sharing schemes with adversary structure
- Quantum secret sharing with \((m, n)\) threshold: QFT and identity authentication
- Multiparty Quantum Secret Sharing Using Quantum Fourier Transform
- Threshold secret sharing scheme of quantum images based on least significant bit theory
- A \(d\)-level quantum secret sharing scheme with cheat-detection \((t, m)\) threshold
- A cost-effective quantum protocol for secure multi-party multiplication
- A new \(n\)-party quantum secret sharing model based on multiparty entangled states
- General secret sharing based on quantum Fourier transform
- Verifiable \((t,n)\) threshold quantum secret sharing using \(d\)-dimensional Bell state
- Quantum secret sharing using GHZ state qubit positioning and selective qubits strategy with simulation analysis
This page was built for publication: Secret sharing based on quantum Fourier transform
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q356899)