Threshold quantum cryptograph based on Grover's algorithm
From MaRDI portal
Publication:601476
Abstract: Grover's operator in the two-qubit case can transform a basis into its conjugated basis. A permutation operator can transform a state in the two conjugated bases into its orthogonal state. These properties are included in a threshold quantum protocol. The proposed threshold quantum protocol is secure based the proof that the legitimate participators can only eavesdrop 2 bits of 3 bits operation information on one two-qubit with error probability 3/8. We propose a scheme to detect the Trojan horse attack without destroying the legal qubit.
Recommendations
- scientific article; zbMATH DE number 2112484
- Threshold secret sharing scheme based on quantum circuit
- Controlled deterministic secure quantum communication based on quantum search algorithm
- A NOVEL PROTOCOL-AUTHENTICATION ALGORITHM RULING OUT A MAN-IN-THE MIDDLE ATTACK IN QUANTUM CRYPTOGRAPHY
- Two quantum direct communication protocols based on quantum search algorithm
Cites work
Cited in
(3)- Quantum algorithm for the asymmetric weight decision problem and its generalization to multiple weights
- scientific article; zbMATH DE number 2086396 (Why is no real title available?)
- A framework for reducing the overhead of the quantum oracle for use with Grover's algorithm with applications to cryptanalysis of SIKE
This page was built for publication: Threshold quantum cryptograph based on Grover's algorithm
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q601476)