Sharing a quantum secret without a trusted party
From MaRDI portal
Publication:632212
DOI10.1007/S11128-010-0180-3zbMATH Open1209.81084arXiv0810.3446OpenAlexW2044450733WikidataQ62049419 ScholiaQ62049419MaRDI QIDQ632212FDOQ632212
Authors: Qin Li, Dong-Yang Long, Daowen Qiu, W. H. Chan
Publication date: 15 March 2011
Published in: Quantum Information Processing (Search for Journal in Brave)
Abstract: In a conventional quantum (k,n) threshold scheme, a trusted party shares a secret quantum state with n participants such that any k of those participants can cooperate to recover the original secret, while fewer than k participants obtain no information about the secret. In this paper we show how to construct a quantum (k,n) threshold scheme without the assistance of a trusted party, who generates and distributes shares among the participants. Instead, each participant chooses his private state and contributes the same to the determination of the final secret quantum state.
Full work available at URL: https://arxiv.org/abs/0810.3446
Recommendations
Cites Work
- A single quantum cannot be cloned
- Quantum secret sharing without entanglement
- How to share a secret
- Quantum secret sharing
- Title not available (Why is that?)
- Bidirectional quantum secret sharing and secret splitting with polarized single photons
- Multiparty quantum secret sharing
- Secure multi-party quantum computation
- Quantum identification protocol with technologically bounded parties
- Proofs from THE BOOK. Transl. from the English by Nicolas Puech
- Title not available (Why is that?)
Cited In (26)
- Analysis of efficient and secure dynamic quantum secret sharing protocol based on Bell states
- Quantum multi-secret sharing via trap codes and discrete quantum walks
- Cryptanalysis and improvement of verifiable quantum \((k,n)\) secret sharing
- Multi-dimensional quantum state sharing based on quantum Fourier transform
- Multi-party quantum secret sharing with the single-particle quantum state to encode the information
- Practical sharing of quantum secrets over untrusted channels
- \(d\)-dimensional quantum state sharing with adversary structure
- Dynamic quantum secret sharing by using \(d\)-dimensional GHZ state
- A quantum evolving secret sharing scheme
- Quantum secret sharing protocol using maximally entangled multi-qudit states
- Quantum visual secret sharing based on position superposition
- Sharing the quantum state and the classical information simultaneously
- An efficient protocol for the private comparison of equal information based on four-particle entangled W state and Bell entangled states swapping
- Secure quantum carriers for quantum state sharing
- Quantum meaningful visual cryptography
- Threshold secret sharing scheme based on quantum circuit
- Verifiable quantum \((k,n)\)-threshold secret key sharing
- Eavesdropping on semi-quantum secret sharing scheme of specific bits
- Efficient arbitrated quantum signature and its proof of security
- \((t,n)\) threshold quantum secret sharing using the phase shift operation
- Efficient quantum private comparison employing single photons and collective detection
- Quantum private comparison protocol with \(d\)-dimensional Bell states
- High-dimensional deterministic multiparty quantum secret sharing without unitary operations
- Threshold quantum secret sharing between multi-party and multi-party
- Verifiable \((t,n)\) threshold quantum secret sharing using \(d\)-dimensional Bell state
- Proactive quantum secret sharing
This page was built for publication: Sharing a quantum secret without a trusted party
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q632212)