Secret sharing based on quantum Fourier transform
From MaRDI portal
Recommendations
- General secret sharing based on quantum Fourier transform
- Multiparty Quantum Secret Sharing Using Quantum Fourier Transform
- General quantum secret sharing scheme based on two qudit
- A new quantum secret sharing scheme based on mutually unbiased bases
- Quantum secret sharing without monitoring signal disturbance
Cites work
- scientific article; zbMATH DE number 5297601 (Why is no real title available?)
- scientific article; zbMATH DE number 3497764 (Why is no real title available?)
- Efficient quantum key distribution scheme and a proof of its unconditional security
- Graph states for quantum secret sharing
- How to share a secret
- Introduction to modern cryptography.
- Quantum secret sharing
- Secure multi-party quantum computation
- The size of a share must be large
- Unconditional security in quantum cryptography
Cited in
(20)- General quantum secret sharing scheme based on two qudit
- Quantum communication and quantum multivariate polynomial interpolation
- Verifiable threshold quantum secret sharing with sequential communication
- Quantum secure clockwise sorting
- Efficient quantum secret sharing without a trusted player
- High-dimensional quantum key distribution based on qudits transmission with quantum Fourier transform
- Multi-dimensional quantum state sharing based on quantum Fourier transform
- A cost-effective quantum protocol for secure multi-party multiplication
- A new \(n\)-party quantum secret sharing model based on multiparty entangled states
- General secret sharing based on quantum Fourier transform
- Verifiable \((t,n)\) threshold quantum secret sharing using \(d\)-dimensional Bell state
- Multiparty Quantum Secret Sharing Using Quantum Fourier Transform
- Threshold secret sharing scheme of quantum images based on least significant bit theory
- Quantum secret sharing with \((m, n)\) threshold: QFT and identity authentication
- A novel three-party quantum secret sharing scheme based on Bell state sequential measurements with application in quantum image sharing
- Verifiable dynamic quantum secret sharing based on generalized Hadamard gate
- A \(d\)-level quantum secret sharing scheme with cheat-detection \((t, m)\) threshold
- Two quantum secret sharing schemes with adversary structure
- Secret sharing based multiparty quantum computation for multiplication
- Quantum secret sharing using GHZ state qubit positioning and selective qubits strategy with simulation analysis
This page was built for publication: Secret sharing based on quantum Fourier transform
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q356899)