2022
DOI: 10.3390/sym14081692
|View full text |Cite
|
Sign up to set email alerts
|

A Symmetric Extensible Protocol for Quantum Secret Sharing

Abstract: This paper introduces the Symmetric Extensible Quantum Secret Sharing protocol, a novel quantum protocol for secret sharing. At its heart, it is an entanglement-based protocol that relies on the use of maximally entangled GHZ tuples, evenly distributed among the players, endowing the spymaster with the ability to securely share a secret message with the agents. Its security stems from the fact that it is highly improbable for a malicious eavesdropper or a rogue double agent to disrupt its successful execution.… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
7
1

Relationship

4
4

Authors

Journals

citations
Cited by 11 publications
(7 citation statements)
references
References 41 publications
0
2
0
Order By: Relevance
“…[26] is invaluable, and for more recent developments pertaining to state-of-the-art cryprographic protocols we refer to Refs. [27][28][29][30]. Some of these ideas have been extended in Ref.…”
Section: Related Workmentioning
confidence: 99%
“…[26] is invaluable, and for more recent developments pertaining to state-of-the-art cryprographic protocols we refer to Refs. [27][28][29][30]. Some of these ideas have been extended in Ref.…”
Section: Related Workmentioning
confidence: 99%
“…In a similar vein, quantum coin flipping has served as a crucial component in numerous quantum cryptographic protocols, where familiar figures like Alice and Bob take on the roles of remote parties striving to reach a consensus on a random bit. For a comprehensive presentation, the seminal work in [16] is invaluable, and for some state-of-the-art cryprographic protocols we refer to [17,18,19,20,21]). Some of these ideas have been extended in [22] to quantum dice rolling in scenarios involving multiple outcomes and more than two parties.…”
Section: Related Workmentioning
confidence: 99%
“…In his 1991 influential paper, Ekert proved that key distribution is possible with the use of EPR pairs. Immediately afterwards, research in this field produced a plethora of entanglement-based protocols for quantum key distribution [11][12][13][14][15][16][17]. Quantum cryptographic protocols have the potential to enhance the security not only of established applications but also of new and emerging technologies, such as cloud computing, cloud storage [18,19], or blockchain [20].…”
Section: Introductionmentioning
confidence: 99%