2019
DOI: 10.1109/access.2019.2928855
|View full text |Cite
|
Sign up to set email alerts
|

A Verifiable $(t, n)$ Threshold Quantum State Sharing Against Denial Attack

Abstract: To detect frauds by a dealer or some participants, researchers have proposed verifiable threshold quantum state sharing (VTQSTS) schemes. However, the existing VTQSTS schemes either have lowcomputation efficiency or weak security. In this paper, a verifiable (t, n) threshold quantum state sharing against denial attack (VTQSTS-ADA) scheme is proposed to overcome the above limitations, in which the dealer Alice encodes the quantum secret sequence into two quantum message sequences and a quantum signature sequenc… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 7 publications
(2 citation statements)
references
References 48 publications
0
2
0
Order By: Relevance
“…Here we show that the proposed secret sharing scheme is perfect. Following Chaudhry et al 3 and Song et al, 34 let scriptP={}P1,P2,,Pn$$ \mathcal{P}=\left\{{P}_1,{P}_2,\dots, {P}_n\right\} $$ be a finite set of participants and normalΓ={}A1,A2,,At$$ \Gamma =\left\{{A}_1,{A}_2,\dots, {A}_t\right\} $$ be an access structure over scriptP$$ \mathcal{P} $$, that is, each Ai(1it)$$ {A}_i\left(1\le i\le t\right) $$ is a subset of scriptP.$$ \mathcal{P}. $$ Let critical set Q$$ Q $$ of a GS r ( v ; k ) be the secret where 1o(Q)<r20.25em$$ 1\le o(Q)<{r}^2 $$.…”
Section: Security Of the Schemementioning
confidence: 96%
See 1 more Smart Citation
“…Here we show that the proposed secret sharing scheme is perfect. Following Chaudhry et al 3 and Song et al, 34 let scriptP={}P1,P2,,Pn$$ \mathcal{P}=\left\{{P}_1,{P}_2,\dots, {P}_n\right\} $$ be a finite set of participants and normalΓ={}A1,A2,,At$$ \Gamma =\left\{{A}_1,{A}_2,\dots, {A}_t\right\} $$ be an access structure over scriptP$$ \mathcal{P} $$, that is, each Ai(1it)$$ {A}_i\left(1\le i\le t\right) $$ is a subset of scriptP.$$ \mathcal{P}. $$ Let critical set Q$$ Q $$ of a GS r ( v ; k ) be the secret where 1o(Q)<r20.25em$$ 1\le o(Q)<{r}^2 $$.…”
Section: Security Of the Schemementioning
confidence: 96%
“…Here we show that the proposed secret sharing scheme is perfect. Following Chaudhry et al 3 and Song et al, 34 let 𝒫 = {P 1 , P 2 , … , P n } be a finite set of participants and Γ = {A 1 , A 2 , … , A t } be an access structure over 𝒫 , that is, each A i (1 ≤ i ≤ t) is a subset of 𝒫 . Let critical set Q of a GS r (v; k) be the secret where 1 ≤ o(Q) < r 2 .…”
Section: Security Of the Schemementioning
confidence: 99%