2021
DOI: 10.1007/s11128-021-03157-2
|View full text |Cite
|
Sign up to set email alerts
|

An efficient semi-quantum secret sharing protocol of specific bits

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
25
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
9
1

Relationship

2
8

Authors

Journals

citations
Cited by 42 publications
(25 citation statements)
references
References 24 publications
0
25
0
Order By: Relevance
“…Quantum Secret Sharing Protocols: For the first time, M. Hillery presented out a quantum secret sharing protocol built on the Greenberger-Horne-Zeilinger state that combines secret sharing with quantum technology to accomplish the goal of eavesdropping detection [57]. Its principle is based on quantum entanglement.…”
Section: Sarg04 Protocolmentioning
confidence: 99%
“…Quantum Secret Sharing Protocols: For the first time, M. Hillery presented out a quantum secret sharing protocol built on the Greenberger-Horne-Zeilinger state that combines secret sharing with quantum technology to accomplish the goal of eavesdropping detection [57]. Its principle is based on quantum entanglement.…”
Section: Sarg04 Protocolmentioning
confidence: 99%
“…Since semi-quantum cryptography protocol only requires one participant to have the full quantum capability, it simplifies the execution difficulty of the protocols and has been widely applied to various quantum cryptography fields, such as semi-quantum key distribution, [17][18][19] semi-quantum secure direct communication, [20][21][22] semi-quantum private comparison [23][24][25] and semi-quantum secret sharing. [26][27][28][29][30][31][32] In 2010, Li et al [26] proposed the first semi-quantum secret sharing (SQSS) protocol using the maximally entangled GHZ states. Two years later, Wang et al [27] considered an SQSS protocol using the two-particle entangled states.…”
Section: Introductionmentioning
confidence: 99%
“…After the proposal, miscellaneous protocols have been applied within a "semi" environment. For example, SQKD protocols [18][19][20][21][22][23][24][25][26][27][28], semi-quantum secret sharing protocols [29][30][31][32][33][34][35][36][37][38][39], semi-quantum secure direct communication [40][41][42][43][44][45][46][47][48][49], semiquantum key agreement [50][51][52][53], and semi-quantum private comparison [54][55][56][57][58].…”
Section: Introductionmentioning
confidence: 99%