2016
DOI: 10.1088/0031-8949/91/8/085101
|View full text |Cite
|
Sign up to set email alerts
|

Authenticated quantum secret sharing with quantum dialogue based on Bell states

Abstract: This work proposes a scheme that combines the advantages of a quantum secret sharing procedure and quantum dialogue. The proposed scheme enables the participants to simultaneously make mutual identity authentications, in a simulated scenario where the boss, Alice, shares a secret with her two agents Bob and Charlie. The secret is protected by checking photons to keep untrustworthy agents and outer attacks from getting useful information. Before the two agents cooperate to recover Alice's secret, they must auth… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
18
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
9
1

Relationship

1
9

Authors

Journals

citations
Cited by 39 publications
(18 citation statements)
references
References 62 publications
0
18
0
Order By: Relevance
“…Classical secret sharing (CSS) [1,2] is a method for splitting and sharing a secret message amongst n number of agents in a group, where each agent holds a share of the message. Only sufficient number of agents (let us say k) can reconstruct the secret message, while any set of k-1 or lesser number of agents can gain no information about the message.…”
Section: Introductionmentioning
confidence: 99%
“…Classical secret sharing (CSS) [1,2] is a method for splitting and sharing a secret message amongst n number of agents in a group, where each agent holds a share of the message. Only sufficient number of agents (let us say k) can reconstruct the secret message, while any set of k-1 or lesser number of agents can gain no information about the message.…”
Section: Introductionmentioning
confidence: 99%
“…Several excellent researchers recently propose studies 41 44 about an internal attack on a multi-party quantum secret sharing protocol and their strategy to protect against it. The scenario of this kind of internal attack, as discussed in studies 41 44 , does not happen in our protocol, because the dealer distributes the parts of secrets to each participant individually by a secure quantum channel, such as QKD, and the participants do not need to distribute or forward information with each other. Once the distribution is finished, the dealer has no more information (nothing is left for stealing) and also does not need to anticipate the reconstruction process of the secret.…”
Section: Resultsmentioning
confidence: 99%
“…Quantum secret sharing (QSS) schemes are also modified to design schemes for QIA enabling authentication of the legitimate users individually or simultaneously by a set of other users or trusted third party [96]. In addition, a set of schemes for QSS with the feature of identity authentication for better security have been proposed [66,[97][98][99]. A large variety of quantum resources and operations (e.g., Bell state, phase-shift operation, GHZ state) have been used in these schemes.…”
Section: Protocols Based On Quantum Secret Sharingmentioning
confidence: 99%