2021
DOI: 10.1364/oe.417856
|View full text |Cite
|
Sign up to set email alerts
|

Differential phase shift quantum secret sharing using a twin field

Abstract: Quantum secret sharing (QSS) is essential for multiparty quantum communication, which is one of cornerstones in the future quantum internet. However, a linear rate-distance limitation severely constrains the secure key rate and transmission distance of QSS. Here, we present a practical QSS protocol among three participants based on the differential phase shift scheme and twin field ideas for the solution of high-efficiency multiparty communication task. In contrast to formerly proposed differential phase shift… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
29
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6

Relationship

1
5

Authors

Journals

citations
Cited by 43 publications
(29 citation statements)
references
References 40 publications
0
29
0
Order By: Relevance
“…In Figure 4, we plot the results of our asymmetric protocol when the total pulses are set N = 10 12 , where the difference in length between Alice's channel and Bob's is fixed at 10 km, 50 km, and 100 km, respectively. When the original TF-DPSQSS [29] protocol is applied to the asymmetric channels, a high system error rate will arise since different channel transmittances will lead to the poor performance of interference at the beam splitter. Figure 5 presents numerical results of our asymmetric protocols and the original TF-DPSQSS [29] protocol with the difference in length between two channels fixed at 10 km and 14 km.…”
Section: Results Of Simulationmentioning
confidence: 99%
See 3 more Smart Citations
“…In Figure 4, we plot the results of our asymmetric protocol when the total pulses are set N = 10 12 , where the difference in length between Alice's channel and Bob's is fixed at 10 km, 50 km, and 100 km, respectively. When the original TF-DPSQSS [29] protocol is applied to the asymmetric channels, a high system error rate will arise since different channel transmittances will lead to the poor performance of interference at the beam splitter. Figure 5 presents numerical results of our asymmetric protocols and the original TF-DPSQSS [29] protocol with the difference in length between two channels fixed at 10 km and 14 km.…”
Section: Results Of Simulationmentioning
confidence: 99%
“…In this section, we will discuss the security of our protocol against eavesdropping. Because of the equivalence [29] between our asymmetric protocol and differential phase shift QSS, we can apply the conclusion in differential phase shift quantum key distribution [25] to the analysis of both an external eavesdropper and an internal eavesdropper in our protocol.…”
Section: Proof Of Securitymentioning
confidence: 93%
See 2 more Smart Citations
“…Recently, some verifiable QSS protocols were proposed. 22,23 Gu et al 25 proposed an experimental implementation of three-party QSS based on differential phase shift and twin field. Pinnell et al 26 gave a proof-of-principle implementation for high-dimensional QSS by exploiting the orbital angular momentum in high-dimensional Hilbert space and perfect Vortex beams.…”
Section: Introductionmentioning
confidence: 99%