2023
DOI: 10.1038/s41534-023-00763-z
|View full text |Cite
|
Sign up to set email alerts
|

Experimental demonstration of multiparty quantum secret sharing and conference key agreement

Shuaishuai Liu,
Zhenguo Lu,
Pu Wang
et al.

Abstract: Quantum secret sharing (QSS) and conference key agreement (CKA) provide efficient encryption approaches for realizing multi-party secure communication, which are essential components of quantum networks. In this work, a practical, scalable, verifiable (k, n) threshold continuous variable QSS protocol secure against eavesdroppers and dishonest players are proposed and demonstrated. The protocol does not require preparing the laser source by each player and phase locking of independent lasers. The parameter eval… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0
1

Year Published

2023
2023
2024
2024

Publication Types

Select...
7
1

Relationship

1
7

Authors

Journals

citations
Cited by 15 publications
(4 citation statements)
references
References 55 publications
0
3
0
1
Order By: Relevance
“…Quantum technology is developing rapidly, with an increasing number of quantum multi-party secret sharing protocols [9][10][11][12][13][14][15][16][17][18] based on QKD networks being proposed. These QSS protocols afford the secure and confidential sharing of a secret parameter among the validator nodes, which unrelated parties cannot access outside the list of validator nodes (LR).…”
Section: Quantum Secret Sharing (Qss) Protocolmentioning
confidence: 99%
See 1 more Smart Citation
“…Quantum technology is developing rapidly, with an increasing number of quantum multi-party secret sharing protocols [9][10][11][12][13][14][15][16][17][18] based on QKD networks being proposed. These QSS protocols afford the secure and confidential sharing of a secret parameter among the validator nodes, which unrelated parties cannot access outside the list of validator nodes (LR).…”
Section: Quantum Secret Sharing (Qss) Protocolmentioning
confidence: 99%
“…In each consensus cycle, the leader node uses the VDF to obtain a random number R. Each candidate node, i.e., validator nodes that have not been granted the bookkeeping right in a consensus round, utilizes the unique random number and its ID to calculate the hash value for competing for the bookkeeping right. The highest hash value holder is elected as the leader node, and the leader node's identity is shared secretly among the validator nodes through a quantum multi-party secret sharing protocol [9][10][11][12][13][14][15][16][17][18]. After the election of the new leader node LN+1, LN+1 starts taking over the transaction queue from LN, LN+1 packages transactions to generate the next block.…”
Section: Figure 2 Leader Node Campaign Schemamentioning
confidence: 99%
“…Random numbers are key resources in the information age. They play an essential role in various applications, such as simulation, cryptography, and fundamental physical experiments [1][2][3][4][5][6][7][8][9][10]. A quantum random number generator (QRNG) can produce true random numbers with the characteristics of unpredictability, irreproducibility, and unbiasedness, guaranteed by the basic principles of quantum physics.…”
Section: Introductionmentioning
confidence: 99%
“…从上述研究中可以看 到, 器件耦合方式均采用垂直的二维光栅耦合方 式, 耦合损耗较大, 且静态消光比受二维光栅的限 制, 普遍低于30 dB. 较大的耦合损耗会使通信系 统探测效率降低, 特别是对损耗敏感的量子通信系 统 [6,9] ; 同时偏振消光比关系着动态偏振控制器对 偏振态的控制精度, 在量子通信领域对额外噪声和 安全密钥速率有着直接的影响 [16] . 如果能够优化 这两个核心参数值, 将会极大地提高硅基动态偏振 控制器的性能, 提升其应用价值和应用范围.…”
unclassified