2023
DOI: 10.1088/1612-202x/acb04f
|View full text |Cite
|
Sign up to set email alerts
|

Multiple-participant measurement-device-independent quantum secret sharing protocol based on entanglement swapping

Abstract: Quantum secret sharing (QSS) is a multi-party quantum communication mode, which allows the dealer to split a key into several parts and send each part of a key to a participant. The participants can obtain the key only by cooperation. Entanglement swapping is a promising method to construct the entanglement channel. In the paper, we propose a multiple-participant measurement-device-independent QSS protocol based on entanglement swapping. All the measurement tasks are handed over to an untrusted measurement par… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
1
1

Relationship

1
6

Authors

Journals

citations
Cited by 14 publications
(4 citation statements)
references
References 92 publications
0
4
0
Order By: Relevance
“…Quantum technology is developing rapidly, with an increasing number of quantum multi-party secret sharing protocols [9][10][11][12][13][14][15][16][17][18] based on QKD networks being proposed. These QSS protocols afford the secure and confidential sharing of a secret parameter among the validator nodes, which unrelated parties cannot access outside the list of validator nodes (LR).…”
Section: Quantum Secret Sharing (Qss) Protocolmentioning
confidence: 99%
See 1 more Smart Citation
“…Quantum technology is developing rapidly, with an increasing number of quantum multi-party secret sharing protocols [9][10][11][12][13][14][15][16][17][18] based on QKD networks being proposed. These QSS protocols afford the secure and confidential sharing of a secret parameter among the validator nodes, which unrelated parties cannot access outside the list of validator nodes (LR).…”
Section: Quantum Secret Sharing (Qss) Protocolmentioning
confidence: 99%
“…In each consensus cycle, the leader node uses the VDF to obtain a random number R. Each candidate node, i.e., validator nodes that have not been granted the bookkeeping right in a consensus round, utilizes the unique random number and its ID to calculate the hash value for competing for the bookkeeping right. The highest hash value holder is elected as the leader node, and the leader node's identity is shared secretly among the validator nodes through a quantum multi-party secret sharing protocol [9][10][11][12][13][14][15][16][17][18]. After the election of the new leader node LN+1, LN+1 starts taking over the transaction queue from LN, LN+1 packages transactions to generate the next block.…”
Section: Figure 2 Leader Node Campaign Schemamentioning
confidence: 99%
“…After receiving the C A and C B , Charlie makes BSMs on each pair of them and announces the measured results. There are three combinations for the photons performing BSMs [53].…”
Section: Protocol Descriptionmentioning
confidence: 99%
“…Quantum entanglement is an essential property that distinguishes quantum physics from classical physics. It plays a vital role in quantum communication and computation fields, such as quantum teleportation, [1][2][3] quantum key distribution, [4][5][6][7][8][9] quantum secret sharing, [10][11][12][13] quantum secure direct communication, [14][15][16][17][18][19][20][21][22] quantum repeater, [23,24] distributed quantum computing, [25] quantum machine learning, [26] and some other important branches. [27][28][29][30][31][32][33][34][35][36] Practical quantum applications commonly operate across diverse physical systems.…”
Section: Introductionmentioning
confidence: 99%