2022
DOI: 10.1007/s11128-022-03620-8
|View full text |Cite
|
Sign up to set email alerts
|

Quantum sealed-bid auction protocol based on quantum secret sharing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 19 publications
0
4
0
Order By: Relevance
“…Quantum technology is developing rapidly, with an increasing number of quantum multi-party secret sharing protocols [9][10][11][12][13][14][15][16][17][18] based on QKD networks being proposed. These QSS protocols afford the secure and confidential sharing of a secret parameter among the validator nodes, which unrelated parties cannot access outside the list of validator nodes (LR).…”
Section: Quantum Secret Sharing (Qss) Protocolmentioning
confidence: 99%
See 1 more Smart Citation
“…Quantum technology is developing rapidly, with an increasing number of quantum multi-party secret sharing protocols [9][10][11][12][13][14][15][16][17][18] based on QKD networks being proposed. These QSS protocols afford the secure and confidential sharing of a secret parameter among the validator nodes, which unrelated parties cannot access outside the list of validator nodes (LR).…”
Section: Quantum Secret Sharing (Qss) Protocolmentioning
confidence: 99%
“…In each consensus cycle, the leader node uses the VDF to obtain a random number R. Each candidate node, i.e., validator nodes that have not been granted the bookkeeping right in a consensus round, utilizes the unique random number and its ID to calculate the hash value for competing for the bookkeeping right. The highest hash value holder is elected as the leader node, and the leader node's identity is shared secretly among the validator nodes through a quantum multi-party secret sharing protocol [9][10][11][12][13][14][15][16][17][18]. After the election of the new leader node LN+1, LN+1 starts taking over the transaction queue from LN, LN+1 packages transactions to generate the next block.…”
Section: Figure 2 Leader Node Campaign Schemamentioning
confidence: 99%
“…Moreover, due to its ability to satisfy the requirements of multi-user secret sharing, QSS can be applied to scenarios of quantum secure multiparty computation. Serving as a foundational module, QSS can facilitate the construction of secure multiparty computation protocols with various functions, such as quantum sealed-bid auction [11][12][13] and quantum summation [14][15][16][17].…”
Section: Introductionmentioning
confidence: 99%
“…Many experts and scholars have been devoted to studying post-confirmation mechanisms to resist collusion attacks. Even now, the post-confirmation mechanism has been researched and modified by several academics [19][20][21][22][23][24].…”
Section: Introductionmentioning
confidence: 99%