2019
DOI: 10.1103/physreva.100.022339
|View full text |Cite
|
Sign up to set email alerts
|

Quantum secret sharing using weak coherent states

Abstract: Secret sharing allows a trusted party (the dealer) to distribute a secret to a group of players, who can only access the secret cooperatively. Quantum secret sharing (QSS) protocols could provide unconditional security based on fundamental laws in physics. While the general security proof has been established recently in an entanglement-based QSS protocol, the tolerable channel loss is unfortunately rather small. Here we propose a continuous variable QSS protocol using conventional laser sources and homodyne d… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
32
0
1

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
1
1

Relationship

1
7

Authors

Journals

citations
Cited by 66 publications
(33 citation statements)
references
References 46 publications
0
32
0
1
Order By: Relevance
“…Enlightened by the characteristics of the GMCS-involved quantum key distribution (QKD) [19] and the topological structure of the (n, n)-threshold scheme using weak coherent states [24], we propose an improved (t, n) threshold scheme for the practical CVQSS.…”
Section: The Gmcs-involved (T N) Scheme For Cvqssmentioning
confidence: 99%
See 2 more Smart Citations
“…Enlightened by the characteristics of the GMCS-involved quantum key distribution (QKD) [19] and the topological structure of the (n, n)-threshold scheme using weak coherent states [24], we propose an improved (t, n) threshold scheme for the practical CVQSS.…”
Section: The Gmcs-involved (T N) Scheme For Cvqssmentioning
confidence: 99%
“…Because the secure key of CVQSS ought to secure against any group of t − 1 participants, the dealer needs to select the smallest one among secure key rates of legitimate participants and the dealer. The secure key rate of the GMCS-based QKD can be calculated between the dealer and a selected participant while other t − 1 legitimate participants are dishonest [24,34]. In order to show the performance of the CVQSS protocol, we execute simulations using concrete parameters and analyze the results in the next section.…”
Section: Collective Attackmentioning
confidence: 99%
See 1 more Smart Citation
“…Nevertheless, difficulties in preparing and transmitting GHZ states constrains the secret key rate and stability of QSS systems, making it far from practical implementation. Therefore, several protocols in the prepare-and-measure scenario were proposed to circumvent preparations of multipartite entangled states, such as protocols using post-selected multipartite entanglement state [15], Bell states [16,17], continuous variable [18,19], single-qubit scheme [20][21][22][23], d-level scheme [24,25] and differential phase shift scheme [26]. Unfortunately, a majority of prepare-and-measure protocols [20][21][22][23][24][25][26] is vulnerable to the Trojan horse attacks [27,28].…”
Section: Introductionmentioning
confidence: 99%
“…More recently, this passive state preparation scheme has been extended to measurement-device-independent CV QKD [23]. It could also be applied in other CV quantum communication protocols, such as quantum secret sharing [24] and quantum digital signature [25].…”
Section: Introductionmentioning
confidence: 99%