2009
DOI: 10.1016/j.optcom.2009.08.018
|View full text |Cite
|
Sign up to set email alerts
|

Reexamining the security of the improved quantum secret sharing scheme

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
16
0

Year Published

2010
2010
2023
2023

Publication Types

Select...
6

Relationship

3
3

Authors

Journals

citations
Cited by 29 publications
(16 citation statements)
references
References 30 publications
0
16
0
Order By: Relevance
“…In the end, it is worth stressing that our individual attack is proposed by employing the Bell state comparison law [31]. This law has been recently applied in the designing of several attack strategies [28][29][30].…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…In the end, it is worth stressing that our individual attack is proposed by employing the Bell state comparison law [31]. This law has been recently applied in the designing of several attack strategies [28][29][30].…”
Section: Resultsmentioning
confidence: 99%
“…Most of people focused on the presentation of new QSS protocols. Also a small part of people [21][22][23][24][25][26][27][28][29][30] focused on that the securities of some previous QSS protocols are reexamined and the security leaks are pointed out. Indeed, the latter is also a studying point on QSS.…”
Section: Introductionmentioning
confidence: 99%
“…Obviously, the trait of this attack is that the Bell state comparison and the entanglement swapping are employed. By the way, the Bell state comparison [26] has been also used in the proposed attack strategy [25]. In addition, after giving this attack, we further modify Lin et al .…”
Section: Discussionmentioning
confidence: 99%
“…Afterward, QSS had attracted widespread attention and there were a lot of studies focused on QSS in both the theoretical [4][5][6][7][8] and experimental [9,10] aspects. Generally speaking, QSS concentrates mainly on two kinds of research, one only deals with the QSS of classical information [11][12][13][14][15][16][17][18][19][20][21][22][23][24][25], in which a classical secret is shared among all participants based on quantum mechanics, and another with the QSS of quantum information [26][27][28][29][30][31][32], in which the secret is an arbitrary unknown quantum state. In this paper, we mainly focus on the former.…”
mentioning
confidence: 99%
“…Almost all the existing QSS schemes utilize either the ideal single photons [11,13,14,18] or the maximally entangled quantum states [12,[15][16][17][19][20][21][22][23][24] as the quantum resources. And most existing schemes with the ideal single photons are the QSS variants of the traditional BB84 QKD protocol, and look more practical than entanglement-based protocols.…”
mentioning
confidence: 99%