2018
DOI: 10.1088/0253-6102/69/5/513
|View full text |Cite
|
Sign up to set email alerts
|

Sequential Quantum Secret Sharing Using a Single Qudit

Abstract: In this paper we propose a novel and efficient quantum secret sharing protocol using d-level single particle, which it can realize a general access structure via the thought of concatenation. In addition, Our scheme includes all advantages of Tavakoli’s scheme [Phys. Rev. A 92 (2015) 030302(R)]. In contrast to Tavakoli’s scheme, the efficiency of our scheme is 1 for the same situation, and the access structure is more general and has advantages in practical significance. Furthermore, we also analyze the securi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
9
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
6
2

Relationship

2
6

Authors

Journals

citations
Cited by 17 publications
(9 citation statements)
references
References 34 publications
0
9
0
Order By: Relevance
“…3 )|ϕ 1 , (σ k (6) 1 W k (5) σ k (4) 3 )|ϕ 2 , (σ k (9) 1 W k (8) σ k (7) 3 )|ϕ 3 , (σ k (12) 1 W k (11) σ k (10) 3…”
Section: Examplementioning
confidence: 99%
See 1 more Smart Citation
“…3 )|ϕ 1 , (σ k (6) 1 W k (5) σ k (4) 3 )|ϕ 2 , (σ k (9) 1 W k (8) σ k (7) 3 )|ϕ 3 , (σ k (12) 1 W k (11) σ k (10) 3…”
Section: Examplementioning
confidence: 99%
“…Some of the existing QSS schemes are of the (n, n) threshold type, which requires all participants together to reconstruct the secret [2]- [10]. To improve the flexibility and practicability of the (n, n) threshold QSS schemes, some (t, n) threshold QSS schemes (TQSS) [11]- [20] have been proposed.…”
Section: Introductionmentioning
confidence: 99%
“…Therefore, it has overwhelming advantages in the information security, and its development is extremely rapid. Nowadays, the research of quantum cryptography is extremely active in the fields of quantum key distribution (QKD) [1,2,3,4], quantum secret sharing (QSS) [5,6,7] and quantum secure direct communication (QSDC) [8,9]. Unlike the QKD protocols, quantum key agreement (QKA) [10,11,12,13,14] is a new important branch that each participant plays an equivalent role on generating the shared key.…”
Section: Introductionmentioning
confidence: 99%
“…2) In the process of transmitting the information by the subsequences, the decoy particles are always inserted randomly to resist the eavesdropping attacks. 3) Before recovering the shared key, the trusted design combiner (TDC) [6] will use the homomorphic hash function [29] to detect the received information, which can not only ensure the privacy of the shared key before all participants complete the operation, but also ensure the correctness and simultaneous of the recovered shared key. 4) The shared key is recovered by all participants, and the participant attacks can be resisted successfully.…”
Section: Introductionmentioning
confidence: 99%
“…The former presents various characteristics in the scheme design, while the latter is mostly realized by means of quantum entanglement swapping and quantum teleportation. Many QSS schemes are (n, n) threshold [18,19,20] that need all participants to reconstruct the secret together. In order to improve the flexibility and practicability, the (t, n) threshold quantum secret sharing (TQSS) schemes [14,21,22,23] were proposed.…”
Section: Introductionmentioning
confidence: 99%