2015
DOI: 10.1007/s11128-015-1037-6
|View full text |Cite
|
Sign up to set email alerts
|

(t, n) Threshold quantum secret sharing using the phase shift operation

Abstract: A (t, n) threshold quantum secret sharing scheme is proposed, in which the secret is a quantum state, and the dealer encodes the secret through the phase shift operation. The participants perform the phase shift operations on the quantum state according to their private keys, and any t out of the n participants can use the Lagrange interpolation to recover the original quantum state. Compared to the existing schemes, the proposed scheme is simpler and more efficient.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
44
0

Year Published

2016
2016
2020
2020

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 75 publications
(44 citation statements)
references
References 30 publications
0
44
0
Order By: Relevance
“…In ref. 17, the transmission route of the quantum sequence is determined as: Alice  →  Bob i  →  Bob 1  →  →  Bob t . The total number of the transmitted particles is the sum of the message particles and the decoy particles, as shown in Table 3, which is .…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…In ref. 17, the transmission route of the quantum sequence is determined as: Alice  →  Bob i  →  Bob 1  →  →  Bob t . The total number of the transmitted particles is the sum of the message particles and the decoy particles, as shown in Table 3, which is .…”
Section: Resultsmentioning
confidence: 99%
“… 1 in 1999, based on Greenberger-Home-Zeilinger(GHZ) state. Since then, many design and analysis schemes on QSS have been proposed 2 20 such as circular QSSs 2 4 , dynamic QSSs 5 , 6 , single particle QSSs 7 9 , graph state QSSs 10 12 , verifiable QSSs 13 15 , and other QSSs that may be based on Calderbank–Shor–Steane codes 16 , or based on phase shift operation 17 19 , or based on quantum search algorithm 20 .…”
Section: Introductionmentioning
confidence: 99%
“…The attack is found with the probability 1 − ( 3 4 ) Ω . For Ω → ∞, the probability will converge to 1 [33].…”
Section: Intercept-and-resend Attackmentioning
confidence: 99%
“…Due to the advantages of CV quantum states, scholars have proposed a number of CV quantum communication protocols. For instance, CV quantum key distribution (CV-QKD) [21]- [23], CV quantum teleportation [24]- [27], CV quantum secret sharing [28]- [30], and CV quantum identity authentication [31] etc. The CV-AQS protocols [32], [33] are proposed, which show superior performance in terms of generation and detection over the DV-AQS.…”
Section: Introductionmentioning
confidence: 99%