2005
DOI: 10.1103/physreva.71.012314
|View full text |Cite
|
Sign up to set email alerts
|

Threshold quantum cryptography

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
36
0

Year Published

2006
2006
2024
2024

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 32 publications
(36 citation statements)
references
References 7 publications
0
36
0
Order By: Relevance
“…The t-outof-n quantum cash threshold protocol proposed by Tokunaga et al [10] is not secure. With the help of the attack schemes proposed in Ref.…”
Section: Introductionmentioning
confidence: 99%
See 3 more Smart Citations
“…The t-outof-n quantum cash threshold protocol proposed by Tokunaga et al [10] is not secure. With the help of the attack schemes proposed in Ref.…”
Section: Introductionmentioning
confidence: 99%
“…[8,9], the first participant P 1 , called a center in Ref. [10], can completely eavesdrop t − 1 secret inputs kept by t − 1 other participants in a issuing phase one by one, and then reconstructs the copies of quantum cash that can pass the checking phase.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…The basic idea of secret sharing in the simplest case is that a secret of one person, say Alice, is shared between other two persons, say Bob and Charlie, in such a way that it can only be reconstructed if both collaborate. In a more general case, notably for secure key management, a t-out-of-n protocol (or (t, n)-threshold scheme) with 1 ≤ t ≤ n spreads a secret to n participants in a way that any t participants can reconstruct it [12]. Lance et al have reported an experimental demonstration of a (2,3) threshold quantum secret sharing scheme [13].…”
Section: Introductionmentioning
confidence: 99%