Results 1 to 10 of about 1,065 (175)
Differential Phase Shift Quantum Secret Sharing Using a Twin Field with Asymmetric Source Intensities [PDF]
As an essential application of quantum mechanics in classical cryptography, quantum secret sharing has become an indispensable component of quantum internet. Recently, a differential phase shift quantum secret sharing protocol using a twin field has been
Zhao-Ying Jia +4 more
doaj +2 more sources
A Semi-Quantum Secret-Sharing Protocol with a High Channel Capacity [PDF]
Semi-quantum cryptography communication stipulates that the quantum user has complete quantum capabilities, and the classical user has limited quantum capabilities, only being able to perform the following operations: (1) measuring and preparing qubits ...
Yuan Tian +5 more
doaj +2 more sources
Enhanced (t, n) threshold d-level quantum secret sharing [PDF]
The quantum secret sharing is an essential and fundamental technique for sharing a secret with the all participants in quantum cryptography. It can be used to design many complex protocols such as secure multiparty summation, multiplication, sorting ...
Kartick Sutradhar, Hari Om
doaj +2 more sources
Advance Sharing of Quantum Shares for Classical Secrets
Secret sharing schemes for classical secrets can be classified into classical secret sharing schemes and quantum secret sharing schemes. Classical secret sharing has been known to be able to distribute some shares before a given secret. On the other hand,
Rina Miyajima, Ryutaroh Matsumoto
doaj +3 more sources
An Efficient Quantum Secret Sharing Scheme Based on Restricted Threshold Access Structure [PDF]
Quantum secret sharing is an important branch of quantum cryptography, and secure multi-party quantum key distribution protocols can be constructed using quantum secret sharing.
Lei Li, Zhi Li
doaj +2 more sources
Security of a kind of quantum secret sharing with entangled states [PDF]
We present a new collusion attack to a kind of quantum secret sharing schemes with entangled states. Using this attack, an unauthorized set of agents can gain access to the shared secret without the others’ cooperation.
Tian-Yin Wang +4 more
doaj +2 more sources
A (t, n) threshold protocol of semi-quantum secret sharing based on single particles
Semi-quantum secret sharing is an important research issue in quantum cryptography. In this paper, we propose a (t, n) threshold semi-quantum secret sharing protocol, which combines the practicality of semi-quantum secret sharing protocols and the ...
Ziyi Zhou +5 more
doaj +1 more source
Lattice-based Threshold Secret Sharing Algorithm [PDF]
The secret sharing algorithm based on the traditional mathematical assumption is difficult to resist the attack of the quantum algorithm.Therefore,a lattice-based threshold secret sharing algorithm is proposed.The basic process of the secret sharing ...
ZHANG Hongjun,LIU Ke,MOU Zhansheng
doaj +1 more source
Code-routing: a new attack on position verification [PDF]
The cryptographic task of position verification attempts to verify one party's location in spacetime by exploiting constraints on quantum information and relativistic causality.
Joy Cree, Alex May
doaj +1 more source
Quantum cryptographic resource distillation and entanglement
We look into multipartite quantum states on which quantum cryptographic protocols including quantum key distribution and quantum secret sharing can be perfectly performed, and define the quantum cryptographic resource distillable rate as the asymptotic ...
Minjin Choi, Soojoon Lee
doaj +1 more source

