Results 11 to 20 of about 1,065 (175)

Rational quantum secret sharing. [PDF]

open access: yesSci Rep, 2018
AbstractThe traditional quantum secret sharing does not succeed in the presence of rational participants. A rational participant’s motivation is to maximize his utility, and will try to get the secret alone. Therefore, in the reconstruction, no rational participant will send his share to others.
Qin H, Tang WKS, Tso R.
europepmc   +5 more sources

Standard (3, 5)-threshold quantum secret sharing by maximally entangled 6-qubit states [PDF]

open access: yesScientific Reports, 2021
In this paper, a standard (3, 5)-threshold quantum secret sharing scheme is presented, in which any three of five participants can resume cooperatively the classical secret from the dealer, but one or two shares contain absolutely no information about ...
Yinxiang Long, Cai Zhang, Zhiwei Sun
doaj   +2 more sources

Implementing Quantum Secret Sharing on Current Hardware [PDF]

open access: yesEntropy
Quantum secret sharing is a cryptographic scheme that enables the secure storage and reconstruction of quantum information. While the theory of secret sharing is mature in its development, relatively few studies have explored the performance of quantum ...
Jay Graves, Mike Nelson, Eric Chitambar
doaj   +2 more sources

Enhanced quantum secret sharing protocol for anonymous secure communication utilizing W states [PDF]

open access: yesiScience
Summary: Quantum secret sharing (QSS) represents the fusion of quantum mechanics principles with secret information sharing, allowing a sender to distribute a secret among receivers for collective recovery.
Guo-Dong Li   +5 more
doaj   +2 more sources

Improving security of efficient multiparty quantum secret sharing based on a novel structure and single qubits [PDF]

open access: yesScientific Reports
Quantum secret sharing is a basic quantum cryptographic primitive, which has a lot of applications in information security and privacy preservation. An efficient multiparty quantum secret sharing protocol (Kuo et al. in EPJ Quantum Technol 10(1):29, 2023)
Xiao-Qiu Cai   +3 more
doaj   +2 more sources

Cryptanalysis of efficient controlled semi-quantum secret sharing protocol with entangled state [PDF]

open access: yesScientific Reports
Quantum secret sharing is a basic quantum cryptographic primitive, which plays an important role in robust key management and secure multiparty computation etc.
Shuang Li   +4 more
doaj   +2 more sources

Multiparty weighted threshold quantum secret sharing based on the Chinese remainder theorem to share quantum information [PDF]

open access: yesScientific Reports, 2021
Secret sharing is a widely-used security protocol and cryptographic primitive in which all people cooperate to restore encrypted information. The characteristics of a quantum field guarantee the security of information; therefore, many researchers are ...
Yao-Hsin Chou   +3 more
doaj   +2 more sources

Authenticable quantum secret sharing based on special entangled state [PDF]

open access: yesScientific Reports
In this paper, a pair of quantum states are constructed based on an orthogonal array and further generalized to multi-body quantum systems. Subsequently, a novel physical process is designed, which is aimed at effectively masking quantum states within ...
Chen-Ming Bai, Ya-Xi Shu, Sujuan Zhang
doaj   +2 more sources

Detector-device-independent quantum secret sharing with source flaws [PDF]

open access: yesScientific Reports, 2018
Measurement-device-independent entanglement witness (MDI-EW) plays an important role for detecting entanglement with untrusted measurement device. We present a double blinding-attack on a quantum secret sharing (QSS) protocol based on GHZ state.
Xiuqing Yang   +6 more
doaj   +2 more sources

An Efficient and Secure Semi-Quantum Secret Sharing Scheme Based on W State Sharing of Specific Bits [PDF]

open access: yesEntropy
This paper presents a semi-quantum secret sharing (SQSS) protocol based on three-particle W states, designed for efficient and secure secret sharing in quantum-resource-constrained scenarios. In the protocol, a fully quantum-capable sender encodes binary
Kai Xing, Rongbo Lu, Sihai Liu, Lu Lan
doaj   +2 more sources

Home - About - Disclaimer - Privacy