Results 21 to 30 of about 1,065 (175)

(t, n) Threshold d-Level Quantum Secret Sharing [PDF]

open access: yesScientific Reports, 2017
Most of Quantum Secret Sharing(QSS) are (n, n) threshold 2-level schemes, in which the 2-level secret cannot be reconstructed until all n shares are collected.
Xiu-Li Song   +3 more
doaj   +2 more sources

PQSF: post-quantum secure privacy-preserving federated learning [PDF]

open access: yesScientific Reports
In federated learning, secret sharing is a key technology to maintain the privacy of participants’ local models. Moreover, with the rapid development of quantum computers, existing federated learning privacy protection schemes based on secret sharing ...
Xia Zhang   +4 more
doaj   +2 more sources

Quantum Teleportation of Shared Quantum Secret [PDF]

open access: yesPhysical Review Letters, 2020
Quantum teleportation allows to transfer unknown quantum states between distant parties. It is not only a primitive of quantum communications but also an essential task in realization of the quantum networks for promising applications such as quantum cryptography and distributed quantum computation.
Sang Min Lee   +3 more
openaire   +3 more sources

Multiparty quantum secret sharing [PDF]

open access: yesPhysical Review A, 2005
Based on a quantum secure direct communication (QSDC) protocol [Phys. Rev. A69(04)052319], we propose a $(n,n)$-threshold scheme of multiparty quantum secret sharing of classical messages (QSSCM) using only single photons. We take advantage of this multiparty QSSCM scheme to establish a scheme of multiparty secret sharing of quantum information (SSQI),
Zhang, Zhan-jun   +2 more
openaire   +2 more sources

Quantum secret sharing [PDF]

open access: yesPhysical Review A, 1999
Secret sharing is a procedure for splitting a message into several parts so that no subset of parts is sufficient to read the message, but the entire set is. We show how this procedure can be implemented using GHZ states. In the quantum case the presence of an eavesdropper will introduce errors so that his presence can be detected. We also show how GHZ
Hillery, Mark   +2 more
openaire   +2 more sources

User privacy prevention model using supervised federated learning‐based block chain approach for internet of Medical Things

open access: yesCAAI Transactions on Intelligence Technology, EarlyView., 2023
Abstract This research focuses on addressing the privacy issues in healthcare advancement monitoring with the rapid establishment of the decentralised communication system in the Internet of Medical Things (IoMT). An integrated blockchain homomorphic encryption standard with an in‐build supervised learning‐based smart contract is designed to improvise ...
Chandramohan Dhasarathan   +7 more
wiley   +1 more source

Synonym‐based multi‐keyword ranked search with secure k‐NN in 6G network

open access: yesIET Networks, EarlyView., 2022
Abstract Sixth Generation (6G) integrates the next generation communication systems such as maritime, terrestrial, and aerial to offer robust network and massive device connectivity with ultra‐low latency requirement. The cutting edge technologies such as artificial intelligence, quantum machine learning, and millimetre enable hyper‐connectivity to ...
Deebak Bakkiam David, Fadi Al‐Turjman
wiley   +1 more source

Communication efficient quantum secret sharing [PDF]

open access: yesPhysical Review A, 2019
In the standard model of quantum secret sharing, typically, one is interested in minimal authorized sets for the reconstruction of the secret. In such a setting, reconstruction requires the communication of all the shares of the corresponding authorized set.
Senthoor, Kaushik   +1 more
openaire   +2 more sources

Secret Sharing of a Quantum State [PDF]

open access: yesPhysical Review Letters, 2016
13 pages, 9 ...
Lu, He   +9 more
openaire   +3 more sources

Experimental Single Qubit Quantum Secret Sharing [PDF]

open access: yesPhysical Review Letters, 2005
We present a simple and practical protocol for the solution of a secure multiparty communication task, the secret sharing, and its proof-of-principle experimental realization. In this protocol, a secret is split among several parties in a way that its reconstruction requires the collaboration of the participating parties.
Schmid, C.   +5 more
openaire   +3 more sources

Home - About - Disclaimer - Privacy