Access the full text.
Sign up today, get DeepDyve free for 14 days.
Y. Sun, Q.Y. Wen, F.C. Zhu (2010)
Improving the multiparty quantum secret sharing over two collective-noise channels against insider attackOpt. Commun., 283
S.J. Qin, F. Gao, Q.Y. Wen, F.C. Zhu (2008)
A special attack on the multiparty quantum secret sharing of secure direct communication using single photonsOpt. Commun., 281
S. Lin, Q.Y. Wen, X.F. Liu (2009)
Cryptanalysis and improvement of quantum secret sharing protocol between multiparty and multiparty with single photons and unitary transformationsChin. Phys. Lett., 26
R. Cleve, D. Gottesman, H.-K. Lo (1999)
How to share a quantum secretPhys. Rev. Lett., 83
S. Lin, Q.Y. Wen, S.J. Qin, F.C. Zhu (2009)
Multiparty quantum secret sharing with collective eavesdropping-checkOpt. Commun., 282
L. Xiao, G.L. Long, F.G. Deng, J.W. Pan (2004)
Efficient multiparty quantum-secret-sharing schemesPhys. Rev. A, 69
Z.J. Zhang, Y. Li, Z.X. Man (2005)
Multiparty quantum secret sharingPhys. Rev. A, 71
F.G. Deng, H.Y. Zhou, G.L. Long (2005)
Bidirectional quantum secret sharing and secret splitting with polarized single photonsPhys. Lett. A, 337
H.F. Chau (2002)
Practical scheme to share a secret key through a quantum channel with a 27.6% bit error ratePhys. Rev. A, 66
T.Y. Wang, Q.Y. Wen, X.B. Chen, F.Z. Guo, F.C. Zhu (2008)
An efficient and secure multiparty quantum secret sharing scheme based on single photonsOpt. Commun., 281
F.Z. Guo, S.J. Qin, F. Gao, S. Lin, Q.Y. Wen, F.C. Zhu (2010)
Participant attack on a kind of MQSS schemes based on entanglement swappingEur. Phys. J. D, 56
L.Y. Hsu (2003)
Quantum secret-sharing protocol based on Grover’s algorithmPhys. Rev. A, 68
J. Song, S. Zhang (2006)
Secure quantum secret sharing based on reusable GHZ states as secure carriersChin. Phys. Lett., 23
M. Nielsen, I. Chuang (2000)
Quantum Computation and Quantum Information
S. Lin, Q.Y. Wen, F. Gao, F.C. Zhu (2008)
Improving the security of multiparty quantum secret sharing based on the improved Bostrom-Felbinger protocolOpt. Commun., 281
Y. Lin, T. Wu (1999)
(t,n) Threshold verifiable multi secret sharing scheme based on factorization intractability and discrete logarithm modulo a composite problemsIEEE Proc. Comput. Digit. Tech., 146
F.G. Deng, X.H. Li (2006)
Multiparty quantum secret splitting and quantum state sharingPhys. Lett. A, 354
F.G. Deng, X.H. Li, H.Y. Zhou, Z.J. Zhang (2005)
Improving the security of multiparty quantum secret sharing against Trojan horse attackPhys. Rev. A, 72
A. Shamir (1979)
How to share a secretCommun. ACM, 22
S.J. Qin, F. Gao, Q.Y. Wen, F.C. Zhu (2006)
Improving the security of multiparty quantum secret sharing against an attack with a fake signalPhys. Lett. A, 357
A.M. Lance, T. Symul, W.P. Bowen, B.C. Sanders, P.K. Lam (2004)
Tripartite quantum state sharingPhys. Rev. Lett., 92
Y.G. Yang, Q.Y. Wen (2009)
Threshold multiparty quantum-information splitting via quantum channel encryptionInt. J. Quantum Inf., 7
J. Benaloh, J. Leichter (1989)
Advances generalized sharing and monotone functionsLect. Notes Comput. Sci., 403
M. Stadler (1996)
Publicly Verifiable Secret Sharing EUROCRYPT96
G.P. Guo, G.C. Guo (2003)
Quantum secret sharing without entanglementPhys. Lett. A, 310
M. Hillery, V. Buzek, A. Berthiaume (1999)
Quantum secret sharingPhys. Rev. A, 59
D. Gottesman (2000)
Theory of quantum secret sharingPhys. Rev. A, 61
F.G. Deng, X.H. Li, H.Y. Zhou, Z.J. Zhang (2005)
Erratum: Improving the security of multiparty quantum secret sharing against Trojan horse attack [PhysRev. A, 72
Z.J. Zhang, Z.X. Man (2005)
Multiparty quantum secret sharing of classical messages based on entanglement swappingPhys. Rev. A, 72
S. Bandyopadhyay (2000)
Teleportation and secret sharing with pure entangled statesPhys. Rev. A, 62
Y. Sun, Q.Y. Wen, F. Gao, X.B. Chen, F.C. Zhu (2009)
Multiparty quantum secret sharing based on Bell measurementOpt. Commun., 282
A. Karlsson, M. Koashi, N. Imoto (1999)
Quantum entanglement for secret sharing and secret splittingPhys. Rev. A, 59
Y.-G. Yang, Q.-Y. Wen (2008)
Circular threshold quantum secret sharingChin. Phys. B, 17
Z.J. Zhang, Y.M. Liu, M. Fang, D. Wang (2007)
Multiparty quantum secret sharing scheme of classical messages by swapping qudit-state entanglementInt. J. Mod. Phys. C, 18
T.Y. Wang, Q.Y. Wen, F. Gao, S. Lin, F.C. Zhu (2008)
Cryptanalysis and improvement of multiparty quantum secret sharing schemesPhys. Lett. A, 373
Y.M. Li, K.S. Zhang, K.C. Peng (2004)
Multiparty secret sharing of quantum information based on entanglement swappingPhys. Lett. A, 324
Y.Q. Zhang, X.R. Jin, S. Zhang (2005)
Secret sharing of quantum information via entanglement swapping in cavity QEDPhys. Lett. A, 341
Q. Li, D.Y. Long, W.H. Chan, D.W. Qiu (2011)
Sharing a quantum secret without a trusted partyQuantum Inf. Process., 10
E. Knarnin, J. Greene, M. Hellman (1983)
On secret sharing systemsIEEE Trans. Inf. Theory, 29
C. Asmuth, J. Bloom (1983)
A modular approach to key safeguardingIEEE Trans. Inf. Theory, 29
Z.J. Zhang, J. Yang, Z.X. Man, Y. Li (2005)
Multiparty secret sharing of quantum information using and identifying Bell statesEur. Phys. J. D, 33
B.-K. Li, Y.-G. Yang, Q.-Y. Wen (2009)
Threshold quantum secret sharing of secure direct communicationChin. Phys. Lett., 26
Y. Sun, Q.Y. Wen, F.C. Zhu (2010)
Robust multiparty quantum secret sharing against participant forcible manipulationCommun. Theor. Phys., 54
M. Curty, D.J. Santos, E. Pérez, P. García-Fernández (2002)
Qubit authenticationPhys. Rev. A, 66
In a conventional quantum (k, n) threshold scheme, a trusted party shares a quantum secret with n agents such that any k or more agents can cooperate to recover the original secret, while fewer than k agents obtain no information about the secret. Is the reconstructed quantum secret same with the original one? Or is the dishonest agent willing to provide a true share during the secret reconstruction? In this paper we reexamine the security of quantum (k, n) threshold schemes and show how to construct a verifiable quantum (k, n) threshold scheme by combining a qubit authentication process. The novelty of ours is that it can provide a mechanism for checking whether the reconstructed quantum secret is same with the original one. This mechanism can also attain the goal of checking whether the dishonest agent provides a false quantum share during the secret reconstruction such that the secret quantum state cannot be recovered correctly.
Quantum Information Processing – Springer Journals
Published: Oct 30, 2011
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.