Access the full text.
Sign up today, get DeepDyve free for 14 days.
Fuguo Deng, G. Long, Hong-Yu Zhou (2005)
An efficient quantum secret sharing scheme with Einstein–Podolsky–Rosen pairsPhysics Letters A, 340
Fuguo Deng, Xihan Li, Hong-Yu Zhou (2006)
Efficient high-capacity quantum secret sharing with two-photon entanglementPhysics Letters A, 372
Li Xiao, G. Long, Fuguo Deng, Jian-Wei Pan (2004)
Efficient multiparty quantum-secret-sharing schemesPhysical Review A, 69
C. Crépeau, L. Salvail (1995)
Quantum Oblivious Mutual Identification
G. Guo, G. Guo (2002)
Quantum secret sharing without entanglementPhysics Letters A, 310
S. Wang, Song-Kong Chong, T. Hwang (2010)
On "multiparty quantum secret sharing with Bell states and Bell measurements"Optics Communications, 283
Tianyin Wang, Q. Wen, Xiubo Chen, F. Guo, F. Zhu (2008)
An efficient and secure multiparty quantum secret sharing scheme based on single photonsOptics Communications, 281
Chun-Wei Yang, Chia-Wei Tsai, T. Hwang (2012)
Thwarting intercept-and-resend attack on Zhang’s quantum secret sharing using collective rotation noisesQuantum Information Processing, 11
Liu Wei-Tao, Liang Lin-mei, Li Cheng-zu, Yuan Jian-min (2006)
Quantum Secret Sharing with Two-Particle Entangled StatesChinese Physics Letters, 23
Z. 朱, Y. 张, An-Min 付 (2011)
Efficient quantum secret sharing scheme with two-particle entangled statesChinese Physics B, 20
Fu-Guo Deng, Xihan Li, Hong-Yu Zhou, Zhanjun Zhang (2006)
Erratum: Improving the security of multiparty quantum secret sharing against Trojan horse attack [Phys. Rev. A 72, 044302 (2005)]Physical Review A, 73
Zhu Zhen-chao, Zhang Yu-qing (2010)
Cryptanalysis and Improvement of a Quantum Secret Sharing Protocol between Multiparty and Multiparty with Single Photons and Unitary TransformationsChinese Physics Letters, 27
L. Hsu (2003)
Quantum secret-sharing protocol based on Grover's algorithmPhysical Review A, 68
Jason Lin, T. Hwang (2013)
New circular quantum secret sharing for remote agentsQuantum Information Processing, 12
L. Hsu, Che Li (2005)
Quantum secret sharing using product statesPhysical Review A, 71
Zhenchao Zhu, Yuqing Zhang, Anmin Fu (2011)
Comment on “Reply to Comment on ‘Efficient High-Capacity Quantum Secret Sharing with Two-Photon Entanglement’ ”International Journal of Theoretical Physics, 50
Yongmin Li, Kuanshou Zhang, K. Peng (2004)
Multiparty secret sharing of quantum information based on entanglement swappingPhysics Letters A, 324
朱珍超, 朱珍超, 张玉清, 付安民 (2012)
Cryptanalysis and improvement of a quantum secret sharing scheme based on χ-type entangled statesChinese Physics B, 21
Jason Lin, T. Hwang (2011)
An enhancement on Shi et al.'s multiparty quantum secret sharing protocolOptics Communications, 284
林崧, 温巧燕, 刘晓芬 (2009)
Cryptanalysis and Improvement of Quantum Secret Sharing Protocol between Multiparty and Multiparty with Single Photons and Unitary Transformations, 26
Fuguo Deng, Hongyu Long (2006)
Circular quantum secret sharingJournal of Physics A, 39
Run-hua Shi, Liusheng Huang, Wei Yang, Hong Zhong (2010)
Quantum secret sharing between multiparty and multiparty with Bell states and Bell measurementsScience China Physics, Mechanics and Astronomy, 53
Zhan-jun Zhang, Yong Li, Z. Man (2004)
Multiparty quantum secret sharingPhysical Review A, 71
Lian-Fang Han, Yi-min Liu, Jun Liu, Zhan-Jun Zhang, Zhan-Jun Zhang (2004)
Multiparty quantum secret sharing of secure direct communication using single photonsOptics Communications, 281
Z.J. Zhang (2005)
Multiparty quantum secret sharing of secure direct communicationPhys. Lett. A, 342
B. Gu, L. Mu, L. Ding, C. Zhang, C. Li (2010)
Fault tolerant three-party quantum secret sharing against collective noiseOpt. Commun., 283
D. Gottesman (1999)
Theory of quantum secret sharingPhysical Review A, 61
Fuguo Deng, Xihan Li, Hong-Yu Zhou, Zhan-jun Zhang (2005)
Improving the security of multiparty quantum secret sharing against Trojan horse attackPhysical Review A, 72
C. Shannon (1949)
Communication theory of secrecy systemsBell Syst. Tech. J., 28
Jian Wang, Quan Zhang, Chaojing Tang (2005)
Efficient multiparty quantum secret sharing of secure direct communicationarXiv: Quantum Physics
M. Hillery, V. Bužek, A. Berthiaume (1998)
Quantum secret sharingPhysical Review A, 59
Ying Sun, Q. Wen, F. Gao, Xiubo Chen, F. Zhu (2009)
Multiparty quantum secret sharing based on Bell measurementOptics Communications, 282
Guihua Zeng, C. Keitel (2001)
Arbitrated quantum-signature schemePhysical Review A, 64
Gu Bin, Chuang Li, Xue Fei, Yu-Lin Chen (2009)
High-capacity three-party quantum secret sharing with superdense codingChinese Physics B, 18
P. Zhou, Xihan Li, Yu-Jie Liang, Fuguo Deng, Hong-Yu Zhou (2007)
Multiparty quantum secret sharing with pure entangled states and decoy photonsPhysica A-statistical Mechanics and Its Applications, 381
Z. Zhang, Z. Man (2004)
Multiparty quantum secret sharing of classical messages based on entanglement swappingPhysical Review A, 72
S. Wiesner (1983)
Conjugate codingSIGACT News, 15
S. Qin, F. Gao, Q. Wen, F. Zhu (2007)
Cryptanalysis of the Hillery-Buzek-Berthiaume quantum secret-sharing protocolPhysical Review A, 76
Zhan-jun Zhang, Gan Gao, Xin Wang, L. Han, Shou-hua Shi (2007)
Multiparty quantum secret sharing based on the improved Boström–Felbinger protocolOptics Communications, 269
(1984)
Quantum cryptography: public-key distribution and coin tossing
In a recent paper (Lin and Hwang in Quantum Inf Process, 2012. doi: 10.1007/s11128-012-0413-8 ), a new circular quantum secret sharing (QSS) protocol for remote agents was presented. The protocol is designed with entangling a Bell state and several single photons to form a multi-particle GHZ state. For each shared bit among n party, the qubit efficiency has reached 1/2n + 1 which is the best among the current circular QSS protocol. They claim that the protocol is more suitable for a remote agents’ environment as that the newly generated photons are powerful enough to reach to the next receiver. However, we show that the protocol is not secure as the first agent and the last agent in the protocol can illegally obtain all the secret messages without introducing any error.
Quantum Information Processing – Springer Journals
Published: Aug 10, 2012
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.