Access the full text.
Sign up today, get DeepDyve free for 14 days.
Kun-Fei Yu, Chun-Wei Yang, Ci-Hong Liao, T. Hwang (2014)
Authenticated semi-quantum key distribution protocol using Bell statesQuantum Information Processing, 13
Fuguo Deng, G. Long, Hong-Yu Zhou (2005)
An efficient quantum secret sharing scheme with Einstein–Podolsky–Rosen pairsPhysics Letters A, 340
Xiangfu Zou, Daowen Qiu, Lvzhou Li, Lihua Wu, Lvjun Li (2009)
Semiquantum-key distribution using less than four quantum statesPhysical Review A, 79
Fuguo Deng, Xihan Li, Hong-Yu Zhou (2006)
Efficient high-capacity quantum secret sharing with two-photon entanglementPhysics Letters A, 372
Yuguang Yang, Shang Gao, Dan Li, Yihua Zhou, Wei-Min shi (2019)
Three-party quantum secret sharing against collective noiseQuantum Information Processing, 18
Q. Cai (2005)
Eavesdropping on the two-way quantum communication protocols with invisible photonsPhysics Letters A, 351
G. Guo, G. Guo (2002)
Quantum secret sharing without entanglementPhysics Letters A, 310
Xian-Zhou Zhang, Wei-Gui Gong, Yong-Gang Tan, Zhen-Zhong Ren, Xiao-Tian Guo (2009)
Quantum key distribution series network protocol with M-classical BobsChinese Physics B, 18
S. Wang, Song-Kong Chong, T. Hwang (2010)
On "multiparty quantum secret sharing with Bell states and Bell measurements"Optics Communications, 283
Jian Wang, S. Zhang, Quan Zhang, Chaojing Tang (2011)
SEMIQUANTUM SECRET SHARING USING TWO-PARTICLE ENTANGLED STATEInternational Journal of Quantum Information, 10
Michel Boyer, D. Kenigsberg, T. Mor (2007)
Quantum Key Distribution with Classical Bob2007 First International Conference on Quantum, Nano, and Micro Technologies (ICQNM'07)
Jian Wang, S. Zhang, Quan Zhang, Chaojing Tang (2011)
Semiquantum Key Distribution Using Entangled StatesChinese Physics Letters, 28
Fuguo Deng, P. Zhou, Xihan Li, Chun-Yan Li, Hong-Yu Zhou (2005)
Robustness of two-way quantum communication protocols against Trojan horse attackarXiv: Quantum Physics
Xihan Li, Fuguo Deng, Hong-Yu Zhou (2006)
Improving the security of secure direct communication based on the secret transmitting order of particlesPhysical Review A, 74
D. Deutsch, A. Ekert, R. Jozsa, C. Macchiavello, S. Popescu, A. Sanpera (1996)
Quantum Privacy Amplification and the Security of Quantum Cryptography over Noisy Channels.Physical review letters, 77 13
L. Hsu, Che Li (2005)
Quantum secret sharing using product statesPhysical Review A, 71
Chun-Wei Yang, T. Hwang (2013)
EFFICIENT KEY CONSTRUCTION ON SEMI-QUANTUM SECRET SHARING PROTOCOLSInternational Journal of Quantum Information, 11
Yongmin Li, Kuanshou Zhang, K. Peng (2004)
Multiparty secret sharing of quantum information based on entanglement swappingPhysics Letters A, 324
M Boyer, D Kenigsberg, T Mor (2007)
Quantum key distribution with classical BobPhys. Rev. Lett., 99
Jason Lin, T. Hwang (2011)
An enhancement on Shi et al.'s multiparty quantum secret sharing protocolOptics Communications, 284
Shih-Min Hung, Sheng-Liang Hwang, T. Hwang, Shih-Hung Kao (2017)
Multiparty quantum private comparison with almost dishonest third parties for strangersQuantum Information Processing, 16
T. Hwang, C. Hwang, Chuan-Ming Li (2011)
Multiparty quantum secret sharing based on GHZ statesPhysica Scripta, 83
Chia-Wei Tsai, T. Hwang (2011)
Entanglement swapping of a GHZ state via a GHZ-like statePhysica Scripta, 84
Chun-Wei Yang, T. Hwang (2012)
Improved QSDC Protocol over a Collective-Dephasing Noise ChannelInternational Journal of Theoretical Physics, 51
B Gu, LL Mu, LG Ding, CY Zhang, CQ Li (2010)
Fault tolerant three-party quantum secret sharing against collective noiseOpt. Commun., 283
Lvzhou Li, Daowen Qiu, P. Mateus (2013)
Quantum secret sharing with classical BobsJournal of Physics A: Mathematical and Theoretical, 46
Chun-Wei Yang, T. Hwang (2013)
Quantum dialogue protocols immune to collective noiseQuantum Information Processing, 12
Fuguo Deng, Xihan Li, Hong-Yu Zhou, Zhan-jun Zhang (2005)
Improving the security of multiparty quantum secret sharing against Trojan horse attackPhysical Review A, 72
M. Hillery, V. Bužek, A. Berthiaume (1998)
Quantum secret sharingPhysical Review A, 59
Chun-Wei Yang, T. Hwang, Yi-Ping Luo (2013)
Enhancement on “quantum blind signature based on two-state vector formalism”Quantum Information Processing, 12
Ying Sun, Q. Wen, F. Gao, Xiubo Chen, F. Zhu (2009)
Multiparty quantum secret sharing based on Bell measurementOptics Communications, 282
Chia-Wei Tsai, T. Hwang (2010)
Teleportation of a Pure EPR State via GHZ-like StateInternational Journal of Theoretical Physics, 49
CR Hsieh (2010)
1019Commun. Theor. Phys., 54
Chen Xie, Lvzhou Li, Daowen Qiu (2015)
A Novel Semi-Quantum Secret Sharing Scheme of Specific BitsInternational Journal of Theoretical Physics, 54
Qin Li, Qin Li, Qin Li, W. Chan, Dongyang Long (2009)
Semiquantum secret sharing using entangled statesPhysical Review A, 82
Kan Yang, Liusheng Huang, Wei Yang, F. Song (2009)
Quantum Teleportation via GHZ-like StateInternational Journal of Theoretical Physics, 48
谢朝任, 蔡家纬, 黄宗立 (2010)
Quantum Secret Sharing Using GHZ-Like State
Gu Bin, Chuang Li, Xue Fei, Yu-Lin Chen (2009)
High-capacity three-party quantum secret sharing with superdense codingChinese Physics B, 18
Z. Zhang, Z. Man (2004)
Multiparty quantum secret sharing of classical messages based on entanglement swappingPhysical Review A, 72
B Gu (2010)
3099Opt. Commun., 283
M Boyer, R Gelles, D Kenigsberg, T Mor (2009)
Semiquantum key distributionPhys. Rev. A, 79
RH Shi (2010)
2476Opt. Commun., 283
(1984)
Quantum cryptography: public key distribution and coin tossing
This paper proposes a multi-party semi-quantum secret sharing (MSQSS) protocol which allows a quantum party (manager) to share a secret among several classical parties (agents) based on GHZ-like states. By utilizing the special properties of GHZ-like states, the proposed scheme can easily detect outside eavesdropping attacks and has the highest qubit efficiency among the existing MSQSS protocols. Then, we illustrate an efficient way to convert the proposed MSQSS protocol into a multi-party semi-quantum key distribution (MSQKD) protocol. The proposed approach is even useful to convert all the existing measure–resend type of semi-quantum secret sharing protocols into semi-quantum key distribution protocols.
Quantum Information Processing – Springer Journals
Published: Jul 1, 2017
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.