2020
DOI: 10.1109/tcsii.2020.2989447
|View full text |Cite
|
Sign up to set email alerts
|

A Generalized Quantum Protocol for Secure Multiparty Summation

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
17
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
7
1

Relationship

2
6

Authors

Journals

citations
Cited by 30 publications
(22 citation statements)
references
References 17 publications
0
17
0
Order By: Relevance
“…In 2020, Sutradhar [34] cooperated with Om to present a generalized QSMS protocol, which needs to use entangled state and multiple quantum operations: QFT, SUM operation, and Pauli operation. Later, Cai et al [35] pointed out that this protocol has a security vulnerability due to the lack of eavesdropping detection during particle transmission.…”
Section: Comparisons and Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…In 2020, Sutradhar [34] cooperated with Om to present a generalized QSMS protocol, which needs to use entangled state and multiple quantum operations: QFT, SUM operation, and Pauli operation. Later, Cai et al [35] pointed out that this protocol has a security vulnerability due to the lack of eavesdropping detection during particle transmission.…”
Section: Comparisons and Discussionmentioning
confidence: 99%
“…Liu and Ma [18] Li et al [19] Sutradhar and Om [34] Zhang et al [32] Yi et al [33] Li et al [23] Ours -: not involving this feature or attack method.…”
Section: Protocolsmentioning
confidence: 98%
“…For details on secret sharing schemes we refer to Gopalakrishnan and Stinson, 4 Beimel 5 Koukouvinos et al 6 Changyuan, 7 Cramer et al 8 Huaixi et al 9 and Stinson and Wei, 10 among others. The proposed protocol can also be used to build the quantum protocols, see Sutradhar and Om 11‐19 …”
Section: Introductionmentioning
confidence: 99%
“…The dealer distributes the shares of a secret among n participants. When the dealer requires to retrieve the original secret, the t (threshold) number of participants will work together to retrieve it 8 11 . The quantum secret sharing can be used in various applications 12 20 , namely, secure multiparty summation 21 , 22 , multiplication 23 , comparison, sorting, voting, etc., as it preserves the secret from getting lost, damaged, or changed 24 26 .…”
Section: Introductionmentioning
confidence: 99%