2021
DOI: 10.1007/s11128-021-03141-w
|View full text |Cite
|
Sign up to set email alerts
|

A stronger participant attack on the measurement-device-independent protocol for deterministic quantum secret sharing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 17 publications
(3 citation statements)
references
References 39 publications
0
3
0
Order By: Relevance
“…In 2015, Fu et al proposed the first three-party measurementdevice-independent (MDI) QSS protocol, which can resist all possible attacks from imperfect measurement devices and largely enhance QSS's security in practical experimental condition [52]. Subsequently, some interesting MDI-QSS and detector-device-independent (DDI) QSS protocols have been proposed [53][54][55][56][57][58][59][60]. In 2016, the MDI-QSS protocol using the continuous-variable (CV) GHZ state was proposed [53].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…In 2015, Fu et al proposed the first three-party measurementdevice-independent (MDI) QSS protocol, which can resist all possible attacks from imperfect measurement devices and largely enhance QSS's security in practical experimental condition [52]. Subsequently, some interesting MDI-QSS and detector-device-independent (DDI) QSS protocols have been proposed [53][54][55][56][57][58][59][60]. In 2016, the MDI-QSS protocol using the continuous-variable (CV) GHZ state was proposed [53].…”
Section: Introductionmentioning
confidence: 99%
“…In 2019, Wang et al proposed the MDI-QSS protocol based on CV four-mode cluster states [54]. Recently, researchers proposed the deterministic MDI and DDI QSS protocols, where the sender can distribute the deterministic keys to the receivers [56][57][58][59]. For example, in 2020, Gao et al put forward a deterministic MDI-QSS protocol, which exploits post-selected GHZ states to establish exclusive correlations among a sender and receivers without any basis reconciliation [56].…”
Section: Introductionmentioning
confidence: 99%
“…The GHZ-state analyzer in David's node [49][50][51], in principle, performs a teleportation operation and correlates the states of photons kept in Alice's node to that prepared by the receivers. The receivers check the security of DMDI-QSS before information encoding; and some of receivers can cheat one receiver by a particular strategy [52][53][54]. Therefore, it requires at least two faithful receivers to guarantee the security of DMDI-QSS against the participant attack [48].…”
Section: Introductionmentioning
confidence: 99%