2021
DOI: 10.1007/s11128-021-03343-2
|View full text |Cite
|
Sign up to set email alerts
|

Cheating identifiable (k, n) threshold quantum secret sharing scheme

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
8
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 13 publications
(8 citation statements)
references
References 32 publications
0
8
0
Order By: Relevance
“…The schemes [18][19][20][21] are all (t, n) threshold QSS schemes that cannot verify the correctness of the recovered secret. Our scheme and the schemes [27][28][29][30][31] are verifiable (t, n) threshold QSS schemes in which the participants can verify the correctness of the recovered secret.…”
Section: Comparisonmentioning
confidence: 99%
See 1 more Smart Citation
“…The schemes [18][19][20][21] are all (t, n) threshold QSS schemes that cannot verify the correctness of the recovered secret. Our scheme and the schemes [27][28][29][30][31] are verifiable (t, n) threshold QSS schemes in which the participants can verify the correctness of the recovered secret.…”
Section: Comparisonmentioning
confidence: 99%
“…After that, many QSS schemes were proposed. Such as (n, n) threshold QSS schemes [12][13][14], (t, n) threshold QSS schemes [15][16][17][18][19][20], multiparty-to-multiparty QSS schemes [21,22], access structure-based QSS schemes [23,24] and dynamic QSS schemes [25,26]. In (n, n) threshold QSS schemes all participants must cooperate together to recover the secret.…”
Section: Introductionmentioning
confidence: 99%
“…In addition to the nonlocality detection of a bipartite state, the researchers have extended to the more complex cases, such as more measurements per party [19], sequential measurements [20], multi measurement outcomes [21] and increasing number of parties [22,23], where the increasing number of parties can form different types of quantum networks. Therefore, the topic of network quantum nonlocal correlations are focused on increasingly as the development of the research [24][25][26][27][28][29][30][31][32][33][34][35]. Definitions and inequality criteria of the nonlocal correlations in various quantum networks have been proposed, such as entanglement-swapping networks [24,25], chain networks [26,27], star networks [28,29], triangle networks [30][31][32], tree-shaped networks [33][34][35] and arbitrary acyclic networks [36][37][38].…”
Section: Introductionmentioning
confidence: 99%
“…Therefore, the topic of network quantum nonlocal correlations are focused on increasingly as the development of the research [24][25][26][27][28][29][30][31][32][33][34][35]. Definitions and inequality criteria of the nonlocal correlations in various quantum networks have been proposed, such as entanglement-swapping networks [24,25], chain networks [26,27], star networks [28,29], triangle networks [30][31][32], tree-shaped networks [33][34][35] and arbitrary acyclic networks [36][37][38]. It is well-known that network nonlocality correlations can always be detected if all independent sources of the network are entangled pure bipartite states whatever the scale of the network is.…”
Section: Introductionmentioning
confidence: 99%
“…In 2011, Tseng et al [14] proposed a QSS protocol based on a quantum search algorithm. To address the problem of not being able to check the honesty of participants during the secret recovery process (i.e., dishonest participants will provide false shares in the secret reconstruction phase to steal the secret or make the secret not recovered correctly), verifiable threshold quantum secret sharing (VTQSS) schemes [15][16][17][18][19][20][21][22][23][24] are considered. Verifiability prevents dealer from sharing incorrect shares and forces participants to submit their shares correctly.…”
Section: Introductionmentioning
confidence: 99%