2006
DOI: 10.1103/physreva.73.016301
|View full text |Cite
|
Sign up to set email alerts
|

Comment on “Quantum secret sharing between multiparty and multiparty without entanglement”

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
16
0

Year Published

2007
2007
2023
2023

Publication Types

Select...
6

Relationship

1
5

Authors

Journals

citations
Cited by 28 publications
(16 citation statements)
references
References 1 publication
0
16
0
Order By: Relevance
“…Alice i 0 generates nN EPR pairs in the state secret message by cheating without the detection of other parties, which is the same as Alice m using the attack with EPR pairs in ref. [2]. However, all the weaknesses above can be avoided by the following improved QSS protocol.…”
Section: Review Of the Original Qss Protocol Between Multiparty And Mmentioning
confidence: 95%
See 3 more Smart Citations
“…Alice i 0 generates nN EPR pairs in the state secret message by cheating without the detection of other parties, which is the same as Alice m using the attack with EPR pairs in ref. [2]. However, all the weaknesses above can be avoided by the following improved QSS protocol.…”
Section: Review Of the Original Qss Protocol Between Multiparty And Mmentioning
confidence: 95%
“…The security of this present QSS protocol against the attacks in refs. [2,4] is discussed as follows.…”
Section: Securitymentioning
confidence: 99%
See 2 more Smart Citations
“…Most of people focused on the presentation of new QSS protocols. Also a small part of people [21][22][23][24][25][26][27][28][29][30] focused on that the securities of some previous QSS protocols are reexamined and the security leaks are pointed out. Indeed, the latter is also a studying point on QSS.…”
Section: Introductionmentioning
confidence: 99%