2021
DOI: 10.1109/access.2021.3055943
|View full text |Cite
|
Sign up to set email alerts
|

Dynamic Multiparty Quantum Secret Sharing With a Trusted Party Based on Generalized GHZ State

Abstract: This paper proposes a dynamic multiparty to multiparty quantum secret sharing scheme, where two distant groups of participants can share the common secrets. In our present scheme, a trusted third party is required to reliably prepare all quantum resources. Each agent only needs to perform the local unitary operations or single-particle measurement completing the process of secret sharing. Secret can be recovered only if all agents cooperate each other. Furthermore, a new agent can be added or deleted from the … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
4
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
9

Relationship

0
9

Authors

Journals

citations
Cited by 18 publications
(8 citation statements)
references
References 42 publications
0
4
0
Order By: Relevance
“…Due to its greatest significance, key agreement protocols have been employed to generate encryption keys in today's IT applications such as IoT applications [1], healthcare systems [2], vehicular communications [3], smart networks [4], satellite communications [5], cloud applications [6], and others. To resist quantum attacks, several security protocols have been proposed based on the principles of quantum physics for addressing various security problems [7][8][9][10][11][12][13][14][15][16][17][18][19][20][21][22][23][24][25][26].…”
Section: Introductionmentioning
confidence: 99%
“…Due to its greatest significance, key agreement protocols have been employed to generate encryption keys in today's IT applications such as IoT applications [1], healthcare systems [2], vehicular communications [3], smart networks [4], satellite communications [5], cloud applications [6], and others. To resist quantum attacks, several security protocols have been proposed based on the principles of quantum physics for addressing various security problems [7][8][9][10][11][12][13][14][15][16][17][18][19][20][21][22][23][24][25][26].…”
Section: Introductionmentioning
confidence: 99%
“…It has been demonstrated that higher levels of encoding can carry more information during each transaction which can speed up the time taken to transmit photon, as stated in [21].…”
Section: Results and Findingsmentioning
confidence: 99%
“…She then transmits the intercepted qubits to Bob's side via an ideal channel she has created. Eve may be able to blend her attacks into the quantum channels' background noise by using this strategy [39].…”
Section: B Noise Tolerancementioning
confidence: 99%
“…This is followed by the 3-d, which transfers 3 qubits at once, 262.8 seconds, and the 2-d, which transfers only 2 qubits at once, has the slowest photon transmission rate, 471.6 seconds. It has been demonstrated that higher levels of encoding can carry more information during each transaction which can speed up the time taken to transmit photons, as stated in[39].…”
mentioning
confidence: 99%