2023
DOI: 10.1007/s11128-023-03897-3
|View full text |Cite
|
Sign up to set email alerts
|

Memory-free quantum secret sharing protocol with collective detection

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 32 publications
0
3
0
Order By: Relevance
“…Quantum technology is developing rapidly, with an increasing number of quantum multi-party secret sharing protocols [9][10][11][12][13][14][15][16][17][18] based on QKD networks being proposed. These QSS protocols afford the secure and confidential sharing of a secret parameter among the validator nodes, which unrelated parties cannot access outside the list of validator nodes (LR).…”
Section: Quantum Secret Sharing (Qss) Protocolmentioning
confidence: 99%
See 1 more Smart Citation
“…Quantum technology is developing rapidly, with an increasing number of quantum multi-party secret sharing protocols [9][10][11][12][13][14][15][16][17][18] based on QKD networks being proposed. These QSS protocols afford the secure and confidential sharing of a secret parameter among the validator nodes, which unrelated parties cannot access outside the list of validator nodes (LR).…”
Section: Quantum Secret Sharing (Qss) Protocolmentioning
confidence: 99%
“…In each consensus cycle, the leader node uses the VDF to obtain a random number R. Each candidate node, i.e., validator nodes that have not been granted the bookkeeping right in a consensus round, utilizes the unique random number and its ID to calculate the hash value for competing for the bookkeeping right. The highest hash value holder is elected as the leader node, and the leader node's identity is shared secretly among the validator nodes through a quantum multi-party secret sharing protocol [9][10][11][12][13][14][15][16][17][18]. After the election of the new leader node LN+1, LN+1 starts taking over the transaction queue from LN, LN+1 packages transactions to generate the next block.…”
Section: Figure 2 Leader Node Campaign Schemamentioning
confidence: 99%
“…With the development of technology, quantum communication is attracting more and more scholars' attention due to its high security based on quantum mechanical properties. In the past few years, based on quantum entanglement, significant progress has been made in various fields of quantum communication, such as quantum key distribution [1,2], quantum teleportation [3][4][5], quantum remote state preparation [6,7], and quantum secret sharing [8,9].…”
Section: Introductionmentioning
confidence: 99%