2017
DOI: 10.1007/s10773-017-3574-5
|View full text |Cite
|
Sign up to set email alerts
|

Quantum-Secret-Sharing Scheme Based on Local Distinguishability of Orthogonal Seven-Qudit Entangled States

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
9
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 15 publications
(9 citation statements)
references
References 26 publications
0
9
0
Order By: Relevance
“…There are many attack cases in QC [43]. Next, we will discuss the communication security of the proposed protocol in two cases.…”
Section: Security Analysismentioning
confidence: 99%
“…There are many attack cases in QC [43]. Next, we will discuss the communication security of the proposed protocol in two cases.…”
Section: Security Analysismentioning
confidence: 99%
“… In 2017, Wang 48 proposed the concept of judgment space to investigate the quantum secret sharing scheme based on local distinguishability, and developed a standard (3, 4)-threshold LOCC-QSS scheme and a standard (5, 6)-threshold LOCC-QSS scheme with three orthogonal 4-qudit (4-level) entangled states and three orthogonal 6-qudit (6-level) entangled states, respectively. Furthermore, Liu 49 proposed a standard (6, 7)-threshold LOCC-QSS scheme with five orthogonal 7-qudit (7-level). In 2020, Dou 50 followed the work of Wang 48 and investigate the judgement space deeply.…”
Section: Introductionmentioning
confidence: 99%
“…Compared with classical cryptography on the basis of computational complexity, quantum cryptography based on the laws of quantum physics can achieve unconditional security. Many branches of quantum cryptography have been developed, such as quantum key distribution(QKD) [1,2], quantum key agreement(QKA) [3][4][5], quantum secure direct communication(QSDC) [6,7], quantum teleportation [8,9], quantum signature [10,11], quantum authentication [12][13][14], quantum secret sharing(QSS) [15][16][17][18][19][20][21][22][23][24][25][26][27][28][29][30] and so on.…”
Section: Introductionmentioning
confidence: 99%
“…Only the participants in authorized sets can recover the secret, and the participants in unauthorized sets can not recover the secret. Since Hillery et al [15] proposed the first quantum secret ⋆ lizhihui@snnu.edu.cn sharing scheme by using GHZ state in 1999, a growing number of QSS schemes [16][17][18][19][20][21][22][23][24][25][26][27][28][29][30] have been proposed. For example, Williams et al [22] described and experimentally demonstrated a three-party quantum secret sharing protocol using polarization-entangled photon pairs.…”
Section: Introductionmentioning
confidence: 99%