2013
DOI: 10.1007/s11128-013-0534-8
|View full text |Cite
|
Sign up to set email alerts
|

Secret sharing based on quantum Fourier transform

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
60
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 42 publications
(61 citation statements)
references
References 19 publications
0
60
0
Order By: Relevance
“…The number of the transmitted particles of the proposed QSS is t  − 1, and that of ref. 7 is n  − 1. If t  =  n , the communication cost of the proposed QSS, that of ref.…”
Section: Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…The number of the transmitted particles of the proposed QSS is t  − 1, and that of ref. 7 is n  − 1. If t  =  n , the communication cost of the proposed QSS, that of ref.…”
Section: Resultsmentioning
confidence: 99%
“… 1 in 1999, based on Greenberger-Home-Zeilinger(GHZ) state. Since then, many design and analysis schemes on QSS have been proposed 2 20 such as circular QSSs 2 4 , dynamic QSSs 5 , 6 , single particle QSSs 7 9 , graph state QSSs 10 12 , verifiable QSSs 13 15 , and other QSSs that may be based on Calderbank–Shor–Steane codes 16 , or based on phase shift operation 17 19 , or based on quantum search algorithm 20 .…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…In their scheme, an X-basis measurement and classical communication are used to distinguish two orthogonal states and reconstruct the original secret. Some d-level schemes [18,33] were proposed based on Quantum Fourier Transform. The scheme in [18] disguises each share of a secret with true randomness, rather than classical pseudo randomness.…”
Section: Comparisons and Discussionmentioning
confidence: 99%
“…The value of the bits (b13.b15) for Delay in Trans attack type of node X is the fine paid by the node and if this fine is above a threshold value the node X is removed from the network. 4. Similarly, if X forwarding rate is optimal then the b12 bit is zero and X need not pay any fine for delay in trans attack type.…”
Section: Detect the Compromised Nodesmentioning
confidence: 99%