2022
DOI: 10.1007/s10773-022-05009-w
|View full text |Cite
|
Sign up to set email alerts
|

Verifiable Multi-Dimensional (t,n) Threshold Quantum Secret Sharing Based on Quantum Walk

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
18
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
9

Relationship

0
9

Authors

Journals

citations
Cited by 34 publications
(21 citation statements)
references
References 34 publications
0
18
0
Order By: Relevance
“…A recent survey on Perfectly Secure Verifiable Secret-sharing is given in [ 6 ], where perfect means that computationally unbounded adversaries are tolerated. Using quantum cryptography, also a verifiable multi-dimensional threshold secret sharing scheme has been proposed [ 7 ]. However, this type of schemes are not very practical for the generation of a group key, due to the strict requirement of the need to combine all secrets at the same time.…”
Section: Related Workmentioning
confidence: 99%
“…A recent survey on Perfectly Secure Verifiable Secret-sharing is given in [ 6 ], where perfect means that computationally unbounded adversaries are tolerated. Using quantum cryptography, also a verifiable multi-dimensional threshold secret sharing scheme has been proposed [ 7 ]. However, this type of schemes are not very practical for the generation of a group key, due to the strict requirement of the need to combine all secrets at the same time.…”
Section: Related Workmentioning
confidence: 99%
“…A quantum walk algorithm can be implemented on many graph structures, and its function is very significant [7][8][9][10][11][12][13][14]. Also, quantum walks have important applications in quantum cryptography and quantum communication [15,16]. Noise research in the quantum walk algorithm is also one of the key points, and general quantum walk calculation based on the Bose-Hubbard model has been proposed [17,18].…”
Section: Introductionmentioning
confidence: 99%
“…Using the encoding method of quantum states mentioned in the study in reference [17], entanglement of quantum states in two lattices is generated by controlling the ratio of transition intensity and interaction between particles [27]. Controlling the ratio of model parameters to generate entanglement is easier than other methods [15,28]. The convolutional neural network decoder has been introduced in detail in the study mentioned in reference [29][30][31][32][33].…”
Section: Introductionmentioning
confidence: 99%
“…(1) reflecting the qubits with no disturbance ; (2) measuring the qubits with basis Z; (3) preparing the fresh qubits with basis Z; and (4) reordering the qubits via delay lines. Because the concept of "semi-quantum" requires less quantum power and resources and is easy to implement, it has received extensive attention, has been studied by an increasing number of scholars, and even extended to other directions such as semi-quantum distribution (SQKD) protocols [25][26][27][28][29][30][31][32][33], semi-quantum secret sharing (SQSS) protocols [34][35][36][37], semi-quantum private comparison (SQPC) protocols [38][39][40][41], etc. In 2009, Zou et al [25] put forward five SQKD protocols based on three quantum states, two quantum states, and one quantum state, and strong proofs are given.…”
mentioning
confidence: 99%