Unconditional security of entanglement-based continuous-variable quantum secret sharing
The need for secrecy and security is essential in communication. Secret sharing is a
conventional protocol to distribute a secret message to a group of parties, who cannot …
conventional protocol to distribute a secret message to a group of parties, who cannot …
Quantum teleportation based on non-maximally entangled graph states
Y Ding, Y Wei, Z Li, M Jiang - Quantum Information Processing, 2023 - Springer
In recent years, the development of graph states has opened a bright prospect for the
generation of multipartite entangled states. However, due to the influences of noises in the …
generation of multipartite entangled states. However, due to the influences of noises in the …
Limited resource semiquantum secret sharing
The idea of semiquantum secret sharing (SQSS) is that quantum Alice wants to share secret
information with clients such as Bob and Charlie who have limited quantum capability …
information with clients such as Bob and Charlie who have limited quantum capability …
Verifiable threshold quantum secret sharing with sequential communication
A (t, n) threshold quantum secret sharing (QSS) is proposed based on a single d-level
quantum system. It enables the (t, n) threshold structure based on Shamir's secret sharing …
quantum system. It enables the (t, n) threshold structure based on Shamir's secret sharing …
Eavesdropping on semi-quantum secret sharing scheme of specific bits
A Yin, F Fu - International Journal of Theoretical Physics, 2016 - Springer
In a recent paper, Xie et al.(Int. Theor. Phys. 54, 3819–3824, 2015) proposed a semi-
quantum secret sharing scheme based on specific bits. In this paper, a simple attack strategy …
quantum secret sharing scheme based on specific bits. In this paper, a simple attack strategy …
Quantum Private Comparison Protocol Based on Continuous Variables
M Xiao, X Liu - International Journal of Theoretical Physics, 2023 - Springer
A new quantum private comparison protocol based on continuous-variable EPR entangled
state and entanglement swapping technique is proposed. This protocol can achieve the size …
state and entanglement swapping technique is proposed. This protocol can achieve the size …
Sequential quantum secret sharing in noisy environments
P Khakbiz, M Asoudeh - Quantum Information Processing, 2019 - Springer
Sequential quantum secret sharing (QSS) schemes do not use entangled states for secret
sharing, rather they rely on sequential operations of the players on a single state which is …
sharing, rather they rely on sequential operations of the players on a single state which is …
Quantum secure direct communication based on dense coding and detecting eavesdropping with four-particle genuine entangled state
J Li, Z Pan, F Sun, Y Chen, Z Wang, Z Shi - Entropy, 2015 - mdpi.com
A novel quantum secure direct communication protocol based on four-particle genuine
entangled state and quantum dense coding is proposed. In this protocol, the four-particle …
entangled state and quantum dense coding is proposed. In this protocol, the four-particle …
Multi-user QKD using quotient graph states derived from continuous-variable dual-rail cluster states
A nag Oruganti - arXiv preprint arXiv:2412.14317, 2024 - arxiv.org
Multipartite entangled states are fundamental resources for multi-user quantum
cryptographic tasks. Despite significant advancements in generating large-scale continuous …
cryptographic tasks. Despite significant advancements in generating large-scale continuous …
Network-based arbitrated quantum signature scheme with graph state
H Ma, F Li, N Mao, Y Wang, Y Guo - International Journal of Theoretical …, 2017 - Springer
Implementing an arbitrated quantum signature (QAS) through complex networks is an
interesting cryptography technology in the literature. In this paper, we propose an arbitrated …
interesting cryptography technology in the literature. In this paper, we propose an arbitrated …