期刊文献+
共找到179篇文章
< 1 2 9 >
每页显示 20 50 100
Improved Multipartite Quantum Secret Sharing Protocol Using Preshared Greenberger-Horne-Zeilinger States 被引量:3
1
作者 谢灯 叶明勇 李兴华 《Communications in Theoretical Physics》 SCIE CAS CSCD 2011年第12期1027-1030,共4页
Inspired by the protocol presented by Bagherinezhad and Karimipour[Phys.Rev.A 67(2003) 044302], which will be shown to be insecure,we present a multipartite quantum secret sharing protocol using reusable GreenbergerHo... Inspired by the protocol presented by Bagherinezhad and Karimipour[Phys.Rev.A 67(2003) 044302], which will be shown to be insecure,we present a multipartite quantum secret sharing protocol using reusable GreenbergerHorne -Zeilinger(GHZ) states.This protocol is robust against eavesdropping and could be used for the circumstance of many parties. 展开更多
关键词 secret sharing Greenberger-Horne-Zeilinger state quantum cryptography
在线阅读 下载PDF
Probabilistic quantum teleportation of shared quantum secret
2
作者 Hengji Li Jian Li Xiubo Chen 《Chinese Physics B》 SCIE EI CAS CSCD 2022年第9期196-201,共6页
Very recently,Lee et al.proposed a secure quantum teleportation protocol to transfer shared quantum secret between multiple parties in a network[Phys.Rev.Lett.124060501(2020)].This quantum network is encoded with a ma... Very recently,Lee et al.proposed a secure quantum teleportation protocol to transfer shared quantum secret between multiple parties in a network[Phys.Rev.Lett.124060501(2020)].This quantum network is encoded with a maximally entangled GHZ state.In this paper,we consider a partially entangled GHZ state as the entanglement channel,where it can achieve,probabilistically,unity fidelity transfer of the state.Two kinds of strategies are given.One arises when an auxiliary particle is introduced and a general evolution at any receiver's location is then adopted.The other one involves performing a single generalized Bell-state measurement at the location of any sender.This could allow the receivers to recover the transmitted state with a certain probability,in which only the local Pauli operators are performed,instead of introducing an auxiliary particle.In addition,the successful probability is provided,which is determined by the degree of entanglement of the partially multipartite entangled state.Moreover,the proposed protocol is robust against the bit and phase flip noise. 展开更多
关键词 probabilistic quantum teleportation shared quantum secret partially entangled GHZ state
原文传递
A pure quantum secret sharing scheme based on GHZ basis measurement and quantum entanglement exchange
3
作者 Bai Liu Jun Zhang +1 位作者 Shupin Qiu Mingwu Zhang 《Chinese Physics B》 2025年第3期95-102,共8页
At present,most quantum secret sharing(QSS)protocols are more or less designed with the incorporation of classical secret sharing schemes.With the increasing maturity of quantum technology,QSS protocols based on pure ... At present,most quantum secret sharing(QSS)protocols are more or less designed with the incorporation of classical secret sharing schemes.With the increasing maturity of quantum technology,QSS protocols based on pure quantum mechanics are becoming more important.Classical secret sharing schemes cannot achieve absolute security,and their involvement can compromise the security of QSS protocols.This paper proposes a QSS scheme based on Greenberger-Horn-Zeilinger(GHZ)basis measurement and quantum entanglement exchange.In this protocol,the secret sender stores the secret information using Pauli operations.Participants obtain their shares by measuring the product state sequentially.Finally,participants complete the secret reconstruction through quantum entanglement exchange and other related quantum operations.In addition,the particles held by participants in the protocol do not contain any secret information.Each participant's particles are in a state of maximum entanglement,and no participant can deduce the particle information of other participants through their own particles.At the same time,the protocol is based on pure quantum mechanics and does not involve classical schemes,which avoids the problem of reduced security of the protocol.Security analysis indicates that the protocol is not vulnerable to retransmission interception and collusion attacks.Moreover,it is capable of detecting and terminating the protocol promptly when facing with attacks from dishonest participants. 展开更多
关键词 quantum secret sharing projection measurement quantum entanglement exchange THRESHOLD
原文传递
One-Time Rational Secret Sharing Scheme Based on Bayesian Game 被引量:8
4
作者 TIAN Youliang MA Jianfeng +2 位作者 PENG Changgen CHEN Xi JI Wenjiang 《Wuhan University Journal of Natural Sciences》 CAS 2011年第5期430-434,共5页
The rational secret sharing cannot be realized in the case of being played only once, and some punishments in the one-time rational secret sharing schemes turn out to be empty threats. In this paper, after modeling 2-... The rational secret sharing cannot be realized in the case of being played only once, and some punishments in the one-time rational secret sharing schemes turn out to be empty threats. In this paper, after modeling 2-out-of-2 rational secret sharing based on Bayesian game and considering different classes of protocol parties, we propose a 2-out-of-2 secret sharing scheme to solve cooperative problem of a rational secret sharing scheme being played only once. Moreover, we prove that the strategy is a perfect Bayesian equilibrium, adopted only by the parties in their decision-making according to their belief system (denoted by the probability distribution) and Bayes rule, without requiring simultaneous channels. 展开更多
关键词 rational secret sharing one-time rational secret sharing Bayesian game perfect Bayesian equilibrium
原文传递
A New Rational Secret Sharing Scheme 被引量:4
5
作者 ZHANG En CAI Yongquan 《China Communications》 SCIE CSCD 2010年第4期18-22,共5页
In this paper,we propose a new approach for rational secret sharing in game theoretic settings.The trusted center is eliminated in the secret reconstruction phase.Every player doesn’t know current round is real round... In this paper,we propose a new approach for rational secret sharing in game theoretic settings.The trusted center is eliminated in the secret reconstruction phase.Every player doesn’t know current round is real round or fake round.The gain of following the protocol is more than the gain of deviating,so rational player has an incentive to abide the protocol.Finally,every player can obtain the secret fairly.Our scheme is verifiable and any player’s cheating can not work.Furthermore the proposed scheme is immune to backward induction and satisfies resilient equilibrium.No player of the coalition C can do better,even if the whole coalition C cheats.Our scheme can withstand the conspiracy attack with at most m-1 players. 展开更多
关键词 secret Sharing Game Theory Verifiable secret Sharing Resilient Equilibrium
在线阅读 下载PDF
High-dimension multiparty quantum secret sharing scheme with Einstein-Podolsky-Rosen pairs 被引量:4
6
作者 陈攀 邓富国 龙桂鲁 《Chinese Physics B》 SCIE EI CAS CSCD 2006年第10期2228-2235,共8页
In this paper a high-dimension multiparty quantum secret sharing scheme is proposed by using Einstein-Podolsky-Rosen pairs and local unitary operators. This scheme has the advantage of not only having higher capacity,... In this paper a high-dimension multiparty quantum secret sharing scheme is proposed by using Einstein-Podolsky-Rosen pairs and local unitary operators. This scheme has the advantage of not only having higher capacity, but also saving storage space. The security analysis is also given. 展开更多
关键词 high—dimension quantum secret sharing EPR QUBIT QUTRIT
原文传递
Dynamic quantum secret sharing protocol based on two-particle transform of Bell states 被引量:5
7
作者 Yu-Tao Du Wan-Su Bao 《Chinese Physics B》 SCIE EI CAS CSCD 2018年第8期118-123,共6页
To solve the problems of updating sub-secrets or secrets as well as adding or deleting agents in the quantum secret sharing protocol, we propose a two-particle transform of Bell states, and consequently present a nove... To solve the problems of updating sub-secrets or secrets as well as adding or deleting agents in the quantum secret sharing protocol, we propose a two-particle transform of Bell states, and consequently present a novel dynamic quantum secret sharing protocol. The new protocol can not only resist some typical attacks, but also be more efficient than the existing protocols. Furthermore, we take advantage of the protocol to establish the dynamic secret sharing of a quantum state protocol for two-particle maximum entangled states. 展开更多
关键词 quantum secret sharing two-particle transform of Bell states ATTACK DYNAMIC
原文传递
Verifiable Secret Redistribution for Proactive Secret Sharing Schemes 被引量:4
8
作者 于佳 孔凡玉 李大兴 《Journal of Shanghai Jiaotong university(Science)》 EI 2006年第2期236-241,共6页
A new scheme to verifiably redistribute a secret from the old to new shareholders without reconstruction of the secret is presented in this paper. The scheme allows redistribution between different access structures a... A new scheme to verifiably redistribute a secret from the old to new shareholders without reconstruction of the secret is presented in this paper. The scheme allows redistribution between different access structures and between different threshold schemes. A point worth mentioning is that this verifiable secret redistribution (VSR) scheme can identify dishonest old shareholders during redistribution without any assumption. A certain technique is adopted to verify the correctness of the old shares of the secret. As a result, the scheme is very efficient. It can be applied to proactive secret sharing (PSS) schemes to construct more flexible and practical proactive secret sharing schemes. 展开更多
关键词 secret sharing verifiable secret redistribution proactive secret sharing
在线阅读 下载PDF
Participant attack on quantum secret sharing based on entanglement swapping 被引量:4
9
作者 宋婷婷 张劼 +2 位作者 高飞 温巧燕 朱甫臣 《Chinese Physics B》 SCIE EI CAS CSCD 2009年第4期1333-1337,共5页
The security of quantum secret sharing based on entanglement swapping is revisited and a participant attack is presented. In this attack two dishonest agents together can illegally recover the secret quantum state wit... The security of quantum secret sharing based on entanglement swapping is revisited and a participant attack is presented. In this attack two dishonest agents together can illegally recover the secret quantum state without the help of any other controller, and it will not be detected by any other users. Furthermore, by modifying the distribution process of particles and adding a detection step after each distribution process, we propose an improved protocol which can resist this kind of attack. 展开更多
关键词 quantum secret sharing entanglement swapping the Bell measurement two-particleentangled state
原文传递
Measurement-device-independent quantum secret sharing with hyper-encoding 被引量:4
10
作者 Xing-Xing Ju Wei Zhong +1 位作者 Yu-Bo Sheng Lan Zhou 《Chinese Physics B》 SCIE EI CAS CSCD 2022年第10期307-313,共7页
Quantum secret sharing(QSS) is a typical multi-party quantum communication mode, in which the key sender splits a key into several parts and the participants can obtain the key by cooperation. Measurement-device-indep... Quantum secret sharing(QSS) is a typical multi-party quantum communication mode, in which the key sender splits a key into several parts and the participants can obtain the key by cooperation. Measurement-device-independent quantum secret sharing(MDI-QSS) is immune to all possible attacks from measurement devices and can greatly enhance QSS's security in practical applications. However, previous MDI-QSS's key generation rate is relatively low. Here, we adopt the polarization-spatial-mode hyper-encoding technology in the MDI-QSS, which can increase single photon's channel capacity. Meanwhile, we use the cross-Kerr nonlinearity to realize the complete hyper-entangled Greenberger-Horne-Zeilinger state analysis. Both above factors can increase MDI-QSS's key generation rate by about 10^(3). The proposed hyper-encoded MDI-QSS protocol may be useful for future multiparity quantum communication applications. 展开更多
关键词 measurement-device-independent quantum secret sharing hyper-encoding technology cross-Kerr nonlinearity hyper-entangled Greenberger-Horne-Zeilinger state analysis
原文传递
Secret sharing of quantum information via entanglement swapping 被引量:3
11
作者 张英俏 金星日 张寿 《Chinese Physics B》 SCIE EI CAS CSCD 2006年第10期2252-2255,共4页
Based on entanglement swapping, a scheme for the secret sharing of an arbitrary two-particle entangled state is proposed. If the controllers do not co-operate with the eavesdropper, the eavesdropper's successful prob... Based on entanglement swapping, a scheme for the secret sharing of an arbitrary two-particle entangled state is proposed. If the controllers do not co-operate with the eavesdropper, the eavesdropper's successful probability decreases with the number of the controllers increasing. In addition, only the Bell-state measurements are required to realize the secret sharing scheme. 展开更多
关键词 secret sharing two-particle entangled state Dell-state measurements entanglement swapping
原文传递
Robust Multiparty Quantum Secret Key Sharing Over Two Collective-Noise Channels via Three-Photon Mixed States 被引量:7
12
作者 WANG Zhang-Yin YUAN Hao GAO Gan Shou-Hua 《Communications in Theoretical Physics》 SCIE CAS CSCD 2006年第4X期607-609,共3页
We present a robust (n, n)-threshold scheme for multiparty quantum secret sharing of key over two collectivenoise channels (i.e., the collective dephasing channel and the collective rotating channel) via three-pho... We present a robust (n, n)-threshold scheme for multiparty quantum secret sharing of key over two collectivenoise channels (i.e., the collective dephasing channel and the collective rotating channel) via three-photon mixed states, In our scheme, only if all the sharers collaborate together can they establish a joint key with the message sender and extract the secret message from the sender's encrypted message. This scheme can be implemented using only a Bell singlet, a one-qubit state and polarization identification of single photon, so it is completely feasible according to the present-day technique. 展开更多
关键词 multiparty quantum secret key sharing collective-noise channel
在线阅读 下载PDF
Multiparty Quantum Secret Sharing Using Two-Photon Three-Dimensional Bell States 被引量:3
13
作者 GAO Gan 《Communications in Theoretical Physics》 SCIE CAS CSCD 2009年第9期421-424,共4页
We present a two-photon three-dimensional multiparty quantum secret sharing scheme.The secret messagesare encoded by performing local operations.This is different from those quantum secret sharing protocols that all s... We present a two-photon three-dimensional multiparty quantum secret sharing scheme.The secret messagesare encoded by performing local operations.This is different from those quantum secret sharing protocols that all sharersmust make a state measurement.The merit of our protocol is the high capacity. 展开更多
关键词 Bell state THREE-DIMENSIONAL quantum secret sharing
在线阅读 下载PDF
Quantum Secret Sharing Using GHZ-Like State 被引量:3
14
作者 谢朝任 蔡家纬 黄宗立 《Communications in Theoretical Physics》 SCIE CAS CSCD 2010年第12期1019-1022,共4页
This paper presents a simple and novel quantum secret sharing scheme using GHZ-like state. The characteristics of the GHZ-like state are used to develop the quantum secret sharing scheme. In contrast with the other GH... This paper presents a simple and novel quantum secret sharing scheme using GHZ-like state. The characteristics of the GHZ-like state are used to develop the quantum secret sharing scheme. In contrast with the other GHZ-based QSS protocols with the same assumptions, the proposed protocol provides the best quantum bit efficiency. 展开更多
关键词 quantum cryptography quantum secret sharing GHZ-like state
在线阅读 下载PDF
Special secret sharing scheme with the function of assignment 被引量:3
15
作者 叶振军 孟繁桢 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2005年第3期651-653,共3页
A concept of secret sharing scheme with the function of assignment is proposed. It provides great capabilities for many practical applications. In this scheme, the dealer can randomly assign one or more than one parti... A concept of secret sharing scheme with the function of assignment is proposed. It provides great capabilities for many practical applications. In this scheme, the dealer can randomly assign one or more than one participant to get the secret at any time, but these participants can get nothing about the secret before that moment. At the same time, the other participants cannot get anything about the secret by stealing the secret value when it is transferred. However, if the dealer is lost, a certain number or more partidtmnts of them can reoonstruct the secret by ccoperating. In order to clear this concept, an illustrating scheme with geometry method and a practical scheme with algebra method is given. 展开更多
关键词 secret sharing THRESHOLD assignment scheme dynamtic assignment scheme.
在线阅读 下载PDF
Quantum Secret Sharing Based on Chinese Remainder Theorem 被引量:3
16
作者 施荣华 粟倩 +1 位作者 郭迎 李门浩 《Communications in Theoretical Physics》 SCIE CAS CSCD 2011年第4期573-578,共6页
A novel quantum secret sharing (QSS) scheme is proposed on the basis of Chinese Remainder Theorem (CRT). In the scheme, the classical messages are mapped to secret sequences according to CRT equations, and distrib... A novel quantum secret sharing (QSS) scheme is proposed on the basis of Chinese Remainder Theorem (CRT). In the scheme, the classical messages are mapped to secret sequences according to CRT equations, and distributed to different receivers by different dimensional superdense-coding respectively. CRT's secret sharing function, together with high-dimensional superdense-eoding, provide convenience, security, and large capability quantum channel for secret distribution and recovering. Analysis shows the security of the scheme. 展开更多
关键词 quantum secret sharing Chinese Remainder Theorem quantum superdense-coding
在线阅读 下载PDF
Sequential Quantum Secret Sharing Using a Single Qudit 被引量:3
17
作者 Chen-Ming Bai Zhi-Hui Li and Yong-Ming Li 《Communications in Theoretical Physics》 SCIE CAS CSCD 2018年第5期513-518,共6页
In this paper we propose a novel and efficient quantum secret sharing protocol using d-level single particle,which it can realize a general access structure via the thought of concatenation. In addition, Our scheme in... In this paper we propose a novel and efficient quantum secret sharing protocol using d-level single particle,which it can realize a general access structure via the thought of concatenation. In addition, Our scheme includes all advantages of Tavakoli's scheme [Phys. Rev. A 92 (2015) 030302(R)]. In contrast to Tavakoli's scheme, the efficiency of our scheme is 1 for the same situation, and the access structure is more general and has advantages in practical significance. Furthermore, we also analyze the security of our scheme in the primary quantum attacks. 展开更多
关键词 quantum secret sharing access structure threshold scheme
原文传递
Optimistic fair exchange E-commerce protocol based on secret sharing 被引量:3
18
作者 Ma Changshe Lei Feiyu Chen Kefei 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2006年第4期858-863,共6页
A key problem of electronic commerce (for short e-commerce) is fair exchange which guarantees that at the end of the transaction, either both parties involved in the trausaction receive each other's items or none d... A key problem of electronic commerce (for short e-commerce) is fair exchange which guarantees that at the end of the transaction, either both parties involved in the trausaction receive each other's items or none do. A non-interactive optimistic fair exchange e-commerce protocol model based on the publicly verifiable secret sharing is presented. The main idea of our exchange protocol is to interchange verifiable and recoverable keys of the symmetric encryption for participants' items. So it is especially suitable for exchange of large-size items. Furthermore, our protocol is efficient and simple as it does not need interactive proof system which has been adopted by a large quantity of previously proposed fair exchange protocols. Based on a modified (2,2) secret sharing scheme, a concrete non-interactive fair exchange e-commerce protocol is designed. 展开更多
关键词 E-COMMERCE optimistic fair-exchange publicly verfiable secret sharing.
在线阅读 下载PDF
Multiparty Quantum Secret Sharing Using Quantum Fourier Transform 被引量:3
19
作者 HUANG Da-Zu CHEN Zhi-Gang GUO Ying 《Communications in Theoretical Physics》 SCIE CAS CSCD 2009年第2期221-226,共6页
A (n, n)-threshold scheme of multiparty quantum secret sharing of classical or quantum message is proposed based on the discrete quantum Fourier transform. In our proposed scheme, the secret message, which is encode... A (n, n)-threshold scheme of multiparty quantum secret sharing of classical or quantum message is proposed based on the discrete quantum Fourier transform. In our proposed scheme, the secret message, which is encoded by using the forward quantum Fourier transform and decoded by using the reverse, is split and shared in such a way that it can be reconstructed among them only if all the participants work in concert. Fhrthermore, we also discuss how this protocol must be carefully designed for correcting errors and checking eavesdropping or a dishonest participant. Security analysis shows that our scheme is secure. Also, this scheme has an advantage that it is completely compatible with quantum computation and easier to realize in the distributed quantum secure computation. 展开更多
关键词 quantum secret sharing quantum Fourier transform quantum error correction code
在线阅读 下载PDF
High-capacity three-party quantum secret sharing with superdense coding 被引量:2
20
作者 顾斌 李传起 +1 位作者 徐飞 陈玉林 《Chinese Physics B》 SCIE EI CAS CSCD 2009年第11期4690-4694,共5页
This paper presents a scheme for high-capacity three-party quantum secret sharing with quantum superdense coding, following some ideas in the work by Liuet al (2002 Phys. Rev. A 65 022304) and the quantum secret sha... This paper presents a scheme for high-capacity three-party quantum secret sharing with quantum superdense coding, following some ideas in the work by Liuet al (2002 Phys. Rev. A 65 022304) and the quantum secret sharing scheme by Deng et al (2008 Phys. Lett. A 372 1957). Instead of using two sets of nonorthogonal states, the boss Alice needs only to prepare a sequence of Einstei^Podolsky-l^osen pairs in d-dimension. The two agents Bob and Charlie encode their information with dense coding unitary operations, and security is checked by inserting decoy photons. The scheme has a high capacity and intrinsic efficiency as each pair can carry 21bd bits of information, and almost all the pairs can be used for carrying useful information. 展开更多
关键词 quantum secret sharing three-party HIGH-CAPACITY superdense coding
原文传递
上一页 1 2 9 下一页 到第
使用帮助 返回顶部