Multi-party quantum secret sharing based on two special entangled states

2012 ◽  
Vol 55 (3) ◽  
pp. 460-464 ◽  
Author(s):  
ChiaWei Tsai ◽  
Tzonelih Hwang
2018 ◽  
Vol 32 (22) ◽  
pp. 1850256 ◽  
Author(s):  
Ai Han Yin ◽  
Yan Tong

Semi-quantum secret sharing (SQSS) can transmit secret messages. Most existing SQSS protocols can only use one or two specific entangled states to share unspecific or specific classical message. In this paper, we propose a novel SQSS protocol using N different unspecific two-particle entangled state [Formula: see text], [Formula: see text] to share unspecific message, in which quantum Alice can transmit classical messages with classical Bob and Charlie. In addition, we have proved that the protocol can strongly resist some forms of eavesdropping.


2016 ◽  
Vol 30 (02) ◽  
pp. 1550267 ◽  
Author(s):  
Yi Xiang ◽  
Zhi Wen Mo

In this paper, we proposed a three-party quantum secret sharing (QSS) scheme using four-dimensional three-particle entangled states. In this QSS scheme, each agent can obtain a shadow of the secret key by performing single-particle measurements. Compared with the existing QSS protocol, this scheme has high efficiency and can resist the eavesdropping attack and entangle-measuring attack, which using three-particle entangled states are based on four-dimensional Hilbert space.


2006 ◽  
Vol 23 (12) ◽  
pp. 3148-3151 ◽  
Author(s):  
Liu Wei-Tao ◽  
Liang Lin-Mei ◽  
Li Cheng-Zu ◽  
Yuan Jian-Min

2021 ◽  
Vol 11 (1) ◽  
Author(s):  
Yinxiang Long ◽  
Cai Zhang ◽  
Zhiwei Sun

AbstractIn this paper, a standard (3, 5)-threshold quantum secret sharing scheme is presented, in which any three of five participants can resume cooperatively the classical secret from the dealer, but one or two shares contain absolutely no information about the secret. Our scheme can be fulfilled by using the singular properties of maximally entangled 6-qubit states found by Borras. We analyze the scheme’s security by several ways, for example, intercept-and-resend attack, entangle-and-measure attack, and so on. Compared with the other standard threshold quantum secret sharing schemes, our scheme needs neither to use d-level multipartite entangled states, nor to produce shares by classical secret splitting techniques, so it is feasible to be realized.


2008 ◽  
Vol 28 (3) ◽  
pp. 556-559 ◽  
Author(s):  
於亚飞 Yu Yafei ◽  
张智明 Zhang Zhiming

2017 ◽  
Vol 16 (12) ◽  
Author(s):  
Chen-Ming Bai ◽  
Zhi-Hui Li ◽  
Cheng-Ji Liu ◽  
Yong-Ming Li

Sign in / Sign up

Export Citation Format

Share Document