Abstract
The quantum secret sharing is an essential and fundamental technique for sharing a secret with the all participants in quantum cryptography. It can be used to design many complex protocols such as secure multiparty summation, multiplication, sorting, voting, etc. Recently, Song et al. have discussed a quantum protocol for secret sharing, which has (t, n) threshold approach and modulo d, where t and n denote the threshold number of participants and total number of participants, respectively. Kao et al. point out that the secret in the Song et al.’s protocol cannot be reconstructed without other participants’ information. In this paper, we discuss a protocol that overcomes this problem.
Similar content being viewed by others
Introduction
The quantum secret sharing includes a dealer and a group of n participants1,2,3,4,5,6,7. The dealer distributes the shares of a secret among n participants. When the dealer requires to retrieve the original secret, the t (threshold) number of participants will work together to retrieve it8,9,10,11. The quantum secret sharing can be used in various applications12,13,14,15,16,17,18,19,20, namely, secure multiparty summation21,22, multiplication23, comparison, sorting, voting, etc., as it preserves the secret from getting lost, damaged, or changed24,25,26. There have been discussed numerous protocols for sharing a secret in literature8,27,28,29,30,31. There are two approaches followed in quantum secret sharing protocols, namely, (t, n) and (n, n) threshold approaches. The first (n, n) threshold based quantum secret sharing protocol31 was discussed by Hillery et al. in 1999. Xiao et al.32 generalized this two-party protocol to a multi-party protocol. In 2005, the direct sharing of secret was discussed by Zhang33 based on quantum secure direct communication34,35,36. Qin et al. discussed a quantum secret sharing protocol27 based on (n, n) threshold in 2018. The first (t, n) threshold quantum based secret sharing protocol28 was introduced by Li et al. with modulo 2 in 2009. Ye et al.37 discussed the d-level quantum Fourier transform for secure quantum protocol in 2011. Yang et al. discussed a d-level and (t, n) threshold quantum based secret sharing protocol29 in 2013, that uses the quantum Fourier transform (QFT). Qin et al. introduced a (t, n) threshold quantum based secret sharing protocol38 with level-2 in 2015, using the operation of phase shift and creation of quantum entanglement39,40.
An (t, n) threshold quantum based secret sharing protocol with level-d was discussed by Song et al. in 2017 that used the CNOT operation, QFT, generalized Pauli operator, and inverse quantum Fourier transform (IQFT)9. This protocol includes a dealer and a group of participants. The dealer chooses one participant as a trusted reconstructor and SHA-141 as the hash algorithm to evaluate the secret hash value. The dealer sends the secret’s hash value to a trusted reconstructor, who can recover the secret using a collision attack. Further, the trusted reconstructor cannot reconstruct the original secret from the IQFT operation42. The IQFT operation cannot sum up all the states. To recover the original secret, the trusted reconstructor needs other participants’ secret information. In 2020, Mashhadi improved the Song et al.’s protocol43 by using the d-level SUM operation, QFT, and IQFT. This protocol is efficient but it has high computation and communication costs due to the transmission of \((t-1)\) decoy particle, more number of IQFT operation, and SUM operation. Moreover, if the reconstructor is corrupted or dishonest, then the threshold number of participants cannot recover the secret in both the Mashhadi’s and Song et al.’s protocols. Hence, in these protocols, the reconstructor must be honest. In addition, similar to the Song et al.’s protocol, the trusted reconstructor may also recover the secret by performing the collision attack because the dealer sends the secret’s hash value to the trusted reconstructor directly. In this paper, we propose a new d-level quantum based secret sharing protocol using the (t, n) threshold approach that overcomes the above mentioned problems. We may summarize our contributions as follows.
-
The reconstructor \(Bob_1\) can reconstruct the original secret efficiently.
-
The reconstructor \(Bob_1\) cannot reveal the secret by performing the collision attack.
-
The proposed protocol can also resist the coherent and collective attacks.
-
The proposed protocol can also detect the eavesdropping by comparing the hash values of the secret even if the reconstructor transmits a fake secret to other participants after recovering the original secret.
Preliminaries
Here, we introduce the Shamir’s secret sharing, QFT, and IQFT, which will be used in our proposed protocol.
Shamir’s secret sharing44
This protocol has two phases as discussed below.
Sharing of secret
The dealer creates n shares of the secret using a polynomial f(x) of degree (\(t-1\)) and distributes n shares among n participants.
Reconstruction of secret
The threshold number of participants reconstructs the secret as follows.
Quantum Fourier transform (QFT)9
The quantum Fourier transform (QFT) is defined as
Inverse quantum Fourier transform (IQFT)9
The inverse quantum Fourier transform (IQFT) is defined as
Review of Song et al.’s protocol
Here, we review the Song et al.’s protocol. In this protocol, the dealer shares a secret S among n participants \({\mathcal {B}} = \{Bob_1, Bob_2, \dots , Bob_n \}\). From n participants, any one is selected by the dealer as a trusted reconstructor. We may consider here \(Bob_1\) as a trusted reconstructor.
Distribution of shares
The dealer selects an arbitrary polynomial p(x) of degree (\(t-1\)) such that \(p(x) \in {\mathbb {Z}}_d\), where \({\mathbb {Z}}_d\) is a finite field. The (\(t-1\))-degree polynomial may be defined as
A non-zero value \(x_i \in {\mathbb {Z}}_d\) is also selected by the dealer to compute n shares \(p(x_i)\). The dealer encodes \(p(x_i)'s\) using BB84 and sends the qubit string of \(p(x_i)\) through a secure quantum channel to every participant \(Bob_i, i=1,2,\ldots ,n\). The dealer chooses a hash algorithm H() to determine the hash value H(S) of the secret S and sends this hash value H(S) to the participant \(Bob_1\).
Reconstruction of secret
The secret is reconstructed by a certain number of participants using the following steps.
Step 1 Participant \(Bob_1\) (reconstructor) prepares a t-qudit particle \(|l\rangle _1,|l\rangle _2, \dots , |l\rangle _t\), which contains m qubits, where \(m = \lceil \log _{2}^{d} \rceil \). The participant \(Bob_1\) applies the QFT on the particle \(|l\rangle _1\) that results in the output state \(|\varphi _1\rangle \), as follows.
Step 2 Participant \(Bob_1\) again prepares a v-qudit particle \(|l\rangle _v\), where \(v=2, 3, \dots , t\), which contains m qubits, where \(m = \lceil \log _{2}^{d} \rceil \). The participant \(Bob_1\) applies the d-level CNOT gate45 on the particle \(|l\rangle _v\), where \(v= 2, 3, \dots , t\). After performing \((t-1)\) number of CNOT gates, the state \(|\varphi _1\rangle \) becomes an entangled state \(|\varphi _2\rangle \)39,40 as follows.
Step 3 Participant \(Bob_1\) sends the particle \(|u\rangle _v\) through a secure quantum channel to respective participant \(Bob_v\), \(v= 2, 3, \dots , t\).
Step 4 Each participant \(Bob_v\) evaluates the share’s shadow \((s_v)\), \(v= 1, 2, \dots , t\), as follows.
Step 5 The Pauli operator \((U_{0,s_v})\) is applied by each participant \(Bob_v\) on their respective private particles \(|u\rangle _v\), \(v= 1, 2, \dots , t\), as follows.
After performing the Pauli operator on each participant particle, the state \(|\varphi _2\rangle \) extends as follows:
Step 6 Finally, the participant \(Bob_1\) applies the IQFT on his private particle \(|u\rangle _1\) and, based on computational basis, measures it to acquire the secret \(p(0)'= \sum _{v=1}^{t} s_v \mod d\).
Comments on Song et al.’s protocol
Here, we show the incorrectness of the reconstruction phase of the Song et al.’s protocol. Kao et al. point out that, without other participants’ information, \(Bob_1\) can never retrieve the secret. Song et al. mention that \(QFT(\sum _{v=1}^{t} s_v)\) is the qubit of \(Bob_1\) in \(|\varphi _1\rangle \). The participant \(Bob_1\) evaluates IQFT over its particle \(QFT(\sum _{v=1}^{t} s_v)\) and measures it on a computational base, where \(Bob_1\) retrieves the secret \(S' = \sum _{v=1}^{t} s_v\). We have the following observation.
The secret \(S' = \sum _{v=1}^{t} s_v\) cannot be retrieved even when IQFT is performed over the particle \(|l\rangle _1\) and measured computationally by \(Bob_1\).
For better understanding of the problem, consider an example, where \(d = 3, t=2, n = 4\) and \(S =2\). From step 5 of the reconstruction phase of the Song et al.’s protocol, we have
On applying the inverse quantum Fourier transform IQFT over the particle \(|u\rangle \), we get
The result to the equation comes out as \(|0\rangle , |1\rangle \) or \(|2\rangle \), not accurately \(|2\rangle \).
Attack on Song et al.’s protocol
The dealer chooses \(Bob_1\) as a trusted reconstructor in the Song et al. protocol, and the hash algorithm \(SHA-1\) to evaluate the secret’s hash value. After computing the hash value, the dealer transfers this hash value through a secure quantum channel to \(Bob_1\). From this hash value, \(Bob_1\) can easily reveal the secret by performing the collision attack.
Proposed quantum secret sharing protocol
Here, we propose a new quantum secret sharing protocol that has (t, n) threshold and d-level. The distribution of the shares and the reconstruction of secret are its two main phases, as discussed below.
Distribution of share
The dealer selects an arbitrary \((t-1)\)-degree polynomial \(p(x) \in {\mathbb {Z}}_d\), \({\mathbb {Z}}_d\) is a finite field, as follows:
The dealer selects a non-zero value \(x_i \in {\mathbb {Z}}_d\) to compute n shares \(p(x_i)\), encodes \(p(x_i)s\) using BB84 and sends the qubit string of \(p(x_i)\) via a secure quantum channel to every participant \(Bob_i, i=1,2,..,n\). Then, the dealer chooses a hash algorithm to determine the secret hash value \({\mathcal {H}}(S)\). After computing \({\mathcal {H}}(S)\), the dealer shares it using a polynomial \(h(x)={\mathcal {H}}(S) + \gamma _1x + \gamma _2x^2 + \dots + \gamma _{t-1}x^{t-1}\) among n participants. Participant \(Bob_i\) only learns the share \(h(x_i)\), \(i= 1, 2, \dots , n\).
Reconstruction of the secret
Let \({\mathcal {B}}=\{Bob_1, Bob_2, \dots , Bob_t\}\) be a qualified subset of t participants. The dealer chooses a reconstructor participant from the qualified subset. In this phase, the dealer chooses \(Bob_1\) as a reconstructor participant that recovers the secret and the secret hash value using the following steps:
Step 1 Reconstructor \(Bob_1\) prepares t qudit particle \(|l\rangle _1,|l\rangle _2, \dots , |l\rangle _t\), which contains m qubits, \(m = \lceil \log _{2}^{d} \rceil \). The participant \(Bob_1\) applies the QFT45 on the particle \(|l\rangle _1\). The output state \(|\varphi _1\rangle \) is computed as follows.
Step 2 The participant \(Bob_1\) prepares v qudit particle \(|l\rangle _v\), \(v=2, 3, \dots , t\) and this particle contains m qubits, \(m = \lceil \log _{2}^{d} \rceil \). \(Bob_1\) performs d-level CNOT gate on the particle \(|l\rangle _v\), where \(v= 2, 3, \dots , t\). After performing \((t-1)\) CNOT gates, the state \(|\varphi _1\rangle \) becomes an entangled state \(|\varphi _2\rangle \)39,40 as follows.
Step 3 \(Bob_1\) sends the particle \(|u\rangle _v\), \(v= 2, 3, \dots , t\), to respective \(Bob_v\) participants through a secure quantum channel.
Step 4 Each participant \(Bob_v\) evaluates the share’s shadow \((s_v)\), \(v= 1, 2, \dots , t\).
Step 5 The Pauli operator \((U_{0,s_v})\) applied by each participant \(Bob_v\) on his private particle \(|u\rangle _v\), \(v= 1, 2, \dots , t\).
After performing the Pauli operator on each participant particle, the state \(|\varphi _2\rangle \) extends as follows:
Step 6 Each participant \(Bob_v\) applies the IQFT on his private particle \(|u\rangle _v\) and measures the result of IQFT. After measuring, each participant \(Bob_v\) broadcasts the result of measurement.
Step 7 Each participant \(Bob_v\) computes the secret \(p(0)'= \sum _{v=1}^{t} s_v \mod d\) by adding the measurement results.
Step 8 Finally, all seven steps discussed above are again performed by the threshold number of participants t to reconstruct the secret hash value. The secret hash value \(h(0)'=\sum _{r=1}^{t}\,g_r\,mod\,d\) is reconstructed by the participant \(Bob_1\), where \(g_r\) represents the hash value share’s shadow. The participant \(Bob_1\) uses the hash algorithm \(SHA-1\) to determine the hash value \({\mathcal {H}}(p(0)')\) and matches it with the secret’ hash value \(h(0)'\). If \(({\mathcal {H}}(p(0)')=h(0)')\), then the participant \(Bob_1\) perceives that the threshold number of participants have executed the protocol honestly; otherwise, \(Bob_1\) believes that the one or more corrupt participants have executed the protocol.
Security analysis
In this section, we discuss the collision, coherent, and collective attacks, which can be resisted by the proposed protocol.
Collision attack
An attacker uses the hash algorithm attack to generate the same secret hash value for two inputs in this attack. In the Song et al.’s9 and Mashhadi’s43 protocols, the \(Bob_1\) can execute the collision attack to get the secret because the dealer sends the secret’s hash value to \(Bob_1\) and hence it is not secure against the collision attack. Our protocol is secure against the collision attack because the dealer determines the secret hash value and shares this value among n participants. So, the reconstructor participant \(Bob_1\) has no knowledge about the hash value and hence he is unable to execute the collision attack.
Coherent attack
In this attack, an attacker creates an independent ancillary particle \(|w\rangle \) and intercepts every participant’s particle \(|l\rangle _v\) by jointly interacting with every qudit of participant \(Bob_v, v=1,2,\dots , t\). On every participant’s particle \(|l\rangle _v\), the attacker conducts the measurement process in computational basis. The attacker just gets l with \(\frac{1}{d}\) probability from this calculation of particle \(|l\rangle _v\). However, l does not hold any valuable data about the share’s shadow. Only the interacting particle \(|l\rangle _v\) is known to the attacker in this case. As a result, the attacker cannot get the share’s shadow from the coherent attack.
Collective attack
In a collective attack, an attacker communicates with each qudit by creating an individual ancillary particle and performing a measure all of the ancillary qudits at the same time to obtain the share’s shadow. Every qudit of participant \(Bob_v, v=1,2,\dots , t\) is interacted with by an individual ancillary particle \(|w\rangle \) created by the attacker. After communicating, the attacker obtains the particle \(|l\rangle _v\) and conducts a joint calculation procedure in the computational basis to reveal the share’s shadow. Since the particle \(|l\rangle _v\) does not hold any valuable data about the share’s shadow, the attacker cannot obtain any information about it from this joint calculation.
Performance analysis
Here, we analyze the performance of the proposed protocol and compare with that of the Song et al.’s9, and Mashhadi’s43 protocols in terms of the security and cost. The Song em et al.’s protocol9 requires one QFT operation, t unitary operations, two hash operations, one IQFT operation, one measure operations, and transmit \((t-1)\) message particles. This protocol is not efficient because the IQFT cannot recover the original secret. The Mashhadi’s protocol43 needs one QFT operation, t unitary operations, two hash operations, t number of IQFT operations, \((t-1)\) SUM operations, t measure operations, and transmit \((t-1)\) message particles with \((t-1)\) decoy particles. However, our protocol requires one QFT operation, t unitary operations, two hash operations, \((t-1)\) IQFT operation, \((t-1)\) measure operations, and transmit \((t-1)\) number of message particles. Moreover, the Mashhadi’s protocol uses the SUM operation, more number of IQFT operation, and transmission of \((t-1)\) decoy particles; whereas, our protocol uses CNOT gate, less number of IQFT operation, and no transmission of the decoy particles. Hence, it has high cost as compared to our protocol. In addition, the proposed protocol is more cost effective, efficient, and secure as compared to the Song et al.’s9, and Mashhadi’s43 protocols. Table 1 shows the comparison of these protocols.
Conclusion
In this paper, we have discussed a new (t, n) threshold protocol for quantum secret sharing in which the reconstructor can reconstruct the original secret efficiently. This protocol can execute the threshold number of participants without any trusted reconstructor participant. Further, the secret hash value and the secret are unknown to the reconstructor participant and he cannot execute the collision attack, but can correctly execute the proposed protocol. The proposed protocol can also resist the coherent and collective attacks.
References
Liu, F., Qin, S.-J. & Wen, Q.-Y. A quantum secret-sharing protocol with fairness. Phys. Scr. 89, 075104 (2014).
Gao, G. A note on wang et al‘s attack on zhang et al‘s multiparty quantum secret sharing. Phys. Scr. 86, 075104 (2012).
Chen, X.-B., Yang, S., Su, Y. & Yang, Y.-X. Cryptanalysis on the improved multiparty quantum secret sharing protocol based on the ghz state. Phys. Scr. 86, 055002 (2012).
Singh, S. K. & Srikanth, R. Some directions beyond traditional quantum secret sharing. Phys. Scr. 77, 065007 (2008).
Abulkasim, H., Hamad, S., El Bahnasy, K. & Rida, S. Z. Authenticated quantum secret sharing with quantum dialogue based on bell states. Phys. Scr. 91, 085101 (2016).
Cheung, C.-Y. Controlled quantum secret sharing. Phys. Scr. 74, 459 (2006).
Liu, X.-F. & Pan, R.-J. Cryptanalysis of quantum secret sharing based on ghz states. Phys. Scr. 84, 045015 (2011).
Mashhadi, S. General secret sharing based on quantum fourier transform. Quant. Inf. Process. 18, 1–15 (2019).
Song, X.-L., Liu, Y.-B., Deng, H.-Y. & Xiao, Y.-G. (t, n) threshold d-level quantum secret sharing. Sci. Rep. 7, 6366 (2017).
Sutradhar, K. & Om, H. Efficient quantum secret sharing without a trusted player. Quant. Inf. Process. 19, 73 (2020).
Sutradhar, K. & Om, H. A generalized quantum protocol for secure multiparty summation. IEEE Trans. Circ. Syst. II Express Briefs 67, 2978–2982 (2020).
Mashhadi, S. Analysis of frame attack on hsu et al‘s non-repudiable threshold multi-proxy multi-signature scheme with shared verification. Sci. Iran. 19, 674–679 (2012).
Long, G. & Liu, Y. Search an unsorted database with quantum mechanics. Front. Comput. Sci. China 1, 247–271 (2007).
Mashhadi, S. A novel secure self proxy signature scheme. IJ Netw. Secur. 14, 22–26 (2012).
Sun, Z. et al. Toward practical quantum secure direct communication: A quantum-memory-free protocol and code design. IEEE Trans. Commun. 68, 5778–5792 (2020).
Mashhadi, S. A novel non-repudiable threshold proxy signature scheme with known signers. IJ Netw. Secur. 15, 274–279 (2013).
Quan, Q. et al. Two-copy quantum teleportation. Sci. Rep. 8, 1–8 (2018).
Mashhadi, S. Computationally secure multiple secret sharing: Models, schemes, and formal security analysis. ISeCure 7, 91–9 (2015).
Long, G. Physicists experimentally verify the multipartite generalized hardy‘s paradox. Sci. Bull. 63, 1597 (2018).
Mashhadi, S. How to fairly share multiple secrets stage by stage. Wirel. Pers. Commun. 90, 93–107 (2016).
Shi, R.-H. & Zhang, S. Quantum solution to a class of two-party private summation problems. Quant. Inf. Process. 16, 1–9 (2017).
Sutradhar, K. & Om, H. An efficient simulation for quantum secure multiparty computation. Sci. Rep. 11, 1–9 (2021).
Sutradhar, K. & Om, H. Hybrid quantum protocols for secure multiparty summation and multiplication. Sci. Rep. 10, 1–9 (2020).
Shi, R.-H., Mu, Y., Zhong, H., Zhang, S. & Cui, J. Quantum private set intersection cardinality and its application to anonymous authentication. Inf. Sci. 370, 147–158 (2016).
Shi, R.-H., Mu, Y., Zhong, H. & Zhang, S. Comment on secure quantum private information retrieval using phase-encoded queries. Phys. Rev. A 94, 066301 (2016).
Shi, R.-H. Efficient quantum protocol for private set intersection cardinality. IEEE Access 6, 73102–73109 (2018).
Qin, H., Tso, R. & Dai, Y. Multi-dimensional quantum state sharing based on quantum fourier transform. Quant. Inf. Process. 17, 48 (2018).
Bao-Kui, L., Yu-Guang, Y. & Qiao-Yan, W. Threshold quantum secret sharing of secure direct communication. Chin. Phys. Lett. 26, 010302 (2009).
Yang, W., Huang, L., Shi, R. & He, L. Secret sharing based on quantum fourier transform. Quant. Inf. Process. 12, 2465–2474 (2013).
Mashhadi, S. New multi-stage secret sharing in the standard model. Inf. Process. Lett. 127, 43–48 (2017).
Hillery, M., Bužek, V. & Berthiaume, A. Quantum secret sharing. Phys. Rev. A 59, 1829 (1999).
Xiao, L., Long, G. L., Deng, F.-G. & Pan, J.-W. Efficient multiparty quantum-secret-sharing schemes. Phys. Rev. A 69, 052307 (2004).
Zhang, Z.-J. Multiparty quantum secret sharing of secure direct communication. Phys. Lett. A 342, 60–66 (2005).
Long, G.-L. & Liu, X.-S. Theoretically efficient high-capacity quantum-key-distribution scheme. Phys. Rev. A 65, 032302 (2002).
Deng, F.-G., Long, G. L. & Liu, X.-S. Two-step quantum direct communication protocol using the einstein-podolsky-rosen pair block. Phys. Rev. A 68, 042317 (2003).
Long, G.-L. et al. Quantum secure direct communication and deterministic secure quantum communication. Front. Phys. China 2, 251–272 (2007).
Ye, C., Shi-Guo, P., Chao, Z. & Gui-Lu, L. Quantum fourier transform and phase estimation in qudit system. Commun. Theor. Phys. 55, 790 (2011).
Qin, H., Zhu, X. & Dai, Y. (t, n) threshold quantum secret sharing using the phase shift operation. Quant. Inf. Process. 14, 2997–3004 (2015).
Zhang, C. et al. Experimental observation of quantum nonlocality in general networks with different topologies. Fundam. Res. 1, 22–26 (2021).
Hu, X.-M. et al. Experimental certification for nonclassical teleportation. Quant. Eng. 1, e13 e13 (2019).
Eastlake, D. & Jones, P. Us secure hash algorithm 1 (sha1) (2001).
Kao, S.-H. & Hwang, T. Comment on (t, n) threshold d-level quantum secret sharing. Preprint arXiv:1803.00216 (2018).
Mashhadi, S. Improvement of a (t, n) threshold d- level quantum secret sharing scheme. J. Appl. Secur. Res. 1–12 (2020).
Shamir, A. How to share a secret. Commun. ACM 22, 612–613 (1979).
Shi, R.-H., Mu, Y., Zhong, H., Cui, J. & Zhang, S. Secure multiparty quantum computation for summation and multiplication. Sci. Rep. 6, 1–9 (2016).
Acknowledgements
This work is partially supported by Indian Institute of technology (ISM) Dhanbad.
Author information
Authors and Affiliations
Contributions
Study conception, design, and writing of the manuscript: K.S. Analysis: H.O. All authors reviewed the manuscript.
Corresponding author
Ethics declarations
Competing Interests
The authors declare no competing interests.
Additional information
Publisher's note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/.
About this article
Cite this article
Sutradhar, K., Om, H. Enhanced (t, n) threshold d-level quantum secret sharing. Sci Rep 11, 17083 (2021). https://doi.org/10.1038/s41598-021-96634-8
Received:
Accepted:
Published:
DOI: https://doi.org/10.1038/s41598-021-96634-8
This article is cited by
-
Security Analysis and Improvements on a Semi-Quantum Electronic Voting Protocol
International Journal of Theoretical Physics (2024)
-
Quantum (t, n) threshold signature based on logistic chaotic sequences and mutually unbiased bases
Quantum Information Processing (2024)
-
A d-level quantum secret sharing scheme with cheat-detection (t, m) threshold
Quantum Information Processing (2023)
-
Robust Quantum Secure Multiparty Computation Protocols for Minimum Value Calculation in Collective Noises and Their Simulation
International Journal of Theoretical Physics (2023)
-
SKC-CCCO: an encryption algorithm for quantum group signature
Quantum Information Processing (2022)
Comments
By submitting a comment you agree to abide by our Terms and Community Guidelines. If you find something abusive or that does not comply with our terms or guidelines please flag it as inappropriate.