Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer
SIAM Journal on Computing
Communications of the ACM
Single qubit quantum secret sharing with improved security
Quantum Information & Computation
Security of quantum key distribution with imperfect devices
Quantum Information & Computation
Security of quantum secret sharing with two-particle entanglement against individual attacks
Quantum Information & Computation
One-time proxy signature based on quantum cryptography
Quantum Information Processing
Cryptanalysis of an inter-bank E-payment protocol based on quantum proxy blind signature
Quantum Information Processing
Cryptanalysis of dynamic quantum secret sharing
Quantum Information Processing
Quantum private comparison against decoherence noise
Quantum Information Processing
Expansible quantum secret sharing network
Quantum Information Processing
Hi-index | 0.00 |
The security of a kind of quantum secret sharing with single photons was analyzed recently, and it was shown that almost all the present schemes in this kind were not secure in the sense that an unauthorized set of participants can gain access to the dealer's secret without introducing any error. In this paper, we give a general model for this kind of quantum secret sharing. Then we analyze the conditions that make it immune to all the present attacks. Finally, we give a feasible way to design secure quantum secret sharing schemes in the model.