Chinese Journal of Quantum Electronics, Volume. 36, Issue 3, 348(2019)
A novel BB84-based quantum secret sharing with decoy states
[4] [4] He X L, Yang C P. Deterministic transfer of multiqubit GHZ entangled states and quantum secret sharing between different cavities [J]. Quantum Information Processing, 2015, 14(12): 4461-4474.
[5] [5] Qin H, Dai Y. d-Dimensional quantum state sharing with adversary structure [J]. Quantum Information Processing, 2016, 15(4): 1689-1701.
[6] [6] Zhu Z C, Hu A Q, Fu A M. Two new controlled not gate based quantum secret sharing protocols without entanglement attenuation [J]. International Journal of Theoretical Physics, 2016, 55(5): 2342-2353.
[7] [7] Liu F, Su Q, Wen Q Y. Eavesdropping on multiparty quantum secret sharing scheme based on the phase shift operations [J]. International Journal of Theoretical Physics, 2014, 53(5): 1730-1737.
[8] [8] Deng F G, Li X H, Zhou H Y, et al. Erratum: Improving the security of multiparty quantum secret sharing against trojan horse attack [J]. Physical Review A, 2005, 72(4): 440-450.
[9] [9] Zhang K J, Jia H Y. Cryptanalysis of a quantum proxy weak blind signature scheme [J]. International Journal of Theoretical Physics, 2015, 54(2): 582-588.
[11] [11] Gao F, Qin S J, Guo F Z, et al. Dense-coding attack on three-party quantum key distribution protocols [J]. IEEE Journal of Quantum Electronics, 2011, 47(5): 630-635.
[14] [14] Lin J, Yang C W, Tsai C W, et al. Intercept-resend attacks on semi-quantum secret sharing and the improvements [J]. International Journal of Theoretical Physics, 2013, 52(1): 156-162.
[15] [15] Shi J, Shi R, Peng X, et al. Distributed quantum packet transmission in non-maximally entangled relay system [J]. International Journal of Theoretical Physics, 2015, 54(4): 1128-1141.
[16] [16] Song T T, Wen Q Y, Gao F, et al. Participant attack and improvement to multiparty quantum secret sharing based on GHZ states [J]. International Journal of Theoretical Physics, 2013, 52(1): 293-301.
[17] [17] Yin A, Fu F. Eavesdropping on semi-quantum secret sharing scheme of specific bits [J]. International Journal of Theoretical Physics, 2016, 55(9): 4027-4035.
[18] [18] Yang Y G, Xia J, Shi L, et al. Comment on “quantum secure direct communication with authentication expansion using single photons” [J]. International Journal of Theoretical Physics, 2012, 51(12): 3681-3687.
[19] [19] Gottesman D, Lo H K, Lutkenhaus N, et al. Security of quantum key distribution with imperfect devices [C]. Proceedings of International Symposium on Information Theory, 2004., IEEE, 2004: 136.
Get Citation
Copy Citation Text
YUHao, JIA Wei, ZAN Jiye, BIAN Yuxiang, LIU Jinsuo. A novel BB84-based quantum secret sharing with decoy states[J]. Chinese Journal of Quantum Electronics, 2019, 36(3): 348
Category:
Received: Sep. 6, 2018
Accepted: --
Published Online: Jun. 17, 2019
The Author Email: