• Chinese Journal of Quantum Electronics
  • Vol. 36, Issue 3, 348 (2019)
YUHao 1, Wei JIA2、3, Jiye ZAN1, Yuxiang BIAN2, and Jinsuo LIU2、3
Author Affiliations
  • 1[in Chinese]
  • 2[in Chinese]
  • 3[in Chinese]
  • show less
    DOI: 10.3969/j.issn.1007-5461.2019.03.015 Cite this Article
    YUHao, JIA Wei, ZAN Jiye, BIAN Yuxiang, LIU Jinsuo. A novel BB84-based quantum secret sharing with decoy states[J]. Chinese Journal of Quantum Electronics, 2019, 36(3): 348 Copy Citation Text show less
    References

    [4] He X L, Yang C P. Deterministic transfer of multiqubit GHZ entangled states and quantum secret sharing between different cavities [J]. Quantum Information Processing, 2015, 14(12): 4461-4474.

    [5] Qin H, Dai Y. d-Dimensional quantum state sharing with adversary structure [J]. Quantum Information Processing, 2016, 15(4): 1689-1701.

    [6] Zhu Z C, Hu A Q, Fu A M. Two new controlled not gate based quantum secret sharing protocols without entanglement attenuation [J]. International Journal of Theoretical Physics, 2016, 55(5): 2342-2353.

    [7] Liu F, Su Q, Wen Q Y. Eavesdropping on multiparty quantum secret sharing scheme based on the phase shift operations [J]. International Journal of Theoretical Physics, 2014, 53(5): 1730-1737.

    [8] Deng F G, Li X H, Zhou H Y, et al. Erratum: Improving the security of multiparty quantum secret sharing against trojan horse attack [J]. Physical Review A, 2005, 72(4): 440-450.

    [9] Zhang K J, Jia H Y. Cryptanalysis of a quantum proxy weak blind signature scheme [J]. International Journal of Theoretical Physics, 2015, 54(2): 582-588.

    [11] Gao F, Qin S J, Guo F Z, et al. Dense-coding attack on three-party quantum key distribution protocols [J]. IEEE Journal of Quantum Electronics, 2011, 47(5): 630-635.

    [14] Lin J, Yang C W, Tsai C W, et al. Intercept-resend attacks on semi-quantum secret sharing and the improvements [J]. International Journal of Theoretical Physics, 2013, 52(1): 156-162.

    [15] Shi J, Shi R, Peng X, et al. Distributed quantum packet transmission in non-maximally entangled relay system [J]. International Journal of Theoretical Physics, 2015, 54(4): 1128-1141.

    [16] Song T T, Wen Q Y, Gao F, et al. Participant attack and improvement to multiparty quantum secret sharing based on GHZ states [J]. International Journal of Theoretical Physics, 2013, 52(1): 293-301.

    [17] Yin A, Fu F. Eavesdropping on semi-quantum secret sharing scheme of specific bits [J]. International Journal of Theoretical Physics, 2016, 55(9): 4027-4035.

    [18] Yang Y G, Xia J, Shi L, et al. Comment on “quantum secure direct communication with authentication expansion using single photons” [J]. International Journal of Theoretical Physics, 2012, 51(12): 3681-3687.

    [19] Gottesman D, Lo H K, Lutkenhaus N, et al. Security of quantum key distribution with imperfect devices [C]. Proceedings of International Symposium on Information Theory, 2004., IEEE, 2004: 136.

    YUHao, JIA Wei, ZAN Jiye, BIAN Yuxiang, LIU Jinsuo. A novel BB84-based quantum secret sharing with decoy states[J]. Chinese Journal of Quantum Electronics, 2019, 36(3): 348
    Download Citation