期刊文献+
共找到36篇文章
< 1 2 >
每页显示 20 50 100
一种分布式可验证的多秘密共享方案 被引量:2
1
作者 何斌 黄杰 +1 位作者 黄根勋 唐燕 《微计算机信息》 北大核心 2006年第12X期61-62,82,共3页
本文给出了一个在分布式环境下可验证的多秘密共享方案(VMSS)。在以往的多秘密共享方案中一般都是要有一个被称为庄家或秘密分发者(Dealer)的参与才能实现多个秘密的共享,但是在现实的应用中很多情况下都要求秘密共享方案是在无庄家(Dea... 本文给出了一个在分布式环境下可验证的多秘密共享方案(VMSS)。在以往的多秘密共享方案中一般都是要有一个被称为庄家或秘密分发者(Dealer)的参与才能实现多个秘密的共享,但是在现实的应用中很多情况下都要求秘密共享方案是在无庄家(Dealer)参与下的分布式运算方案,并且要具备一定的防欺骗功能。本文基于Asmuth-Bloom门限方案就给出了这么一种在分布式计算的环境下可验证的多秘密共享方案。 展开更多
关键词 秘密共 Asmuth-Bloom门限方案 VMSS
下载PDF
Multiparty Quantum Secret Sharing Using Two-Photon Three-Dimensional Bell States 被引量:3
2
作者 GAO Gan 《Communications in Theoretical Physics》 SCIE CAS CSCD 2009年第9期421-424,共4页
We present a two-photon three-dimensional multiparty quantum secret sharing scheme.The secret messagesare encoded by performing local operations.This is different from those quantum secret sharing protocols that all s... We present a two-photon three-dimensional multiparty quantum secret sharing scheme.The secret messagesare encoded by performing local operations.This is different from those quantum secret sharing protocols that all sharersmust make a state measurement.The merit of our protocol is the high capacity. 展开更多
关键词 Bell state THREE-DIMENSIONAL quantum secret sharing
下载PDF
Improved Multipartite Quantum Secret Sharing Protocol Using Preshared Greenberger-Horne-Zeilinger States 被引量:3
3
作者 谢灯 叶明勇 李兴华 《Communications in Theoretical Physics》 SCIE CAS CSCD 2011年第12期1027-1030,共4页
Inspired by the protocol presented by Bagherinezhad and Karimipour[Phys.Rev.A 67(2003) 044302], which will be shown to be insecure,we present a multipartite quantum secret sharing protocol using reusable GreenbergerHo... Inspired by the protocol presented by Bagherinezhad and Karimipour[Phys.Rev.A 67(2003) 044302], which will be shown to be insecure,we present a multipartite quantum secret sharing protocol using reusable GreenbergerHorne -Zeilinger(GHZ) states.This protocol is robust against eavesdropping and could be used for the circumstance of many parties. 展开更多
关键词 secret sharing Greenberger-Horne-Zeilinger state quantum cryptography
下载PDF
Quantum Secret Sharing Using GHZ-Like State 被引量:2
4
作者 谢朝任 蔡家纬 黄宗立 《Communications in Theoretical Physics》 SCIE CAS CSCD 2010年第12期1019-1022,共4页
This paper presents a simple and novel quantum secret sharing scheme using GHZ-like state. The characteristics of the GHZ-like state are used to develop the quantum secret sharing scheme. In contrast with the other GH... This paper presents a simple and novel quantum secret sharing scheme using GHZ-like state. The characteristics of the GHZ-like state are used to develop the quantum secret sharing scheme. In contrast with the other GHZ-based QSS protocols with the same assumptions, the proposed protocol provides the best quantum bit efficiency. 展开更多
关键词 quantum cryptography quantum secret sharing GHZ-like state
下载PDF
Quantum Secret Sharing Based on Chinese Remainder Theorem 被引量:3
5
作者 施荣华 粟倩 +1 位作者 郭迎 李门浩 《Communications in Theoretical Physics》 SCIE CAS CSCD 2011年第4期573-578,共6页
A novel quantum secret sharing (QSS) scheme is proposed on the basis of Chinese Remainder Theorem (CRT). In the scheme, the classical messages are mapped to secret sequences according to CRT equations, and distrib... A novel quantum secret sharing (QSS) scheme is proposed on the basis of Chinese Remainder Theorem (CRT). In the scheme, the classical messages are mapped to secret sequences according to CRT equations, and distributed to different receivers by different dimensional superdense-coding respectively. CRT's secret sharing function, together with high-dimensional superdense-eoding, provide convenience, security, and large capability quantum channel for secret distribution and recovering. Analysis shows the security of the scheme. 展开更多
关键词 quantum secret sharing Chinese Remainder Theorem quantum superdense-coding
下载PDF
Multiparty Quantum Secret Sharing Using Quantum Fourier Transform 被引量:3
6
作者 HUANG Da-Zu CHEN Zhi-Gang GUO Ying 《Communications in Theoretical Physics》 SCIE CAS CSCD 2009年第2期221-226,共6页
A (n, n)-threshold scheme of multiparty quantum secret sharing of classical or quantum message is proposed based on the discrete quantum Fourier transform. In our proposed scheme, the secret message, which is encode... A (n, n)-threshold scheme of multiparty quantum secret sharing of classical or quantum message is proposed based on the discrete quantum Fourier transform. In our proposed scheme, the secret message, which is encoded by using the forward quantum Fourier transform and decoded by using the reverse, is split and shared in such a way that it can be reconstructed among them only if all the participants work in concert. Fhrthermore, we also discuss how this protocol must be carefully designed for correcting errors and checking eavesdropping or a dishonest participant. Security analysis shows that our scheme is secure. Also, this scheme has an advantage that it is completely compatible with quantum computation and easier to realize in the distributed quantum secure computation. 展开更多
关键词 quantum secret sharing quantum Fourier transform quantum error correction code
下载PDF
Universal Three-Party Quantum Secret Sharing Against Collective Noise 被引量:2
7
作者 杨宇光 王园 +1 位作者 滕义伟 温巧燕 《Communications in Theoretical Physics》 SCIE CAS CSCD 2011年第4期589-593,共5页
we present a robust and universal quantum secret sharing protocol with four-qubit decoherence-free (DF) states against collective noise. The transmission's safety is ensured by the nonorthogonality of the noiseless... we present a robust and universal quantum secret sharing protocol with four-qubit decoherence-free (DF) states against collective noise. The transmission's safety is ensured by the nonorthogonality of the noiseless states traveling on the quantum channel. Although this scheme uses entangled states for encoding, only single-particle product measurements are required. 展开更多
关键词 quantum secret sharing 03.67.Hk decoherence-free collective noise
下载PDF
Enhancement of GAO's Multiparty Quantum Secret Sharing 被引量:2
8
作者 Cheng-Chieh Hwang Tzonelih Hwang Chuan-Ming Li 《Communications in Theoretical Physics》 SCIE CAS CSCD 2011年第7期79-82,共4页
A multiparty quantum secret sharing (MQSS) protocol with two-photon three-dimensional Bell states was proposed by Gao [Commun. Theor. Phys. 52 (2009) 421] recently. This study points out that the performance of Gao... A multiparty quantum secret sharing (MQSS) protocol with two-photon three-dimensional Bell states was proposed by Gao [Commun. Theor. Phys. 52 (2009) 421] recently. This study points out that the performance of Gao's protocol can be much improved by using the technique of decoy single photons and carefully modifying the protocol to remove some unnecessary unitary operations, devices, and transmissions. 展开更多
关键词 quantum secret sharing Greenberger-Horne-Zeilinger state
下载PDF
Multiparty Quantum Secret Sharing via Introducing Auxiliary Particles Using a Pure Entangled State 被引量:1
9
作者 XIA Yan SONG Jie SONG He-Shan HUANG Xiao-Li HUANG Xiao-Li 《Communications in Theoretical Physics》 SCIE CAS CSCD 2008年第6期1468-1472,共5页
We propose a new multiparty quantum secret sharing protocol via introducing auxiliary particles using a non-maximally entangled (pure) two-particle state without a Bell measurement. The communication parties utilize... We propose a new multiparty quantum secret sharing protocol via introducing auxiliary particles using a non-maximally entangled (pure) two-particle state without a Bell measurement. The communication parties utilize decoy particles tO check eavesdropping. After ensuring the security of the quantum channel, the sender encodes the secret message and transmits it to the receiver by using controlled-NOT operation and von Neumann measurement. If and only if all the agents agree to collaborate, they can read out the secret message. 展开更多
关键词 multiparty quantum secret sharing auxiliary particle controlled-NOT operation non-maximally entangled two-particle state
下载PDF
Privacy-preserving Distributed Location Proof Generating System 被引量:3
10
作者 LIU Mengjun LIU Shubo +3 位作者 ZHANG Rui Li Yongkai WANG Jun CAO Hui 《China Communications》 SCIE CSCD 2016年第3期203-218,共16页
The rapid development of location-based service(LBS) drives one special kind of LBS, in which the service provider verifies user location before providing services. In distributed location proof generating schemes, pr... The rapid development of location-based service(LBS) drives one special kind of LBS, in which the service provider verifies user location before providing services. In distributed location proof generating schemes, preventing users from colluding with each other to create fake location proofs and protecting user's location privacy at the same time, are the main technical challenges to bring this kind of LBS into practical. Existing solutions tackle these challenges with low collusion-detecting efficiency and defected collusion-detecting method. We proposed two novel location proof generating schemes, which inversely utilized a secure secret-sharing scheme and a pseudonym scheme to settle these shortcomings. Our proposed solution resists and detects user collusion attacks in a more efficient and correct way. Meanwhile, we achieve a higher level of location privacy than that of previous work. The correctness and efficiency of our proposed solution is testified by intensive security analysis, performance analysis, as well as experiments and simulation results. 展开更多
关键词 computer software and theory location proof secret-sharing location privacy
下载PDF
Constructions of Cheating Immune Secret Sharing Functions 被引量:1
11
作者 卓泽朋 Zhang Weiguo Xiao Guozhen 《High Technology Letters》 EI CAS 2011年第1期102-105,共4页
Based on the relationship between cheating immune secret sharing and cryptographic criteria of Boolean functions, to design a cheating immune secret sharing scheme, a 1-resilient function satisfying the strict avalanc... Based on the relationship between cheating immune secret sharing and cryptographic criteria of Boolean functions, to design a cheating immune secret sharing scheme, a 1-resilient function satisfying the strict avalanche criterion (SAC) is needed. In this paper, a technique on constructing a cheating immune secret sharing function is studied. By using Maiorana-McFarland construction technique, two new methods to construct cheating immune secret sharing functions are proposed. 展开更多
关键词 secret sharing Boolean function correlation immune strict avalanche criterion SAC) resilient function
下载PDF
Quantum-Dot Spin-Based Secret Sharing in an Optical Microcavity
12
作者 张英俏 张寿 +1 位作者 YEON Kyu-Hwang YU Seong-Cho 《Communications in Theoretical Physics》 SCIE CAS CSCD 2010年第12期1049-1053,共5页
Two schemes of quantum secret sharing are proposed via single electron spin confined in charged QDs inside a single-sided microcavity and a double-sided microcavity, respectively. Both schemes rely on coherent photons... Two schemes of quantum secret sharing are proposed via single electron spin confined in charged QDs inside a single-sided microcavity and a double-sided microcavity, respectively. Both schemes rely on coherent photonspin interaction. The two schemes axe both deterministic and can be extended to multipartite secret sharing. 展开更多
关键词 secret sharing quantum-dot spin single-sided microcavity double-sided microcavity
下载PDF
Scheme for Quantum Dense Coding with Secret Sharing in Cavity QED
13
作者 ZOU Chang-Lin XUE Zheng-Yuan CAO Zhuo-Liang 《Communications in Theoretical Physics》 SCIE CAS CSCD 2008年第2期365-368,共4页
Quantum dense coding (QDC) is a process originally proposed to send two classical bits information from a sender to a receiver by sending only one qubit. Our scheme of QDC is proposed following some ideas on secret ... Quantum dense coding (QDC) is a process originally proposed to send two classical bits information from a sender to a receiver by sending only one qubit. Our scheme of QDC is proposed following some ideas on secret sharing with entanglement in cavity QED. Based on the theory of secret sharing the QDC process can be more secure. 展开更多
关键词 quantum dense coding quantum secret sharing cavity QED
下载PDF
Robust Multiparty Quantum Secret Sharing against Participant Forcible Manipulation
14
作者 孙莹 温巧燕 朱甫臣 《Communications in Theoretical Physics》 SCIE CAS CSCD 2010年第7期89-92,共4页
The security of the multiparty quantum secret sharing protocol proposed by Gao [G.Gao,Commun.Theor.Phys.52 (2009) 421] is analyzed.It is shown that this protocol is vulnerable since the agents' imperfectencryption... The security of the multiparty quantum secret sharing protocol proposed by Gao [G.Gao,Commun.Theor.Phys.52 (2009) 421] is analyzed.It is shown that this protocol is vulnerable since the agents' imperfectencryption scheme can be attacked by a powerful participant.We introduce a attack strategy called participant forciblemanipulation and analyze the information leakage in this protocol under this attack.At last,we give an improved versionof the original protocol.The improved protocol is robust and has the same efficiency as the original one. 展开更多
关键词 two-level systems quantum secret sharing quantum information
下载PDF
Reexamining Security of Improved Multiparty Quantum Secret Splitting and Quantum State Sharing
15
作者 林崧 《Communications in Theoretical Physics》 SCIE CAS CSCD 2010年第6期1059-1061,共3页
In a recent letter [H.F. Wang, X. Ji, and S. Zhang, Phys. Lett. A 358 (2006) 11], an improvement of the multiparty quantum secret splitting and quantum state sharing protocol [F.G. Deng, et al., Phys. Lett. A 354 (... In a recent letter [H.F. Wang, X. Ji, and S. Zhang, Phys. Lett. A 358 (2006) 11], an improvement of the multiparty quantum secret splitting and quantum state sharing protocol [F.G. Deng, et al., Phys. Lett. A 354 (2006) 190.] was presented. We study the security of the improved protocol and find that two or more dishonest participants may recover the secret from the dealer. Hence we further modify the improved protocol, which make it stand against this kind of attack. 展开更多
关键词 quantum secret sharing entanglement swapping
下载PDF
Binary Cyclic Codes and Minimal Codewords
16
作者 Selda Calkavur 《Computer Technology and Application》 2013年第9期486-489,共4页
Cyclic codes form an important class of codes. They have very interesting algebraic structure. Furthermore, they are equivalent to many important codes, such as binary Hamming codes, Golay codes and BCH codes. Minimal... Cyclic codes form an important class of codes. They have very interesting algebraic structure. Furthermore, they are equivalent to many important codes, such as binary Hamming codes, Golay codes and BCH codes. Minimal codewords in linear codes are widely used in constructing decoding algorithms and studying linear secret sharing scheme. In this paper, we show that in the binary cyclic code all of the codewords are minimal, except 0 and 1. Then, we obtain a result about the number of minimal codewords in the binary cyclic codes. 展开更多
关键词 Linear code cyclic code binary cyclic code generator polynomial minimal codeword secret sharing.
下载PDF
Some Secret Sharing Schemes Based on the Finite Fields
17
作者 Selda Calkavur 《Computer Technology and Application》 2016年第6期269-272,共4页
A (t, n)--secret sharing scheme is a method of distribution of information among n participants such that t 〉 1 can reconstruct the secret but (t - 1) cannot. We explore some (k, n)--secret sharing schemes base... A (t, n)--secret sharing scheme is a method of distribution of information among n participants such that t 〉 1 can reconstruct the secret but (t - 1) cannot. We explore some (k, n)--secret sharing schemes based on the finite fields. 展开更多
关键词 Secret sharing threshold secret sharing scheme finite field.
下载PDF
Secret Sharing Schemes Based on the Dual Code of the Code of a Symmetric (v, k, λ)-Design and Minimal Access Sets
18
作者 Selda Calkavur 《Computer Technology and Application》 2015年第2期95-100,共6页
Secret sharing has been a subject of study for over 30 years. The coding theory has been an important role in the constructing of the secret sharing schemes. It is known that every linear code can be used to construct... Secret sharing has been a subject of study for over 30 years. The coding theory has been an important role in the constructing of the secret sharing schemes. It is known that every linear code can be used to construct the secret sharing schemes. Since the code of a symmetric (V, k, λ)-design is a linear code, this study is about the secret sharing schemes based on C of Fp-code C of asymmetric (v, k, λ)-design. 展开更多
关键词 Linear code the code of a symmetric design secret sharing scheme minimal access set.
下载PDF
A New Method to Construct Secret Sharing Schemes Based on Linear Codes
19
作者 Selda Calkavur 《Computer Technology and Application》 2015年第2期89-94,共6页
Secret sharing is an important topic in cryptography and has applications in information security. The coding theory has been an important role in the constructing of secret sharing schemes. It is known that every lin... Secret sharing is an important topic in cryptography and has applications in information security. The coding theory has been an important role in the constructing of secret sharing schemes. It is known that every linear code can be used to construct secret sharing schemes. So, we use the parity-check matrix of a linear code to construct secret sharing schemes based on linear codes. We also describe some techniques to recover the secret and determine the access structure of the new scheme. In this paper, we use the Massey's secret sharing scheme. 展开更多
关键词 Linear code parity-check matrix secret sharing scheme minimal codeword minimal access set.
下载PDF
A Verifiable Multi-Secret Sharing Scheme Based on Hermite Interpolation
20
作者 Tomoko Adachi Chie Okazaki 《Journal of Mathematics and System Science》 2014年第9期587-592,共6页
A threshold scheme, which is introduced by Shamir in 1979, is very famous as a secret sharing scheme. We can consider that this scheme is based on Lagrange's interpolation formula. A secret sharing scheme has one key... A threshold scheme, which is introduced by Shamir in 1979, is very famous as a secret sharing scheme. We can consider that this scheme is based on Lagrange's interpolation formula. A secret sharing scheme has one key. On the other hand, a multi-secret sharing scheme has more than one key, that is, a multi-secret sharing scheme has p (〉_ 2) keys. Dealer distribute shares of keys among n participants. Gathering t (〈 n) participants, keys can be reconstructed. Yang et al. (2004) gave a scheme of a (t, n) multi-secret sharing based on Lagrange's interpolation. Zhao et al. (2007) gave a scheme of a (t, n) verifiable multi-secret sharing based on Lagrange's interpolation. Recently, Adachi and Okazaki give a scheme of a (t, n) multi-secret sharing based on Hermite interpolation, in the case ofp 〈 t. In this paper, we give a scheme ofa (t, n) verifiable multi-secret sharing based on Hermite interpolation. 展开更多
关键词 Verifiable secret sharing scheme Multi-secret sharing scheme Hermite interpolation
下载PDF
上一页 1 2 下一页 到第
使用帮助 返回顶部