首页 | 本学科首页   官方微博 | 高级检索  
     检索      


Verifiable Quantum (<Emphasis Type="Italic">k</Emphasis>,<Emphasis Type="Italic">n</Emphasis>)-threshold Secret Key Sharing
Authors:Yu-Guang Yang  Yi-Wei Teng  Hai-Ping Chai  Qiao-Yan Wen
Institution:1.College of Computer Science and Technology,Beijing University of Technology,Beijing,China;2.State Key Laboratory of Networking and Switching Technology,Beijing University of Posts and Telecommunications,Beijing,China;3.State Key Laboratory of Information Security,Graduate University of Chinese Academy of Sciences,Beijing,China;4.State Key Laboratory of Integrated Services Network,Xidian University,Xi’an,China
Abstract:Based on Lagrange interpolation formula and the post-verification mechanism, we show how to construct a verifiable quantum (k,n) threshold secret key sharing scheme. Compared with the previous secret sharing protocols, ours has the merits: (i) it can resist the fraud of the dealer who generates and distributes fake shares among the participants during the secret distribution phase; Most importantly, (ii) It can check the cheating of the dishonest participant who provides a false share during the secret reconstruction phase such that the authorized group cannot recover the correct secret.
Keywords:
本文献已被 SpringerLink 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号