Indexed by:
Abstract:
Recently, a measurement-device-independent protocol for deterministic quantum secret sharing was proposed (Gao et al. in Sci Chin Phys Mech Astron 63(12):120311, 2020). Unfortunately, it was pointed out to be insecure against the participant attack (Yang et al. in Sci Chin Phys Mech Astron 64(6):260321, 2021). However, this participant attack strategy has an assumption that a dishonest agent has to reveal his single-photon state after other agents. Here, we give a more powerful participant attack strategy regardless of the announcement order.
Keyword:
Reprint Author's Address:
Email:
Source :
QUANTUM INFORMATION PROCESSING
ISSN: 1570-0755
Year: 2021
Issue: 7
Volume: 20
2 . 5 0 0
JCR@2022
ESI Discipline: PHYSICS;
ESI HC Threshold:72
JCR Journal Grade:2
Cited Count:
WoS CC Cited Count: 17
SCOPUS Cited Count: 18
ESI Highly Cited Papers on the List: 0 Unfold All
WanFang Cited Count:
Chinese Cited Count:
30 Days PV: 7
Affiliated Colleges: