Indexed by:
Abstract:
Based on Lagrange interpolation formula and the post-verification mechanism, we show how to construct a verifiable quantum (k,n) threshold secret key sharing scheme. Compared with the previous secret sharing protocols, ours has the merits: (i) it can resist the fraud of the dealer who generates and distributes fake shares among the participants during the secret distribution phase; Most importantly, (ii) It can check the cheating of the dishonest participant who provides a false share during the secret reconstruction phase such that the authorized group cannot recover the correct secret.
Keyword:
Reprint Author's Address:
Email:
Source :
INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS
ISSN: 0020-7748
Year: 2011
Issue: 3
Volume: 50
Page: 792-798
1 . 4 0 0
JCR@2022
ESI Discipline: PHYSICS;
JCR Journal Grade:3
CAS Journal Grade:4
Cited Count:
WoS CC Cited Count: 54
SCOPUS Cited Count: 57
ESI Highly Cited Papers on the List: 0 Unfold All
WanFang Cited Count:
Chinese Cited Count:
30 Days PV: 3
Affiliated Colleges: