-
Article
Estimating security of the quantum key distribution from the guesswork
Quantum key distribution can provide information-theoretic security keys. In practice, the eavesdropper may attack the transmitted quantum state, which makes some information leakage to the generated key. The ...
-
Article
An arbitrated quantum signature protocol based on the chained CNOT operations encryption
At present, the encryption scheme used by most arbitrated quantum signature (AQS) protocols is quantum one-time pad (QOTP) which encrypts data qubit by qubit. Though QOTP can achieve high security for data enc...
-
Article
A multiparty error-correcting method for quantum secret sharing
Quantum secret sharing (QSS) refers to the process in which the secret is divided into several sub-secrets and sent to different users utilizing quantum technology. Only the user belonging to a specific subset...
-
Article
One-insider attack of quantum secret sharing protocol with collective eavesdrop**-check
Recently, a kind of quantum secret sharing protocol with collective eavesdrop** check was proposed by Lin et al. In this paper, we present a one-insider attack against Lin’s three-party protocol. With the me...