Two Novel Semi-Quantum Secure Direct Communication Protocols in IoT DOI Creative Commons
Yuan Tian,

Nanyijia Zhang,

Jian Li

et al.

Sensors, Journal Year: 2024, Volume and Issue: 24(24), P. 7990 - 7990

Published: Dec. 14, 2024

As Internet of Things (IoT) technology continues to advance, there is a growing awareness IoT security within the industry. Quantum communication can potentially significantly improve devices. Based on semi-quantum cryptography and utilizing single photons, this paper introduces two secure direct (SQSDC) protocols for use in smart door locks. Protocol 1 more efficient, efficiency analysis shows that as high 28.57%. Security demonstrates asymptotic protocols, effectively resisting intercept–measure–resend attacks entangle–measure from potential eavesdroppers. The extended SQSDC protocol (protocol 2) builds upon by enabling qubit transmit bits information, resulting double outcome.

Language: Английский

Multi‐Party Semi‐Quantum Private Comparison Protocol of Size Relation with d‐Level GHZ States DOI Open Access
Nanrun Zhou,

Zhen‐Yong Chen,

Yanyan Liu

et al.

Advanced Quantum Technologies, Journal Year: 2024, Volume and Issue: unknown

Published: Dec. 18, 2024

Abstract A new multi‐party semi‐quantum private comparison protocol of size relation is designed based on d ‐level GHZ states. Multiple classical participants could compare their privacies while keeping them secure under an ideal environment. Compared with some similar protocols, the in do not need to prepare and measure quantum Besides, qubit efficiency reaches 33.33%. It demonstrated that output result proposed correct. Finally, security analysis manifests behaves well withstanding intercept‐resend attack, measure‐resend entanglement Trojan horse so on.

Language: Английский

Citations

6

Scalable and verifiable quantum secret sharing with photonic efficiency via quasicausal cones in the multiscale entanglement renormalization ansatz framework DOI
Hong Lai, Z.W. Huang, Ren Li

et al.

Physical review. A/Physical review, A, Journal Year: 2025, Volume and Issue: 111(2)

Published: Feb. 5, 2025

Language: Английский

Citations

0

Multi-qubit hierarchical quantum state sharing with authentication DOI
Tianai Zhou, Xiu‐Bo Chen, Gang Xu

et al.

Quantum Information Processing, Journal Year: 2025, Volume and Issue: 24(3)

Published: Feb. 25, 2025

Language: Английский

Citations

0

Efficient (k, n) threshold semi-quantum secret sharing protocol DOI Creative Commons
Jie Cao, Jinchao Xu

Frontiers in Physics, Journal Year: 2025, Volume and Issue: 13

Published: Feb. 26, 2025

Most ( k , n ) threshold quantum secret sharing protocols are fully quantum. The message receivers must be equipped with complex devices so as to prepare various resources and perform operations, which may affect the practice of these protocols. On other hand, qubit efficiency most is not more than 1/2. To simplify protocol improve its efficiency, a new semi-quantum properties proposed. In this protocol, dealer prepares decoy particles sends them receivers. insert carrying information along Z-basis into received particle sequence generate mixed-particle sequences, returned dealer. measures sequences check for eavesdropping establishes shared keys With keys, distributes pieces among using Shamir’s scheme. Multiple messages can recovered by or our k/n . For an n) would 100%. proposed scheme based on single without any entangled system. Therefore, relatively easy prepare. Receivers only simple qubits. Its enhance implementation. has robust security against types attacks, including eavesdropping, internal, collusion attacks. Furthermore, it resist unitary attack, seldom analyzed in

Language: Английский

Citations

0

Measurement-device-independent quantum-secret-sharing networks with linear Bell-state analysis DOI
Tianqi Liu, Jiancheng Lai, Zhenhua Li

et al.

Physical Review Applied, Journal Year: 2025, Volume and Issue: 23(3)

Published: March 24, 2025

Language: Английский

Citations

0

Locally distinguishing genuinely nonlocal sets with one GHZ state DOI

Su-Juan Zhang,

Qiao Qiao, Chen‐Ming Bai

et al.

Quantum Information Processing, Journal Year: 2025, Volume and Issue: 24(4)

Published: March 26, 2025

Language: Английский

Citations

0

Authenticable quantum secret sharing based on special entangled state DOI Creative Commons
Chen‐Ming Bai,

Ya‐Xi Shu,

Sujuan Zhang

et al.

Scientific Reports, Journal Year: 2025, Volume and Issue: 15(1)

Published: March 28, 2025

In this paper, a pair of quantum states are constructed based on an orthogonal array and further generalized to multi-body systems. Subsequently, novel physical process is designed, which aimed at effectively masking within multipartite According masker, new authenticable secret sharing scheme proposed, can realize class special access structures. the distribution phase, unknown state shared safely among multiple participants, embedded into multi-particle entangled using approach. reconstruction series precisely designed measurements corresponding unitary operations performed by participants in authorized set restore original information state. To ensure security scheme, analysis five major types attacks conducted. Finally, when compared with other schemes states, proposed found be not only more flexible but also easier implement existing computing cloud platforms.

Language: Английский

Citations

0

Multiparty quantum key agreement based on GHZ states DOI Creative Commons

Ya‐Xi Shu,

Chen‐Ming Bai, Sujuan Zhang

et al.

EPJ Quantum Technology, Journal Year: 2025, Volume and Issue: 12(1)

Published: April 22, 2025

Language: Английский

Citations

0

Quantum Secret Sharing Protocol Based on Mutually Unbiased Bases in Vehicular Networks DOI
Chen‐Ming Bai,

Ya‐Xi Shu,

Sujuan Zhang

et al.

Advanced Quantum Technologies, Journal Year: 2025, Volume and Issue: unknown

Published: April 21, 2025

Abstract In this study, a quantum secret sharing protocol based on mutually unbiased bases and its characteristics is proposed, the implementation of described in detail vehicular network environment. The uses road condition information as signal, which distributed by Traffic Control System. Vehicles participating recovery can obtain information, allowing them to plan their routes advance effectively avoid more severe traffic issues. employs two unitary matrices encrypt data basis publishes hash value data, ensuring unconditional security against both internal external threats. key rate serves critical parameter for proving our protocol. A comprehensive analysis rate's performance conducted relation detection efficiency, depolarization probability, transmission distance. Additionally, study provides supported mathematical proofs. Compared similar protocols, offers higher efficiency requires shorter computation time, thereby enabling efficient signals reducing congestion other related

Language: Английский

Citations

0

Dynamic Multiparty to Multiparty Quantum Secret Sharing Based on Entanglement Swapping of Bell States DOI

J. -C. Li,

Ming‐Ming Wang

Advanced Quantum Technologies, Journal Year: 2025, Volume and Issue: unknown

Published: April 21, 2025

Abstract To address the challenge of disseminating confidential information from multiple agents to agents, a dynamic quantum secret sharing protocol is proposed for multiparty ( in Group 1) 2) based on entanglement swapping Bell states. This accommodates an unequal number two groups with and enables addition revocation 2 both pre‐measurement phase post‐measurement phase. In addition, 1 can verify shares without need third party, which significantly enhances security simplifies protocol. A comprehensive analysis demonstrates that effectively resist common attacks communications. The simulation IBM's Qiskit framework shows correctness usefulness Compared previous protocols, more flexible practical. Moreover, states exhibits superior performance compared protocols utilised others entangled study offers efficient solution advancing field secure

Language: Английский

Citations

0