Sensors,
Journal Year:
2024,
Volume and Issue:
24(24), P. 7990 - 7990
Published: Dec. 14, 2024
As
Internet
of
Things
(IoT)
technology
continues
to
advance,
there
is
a
growing
awareness
IoT
security
within
the
industry.
Quantum
communication
can
potentially
significantly
improve
devices.
Based
on
semi-quantum
cryptography
and
utilizing
single
photons,
this
paper
introduces
two
secure
direct
(SQSDC)
protocols
for
use
in
smart
door
locks.
Protocol
1
more
efficient,
efficiency
analysis
shows
that
as
high
28.57%.
Security
demonstrates
asymptotic
protocols,
effectively
resisting
intercept–measure–resend
attacks
entangle–measure
from
potential
eavesdroppers.
The
extended
SQSDC
protocol
(protocol
2)
builds
upon
by
enabling
qubit
transmit
bits
information,
resulting
double
outcome.
Advanced Quantum Technologies,
Journal Year:
2024,
Volume and Issue:
unknown
Published: Dec. 18, 2024
Abstract
A
new
multi‐party
semi‐quantum
private
comparison
protocol
of
size
relation
is
designed
based
on
d
‐level
GHZ
states.
Multiple
classical
participants
could
compare
their
privacies
while
keeping
them
secure
under
an
ideal
environment.
Compared
with
some
similar
protocols,
the
in
do
not
need
to
prepare
and
measure
quantum
Besides,
qubit
efficiency
reaches
33.33%.
It
demonstrated
that
output
result
proposed
correct.
Finally,
security
analysis
manifests
behaves
well
withstanding
intercept‐resend
attack,
measure‐resend
entanglement
Trojan
horse
so
on.
Frontiers in Physics,
Journal Year:
2025,
Volume and Issue:
13
Published: Feb. 26, 2025
Most
(
k
,
n
)
threshold
quantum
secret
sharing
protocols
are
fully
quantum.
The
message
receivers
must
be
equipped
with
complex
devices
so
as
to
prepare
various
resources
and
perform
operations,
which
may
affect
the
practice
of
these
protocols.
On
other
hand,
qubit
efficiency
most
is
not
more
than
1/2.
To
simplify
protocol
improve
its
efficiency,
a
new
semi-quantum
properties
proposed.
In
this
protocol,
dealer
prepares
decoy
particles
sends
them
receivers.
insert
carrying
information
along
Z-basis
into
received
particle
sequence
generate
mixed-particle
sequences,
returned
dealer.
measures
sequences
check
for
eavesdropping
establishes
shared
keys
With
keys,
distributes
pieces
among
using
Shamir’s
scheme.
Multiple
messages
can
recovered
by
or
our
k/n
.
For
an
n)
would
100%.
proposed
scheme
based
on
single
without
any
entangled
system.
Therefore,
relatively
easy
prepare.
Receivers
only
simple
qubits.
Its
enhance
implementation.
has
robust
security
against
types
attacks,
including
eavesdropping,
internal,
collusion
attacks.
Furthermore,
it
resist
unitary
attack,
seldom
analyzed
in
Scientific Reports,
Journal Year:
2025,
Volume and Issue:
15(1)
Published: March 28, 2025
In
this
paper,
a
pair
of
quantum
states
are
constructed
based
on
an
orthogonal
array
and
further
generalized
to
multi-body
systems.
Subsequently,
novel
physical
process
is
designed,
which
aimed
at
effectively
masking
within
multipartite
According
masker,
new
authenticable
secret
sharing
scheme
proposed,
can
realize
class
special
access
structures.
the
distribution
phase,
unknown
state
shared
safely
among
multiple
participants,
embedded
into
multi-particle
entangled
using
approach.
reconstruction
series
precisely
designed
measurements
corresponding
unitary
operations
performed
by
participants
in
authorized
set
restore
original
information
state.
To
ensure
security
scheme,
analysis
five
major
types
attacks
conducted.
Finally,
when
compared
with
other
schemes
states,
proposed
found
be
not
only
more
flexible
but
also
easier
implement
existing
computing
cloud
platforms.
Advanced Quantum Technologies,
Journal Year:
2025,
Volume and Issue:
unknown
Published: April 21, 2025
Abstract
In
this
study,
a
quantum
secret
sharing
protocol
based
on
mutually
unbiased
bases
and
its
characteristics
is
proposed,
the
implementation
of
described
in
detail
vehicular
network
environment.
The
uses
road
condition
information
as
signal,
which
distributed
by
Traffic
Control
System.
Vehicles
participating
recovery
can
obtain
information,
allowing
them
to
plan
their
routes
advance
effectively
avoid
more
severe
traffic
issues.
employs
two
unitary
matrices
encrypt
data
basis
publishes
hash
value
data,
ensuring
unconditional
security
against
both
internal
external
threats.
key
rate
serves
critical
parameter
for
proving
our
protocol.
A
comprehensive
analysis
rate's
performance
conducted
relation
detection
efficiency,
depolarization
probability,
transmission
distance.
Additionally,
study
provides
supported
mathematical
proofs.
Compared
similar
protocols,
offers
higher
efficiency
requires
shorter
computation
time,
thereby
enabling
efficient
signals
reducing
congestion
other
related
Advanced Quantum Technologies,
Journal Year:
2025,
Volume and Issue:
unknown
Published: April 21, 2025
Abstract
To
address
the
challenge
of
disseminating
confidential
information
from
multiple
agents
to
agents,
a
dynamic
quantum
secret
sharing
protocol
is
proposed
for
multiparty
(
in
Group
1)
2)
based
on
entanglement
swapping
Bell
states.
This
accommodates
an
unequal
number
two
groups
with
and
enables
addition
revocation
2
both
pre‐measurement
phase
post‐measurement
phase.
In
addition,
1
can
verify
shares
without
need
third
party,
which
significantly
enhances
security
simplifies
protocol.
A
comprehensive
analysis
demonstrates
that
effectively
resist
common
attacks
communications.
The
simulation
IBM's
Qiskit
framework
shows
correctness
usefulness
Compared
previous
protocols,
more
flexible
practical.
Moreover,
states
exhibits
superior
performance
compared
protocols
utilised
others
entangled
study
offers
efficient
solution
advancing
field
secure