Javascript must be enabled to continue!
A Symmetric Extensible Protocol for Quantum Secret Sharing
View through CrossRef
This paper introduces the Symmetric Extensible Quantum Secret Sharing protocol, a novel quantum protocol for secret sharing. At its heart, it is an entanglement-based protocol that relies on the use of maximally entangled GHZ tuples, evenly distributed among the players, endowing the spymaster with the ability to securely share a secret message with the agents. Its security stems from the fact that it is highly improbable for a malicious eavesdropper or a rogue double agent to disrupt its successful execution. It is characterized by symmetry, since all agents are treated indiscriminately, utilizing identical quantum circuits. Furthermore, it can be seamlessly extended to an arbitrary number of agents. Finally, after the completion of the quantum part of the protocol, the spymaster will have to publicly transmit some information, in order to allow the agents to unlock the secret message. This part of the protocol can be considered as an additional advantage, due to the fact that it gives the spymaster the privilege of deciding if, or when, it is the right time for the agents to unlock the secret message, after the completion of the quantum part of the protocol.
Title: A Symmetric Extensible Protocol for Quantum Secret Sharing
Description:
This paper introduces the Symmetric Extensible Quantum Secret Sharing protocol, a novel quantum protocol for secret sharing.
At its heart, it is an entanglement-based protocol that relies on the use of maximally entangled GHZ tuples, evenly distributed among the players, endowing the spymaster with the ability to securely share a secret message with the agents.
Its security stems from the fact that it is highly improbable for a malicious eavesdropper or a rogue double agent to disrupt its successful execution.
It is characterized by symmetry, since all agents are treated indiscriminately, utilizing identical quantum circuits.
Furthermore, it can be seamlessly extended to an arbitrary number of agents.
Finally, after the completion of the quantum part of the protocol, the spymaster will have to publicly transmit some information, in order to allow the agents to unlock the secret message.
This part of the protocol can be considered as an additional advantage, due to the fact that it gives the spymaster the privilege of deciding if, or when, it is the right time for the agents to unlock the secret message, after the completion of the quantum part of the protocol.
Related Results
Advanced frameworks for fraud detection leveraging quantum machine learning and data science in fintech ecosystems
Advanced frameworks for fraud detection leveraging quantum machine learning and data science in fintech ecosystems
The rapid expansion of the fintech sector has brought with it an increasing demand for robust and sophisticated fraud detection systems capable of managing large volumes of financi...
Advancements in Quantum Computing and Information Science
Advancements in Quantum Computing and Information Science
Abstract: The chapter "Advancements in Quantum Computing and Information Science" explores the fundamental principles, historical development, and modern applications of quantum co...
Integrating quantum neural networks with machine learning algorithms for optimizing healthcare diagnostics and treatment outcomes
Integrating quantum neural networks with machine learning algorithms for optimizing healthcare diagnostics and treatment outcomes
The rapid advancements in artificial intelligence (AI) and quantum computing have catalyzed an unprecedented shift in the methodologies utilized for healthcare diagnostics and trea...
Entanglement and Geometrical Distances in Quantum Information and Quantum Cryptography
Entanglement and Geometrical Distances in Quantum Information and Quantum Cryptography
The counter-intuitive features of Quantum Mechanics make it possible to solve problems and perform tasks that are beyond the abilities of classical computers and classical communic...
Quantum information outside quantum information
Quantum information outside quantum information
Quantum theory, as counter-intuitive as a theory can get, has turned out to make predictions of the physical world that match observations so precisely that it has been described a...
Revolutionizing multimodal healthcare diagnosis, treatment pathways, and prognostic analytics through quantum neural networks
Revolutionizing multimodal healthcare diagnosis, treatment pathways, and prognostic analytics through quantum neural networks
The advent of quantum computing has introduced significant potential to revolutionize healthcare through quantum neural networks (QNNs), offering unprecedented capabilities in proc...
Quantum metamaterials: Applications in quantum information science
Quantum metamaterials: Applications in quantum information science
Metamaterials are a class of artificially engineered materials with periodic structures possessing exceptional properties not found in conventional materials. This definition can b...
Quantum Communication and Cybersecurity
Quantum Communication and Cybersecurity
Abstract:
This book presents a comprehensive and interdisciplinary examination of the convergence between quantum information science and cybersecurity. It addresses the foundation...

