收录:
摘要:
Based on Lagrange interpolation formula and the post-verification mechanism, we show how to construct a verifiable quantum (k,n) threshold secret key sharing scheme. Compared with the previous secret sharing protocols, ours has the merits: (i) it can resist the fraud of the dealer who generates and distributes fake shares among the participants during the secret distribution phase; Most importantly, (ii) It can check the cheating of the dishonest participant who provides a false share during the secret reconstruction phase such that the authorized group cannot recover the correct secret.
关键词:
通讯作者信息:
电子邮件地址: