0% Complete
Home
/
11th International Conference on Computer and Knowledge Engineering
Optimization of quantum secret sharing communication using corresponding bits
Authors :
Mahsa Khorrampanah
1
Mohammad Bolokian
2
Monireh Houshmand
3
1- Faculty of Electrical and Computer Engineering, University of Tabriz
2- Faculty of Electrical Engineering, Imam Reza International University
3- Faculty of Electrical Engineering, Imam Reza International University
Keywords :
quantum computation, quantum cryptography, quantum secret sharing, quantum secure direct communication
Abstract :
A three-party quantum secret sharing protocol using secure direct communication is proposed. The protocol is an improved version of Wang et al.’s in terms of efficiency. The improvement is achieved by introducing a new concept of “encoded classical bits” in the decoding phase. Using the proposed protocol, treble amount of message at a time is transmitted instead of doing J. Wang et al.'s protocol thrice. No qubit carrying the message is sent. Therefore, the protocol is completely secure, if the perfect quantum channel is used.
Papers List
List of archived papers
Enhanced Atrial Fibrillation (AF) Detection via Data Augmentation with Diffusion Model
Arash Vashagh - Amirhossein Akhoondkazemi - Sayed Jalal Zahabi - Davood Shafie
Bipartite link prediction improvement using the effective utilization of edge betweenness centrality
Sadegh Sulaimany Sulaimany - Yasin Amini
Recommending Popular Locations Based on Collected Trajectories
Mohammad Rabbani bidgoli - Saber Ziaei
SGFL: A Federated Learning Approach for Non-IID Data Using Semi-Supervised DCGAN
Alireza Rabiee - Abolfazl Ajdarloo - Mohsen Rahmani
An intelligent linguistic error detection approach to automated diagnosis of Dyslexia disorder in Persian speaking children
Fatemeh Asghari - Mahsa Khorasani - Mohsen Kahani - Seyed Amir Amin Yazdi - Mahdi Arkhodi Ghalenoei
A Simple Low Cost Approach to Detect Hand Gesture Based on Software Event Camera Emulation
Ali Sabet Akbarzadeh - Abedin Vahedian
Improved TrustChain for Lightweight Devices
Seyed Salar Ghazi - Haleh Amintoosi
Android Malware Detection using Supervised Deep Graph Representation Learning
Fatemeh Deldar - Mahdi Abadi - Mohammad Ebrahimifard
Data Clustering using Chimp Optimization Algorithm
SAYED PEDRAM HAERI BOROUJENI - ELNAZ PASHAEI
A Review on Machine Learning Methods for Workload Prediction in Cloud Computing
Mohammad Yekta - Hadi Shahriar Shahhoseini
more
Samin Hamayesh - Version 42.2.1